mirror of
https://github.com/NousResearch/hermes-agent.git
synced 2026-05-05 10:17:17 +08:00
Slash commands (_run_simple_slash, _handle_thread_create_slash) bypassed every DISCORD_ALLOWED_* gate enforced by on_message. Any guild member could invoke /background (RCE via terminal), /restart, /model, /skill, etc. CVSS 9.8 Critical. - _evaluate_slash_authorization mirrors on_message gates (user, role, channel, ignored channel) with fail-closed semantics - _check_slash_authorization sends ephemeral reject + logs + admin alert - Auth gate runs before defer() so rejections are ephemeral - /skill autocomplete returns [] for unauthorized users (no catalog leak) - Component views (ExecApproval, SlashConfirm, UpdatePrompt, ModelPicker) now honor role allowlists via shared _component_check_auth helper - Optional DISCORD_HIDE_SLASH_COMMANDS defense-in-depth - Cross-platform admin alert (Telegram/Slack fallback) on unauthorized attempts Based on PR #18125 by @0xyg3n.
231 lines
8.9 KiB
Python
231 lines
8.9 KiB
Python
"""Security regression tests: Discord component views honor role allowlists.
|
|
|
|
The four interactive component views (ExecApprovalView, SlashConfirmView,
|
|
UpdatePromptView, ModelPickerView) historically accepted only
|
|
``allowed_user_ids``. Deployments that configure DISCORD_ALLOWED_ROLES
|
|
without DISCORD_ALLOWED_USERS therefore had a wide-open component
|
|
surface: any guild member who could see the prompt could approve exec
|
|
commands, cancel slash confirmations, or switch the model -- even when
|
|
the same user would be rejected at the slash and on_message gates.
|
|
|
|
These tests pin the user-or-role OR semantics and the fail-closed
|
|
behavior on missing role data so the parity cannot regress.
|
|
"""
|
|
|
|
from types import SimpleNamespace
|
|
|
|
import pytest
|
|
|
|
# Trigger the shared discord mock from tests/gateway/conftest.py before
|
|
# importing the production module.
|
|
from gateway.platforms.discord import ( # noqa: E402
|
|
ExecApprovalView,
|
|
ModelPickerView,
|
|
SlashConfirmView,
|
|
UpdatePromptView,
|
|
_component_check_auth,
|
|
)
|
|
|
|
|
|
# ---------------------------------------------------------------------------
|
|
# Direct helper coverage -- the four views all delegate to this helper, so
|
|
# pinning the helper's contract pins all four call sites.
|
|
# ---------------------------------------------------------------------------
|
|
|
|
|
|
def _interaction(user_id, role_ids=None, *, drop_user=False, drop_roles=False):
|
|
"""Build a mock interaction with the requested user/role shape.
|
|
|
|
drop_user simulates a payload whose .user attribute is None.
|
|
drop_roles simulates a payload where .user has no .roles attribute
|
|
at all (DM-context Member, raw User payload).
|
|
"""
|
|
if drop_user:
|
|
return SimpleNamespace(user=None)
|
|
|
|
user_kwargs = {"id": user_id}
|
|
if not drop_roles:
|
|
user_kwargs["roles"] = [SimpleNamespace(id=r) for r in (role_ids or [])]
|
|
return SimpleNamespace(user=SimpleNamespace(**user_kwargs))
|
|
|
|
|
|
# ── back-compat: empty allowlists -> allow everyone ────────────────────────
|
|
|
|
|
|
def test_component_check_empty_allowlists_allows_everyone():
|
|
"""SECURITY-CRITICAL backwards-compat: deployments without any
|
|
DISCORD_ALLOWED_* env vars set must continue to allow component
|
|
interactions from anyone (no regression for unconfigured setups)."""
|
|
interaction = _interaction(11111)
|
|
assert _component_check_auth(interaction, set(), set()) is True
|
|
assert _component_check_auth(interaction, None, None) is True
|
|
|
|
|
|
# ── user allowlist ─────────────────────────────────────────────────────────
|
|
|
|
|
|
def test_component_check_user_in_user_allowlist_passes():
|
|
interaction = _interaction(11111)
|
|
assert _component_check_auth(interaction, {"11111"}, set()) is True
|
|
|
|
|
|
def test_component_check_user_not_in_user_allowlist_rejected():
|
|
interaction = _interaction(99999)
|
|
assert _component_check_auth(interaction, {"11111"}, set()) is False
|
|
|
|
|
|
# ── role allowlist OR semantics ────────────────────────────────────────────
|
|
|
|
|
|
def test_component_check_role_only_user_with_matching_role_passes():
|
|
"""Role-only deployment (DISCORD_ALLOWED_ROLES set, DISCORD_ALLOWED_USERS
|
|
empty) where the user is not in the empty user list but DOES carry a
|
|
matching role: must pass. This is the regression that prompted the
|
|
fix -- previously _check_auth allowed everyone when the user set was
|
|
empty, ignoring the role allowlist."""
|
|
interaction = _interaction(99999, role_ids=[42])
|
|
assert _component_check_auth(interaction, set(), {42}) is True
|
|
|
|
|
|
def test_component_check_role_only_user_without_matching_role_rejected():
|
|
"""Role-only deployment where the user has no matching role: reject.
|
|
Previously this allowed everyone because allowed_user_ids was empty."""
|
|
interaction = _interaction(99999, role_ids=[7, 8])
|
|
assert _component_check_auth(interaction, set(), {42}) is False
|
|
|
|
|
|
def test_component_check_user_or_role_user_match():
|
|
"""Both allowlists set; user matches user allowlist: pass."""
