Conversation
…L-068, SUP-035) New detection rules: - PSV-020 (critical): MCP STDIO command injection via unsanitized adapter config (CVE-2026-30623/30624/30616/30617/30618/33224 — LiteLLM, Agent Zero, Jaaz, LangChain-ChatChat, Fay, Bisheng, LangFlow, GPT Researcher) - PSV-021 (critical): Marimo pre-auth RCE via unauthenticated /terminal/ws (CVE-2026-39987, GHSA-2679-6mx9-h9xc, fixed 0.23.0) - PSV-022 (medium): docker-mcp-server OS command injection RCE (CVE-2026-5741, suvarchal <= 0.1.0, no patch) - MAL-068 (critical): js-logger-pack npm multi-platform WebSocket stealer (postinstall C2 agent, 195.201.194.107:8010, api-sub.jrodacooker.dev) - SUP-035 (critical): dom-utils-lite/centralogger npm SSH backdoor via Supabase C2 (tanvisoul9@gmail.com, xienztiavkygvacpqzgr/ndfcioahsbgsjmulpjgt.supabase.co) Supporting changes: - 5 showcase examples (175–179) with SKILL.md trigger files - 10 new unit tests (test_rules.py + test_showcase_examples.py) - IOC DB: +4 domains, +1 IP - Vuln DB: marimo, docker-mcp-server, js-logger-pack, dom-utils-lite, centralogger - PATTERN_UPDATES.md, docs/EXAMPLES.md, examples/showcase/INDEX.md updated
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #191 +/- ##
=======================================
Coverage 75.25% 75.25%
=======================================
Files 33 33
Lines 4643 4643
=======================================
Hits 3494 3494
Misses 1149 1149 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
2026-04-15
rulepack: 2026.04.15.1
Five new detection rules, IOC enrichment, and vuln DB updates covering a systemic MCP STDIO command injection advisory, a Marimo pre-auth RCE, a docker-mcp-server OS command injection, and two malicious npm supply chain packages.
PSV-020(critical): MCP STDIO arbitrary command injection via unsanitized adapter configuration (CVE-2026-30623/30624/30616/30617/30618/33224) — OX Security (April 15, 2026) disclosed a systemic MCP STDIO command injection vulnerability affecting LiteLLM (CVE-2026-30623), Agent Zero (CVE-2026-30624), Jaaz (CVE-2026-30616), LangChain-ChatChat (CVE-2026-30617), Fay Digital Human (CVE-2026-30618), Bisheng (CVE-2026-33224), LangFlow, and GPT Researcher. All affected platforms pass user-supplied MCP server command and args values directly to StdioServerParameters without sanitization, enabling authenticated or unauthenticated RCE. Restrict MCP server configuration to trusted administrators and upgrade to patched versions.PSV-021(critical): Marimo reactive notebook pre-auth RCE via unauthenticated WebSocket terminal (CVE-2026-39987, < 0.23.0) — CVE-2026-39987 (CVSS 9.3, CWE-306, GHSA-2679-6mx9-h9xc) is a critical pre-authentication RCE in Marimo prior to 0.23.0. The /terminal/ws WebSocket endpoint lacks authentication validation, allowing any unauthenticated attacker to obtain a full PTY shell. Exploited in the wild within 10 hours of disclosure. Upgrade to Marimo 0.23.0 or later immediately.PSV-022(medium): docker-mcp-server OS command injection RCE (CVE-2026-5741, <= 0.1.0) — CVE-2026-5741 (CWE-77, CVSS 6.9) is an OS command injection in suvarchal docker-mcp-server up to version 0.1.0. The stop_container(), remove_container(), and pull_image() functions pass user-supplied values directly to shell commands without sanitization. No official patch available. Restrict network access to localhost only.MAL-068(critical): js-logger-pack npm multi-platform WebSocket stealer (postinstall C2 agent) — js-logger-pack is a malicious npm package (SafeDep, April 2026) that evolved into a full-featured multi-platform infostealer over 23 versions. Its postinstall hook deploys an 885 KB obfuscated bundle that installs an SSH backdoor (bink@DESKTOP-N8JGD6T), exfiltrates Telegram tdata, drains 27 crypto wallets and browser credentials, and runs a native keylogger with autostart persistence. C2: ws://195.201.194.107:8010 (api-sub.jrodacooker.dev). Remove immediately and rotate all credentials.SUP-035(critical): dom-utils-lite / centralogger npm SSH backdoor via Supabase C2 — dom-utils-lite and centralogger are malicious npm packages (SafeDep, April 14, 2026) whose postinstall hook fetches the attacker's SSH public key from Supabase storage and appends it to ~/.ssh/authorized_keys ("ssh-key-auto-sync" tag), granting persistent SSH access. C2 domains: xienztiavkygvacpqzgr.supabase.co and ndfcioahsbgsjmulpjgt.supabase.co. Remove both packages, revoke SSH access, and audit authorized_keys.api-sub.jrodacooker.dev,jrodacooker.dev,xienztiavkygvacpqzgr.supabase.co,ndfcioahsbgsjmulpjgt.supabase.coto domain IOC DB; added195.201.194.107to IP IOC DB.marimo(CVE-2026-39987, critical, fixed 0.23.0),docker-mcp-server(CVE-2026-5741, medium, no patch),js-logger-pack(MALICIOUS-NPM-2026-0415-JS-LOGGER-PACK, critical),dom-utils-lite(MALICIOUS-NPM-2026-0414-DOM-UTILS-LITE, critical), andcentralogger(MALICIOUS-NPM-2026-0414-CENTRALOGGER, critical) to vuln DB.Sources: