WhisperX tag archive

#cli

This page collects WhisperX intelligence signals tagged #cli. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (9)

The Lab · 2026-03-30 19:27:18 · GitHub Issues

1. OpenAI CLI Security Flaw: Predictable Temp Files Allowed Local Attackers to Steal Model Data, Inject Scripts

A critical security vulnerability in OpenAI's command-line interface (CLI) tool, specifically within its onboarding module, exposed systems to local attacks. The flaw resided in six functions that created temporary files using predictable names based on `Date.now()` and `Math.random().toString(36)`. This predictability...

The Lab · 2026-04-11 02:22:26 · GitHub Issues

2. Security Vulnerability: py-bugger CLI Tool Fails to Warn Users About Project Secrets

A security vulnerability has been identified in the py-bugger command-line tool, where the software provides no warning before operating on projects containing sensitive data such as API keys and passwords. This oversight occurs during execution, specifically when py-bugger processes files, leaving developers unaware t...

The Lab · 2026-04-11 02:22:28 · GitHub Issues

3. Critical Security Flaw in py-bugger CLI: Path Traversal via --target-dir Parameter

A critical security vulnerability has been identified in the py-bugger tool, exposing systems to potential path traversal attacks. The flaw resides in the `_check_git_status()` function within the CLI utilities, where user-supplied input is passed directly to a subprocess call without any sanitization. This allows an a...

The Lab · 2026-04-13 02:22:36 · GitHub Issues

4. Hermes CLI Path Traversal Vulnerability: Malicious Archives Could Overwrite System Files

A critical path traversal vulnerability in the Hermes CLI tool has been patched, closing a security gap that could have allowed attackers to overwrite critical system files or inject malicious executables. The flaw, a classic 'zip slip' vulnerability, existed in the profile archive extraction functions used by the `her...

The Lab · 2026-04-16 08:22:53 · GitHub Issues

5. Vuls Security Scanner Breaks CLI with 'kb' to 'kb-info' Rename, Adds New 'kb-vuln' Command

The Vuls open-source vulnerability scanner has introduced a breaking change to its command-line interface, directly impacting security workflows. The existing `vuls db search kb` subcommand has been renamed to `vuls db search kb-info`. This change, explicitly tagged as a "BREAKING CHANGE," will cause existing scripts, ...

The Lab · 2026-04-19 05:22:33 · GitHub Issues

6. Dragon-Mind CLI Security Audit: Input Validation Gaps Expose Risk in Multi-User or API Contexts

A security audit of the Dragon-Mind CLI tool has identified several input validation and hardening gaps that, while currently posing a low overall risk, could become exploitable if the tool's usage context expands. The audit found no exposed credentials, SQL injection, shell execution, or known CVEs, but the core comma...

The Lab · 2026-04-19 15:22:40 · GitHub Issues

7. Critical CLI-DAG Drift Exposed: Audit Finds Baseline Pipeline Missing Core Intelligence Links

A comprehensive 7-agent audit has exposed a critical structural flaw in the intelligence platform's command-line interface (CLI), revealing that its baseline data generation pipeline was fundamentally broken. The audit identified a major class of issues termed 'CLI ↔ DAG drift,' where the CLI's baseline process failed ...

The Vault · 2026-04-27 00:54:10 · GitHub Issues

8. Hook Installer Exposes Unescaped TOTEM_CMD Interpolation — Shell Injection Surface Identified in CLI Package

A security audit has flagged a fragile interpolation pattern in the hook installation mechanism of the CLI package that, if left unaddressed, could enable shell injection. The file `packages/cli/src/commands/install-hooks.ts` writes a generated shell script where the `fallbackCmd` variable is substituted directly into ...

The Lab · 2026-04-30 18:54:06 · The Register

9. Google Patches Maximum-Severity RCE Vulnerability in Gemini CLI, Warns CI/CD Pipeline Risk

Google has released a patch for a critical remote code execution vulnerability in its Gemini CLI command-line AI tool, carrying the highest possible severity rating and potentially affecting developers who run the tool within automated build and deployment pipelines. The vulnerability, rated CVSS 10.0, was patched by ...