fix(opencode): guard tui server exposure#10974
fix(opencode): guard tui server exposure#10974MaxMiksa wants to merge 1 commit intoanomalyco:devfrom
Conversation
|
The following comment was made by an LLM, it may be inaccurate: Potential Related PR Found:[Security] Fix HIGH vulnerability: CVE-2025-58179 This PR may be related because it addresses a security vulnerability that could be related to server exposure issues. Given that PR #10974 mentions applying "insecure-non-loopback guardrail" to the TUI server and references fixing issue #10973, this CVE fix might be addressing a similar or broader security concern around server exposure. I recommend reviewing PR #10763 to confirm whether it overlaps with or supersedes the changes in PR #10974. |
|
Thanks — PR #10763 appears to be a broader CVE/security fix, but this PR is narrowly scoped to a specific user entrypoint.
No attempt to overlap or replace CVE-related changes. |
00637c0 to
71e0ba2
Compare
f1ae801 to
08fa7f7
Compare
|
Closing this pull request because it has had no updates for more than 60 days. If you plan to continue working on it, feel free to reopen or open a new PR. |
Fixes #10973.
What does this PR do?
serve/web.--yesto skip confirmation prompts.How did you verify your code works?
bun test test/cli/exposure-guard.test.tsbun run typecheck