Skip to content

Commit 73fd7e7

Browse files
committed
Update to templates to match VRT
1 parent 13131a0 commit 73fd7e7

File tree

8 files changed

+38
-0
lines changed

8 files changed

+38
-0
lines changed

submissions/description/ai_application_security/sensitive_information_disclosure/sandboxed_container_code_execution/.gitkeep renamed to submissions/description/ai_application_security/remote_code_execution/sandboxed_container_code_execution/.gitkeep

File renamed without changes.

submissions/description/ai_application_security/sensitive_information_disclosure/sandboxed_container_code_execution/guidance.md renamed to submissions/description/ai_application_security/remote_code_execution/sandboxed_container_code_execution/guidance.md

File renamed without changes.

submissions/description/ai_application_security/sensitive_information_disclosure/sandboxed_container_code_execution/recommendations.md renamed to submissions/description/ai_application_security/remote_code_execution/sandboxed_container_code_execution/recommendations.md

File renamed without changes.

submissions/description/ai_application_security/sensitive_information_disclosure/sandboxed_container_code_execution/template.md renamed to submissions/description/ai_application_security/remote_code_execution/sandboxed_container_code_execution/template.md

File renamed without changes.

submissions/description/ai_application_security/sensitive_information_disclosure/key_leak/.gitkeep

Whitespace-only changes.
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
# Guidance
2+
3+
Provide a step-by-step walkthrough with a screenshot on how you exploited the vulnerability. This will speed up triage time and result in faster rewards. Please include specific details on where you identified the vulnerability, how you identified it, and what actions you were able to perform as a result.
4+
5+
Attempt to escalate the vulnerability to perform additional actions. If this is possible, provide a full Proof of Concept (PoC).
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# Recommendation(s)
2+
3+
- Don't hardcode sensitive keys in the application's code.
4+
- Use secure key management systems and environment variables.
5+
- Encrypt sensitive data at rest and in transit.
6+
- Regularly rotate cryptographic keys and API keys.
7+
- Scan code repositories for accidentally committed keys.
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
Key leak occurs when sensitive cryptographic keys, or API keys, used by the AI application are unintentionally exposed. These keys can provide unauthorized access to the system or its components, leading to data breaches, data manipulation, and other malicious activities. An attacker can identify leaked keys in code repositories, configuration files, or through insecure transmission.
2+
3+
**Business Impact**
4+
5+
Unauthorized access to critical systems and data, potential compromise of sensitive information, and significant financial losses. Reputational damage due to security breaches and loss of customer trust.
6+
7+
**Steps to Reproduce**
8+
9+
1. Go to the following location: {{URL/location}}
10+
1. Observe that the following API keys or cryptographic keys are hardcoded in the application's code or configuration files:
11+
12+
```markdown
13+
{API or cryptographic keys}
14+
```
15+
16+
1. Send the following request which demonstrates the leaked keys are valid:
17+
18+
```HTTP
19+
{HTTP request}
20+
```
21+
22+
**Proof of Concept (PoC)**
23+
24+
The screenshot(s) below demonstrate(s) the vulnerability:
25+
>
26+
> {{screenshot}}

0 commit comments

Comments
 (0)