#682 SEC-02: Pickle deserialization RCE vulnerability

closed critical Created 2025-12-25 02:55 · Updated 2025-12-25 02:58

Description

Edit
Location: engine/rag/assistant.py:116. Issue: pickle.loads() on data from database is an RCE vector. If attacker gains DB write access, they can inject malicious pickled objects. Fix: Replace pickle with JSON+HMAC signing or use numpy.load with allow_pickle=False.

Comments

Loading comments...

Context

Loading context...

Audit History

View All
Loading audit history...