-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bypass the security check, RCE again with prompt injection. #399
Comments
@Lyutoon thanks a lot for reporting. That's indeed a very valid example. I think it's quite easy to fix "programmatically". Do you have other examples in mind that would "jailbreak" it? The goal is to figure out if there are some patterns that can be used in an attack like this and have them covered so that the For example, we could disable variables like What do you recommend? |
Hi, thanks for your reply! |
@Lyutoon the vulnerability you shared has just been fixed. Feel free to open a PR or an issue if you come up with any further prompt injection!! |
🐛 Describe the bug
Hi, Team
Today, while I'm reading the source code of pandasai, I found there is a RCE vulnerability which can be triggered by just one line of prompt.
I've seen that there are already some issues that pointed out the security concern about using
exec
such as #43. Also, developers tried to fix these bugs. But, I bypassed these security checks just using jailbreaks and prompt injection. Maybe more checks are needed. Also I've seen that the code check part seems did not update for a long time, maybe it's time for developers to reconsider the fix strategy.PoC: (from the example code)
Log:
Thanks!
The text was updated successfully, but these errors were encountered: