Skip to content

Security Audit: 2 medium findings (password logging, SSH host key bypass) #32

@starbuck100

Description

@starbuck100

AgentAudit Security Report

Package: tabularis v0.8.12
Commit: f88d846
Risk Score: 10/100 (safe)
Report: https://agentaudit.dev/skills/tabularis

Findings

1. Database password logged in plaintext via println (MEDIUM)

  • File: src-tauri/src/commands.rs:1533
  • Issue: The list_databases command logs resolved connection parameters including the full database password via println! to stdout.
  • Fix: Remove password from the println! output or replace with log::debug! and redact the password field.

2. SSH host key verification unconditionally disabled (MEDIUM)

  • File: src-tauri/src/ssh_tunnel.rs:160
  • Issue: Both SSH backends skip host key verification: system SSH uses StrictHostKeyChecking=no, and the russh backend check_server_key always returns Ok(true). This enables MITM attacks on SSH tunnels.
  • Fix: Use StrictHostKeyChecking=accept-new (already used in test_ssh_connection_system) for the tunnel backend. For russh, implement proper known_hosts checking.

Automated security audit by AgentAudit

Metadata

Metadata

Assignees

Labels

No labels
No labels

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions