Open
Conversation
This commit addresses multiple security vulnerabilities: - CDP auth via Authorization header (cloudflare#1) - SSRF whitelist in /debug/gateway-api (cloudflare#2) - XSS fix in /debug/ws-test (cloudflare#3) - Path traversal fixes (cloudflare#4, cloudflare#8) - Rate limiting middleware (cloudflare#5) - Env var names not logged (cloudflare#6) - Command injection fix + audit logging (cloudflare#7) - Dockerfile curl -k removed (cloudflare#9) - Race condition locks (cloudflare#10) - Secrets redaction in logs (cloudflare#11, cloudflare#16) - Auth event logging (cloudflare#12) - Cache poisoning prevention (cloudflare#13) - CDP header injection fix (cloudflare#14) - Sync integrity verification (cloudflare#15) - CDP scripts use auth header (cloudflare#17) All fixes maintain backwards compatibility.
- CDP auth via Authorization header (cloudflare#1) - SSRF whitelist in /debug/gateway-api (cloudflare#2) - XSS fix in /debug/ws-test (cloudflare#3) - Path traversal fixes (cloudflare#4, cloudflare#8) - Rate limiting middleware (cloudflare#5) - Env var names not logged (cloudflare#6) - Command injection fix + audit logging (cloudflare#7) - Dockerfile curl -k removed (cloudflare#9) - Race condition locks (cloudflare#10) - Secrets redaction in logs (cloudflare#11, cloudflare#16) - Auth event logging (cloudflare#12) - Cache poisoning prevention (cloudflare#13) - CDP header injection fix (cloudflare#14) - Sync integrity verification (cloudflare#15) - CDP scripts use auth header (cloudflare#17) All fixes maintain backwards compatibility.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
This PR addresses 17 security vulnerabilities identified in the codebase. All fixes maintain backwards compatibility.
Changes
🔐 Authentication & Authorization
Authorization: Bearerheader support (query param kept for backwards compatibility)💉 Injection Vulnerabilities
/debug/gateway-api/debug/ws-testJSON.stringify()for safe embeddingsanitizeRequestId()function + audit loggingFetch.fulfillRequest📁 Path Traversal
setFileInputFiles/root/clawdbase directory/_admin/assets..in raw and decoded paths🔓 Information Disclosure
redactSecrets()function before logging/debug/container-configexposes secretsredactSensitive()function for config outputAuthorizationheader in WebSocket options🛡️ Rate Limiting & DoS Prevention
🔒 Data Integrity & Race Conditions
withGatewayLock,withSyncLock,withMountLock)🔧 Other
curl -kdisables TLS verification-kflag from DockerfileCache-Control: private, no-store+VaryheadersFiles Changed