proxmox

clawhub:proxmox

View source
B
76/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

8

Score

76/100

MEDIUM 3
LOW 5

Findings (8)

MEDIUM
Internal IP range access
L14

Detects references to private/internal IP ranges in URL context

https://192.168.1.100:
FIX

Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.

FP?

Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.

MEDIUM
Credential in shell export
L16

Detects API keys or tokens exposed in shell export commands

export PROXMOX_TOKEN_SECRET="xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
FIX

Remove credentials from shell export statements. Use a .env file (excluded from version control) or a secrets manager, and load secrets at runtime.

FP?

Likely FP if the export line uses a placeholder value (e.g., export API_KEY=your-key-here) or is in documentation describing environment setup.

MEDIUM
Internal IP range access
L20

Detects references to private/internal IP ranges in URL context

https://192.168.1.100:
FIX

Implement URL allowlisting for all outbound requests. Block requests to private IP ranges (10.x, 172.16-31.x, 192.168.x), localhost, and link-local addresses.

FP?

Likely FP if the match is a localhost URL used for local development (e.g., http://localhost:3000) in setup documentation.

LOW
Shell script file execution
L137

Detects execution of shell script files via bash/sh command or direct invocation

bash
./scripts/pve.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L138

Detects execution of shell script files via bash/sh command or direct invocation

./scripts/pve.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L139

Detects execution of shell script files via bash/sh command or direct invocation

./scripts/pve.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L140

Detects execution of shell script files via bash/sh command or direct invocation

./scripts/pve.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L141

Detects execution of shell script files via bash/sh command or direct invocation

./scripts/pve.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.