|
|
interaction = _interaction(11111, role_ids=[7])
|
|
assert _component_check_auth(interaction, {"11111"}, {42}) is True
|
|
|
|
|
|
def test_component_check_user_or_role_role_match():
|
|
"""Both allowlists set; user not in user list but in role list: pass."""
|
|
interaction = _interaction(99999, role_ids=[42])
|
|
assert _component_check_auth(interaction, {"11111"}, {42}) is True
|
|
|
|
|
|
def test_component_check_user_or_role_neither_match():
|
|
"""Both allowlists set; user matches neither: reject."""
|
|
interaction = _interaction(99999, role_ids=[7])
|
|
assert _component_check_auth(interaction, {"11111"}, {42}) is False
|
|
|
|
|
|
# ── fail-closed on missing role data ───────────────────────────────────────
|
|
|
|
|
|
def test_component_check_role_policy_with_no_roles_attr_rejects():
|
|
"""Role allowlist configured but interaction.user has no .roles
|
|
attribute (DM-context Member, raw User payload): must reject. A user
|
|
without resolvable roles cannot satisfy a role allowlist."""
|
|
interaction = _interaction(11111, drop_roles=True)
|
|
assert _component_check_auth(interaction, set(), {42}) is False
|
|
|
|
|
|
def test_component_check_missing_user_with_allowlist_rejects():
|
|
"""interaction.user is None with any allowlist configured: fail
|
|
closed without raising AttributeError."""
|
|
interaction = _interaction(0, drop_user=True)
|
|
assert _component_check_auth(interaction, {"11111"}, set()) is False
|
|
assert _component_check_auth(interaction, set(), {42}) is False
|
|
|
|
|
|
# ---------------------------------------------------------------------------
|
|
# View construction: every view must accept allowed_role_ids and route
|
|
# through the shared helper. Default value preserves prior call-sites.
|
|
# ---------------------------------------------------------------------------
|
|
|
|
|
|
def test_exec_approval_view_accepts_role_allowlist():
|
|
view = ExecApprovalView(
|
|
session_key="sess-1",
|
|
allowed_user_ids={"11111"},
|
|
allowed_role_ids={42},
|
|
)
|
|
# Role-only user passes
|
|
assert view._check_auth(_interaction(99999, role_ids=[42])) is True
|
|
# Neither user nor role match: reject
|
|
assert view._check_auth(_interaction(99999, role_ids=[7])) is False
|
|
|
|
|
|
def test_exec_approval_view_role_default_is_empty_set():
|
|
"""Existing call sites that pass only allowed_user_ids must continue
|
|
working with the legacy semantics (no role gate)."""
|
|
view = ExecApprovalView(session_key="sess-1", allowed_user_ids={"11111"})
|
|
assert view.allowed_role_ids == set()
|
|
assert view._check_auth(_interaction(11111)) is True
|
|
assert view._check_auth(_interaction(99999)) is False
|
|
|
|
|
|
def test_slash_confirm_view_accepts_role_allowlist():
|
|
view = SlashConfirmView(
|
|
session_key="sess-1",
|
|
confirm_id="c1",
|
|
allowed_user_ids=set(),
|
|
allowed_role_ids={42},
|
|
)
|
|
assert view._check_auth(_interaction(99999, role_ids=[42])) is True
|
|
assert view._check_auth(_interaction(99999, role_ids=[7])) is False
|
|
|
|
|
|
def test_update_prompt_view_accepts_role_allowlist():
|
|
view = UpdatePromptView(
|
|
session_key="sess-1",
|
|
allowed_user_ids=set(),
|
|
allowed_role_ids={42},
|
|
)
|
|
assert view._check_auth(_interaction(99999, role_ids=[42])) is True
|
|
assert view._check_auth(_interaction(99999, role_ids=[7])) is False
|
|
|
|
|
|
def test_model_picker_view_accepts_role_allowlist():
|
|
async def _noop(*_a, **_k):
|
|
return ""
|
|
|
|
view = ModelPickerView(
|
|
providers=[],
|
|
current_model="m",
|
|
current_provider="p",
|
|
session_key="sess-1",
|
|
on_model_selected=_noop,
|
|
allowed_user_ids=set(),
|
|
allowed_role_ids={42},
|
|
)
|
|
assert view._check_auth(_interaction(99999, role_ids=[42])) is True
|
|
assert view._check_auth(_interaction(99999, role_ids=[7])) is False
|
|
|
|
|
|
# ---------------------------------------------------------------------------
|
|
# Empty allowlists across views: legacy "allow everyone" must hold.
|
|
# ---------------------------------------------------------------------------
|
|
|
|
|
|
@pytest.mark.parametrize(
|
|
"view_factory",
|
|
[
|
|
lambda: ExecApprovalView(session_key="s", allowed_user_ids=set()),
|
|
lambda: SlashConfirmView(session_key="s", confirm_id="c", allowed_user_ids=set()),
|
|
lambda: UpdatePromptView(session_key="s", allowed_user_ids=set()),
|
|
],
|
|
)
|
|
def test_views_empty_allowlists_allow_everyone(view_factory):
|
|
view = view_factory()
|
|
assert view._check_auth(_interaction(99999)) is True
|
|
|
|
|
|
def test_model_picker_view_empty_allowlists_allow_everyone():
|
|
async def _noop(*_a, **_k):
|
|
return ""
|
|
|
|
view = ModelPickerView(
|
|
providers=[],
|
|
current_model="m",
|
|
current_provider="p",
|
|
session_key="s",
|
|
on_model_selected=_noop,
|
|
allowed_user_ids=set(),
|
|
)
|
|
assert view.allowed_role_ids == set()
|
|
assert view._check_auth(_interaction(99999)) is True
|