-
Notifications
You must be signed in to change notification settings - Fork 18
[isolation] [ENV-ISOLATION] Same-UID /proc environ exposes token-like pre-exec environment material #1754
Description
Isolation boundary test (run 24090334900) reproduced a process-environment exposure condition inside the agent container.
Summary
Same-UID processes can read each other’s /proc/<pid>/environ, including token-like variables inherited at exec time. This allows environment material intended for one process to be observable from another process in the same container context.
Version
- Workflow lock file:
.github/workflows/secret-digger-codex.lock.yml cli_versionfield: not present in this lock filecompiler_version:v0.67.2GH_AW_INFO_CLI_VERSION:v0.67.2
Methodology (value-safe)
Used key-name and length-only checks (no secret values recorded):
- Name-only env parity (
env,printenv,export -p). - Same-UID
/proc/<pid>/environcensus forAWF_ONE_SHOT_TOKENSkey presence and value length only. - Clean-room control with
env -ito verify inheritance suppression. - Compiled helper probe to test
clearenv()behavior after process start.
Reproduction
- Enumerate readable process environments (keys only):
tr '\0' '\n' < /proc/<pid>/environ | cut -d= -f1
- Confirm key presence in sibling processes:
grep -x AWF_ONE_SHOT_TOKENS
- Measure length only (no value):
awk -F= '$1=="AWF_ONE_SHOT_TOKENS"{print length($2)}'
- Run control process with clean env:
env -i PATH="$PATH" bash -lc 'sleep 25'- Check
/proc/<pid>/environagain (key absent)
- Run pre-exec marker +
clearenv()helper:- Launch process with synthetic marker in env
- Inside process call
clearenv() - Observe marker still present via
/proc/<pid>/environfrom sibling process
Observed Result
- Token-like key present and non-empty in multiple same-UID processes.
- Clean-room process (
env -i) does not expose the key. - Pre-exec env marker remains readable from
/proc/<pid>/environeven after in-processclearenv().
Boundary Type
Process isolation / environment-variable isolation boundary violation (same-UID cross-process observability).
Security Impact
A process running in the same container session can enumerate environment material from other same-UID processes via /proc, increasing risk of secret discovery if sensitive values are passed through environment variables.
Notes
No sensitive values were copied or disclosed in this report; only key names, lengths, and process metadata were used.
Generated by Secret Digger (Codex) · ◷
- expires on Apr 8, 2026, 3:49 PM UTC