Skip to content

fix: oauth client credentials (client_id, client_sec... in CliAuth.js#6110

Open
orbisai0security wants to merge 1 commit intoUnitech:masterfrom
orbisai0security:fix-hardcoded-oauth-credentials-v001
Open

fix: oauth client credentials (client_id, client_sec... in CliAuth.js#6110
orbisai0security wants to merge 1 commit intoUnitech:masterfrom
orbisai0security:fix-hardcoded-oauth-credentials-v001

Conversation

@orbisai0security
Copy link
Copy Markdown

Summary

Fix critical severity security issue in lib/API/pm2-plus/auth-strategies/CliAuth.js.

Vulnerability

Field Value
ID V-001
Severity CRITICAL
Scanner multi_agent_ai
Rule V-001
File lib/API/pm2-plus/auth-strategies/CliAuth.js:203

Description: OAuth client credentials (client_id, client_secret) and the BASE_URI for the PM2 Plus API are embedded directly in source code within CliAuth.js and PM2IO.js. Because PM2 is an open-source project published to the public npm registry, these credentials are accessible to anyone who installs the package (npm install pm2) or views the GitHub repository. An attacker can extract these credentials without any special access and use them to impersonate the official PM2 CLI application against the PM2 Plus backend.

Changes

  • lib/API/pm2-plus/PM2IO.js
  • lib/API/pm2-plus/auth-strategies/CliAuth.js

Verification

  • Build passes
  • Scanner re-scan confirms fix
  • LLM code review passed

Automated security fix by OrbisAI Security

Automated security fix generated by Orbis Security AI
@CLAassistant
Copy link
Copy Markdown

CLAassistant commented May 6, 2026

CLA assistant check
All committers have signed the CLA.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants