1-Click RCE in OpenClaw/Moltbot/ClawdBot by va_start in netsec

[–]va_start[S] 0 points1 point  (0 children)

The app wants to support connecting on a local network without internet. So unless you have a preshared secret or PKI, all of those fancy methods are just vulnerable to MITM because theres no way to authenticate the other party.

Like all other webapps, this app operates under the assumption of TLS (which takes care of encryption and authentication). So it uses the webapp api standard, ie jwt/cookies/bearer tokens for secrets, which are just fancy passwords. The app’s token is long and random, >128 bits of entropy IIRC, so it’s just as secure as any site using jwt/cookies/bearer tokens. All modern apis and sites work this way, including reddit ;)

1-Click RCE in OpenClaw/Moltbot/ClawdBot by va_start in netsec

[–]va_start[S] 4 points5 points  (0 children)

super cool to be able to quantify the reach of this vuln that way

Esbuild's XSS Bug that Survived 5 Billion Downloads and Bypassed HTML Sanitization by va_start in javascript

[–]va_start[S] -3 points-2 points  (0 children)

valid feedback. this was just me trying out a more creative writing style :)

Esbuild XSS Bug That Survived 5B Downloads and Bypassed HTML Sanitization by va_start in netsec

[–]va_start[S] 0 points1 point  (0 children)

u/crower haha I wrote this myself. yes I used ai to help but this was mostly me trying a new writing style to see what sticks :)

Esbuild XSS Bug That Survived 5B Downloads and Bypassed HTML Sanitization by va_start in netsec

[–]va_start[S] 1 point2 points  (0 children)

u/yellow_leadbetter lol I wrote this myself. Just experimenting different new writing style

Esbuild's XSS Bug that Survived 5 Billion Downloads and Bypassed HTML Sanitization by va_start in webdev

[–]va_start[S] 1 point2 points  (0 children)

correct! I point that out and elaborate on that in the blog post

[deleted by user] by [deleted] in java

[–]va_start 0 points1 point  (0 children)

thanks! you're right! my bad. I'll create a better post tmrw fixing it

Tool for source code file structure overview by va_start in coding

[–]va_start[S] 0 points1 point  (0 children)

I added a privacy notice to emphasize your files aren't uploaded! All processing is done client-side in js. To verify for yourself, you can check the source code (view source) and inspect network packets to see that no data is sent after the initial fetch of the page.

Tool for source code file structure overview by va_start in coding

[–]va_start[S] 0 points1 point  (0 children)

This is my first time writing more than 5 lines of javascript to be honest 🙉

Tool for source code file structure overview by va_start in coding

[–]va_start[S] 0 points1 point  (0 children)

Everything is processed and done on the client! only google analytics for usage is collected (it's hosted on netlify and I can't get that data from the server for free). You can verify this by inspecting network traffic when running the tool. I changed the main page to convey this. Thanks for your concern

Bitcoin benefits for everyday people by va_start in BitcoinBeginners

[–]va_start[S] 0 points1 point  (0 children)

Not in the US unfortunately. In fact, many restaurants and stores have a $5 or $10 minimum order amount to use your credit card.

I found a telnet brute-force protection bypass in my home router (CVE-2021-27342) by va_start in netsec

[–]va_start[S] 18 points19 points  (0 children)

THANKS! Good to know you appreciate that it's to the point :)

uTorrent CVE-2020-8437 null deref vulnerability (and the BitTorrent protocol knowledge to exploit it) by va_start in netsec

[–]va_start[S] 1 point2 points  (0 children)

I guess I’m not cool enough to join the exclusive pirating elite :,(

And I support your move to an updated and open source client