-
Notifications
You must be signed in to change notification settings - Fork 14
Closed
Description
AgentAudit Security Report
Package: tabularis v0.8.12
Commit: f88d846
Risk Score: 10/100 (safe)
Report: https://agentaudit.dev/skills/tabularis
Findings
1. Database password logged in plaintext via println (MEDIUM)
- File: src-tauri/src/commands.rs:1533
- Issue: The list_databases command logs resolved connection parameters including the full database password via println! to stdout.
- Fix: Remove password from the println! output or replace with log::debug! and redact the password field.
2. SSH host key verification unconditionally disabled (MEDIUM)
- File: src-tauri/src/ssh_tunnel.rs:160
- Issue: Both SSH backends skip host key verification: system SSH uses StrictHostKeyChecking=no, and the russh backend check_server_key always returns Ok(true). This enables MITM attacks on SSH tunnels.
- Fix: Use StrictHostKeyChecking=accept-new (already used in test_ssh_connection_system) for the tunnel backend. For russh, implement proper known_hosts checking.
Automated security audit by AgentAudit
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels