Unauthenticated remote code execution in OpenCode

Vulnerability and Impact

  • Local HTTP server exposed unauthenticated code execution; originally had permissive CORS, later limited to certain origins.
  • Even after partial fixes, concerns remain: once enabled, any localhost page or local process could execute code; no clear indication server is running.
  • Many see this as an egregious violation of basic principles (least privilege, access control, injection) and a breach of trust for a TUI tool.

Disclosure Process and “Silent” Fix

  • Reporter claims initial disclosure in Nov 2025 with multiple ignored contacts.
  • Maintainers say the email used wasn’t monitored and they lacked a proper SECURITY.md; they fixed the issue as soon as they saw it.
  • CVE is marked “Vendor Advisory”; users criticize the lack of proactive user notification and characterize it as a “silent fix” initially.

Maintainer Response and Capacity Issues

  • Maintainer admits mishandling security reports, cites rapid growth, hundreds of daily issues, and inexperience with CVEs.
  • Plans: bug bounty, audits, better process, security.txt; password now added, and latest release claimed to fully fix RCE.
  • Reactions are mixed: some praise accountability, others say words are cheap until practices change.

Trust, Governance, and Startup Culture

  • Surprise that this is a backed company, not a small hobby project; some recall earlier products with questionable security posture.
  • Criticism of “move fast and break things” and “vibecoding” culture where security and governance lag growth and fundraising.
  • Several argue this incident should be a litmus test for whether to trust the organization at all.

Security Design Critiques

  • Strong pushback on shipping an unauthenticated RCE endpoint plus CORS allowances in a CLI that auto-starts a server.
  • Some argue localhost RCE is “just code as your user talking to itself”; others counter with multi-user systems, root risk, and non-Chrome browsers lacking localhost protections.
  • Suggestions to focus money on secure design and staff training rather than only bug bounties.

Sandboxing and User Mitigations

  • Many recommend running AI agents in containers, VMs, devcontainers, or remote hosts, not directly on laptops.
  • Tools and patterns suggested: Docker/Podman, Proxmox/KVM, VS Code devcontainers, remote SSH + tmux, browser protections like uBlock’s LAN filter or JShelter’s Network Boundary Shield.
  • Repeated advice: never give agents unrestricted access to your primary environment or git repo.

Comparisons to Other Tools & Ecosystem

  • Comparisons to Neovim and VS Code: those use domain sockets or authenticated daemons; TCP modes are explicitly documented as insecure.
  • Broader dissatisfaction: multiple agentic coding tools feel “rough,” under-maintained, or security-light; users discuss alternatives and forks.
  • Some note that AI-written code and “feature velocity” are outpacing code review and core maintenance, increasing risk.

Broader Takeaways for AI Coding Agents

  • Many see this as a warning about the entire class of local AI agents with execution powers.
  • Expectation that ops and security workloads will surge as users “punch above their weight” with these tools.
  • Several commenters say this incident has dissuaded them from trying OpenCode and pushed them back toward simpler or more conservative workflows.