-
Notifications
You must be signed in to change notification settings - Fork 2
Open
Description
Reviewing the codebase for JOSS, I found some security issues that contradict the paper's privacy claims.
- Arbitrary File Write:
src/backend/src/api/upload.pyusesunquote()instead ofos.path.basename(), allowing path traversal (e.g.,../../file) to overwrite system files. - Privacy/Network Exposure: Default Docker configurations bind to
0.0.0.0instead of127.0.0.1, exposing "private" instances to the entire local network. - Data Leakage:
src/backend/src/api/api.pymounts the/documentsdirectory publicly without authentication, making all research data accessible to anyone on the network. - Indirect Prompt Injection:
extract_title_ollamainupload.pyinjects raw content into prompts without delimiters, allowing malicious documents to hijack the LLM context. Consider sanitizing the result for URLs, etc. before storing.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels