You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,8 @@
4
4
5
5
A Model Context Protocol (MCP) server for interacting with iOS simulators. This server allows you to interact with iOS simulators by getting information about them, controlling UI interactions, and inspecting UI elements.
6
6
7
+
> **Security Notice**: Command injection vulnerabilities present in versions < 1.3.3 have been fixed. Please update to v1.3.3 or later. See [SECURITY.md](SECURITY.md) for details.
Copy file name to clipboardExpand all lines: SECURITY.md
+21-4Lines changed: 21 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,9 +5,24 @@
5
5
Use this section to tell people about which versions of your project are
6
6
currently being supported with security updates.
7
7
8
-
| Version | Supported |
9
-
| ------- | ------------------ |
10
-
| * |:white_check_mark:|
8
+
| Version | Supported |
9
+
| -------- | ------------------ |
10
+
| >= 1.3.3 |:white_check_mark:|
11
+
| < 1.3.3 |:x:|
12
+
13
+
## Fixed Vulnerabilities
14
+
15
+
### Command Injection (Fixed in v1.3.3)
16
+
17
+
**CVE**: To be assigned
18
+
**Severity**: Moderate
19
+
**Fixed in**: v1.3.3 (2025)
20
+
21
+
**Description**: Previous versions contained command injection vulnerabilities in several MCP tools (ui_tap, ui_type, ui_swipe, ui_describe_point, ui_describe_all, screenshot, record_video, stop_recording) due to unsafe shell command construction using string interpolation.
22
+
23
+
**Impact**: Malicious input could potentially execute arbitrary commands on the host system.
24
+
25
+
**Fix**: Replaced unsafe `execAsync` string interpolation with secure `execFile` calls using argument arrays. Added input validation.
11
26
12
27
## Reporting a Vulnerability
13
28
@@ -16,10 +31,12 @@ To report a security issue, please use the GitHub Security Advisory "Report a Vu
16
31
You can expect an initial response to your report within 48 hours. We will keep you informed about the progress of addressing the vulnerability and will work with you to coordinate the disclosure timeline.
17
32
18
33
If the vulnerability is accepted:
34
+
19
35
- We will work on a fix and keep you updated on the progress
20
36
- Once a fix is ready, we will coordinate with you on the disclosure timeline
21
37
- You will be credited for the discovery (unless you prefer to remain anonymous)
22
38
23
39
If the vulnerability is declined:
40
+
24
41
- We will provide a detailed explanation of why it was not accepted
25
-
- If appropriate, we will suggest alternative approaches or mitigations
42
+
- If appropriate, we will suggest alternative approaches or mitigations
0 commit comments