logoalt Hacker News

brianstoday at 11:43 AM4 repliesview on HN

I’ve seen several projects like this that offer a network server with access to these Apple models. The danger is when they expose that, even on a loop port, to every other application on your system, including the browser. Random webpages are now shipping with JavaScript that will post to that port. Same-origin restrictions will stop data flow back to the webpage, but that doesn’t stop them from issuing commands to make changes.

Some such projects use CORS to allow read back as well. I haven’t read Apfel’s code yet, but I’m registering the experiment before performing it.


Replies

brianstoday at 11:47 AM

They offer it as an option but default it to false! This is still a --footgun option but it’s the least unsafe version I’ve seen yet! Well done, Apfel authors.

show 1 reply
stingraycharlestoday at 11:46 AM

I don’t think many browsers will allow posting to 127.0.0.1 from a random website. What’s the threat model here?

show 2 replies
robotswantdatatoday at 12:30 PM

Keep seeing similar mistakes with vibe coded AI & MCP projects. Even experienced engineers seem oblivious to this attack vector

snarkyturtletoday at 1:14 PM

Noting that there's an option to require a Bearer token to the API