OpenCode recently exposed a serious security issue. Cloudflare security researchers discovered that a certain parameter supported by the web frontend is at risk of being abused.
Specifically, attackers can use this parameter to point to malicious servers. Then, by forging Markdown sessions and embedding malicious scripts within them, they can trick users into clicking related links. Once users fall for it, attackers can execute arbitrary commands on the user's computer via the terminal API. This type of attack is quite covert and poses significant risks to developers.
The good news is that the official team has quickly released a fix. The main measures include disabling this problematic parameter and strengthening the Content Security Policy (CSP) to prevent malicious scripts from loading. If you're using related tools, it is recommended to update to the latest version promptly. Security patches like these should not be delayed.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
8 Likes
Reward
8
5
Repost
Share
Comment
0/400
OnChainSleuth
· 16h ago
Damn, another parameter vulnerability... This time you can even execute commands directly on the machine, pretty harsh.
Hurry up and update everyone, don't wait to be caught by phishing scripts.
The official response was relatively quick, at least they didn't drag their feet.
View OriginalReply0
NFTRegretDiary
· 16h ago
Another parameter vulnerability... Developers will have to work overtime to patch it again. Hurry up and update to avoid being hacked.
View OriginalReply0
ChainProspector
· 16h ago
Another parameter vulnerability... Developers still need to be cautious; such covert attacks are really hard to defend against.
---
I really didn't expect the Markdown embedded malicious script approach—so ruthless. Hurry up and update, everyone.
---
The official response speed is pretty good; at least they didn't drag their feet. CSP reinforcement is standard procedure.
---
Terminal API directly executing commands? If it gets hacked, the private keys on the computer would be gone...
---
Looking at the complexity of this vulnerability, it seems that not only OpenCode should defend against it, but other platforms should also conduct self-inspections.
---
I just want to know how this thing was discovered. Cloudflare's security team is truly on point.
View OriginalReply0
VitaliksTwin
· 16h ago
Good grief, another parameter vulnerability... Developers really have it tough, it's hard to guard against everything.
It's just ridiculous, malicious scripts can be embedded even in Markdown? Direct remote code execution? Who would have thought of that?
Cloudflare responded fairly quickly, disabling parameters and strengthening CSP. The tactics are still the same old tricks. Everyone, update quickly.
View OriginalReply0
CountdownToBroke
· 16h ago
Oh my god, another parameter vulnerability. These days, you really can't survive without security awareness.
---
Malicious scripts can still be embedded in Markdown? That's too covert; I didn't expect that.
---
Hurry up and update, or your computer might be remotely executed someday. Just thinking about it is creepy.
---
Cloudflare responded quite quickly this time; at least the official didn't drag their feet.
---
Another manual upgrade needed. These kinds of patches really can't wait.
OpenCode recently exposed a serious security issue. Cloudflare security researchers discovered that a certain parameter supported by the web frontend is at risk of being abused.
Specifically, attackers can use this parameter to point to malicious servers. Then, by forging Markdown sessions and embedding malicious scripts within them, they can trick users into clicking related links. Once users fall for it, attackers can execute arbitrary commands on the user's computer via the terminal API. This type of attack is quite covert and poses significant risks to developers.
The good news is that the official team has quickly released a fix. The main measures include disabling this problematic parameter and strengthening the Content Security Policy (CSP) to prevent malicious scripts from loading. If you're using related tools, it is recommended to update to the latest version promptly. Security patches like these should not be delayed.