Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @grackle-ai/powerline
  4. ›
  5. GHSA-xq7h-vwjp-5vrh

GHSA-xq7h-vwjp-5vrh: @grackle-ai/powerline Runs Without Authentication by Default

March 25, 2026

When --token is not provided and GRACKLE_POWERLINE_TOKEN is not set, the PowerLine gRPC server runs with zero authentication. A warning is logged ("NO AUTH (development only)") but nothing prevents deployment in this state. Any client that can reach the PowerLine port can spawn agent sessions, access credential tokens, and execute code.

The default binding is 127.0.0.1 (loopback only), which limits exposure to the local machine. However, if PowerLine is accidentally exposed on a network (e.g., in a container or via port forwarding), the impact is critical.

Affected code:

  • packages/powerline/src/index.ts:46 — token defaults to empty string
  • packages/powerline/src/index.ts:63-76 — auth interceptor is only added when token is truthy

References

  • github.com/advisories/GHSA-xq7h-vwjp-5vrh
  • github.com/nick-pape/grackle
  • github.com/nick-pape/grackle/security/advisories/GHSA-xq7h-vwjp-5vrh

Code Behaviors & Features

Detect and mitigate GHSA-xq7h-vwjp-5vrh with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.70.1

Fixed versions

  • 0.70.1

Solution

Upgrade to version 0.70.1 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-306: Missing Authentication for Critical Function

Source file

npm/@grackle-ai/powerline/GHSA-xq7h-vwjp-5vrh.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:14 +0000.