CVE-2026-34955: PraisonAI Has Sandbox Escape via shell=True and Bypassable Blocklist in SubprocessSandbox
(updated )
SubprocessSandbox in all modes (BASIC, STRICT, NETWORK_ISOLATED) calls subprocess.run() with shell=True and relies solely on string-pattern matching to block dangerous commands. The blocklist does not include sh or bash as standalone executables, allowing trivial sandbox escape in STRICT mode via sh -c '<command>'.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-34955 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →