You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Identified that the resolve_redirect() function (lines 101-111) follows HTTP redirects to determine the latest release URL
The extracted version is taken from the final URL path (line 165: _version="${_resolved##*/}") with no validation that the URL is still on github.com
Reviewed the download flow: resolve redirect → extract version → download binary → verify checksum. If the redirect is hijacked, the checksum file also comes from the attacker's URL, making checksum verification meaningless.
Description
In install.sh, the installer resolves the latest release by following GitHub redirects:
The resolved URL is not validated against the expected origin (github.com). If a MITM or DNS hijack redirects github.com/NVIDIA/OpenShell/releases/latest to an attacker-controlled domain, the script will:
Extract the attacker's version string from the URL path
Download the binary from the attacker's URL
Download the checksums file from the same attacker's URL — so checksum verification passes even for a malicious binary
This is distinct from #590 (checksum tool unavailable). Even with sha256sum present, the checksum file itself could be attacker-controlled if the redirect is hijacked.
Reproduction Steps
Review install.sh lines 101-111 (resolve_redirect) and 161-165:
Agent Diagnostic
install.shresolve_redirect()function (lines 101-111) follows HTTP redirects to determine the latest release URL_version="${_resolved##*/}") with no validation that the URL is still on git.832008.xyzDescription
In
install.sh, the installer resolves the latest release by following GitHub redirects:The resolved URL is not validated against the expected origin (
github.com). If a MITM or DNS hijack redirectsgit.832008.xyz/NVIDIA/OpenShell/releases/latestto an attacker-controlled domain, the script will:This is distinct from #590 (checksum tool unavailable). Even with
sha256sumpresent, the checksum file itself could be attacker-controlled if the redirect is hijacked.Reproduction Steps
install.shlines 101-111 (resolve_redirect) and 161-165:resolve_redirectis used to construct download URLs without validating that it points github.com/NVIDIA/OpenShellEnvironment
mainbranch (commit HEAD as of 2026-03-26)install.shlines 101-111, 161-165Logs
Suggested fix — validate redirect target:
Related: #590 (checksum verification silently skipped when sha256sum unavailable)
Agent-First Checklist
debug-openshell-cluster,debug-inference,openshell-cli)