-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Labels
help wantedExtra attention is neededExtra attention is neededsecuritysystem security vulnerabilitiessystem security vulnerabilities
Description
- Description:
services/shieldx-sandbox/autoheal/main.goexposes/autoheal/incidentwithout any authentication or rate limiting. An external actor can fabricate incidents that triggerMeshControllerto launch replacement VMs viatriggerRecovery, leading to resource exhaustion or unauthorized infrastructure changes. - Location:
services/shieldx-sandbox/autoheal/main.go(handler registration) andshared/shieldx-common/core/autoheal/mesh_controller.go(HandleIncident/triggerRecovery). - Recommendation: Require strong auth (JWT/mTLS + RBAC) for incident submission, validate node identifiers, enforce quotas, and ensure recovery workflows verify origin before provisioning resources.
- Done when: Unauthorized requests get 401/403, abuse tests cannot spawn incidents, and audit logs capture authenticated operators only.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
help wantedExtra attention is neededExtra attention is neededsecuritysystem security vulnerabilitiessystem security vulnerabilities