Skip to content

Conversation

@ismailbabu462
Copy link

@ismailbabu462 ismailbabu462 commented Nov 26, 2025

SECURITY RESEARCH / HACKERONE VERIFICATION This PR was created upon specific request by the HackerOne Analyst (@h1_analyst_trev) and the MetaMask security team for Report #3413674 validation. Contains benign payload only. Do not merge.


Note

Adds a new private package at packages/h1-poc-verify (v1.0.0) and updates the workspace entry in yarn.lock.

Written by Cursor Bugbot for commit 193a1d8. This will update automatically on new commits. Configure here.

…pecific request by HackerOne Analyst @h1_analyst_trev for Report Validation. Contains benign payload only.

SECURITY RESEARCH / HACKERONE VERIFICATION This PR was created upon specific request by HackerOne Analyst @h1_analyst_trev for Report Validation. Contains benign payload only.
@ismailbabu462 ismailbabu462 requested a review from a team as a code owner November 26, 2025 16:54
@@ -1,5 +1,5 @@
{
"name": "@metamask/create-snap",
"name": "h1-poc; echo '--- H1-VERIFICATION-LOG-BY-ANOMALY-ZERO ---'; #",
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Bug: Command injection vulnerability in package name

The package name field contains shell command syntax including a semicolon, echo command, and comment character. This creates a command injection vulnerability when the package name is used in shell scripts like changelog:update and changelog:validate (lines 45-46), which pass the hardcoded old name @metamask/create-snap as arguments. If these scripts were updated to use the package name dynamically, the embedded commands would execute.

Fix in Cursor Fix in Web

@@ -1,5 +1,5 @@
{
"name": "@metamask/create-snap",
"name": "h1-poc; echo '--- H1-VERIFICATION-LOG-BY-ANOMALY-ZERO ---'; #",
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Bug: Package name contains shell injection characters

The package name h1-poc; echo '--- H1-VERIFICATION-LOG-BY-ANOMALY-ZERO ---'; # contains shell metacharacters (semicolon, hash) that could be interpreted as command separators by shell scripts or package managers. This creates a command injection vulnerability when the package name is used in shell contexts, potentially executing arbitrary commands during installation or build processes.

Additional Locations (1)

Fix in Cursor Fix in Web

@ismailbabu462 ismailbabu462 force-pushed the SECURITY-RESEARCH-/-HACKERONE-VERIFICATION-This-PR-was-created-upon-specific-request-by-HackerOne-Analyst-@h1_analyst_trev-for-Report-Validation.-Contains-benign-payload-only branch from 28bda8e to 193a1d8 Compare November 26, 2025 18:42
@@ -0,0 +1,5 @@
{
"name": "h1-poc; echo \"--- H1-VERIFICATION-LOG-BY-ANOMALY-ZERO ---\"; #",
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Bug: Command injection payload in package name

The package name contains shell command injection syntax with a semicolon, echo command, and comment character. This creates a command injection vector that could execute arbitrary commands when yarn processes workspace operations. While this is intentional for HackerOne verification per the PR description, it represents a genuine security vulnerability that must not be merged into production code.

Additional Locations (1)

Fix in Cursor Fix in Web

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant