WhisperX tag archive

#code-audit

This page collects WhisperX intelligence signals tagged #code-audit. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (12)

The Lab · 2026-03-28 08:27:01 · GitHub Issues

1. Security Scanner Gap: Project Claims NoSQL Injection Detection, But Code Shows Zero Implementation

A critical gap exists between a security project's advertised capabilities and its actual code. The project's official documentation explicitly lists NoSQL injection (NoSQLi) detection as a core feature for testing injection attacks. However, a review of the source code reveals this is a documented but unimplemented fe...

The Lab · 2026-03-28 11:27:01 · GitHub Issues

2. GitHub Security Scanner Exposed: Missing CORS Policy Validation Despite Documentation Promise

A critical gap exists in a security scanner's advertised capabilities. The tool's `scan` command documentation explicitly promises "CORS policy validation," but an analysis of the source code reveals this functionality is completely unimplemented. The scanner currently checks for seven standard security headers but con...

The Lab · 2026-03-28 11:27:08 · GitHub Issues

3. Security Flaw: Admin Statistics Controller Missing Critical Permission Check, Exposing Sensitive Data

A critical security oversight has been identified in the admin interface of a PHP application. A `TODO` comment explicitly marking a missing permission check was left unimplemented in the source code, potentially exposing sensitive administrative statistics to unauthorized users. The vulnerability resides in the `Abstr...

The Lab · 2026-03-30 20:27:30 · GitHub Issues

4. Swift Mail & Notes Clients Contain Medium-Severity AppleScript Escaping Flaw, Audit Reveals

A recent external security audit has flagged a medium-severity vulnerability in the Swift-based mail and notes clients, stemming from a manual AppleScript escaping function. The flaw, located in the `ScriptRunner.swift` files for both `swift-mail` and `swift-notes`, involves the `escapeAppleScript` function used to san...

The Lab · 2026-03-30 23:27:08 · GitHub Issues

5. Critical Security Gap in MCP Stdio Probe: Missing Tool-Risk, Info-Disclosure, and Internal-URI Scans

A significant security vulnerability has been identified in the `verifyMcpEndpointStdio` function within the codebase. This function, responsible for probing stdio-based Model Context Protocol (MCP) endpoints, lacks three critical security analysis passes that are standard in other probe paths, creating a dangerous inc...

The Lab · 2026-04-01 02:26:57 · GitHub Issues

6. P1 Vulnerability in XPN: Zip Extraction Exposes Path Traversal Risk

A critical security flaw in the XPN software's archive handling allows attackers to write files anywhere on a user's system. The vulnerability, a classic 'zip-slip' attack, resides in the `XOutshine.h` export module. The code directly passes user-supplied filenames from a `.xpn` archive to the extraction function witho...

The Lab · 2026-04-05 23:26:58 · GitHub Issues

7. GitHub Security Audit Flags High-Severity ReDoS Vulnerability and Over-Permissive Workflows

An automated security audit of a GitHub repository has uncovered a high-severity vulnerability and multiple medium-risk configuration issues, exposing the project to potential denial-of-service attacks and excessive access permissions. The scan, conducted by a Gemini agent on April 5, 2026, identified a critical depend...

The Lab · 2026-04-13 20:23:04 · GitHub Issues

8. Moodle Codebase Exposes Local File Inclusion Risk via Database-Driven `require_once`

A critical security flaw has been identified within the Moodle learning platform's core code, exposing a potential path for local file inclusion (LFI). The vulnerability resides in the `executeService()` method of the `BackgroundServiceRunner` class and its legacy counterpart, `execute_background_services.php`. These c...

The Lab · 2026-04-14 04:22:30 · GitHub Issues

9. Apache Superset Security Alert: High-Risk MD5 Hash Vulnerability in Public Interface Code

A high-severity security vulnerability has been flagged within the Apache Superset analytics platform, exposing a critical weakness in its cryptographic implementation. The automated security scanner Bandit identified the use of the deprecated and cryptographically broken MD5 hash function within a core public interfac...

The Lab · 2026-04-15 06:22:34 · GitHub Issues

10. Apache Superset Codebase Exposes High-Severity Command Injection Vulnerability in command_injection.py

A high-severity security flaw has been flagged within the Apache Superset project's codebase, exposing a potential command injection vulnerability. The automated security scanner Bandit identified a critical issue in the file `command_injection.py` at line 22, where a `subprocess.call()` function is executed with `shel...

The Lab · 2026-04-15 06:22:37 · GitHub Issues

11. Apache Superset Security Flaw: Weak MD5 Password Hashing Exposed in Codebase

A high-severity security vulnerability has been flagged within the Apache Superset codebase, exposing a critical weakness in its authentication system. The automated scanner 'bandit' identified the use of the cryptographically broken MD5 hash function for password hashing in the file `weak_crypto.py`. This practice, cl...

The Lab · 2026-04-15 06:22:38 · GitHub Issues

12. Apache Superset Codebase Exposes High-Severity Weak Crypto Vulnerability in weak_crypto.py

A critical security flaw has been flagged within the Apache Superset codebase, where a SHA1 hash function is being used for security-sensitive operations. The vulnerability, classified as CWE-327, is located in the `weak_crypto.py` file at line 23. The automated scanner 'bandit' identified the use of the cryptographica...