Skip to content

[Security] IDE RCE via malicious .env files in untrusted workspaces #25021

@M0nd0R

Description

@M0nd0R

The local .env loading process evaluates GEMINI_CLI_IDE_SERVER_STDIO_COMMAND and GEMINI_CLI_IDE_SERVER_STDIO_ARGS parameters from an untrusted workspace. If IDE mode is enabled globally, an attacker can create a malicious repository with a .env that executes arbitrary shell code upon simply opening or interacting with the repository. It is requested to filter these stdio configuration vars from the workspace env by default.

Metadata

Metadata

Assignees

No one assigned

    Labels

    area/securityIssues related to securitystatus/need-triageIssues that need to be triaged by the triage automation.

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions