Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
JunoClaw: MCP write tools exposed raw BIP-39 mnemonic as a tool-call parameter
Vulnerability Description
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call parameter. The BIP-39 seed was consequently embedded in the LLM tool-call JSON, exposing it to any transport, log, or telemetry surface in the path between the LLM provider and the MCP process. This vulnerability is fixed in 0.x.y-security-1.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
信息暴露
Vulnerability Title
JunoClaw 信息泄露漏洞
Vulnerability Description
JunoClaw是Dragonmonk111个人开发者的一个基于区块链的去中心化AI代理平台。 JunoClaw 0.x.y-security-1之前版本存在信息泄露漏洞,该漏洞源于每个MCP写入工具接受助记词作为显式工具调用参数,可能导致BIP-39种子暴露在传输、日志或遥测表面。
CVSS Information
N/A
Vulnerability Type
N/A