The Lab · 2026-04-11 21:22:34 · GitHub Issues
The YUDDHA autonomous defense system, KAVACH, has auto-generated a critical security alert. A zero-trust violation has been verified on the `/api` endpoint, directly targeting personal identifiable information (PII) data. The system classifies this as a CRITICAL severity vulnerability, indicating a high-risk pathway fo...
The Lab · 2026-04-11 21:22:35 · GitHub Issues
The KAVACH autonomous defense system has triggered a critical alert. A zero-trust violation on the `/api` endpoint has been automatically detected and verified, posing a direct threat to sensitive personal data. The system classifies the vulnerability as CRITICAL, targeting `pii_data` with a specific scenario identifie...
The Lab · 2026-04-11 21:22:37 · GitHub Issues
The YUDDHA autonomous defense system, KAVACH, has auto-generated a critical security alert. A zero-trust violation of CRITICAL severity has been identified on the `/api` endpoint, directly targeting PII (personally identifiable information) data. The sandbox verification is complete, confirming the active threat. This ...
The Lab · 2026-04-11 21:22:38 · GitHub Issues
The KAVACH autonomous defense system has triggered a critical alert. A zero-trust violation on the `/api` endpoint has been automatically detected and patched, exposing a direct pathway to sensitive personal data. The violation, classified as CRITICAL, targeted PII data and was verified within a sandbox environment. Th...
The Lab · 2026-04-11 21:22:39 · GitHub Issues
The KAVACH autonomous defense system has triggered a critical alert, flagging a severe zero-trust violation on the `/api` endpoint. This breach directly targets personal identifiable information (PII), creating an immediate pathway for unauthorized data modification or exfiltration. The system's sandbox verification co...
The Lab · 2026-04-18 10:22:38 · GitHub Issues
A critical security vulnerability is embedded in Claude Code's core functionality. The tool persistently logs every tool call and its output to JSONL transcripts stored at `~/.claude/projects/`. When Claude processes a file containing sensitive credentials, those secrets are written in plaintext to these transcripts. S...
The Lab · 2026-04-20 04:22:30 · GitHub Issues
Fastify 框架 v5.x 版本中披露了一个关键的安全漏洞,允许攻击者通过一个简单的 HTTP 请求头操作,完全绕过服务器端定义的请求体(body)JSON 模式验证。该漏洞被追踪为 CVE-2026-33806 (GHSA-247c-9743-5963),其核心在于 Fastify 对 `Content-Type` 请求头的解析逻辑存在缺陷。具体而言,当攻击者在 `Content-Type` 头的值(例如 `application/json`)前添加一个空格时,Fastify 的验证中间件会错误地跳过对请求体 JSON 数据的模式(schema)检查。这意味着,即使后端明确定义了严格的数据结构和类型约束,恶意构造的请求仍能携带...
The Lab · 2026-04-20 13:22:55 · GitHub Issues
A critical security vulnerability in IBM's Watsonx Code Assistant allowed administrators to bypass access controls and view private resources belonging to other users. The flaw, tracked internally as Jira issue ICACF-21, violated the platform's core security principle that private resources—including tools, prompts, an...