0.16.3
5 months ago
1 days ago
Known vulnerabilities in the @steipete/summarize package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
@steipete/summarize is a Link → clean text → summary. Affected versions of this package are vulnerable to Missing Authorization via the extension automation feature. An attacker can perform unauthorized browser automation actions by tricking a user into interacting with attacker-controlled content, which causes the agent to invoke enabled automation tools such as navigation or debugger-backed actions without the required user approval. This is only exploitable if the extension automation feature is enabled. How to fix Missing Authorization? Upgrade | <0.15.0 |
@steipete/summarize is a Link → clean text → summary. Affected versions of this package are vulnerable to Missing Authorization via the How to fix Missing Authorization? Upgrade | <0.15.0 |
@steipete/summarize is a Link → clean text → summary. Affected versions of this package are vulnerable to Missing Authorization via the How to fix Missing Authorization? Upgrade | <0.15.0 |
@steipete/summarize is a Link → clean text → summary. Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the hover summary process. An attacker can cause authenticated requests to be sent to internal or private-network endpoints by dispatching synthetic mouseover events over attacker-controlled links, leveraging stored authentication tokens when users interact with malicious content. How to fix Server-side Request Forgery (SSRF)? Upgrade | <0.15.0 |
@steipete/summarize is a Link → clean text → summary. Affected versions of this package are vulnerable to Incorrect Permission Assignment for Critical Resource in the configuration file rewrite process. An attacker can access sensitive credentials by reading files created with overly permissive default filesystem permissions. This is only exploitable if the software is running on a shared Unix-like system where other local users have access to the filesystem. How to fix Incorrect Permission Assignment for Critical Resource? Upgrade | <0.15.0 |
@steipete/summarize is a Link → clean text → summary. Affected versions of this package are vulnerable to Incorrect Permission Assignment for Critical Resource via the creation of the How to fix Incorrect Permission Assignment for Critical Resource? Upgrade | <0.15.0 |