beeper-api-cli

clawhub:beeper-api-cli

View source
F
0/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

17

Score

0/100

HIGH 4
MEDIUM 8
LOW 5

Findings (17)

HIGH
Localhost bypass
L86

Detects alternative representations of localhost used to bypass SSRF filters

http://[::1]
FIX

Prevent URL redirection from bypassing SSRF protections. Validate the final destination URL after following redirects and block redirect chains that resolve to internal addresses.

FP?

Likely FP if the match is documentation about redirect handling behavior without an actual open redirect vulnerability.

HIGH
Localhost bypass
L270

Detects alternative representations of localhost used to bypass SSRF filters

http://[::1]
FIX

Prevent URL redirection from bypassing SSRF protections. Validate the final destination URL after following redirects and block redirect chains that resolve to internal addresses.

FP?

Likely FP if the match is documentation about redirect handling behavior without an actual open redirect vulnerability.

HIGH
Localhost bypass
L293

Detects alternative representations of localhost used to bypass SSRF filters

http://[::1]
FIX

Prevent URL redirection from bypassing SSRF protections. Validate the final destination URL after following redirects and block redirect chains that resolve to internal addresses.

FP?

Likely FP if the match is documentation about redirect handling behavior without an actual open redirect vulnerability.

HIGH
Localhost bypass
L365

Detects alternative representations of localhost used to bypass SSRF filters

http://[::1]
FIX

Prevent URL redirection from bypassing SSRF protections. Validate the final destination URL after following redirects and block redirect chains that resolve to internal addresses.

FP?

Likely FP if the match is documentation about redirect handling behavior without an actual open redirect vulnerability.

MEDIUM
Localhost bypass
L40

Detects alternative representations of localhost used to bypass SSRF filters

http://[::1]
FIX

Prevent URL redirection from bypassing SSRF protections. Validate the final destination URL after following redirects and block redirect chains that resolve to internal addresses.

FP?

Likely FP if the match is documentation about redirect handling behavior without an actual open redirect vulnerability.

MEDIUM
Credential in shell export
L75

Detects API keys or tokens exposed in shell export commands

export BEEPER_TOKEN="your-token-from-beeper-settings"
FIX

Remove credentials from shell export statements. Use a .env file (excluded from version control) or a secrets manager, and load secrets at runtime.

FP?

Likely FP if the export line uses a placeholder value (e.g., export API_KEY=your-key-here) or is in documentation describing environment setup.

MEDIUM
Localhost bypass
L77

Detects alternative representations of localhost used to bypass SSRF filters

http://[::1]
FIX

Prevent URL redirection from bypassing SSRF protections. Validate the final destination URL after following redirects and block redirect chains that resolve to internal addresses.

FP?

Likely FP if the match is documentation about redirect handling behavior without an actual open redirect vulnerability.

MEDIUM
Localhost bypass
L78

Detects alternative representations of localhost used to bypass SSRF filters

http://[::1]
FIX

Prevent URL redirection from bypassing SSRF protections. Validate the final destination URL after following redirects and block redirect chains that resolve to internal addresses.

FP?

Likely FP if the match is documentation about redirect handling behavior without an actual open redirect vulnerability.

MEDIUM
Credential in shell export
L252

Detects API keys or tokens exposed in shell export commands

export BEEPER_TOKEN="your-bearer-token-from-beeper-desktop"
FIX

Remove credentials from shell export statements. Use a .env file (excluded from version control) or a secrets manager, and load secrets at runtime.

FP?

Likely FP if the export line uses a placeholder value (e.g., export API_KEY=your-key-here) or is in documentation describing environment setup.

MEDIUM
Localhost bypass
L266

Detects alternative representations of localhost used to bypass SSRF filters

http://[::1]
FIX

Prevent URL redirection from bypassing SSRF protections. Validate the final destination URL after following redirects and block redirect chains that resolve to internal addresses.

FP?

Likely FP if the match is documentation about redirect handling behavior without an actual open redirect vulnerability.

MEDIUM
Internal IP range access
L285

Detects references to private/internal IP ranges in URL context

http://192.168.1.100:
FIX

Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.

FP?

Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.

MEDIUM
Internal IP range access
L361

Detects references to private/internal IP ranges in URL context

http://192.168.1.100:
FIX

Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.

FP?

Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.

LOW
Shell script file execution
L121

Detects execution of shell script files via bash/sh command or direct invocation

bash
~/clawd/skills/beeper-api-cli/beeper.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L174

Detects execution of shell script files via bash/sh command or direct invocation

bash
~/clawd/skills/beeper-api-cli/beeper.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L373

Detects execution of shell script files via bash/sh command or direct invocation

bash
BEEPER="$HOME/clawd/skills/beeper-api-cli/beeper.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L383

Detects execution of shell script files via bash/sh command or direct invocation

bash
BEEPER="$HOME/clawd/skills/beeper-api-cli/beeper.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L393

Detects execution of shell script files via bash/sh command or direct invocation

bash
BEEPER="$HOME/clawd/skills/beeper-api-cli/beeper.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.