Back to Home
drewcrawford icon

exfiltrate

Verified Safe

by drewcrawford

Overview

A remote debugging framework for Rust applications, enabling inspection and control of running programs (including WASM/browser targets) from a CLI, particularly useful for LLM agent interaction.

Installation

Run Command
cargo run -p exfiltrate --example debug

Security Notes

The `exfiltrate_proxy` component involves manual parsing of HTTP requests for WebSocket handshakes and WebSocket frames, including masking logic (`exfiltrate_proxy/src/websocket.rs`). Manual protocol parsing is inherently complex and prone to subtle bugs that could lead to vulnerabilities like denial-of-service, information leakage, or data corruption if malformed input is received. Although the proxy and main server typically bind to `127.0.0.1` (localhost), limiting external attack surface, a compromised local process or browser-hosted WASM application could potentially exploit these custom parsers. The use of `rmp_serde` for RPC deserialization also introduces a deserialization risk if custom command `execute` implementations handle deserialized arguments unsafely, though `rmp_serde` itself is generally robust. No 'eval' or obvious malicious patterns were detected.

Similar Servers

Stats

Interest Score0
Security Score7
Cost ClassMedium
Avg Tokens1000
Stars0
Forks0
Last Update2025-11-24

Tags

Remote DebuggingRustWebAssemblyCLILLM Agents