The Lab · 2026-03-30 19:27:18 · GitHub Issues
A critical security vulnerability in OpenAI's command-line interface (CLI) tool, specifically within its onboarding module, exposed systems to local attacks. The flaw resided in six functions that created temporary files using predictable names based on `Date.now()` and `Math.random().toString(36)`. This predictability...
The Lab · 2026-04-11 02:22:26 · GitHub Issues
A security vulnerability has been identified in the py-bugger command-line tool, where the software provides no warning before operating on projects containing sensitive data such as API keys and passwords. This oversight occurs during execution, specifically when py-bugger processes files, leaving developers unaware t...
The Lab · 2026-04-11 02:22:28 · GitHub Issues
A critical security vulnerability has been identified in the py-bugger tool, exposing systems to potential path traversal attacks. The flaw resides in the `_check_git_status()` function within the CLI utilities, where user-supplied input is passed directly to a subprocess call without any sanitization. This allows an a...
The Lab · 2026-04-13 02:22:36 · GitHub Issues
A critical path traversal vulnerability in the Hermes CLI tool has been patched, closing a security gap that could have allowed attackers to overwrite critical system files or inject malicious executables. The flaw, a classic 'zip slip' vulnerability, existed in the profile archive extraction functions used by the `her...
The Lab · 2026-04-16 08:22:53 · GitHub Issues
The Vuls open-source vulnerability scanner has introduced a breaking change to its command-line interface, directly impacting security workflows. The existing `vuls db search kb` subcommand has been renamed to `vuls db search kb-info`. This change, explicitly tagged as a "BREAKING CHANGE," will cause existing scripts, ...
The Lab · 2026-04-19 05:22:33 · GitHub Issues
A security audit of the Dragon-Mind CLI tool has identified several input validation and hardening gaps that, while currently posing a low overall risk, could become exploitable if the tool's usage context expands. The audit found no exposed credentials, SQL injection, shell execution, or known CVEs, but the core comma...
The Lab · 2026-04-19 15:22:40 · GitHub Issues
A comprehensive 7-agent audit has exposed a critical structural flaw in the intelligence platform's command-line interface (CLI), revealing that its baseline data generation pipeline was fundamentally broken. The audit identified a major class of issues termed 'CLI ↔ DAG drift,' where the CLI's baseline process failed ...
The Vault · 2026-04-27 00:54:10 · GitHub Issues
A security audit has flagged a fragile interpolation pattern in the hook installation mechanism of the CLI package that, if left unaddressed, could enable shell injection. The file `packages/cli/src/commands/install-hooks.ts` writes a generated shell script where the `fallbackCmd` variable is substituted directly into ...
The Lab · 2026-04-30 18:54:06 · The Register
Google has released a patch for a critical remote code execution vulnerability in its Gemini CLI command-line AI tool, carrying the highest possible severity rating and potentially affecting developers who run the tool within automated build and deployment pipelines.
The vulnerability, rated CVSS 10.0, was patched by ...