mirror of
https://github.com/zvx-echo6/refactored-recon.git
synced 2026-05-20 14:44:39 +02:00
Add CT 101 Caddy security audit findings
CRITICAL: RECON backends (8420, 8440) accept direct LAN/Tailscale connections and trust X-Authentik-Username header unconditionally. Verified exploitation: contacts read, API keys added via spoofed header. Root cause: No firewall on RECON VM, services bind 0.0.0.0. Caddy forward_auth is NOT bypassed - direct backend access is the vector. P0 remediation: Firewall RECON to accept only from CT 101. Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
This commit is contained in:
parent
95fdac5ce3
commit
5afbbdcf4a
1 changed files with 478 additions and 758 deletions
File diff suppressed because it is too large
Load diff
Loading…
Add table
Add a link
Reference in a new issue