searxng-selfhost

clawhub:searxng-selfhost

View source
B
76/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

5

Score

76/100

MEDIUM 3
LOW 2

Findings (5)

MEDIUM
Non-standard port communication
L30

Detects outbound connections to non-standard ports

http://127.0.0.1:8888
FIX

Restrict network connections to standard ports (80, 443) and explicitly allowlisted service ports. Block connections to unusual ports that could indicate covert channels.

FP?

Likely FP if the non-standard port is localhost (127.0.0.1) used for local development servers (e.g., port 3000, 8080, 5432 for a local database).

MEDIUM
Localhost bypass
L34

Detects alternative representations of localhost used to bypass SSRF filters

curl 'http://127.0.0.1:
FIX

Prevent URL redirection from bypassing SSRF protections. Validate the final destination URL after following redirects and block redirect chains that resolve to internal addresses.

FP?

Likely FP if the match is documentation about redirect handling behavior without an actual open redirect vulnerability.

MEDIUM
Non-standard port communication
L40

Detects outbound connections to non-standard ports

http://127.0.0.1:8888
FIX

Restrict network connections to standard ports (80, 443) and explicitly allowlisted service ports. Block connections to unusual ports that could indicate covert channels.

FP?

Likely FP if the non-standard port is localhost (127.0.0.1) used for local development servers (e.g., port 3000, 8080, 5432 for a local database).

LOW
Shell script file execution
L27

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/install_searxng.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Non-standard port communication
L34

Detects outbound connections to non-standard ports

http://127.0.0.1:8888
FIX

Restrict network connections to standard ports (80, 443) and explicitly allowlisted service ports. Block connections to unusual ports that could indicate covert channels.

FP?

Likely FP if the non-standard port is localhost (127.0.0.1) used for local development servers (e.g., port 3000, 8080, 5432 for a local database).