| ▲ | brians 2 hours ago | ||||||||||||||||||||||||||||||||||
I’ve seen several projects like this that offer a network server with access to these Apple models. The danger is when they expose that, even on a loop port, to every other application on your system, including the browser. Random webpages are now shipping with JavaScript that will post to that port. Same-origin restrictions will stop data flow back to the webpage, but that doesn’t stop them from issuing commands to make changes. Some such projects use CORS to allow read back as well. I haven’t read Apfel’s code yet, but I’m registering the experiment before performing it. | |||||||||||||||||||||||||||||||||||
| ▲ | brians 2 hours ago | parent | next [-] | ||||||||||||||||||||||||||||||||||
They offer it as an option but default it to false! This is still a --footgun option but it’s the least unsafe version I’ve seen yet! Well done, Apfel authors. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
| ▲ | stingraycharles 2 hours ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
I don’t think many browsers will allow posting to 127.0.0.1 from a random website. What’s the threat model here? | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||
| ▲ | snarkyturtle 28 minutes ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||
Noting that there's an option to require a Bearer token to the API | |||||||||||||||||||||||||||||||||||
| ▲ | robotswantdata an hour ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||
Keep seeing similar mistakes with vibe coded AI & MCP projects. Even experienced engineers seem oblivious to this attack vector | |||||||||||||||||||||||||||||||||||