* Not running the server by default * Patched the wide open CORS policy which left the server open to execution by any page you visited.
The server is still there but you have to explicitly enable it via `opencode serve`
The original disclosure has a table of fixes that have landed: https://cy.md/opencode-rce/
No, that was the initial mitigation! Before the vulnerability was reported, the server was accessible to the entire world with a wide-open CORS policy.
https://github.com/anomalyco/opencode/commit/7d2d87fa2c44e32...
These local agents that you spawn and give access to your drive are kind of insane to me.
It's at the level of
/bin/bash -c "$(curl -fsSL https://somescriptofftheinternet
which you cannot inspect, and may be well different every time you interact with it!As per usual, being at the forefront of the tech world is leaving behind privacy and security in the dust... until something bad happens.
Does this mean other state actors are beyond needs of RCE vulns as their tools belt and North Korea and Russia lagging behind? Some other interpretation from security-involved practitioners here - like, I don't know - we already have Pegasus, phew on OpenCode RCE?
No, from experience, any nation state actor would love to take advantage of a RCE vuln: this was painted from the perspective of Bottlerocket which is in use by DoD, NSA, etc.
If they were designing these infrastructure pieces primarily for consumer use, they would have used named pipes, Unix domain sockets, or some other local-only IPC method instead of TCP/IP.