In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Sensitive Cookie in HTTPS Session Without "Secure" Attribute vulnerabilities in an interactive lesson.
Start learningUpgrade @grackle-ai/server to version 0.70.5 or higher.
@grackle-ai/server is a Grackle server orchestrator — spawns and wires core (gRPC), web-server (HTTP), MCP, and PowerLine
Affected versions of this package are vulnerable to Sensitive Cookie in HTTPS Session Without "Secure" Attribute in the session process. An attacker can intercept session cookies by capturing network traffic when the application is run with the --allow-network option over an untrusted network, as cookies may be transmitted without the Secure flag. This is only exploitable if the application is started with --allow-network and accessed over a non-localhost interface without a TLS-terminating reverse proxy.
This vulnerability can be mitigated by not using the --allow-network option over untrusted networks unless a TLS-terminating reverse proxy is in place.