Skip to content

[HIGH] **Prompt injection via unescaped channel/user in lightweight routines** — `bui #1364

@ironclaw-ci

Description

@ironclaw-ci

[HIGH:75] Issue Found by Staging CI Review

Severity: HIGH
Confidence: 75/100
PR comment: #1359 (comment)

Description

Prompt injection via unescaped channel/user in lightweight routinesbuild_lightweight_prompt() directly interpolates notify.channel and notify.user values into LLM prompt via format!() without escaping. Backticks provide no security boundary. Attacker controlling routine config could inject arbitrary prompt instructions.


Auto-created by staging-ci Claude Code review

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't workingrisk: mediumBusiness logic, config, or moderate-risk modulesstaging-ci-reviewIssue found during staging CI promotion review

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions