Critical Command Injection in Update-Service: Security Review Finding Ignored, Vulnerability Shipped
A critical command injection vulnerability, explicitly identified in a security review, has been shipped in production code. The flaw resides in the `update-service`, where the `image_ref` parameter is passed directly to the podman CLI without any sanitization. Despite the review system logging this finding in DuckDB, the orchestrator failed to trigger a remediation session, allowing the vulnerable code to pass all subsequent tests and deployment gates. The session summary for `07_update_service:3` confirms the dangerous pattern: the `RealPodmanExecutor` uses `tokio::process::Command`, passing arguments directly to the shell.
The vulnerability creates a direct path for an attacker to execute arbitrary commands on the host system. By controlling the `image_ref` input—potentially through a malicious API request—an adversary could inject shell commands. This represents a severe breakdown in the security feedback loop; the system successfully detected a critical flaw but then completely failed to act on it, treating the finding as a mere data point rather than a blocking issue.
The incident exposes a dangerous gap between security review and operational enforcement. A known, documented vulnerability slipped through because the orchestrator's workflow did not mandate remediation. This raises urgent questions about the integrity of the entire review and deployment pipeline, suggesting that other critical findings could be similarly ignored, leaving shipped software with known, exploitable weaknesses.