ha-ultimate

clawhub:ha-ultimate

View source
B
77/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

5

Score

77/100

HIGH 1
MEDIUM 1
LOW 3

Findings (5)

HIGH
Internal IP range access
L70

Detects references to private/internal IP ranges in URL context

http://192.168.1.100:
FIX

Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.

FP?

Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.

MEDIUM
Internal IP range access
L28

Detects references to private/internal IP ranges in URL context

http://192.168.1.100:
FIX

Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.

FP?

Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.

LOW
Shell script file execution
L51

Detects execution of shell script files via bash/sh command or direct invocation

bash
scripts/ha.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
External API response drives agent behavior
L158

Detects skills where external API responses control agent decisions or actions

Call any service
 + based on
the event type and data
FIX

Do not include content from MCP tool responses verbatim in system prompts or tool descriptions. Sanitize all dynamic content before incorporating it into prompt context.

FP?

Likely FP if the match is a static tool description that mentions dynamic content handling in its documentation, not an actual injection vector.

LOW
External API response used without validation
L804

Detects patterns where external API responses are used directly without validation or sanitization

service data + without explicit use
FIX

Validate and sanitize all data received from external APIs before using it in tool operations or agent prompts. Implement schema validation and treat API responses as untrusted input.

FP?

Likely FP if the match is a truncated table cell or documentation fragment that mentions API responses in a descriptive context, not actual unvalidated data processing.