Awesome! Thanks for taking the topic serious
It’s extremely refreshing to see a company be both proactive and transparent about this kind of thing!
Amazing work and honesty! Wish other companies were as open as Nabu. It’s why you’re my only subscription service is have!!
Good. Especially after the last catastrophic Supervisor vulnerability, having HA professionally pen tested was the right thing to do.
I don’t expect anything else than a strict and tight security maintenance. Good job Home Assistant Team!
Good job guys.
As someone who has been through more than his fair share of security audits at work, I know how tough these can be and, indeed, how easy it is for defects to sneak through even the most careful processes. As such, this seems like a very impressive achievement, not least of which is in resolving the issues promptly.
Thank you for the transparency and for investing in all of our security. It’s appreciated.
Great job all, happy that my subscription helps run these audits.
Nice to know you do security audits.
Great to see things like this.
I still will not put my garbage disposal on a smart switch…I have seen too many horror movies.
So what’s the actual risk when running HA Core before 2023.9 - is it “freaking dangerous” (even if HA is not exposed to the internet) or what’s the actual attack vector?
Not exposed to the internet. Practically none. But it’s a remote code execution full Pown attack.
Read. Bad juju.
This is great work! Could we address the fact that we still can’t configure a console password for HAOS?
Great to see security is being taken seriously. Unlike many smart things vendors.
Good job, everyone involved!
Is it just me that sees secret management as a big vulnerability??
Even if we substitute those out to a secrets.yaml file - there are still all my passwords in there in plain-text for anyone to try to get to, or for untrusted code to access. Surely that’s a bit of an issue?
Even if they were encrypted at least it would help with visibility of them?
Interested to hear other opinions on it!
Another smaller point - I see voice control into HA as a bit of a security problem also. For example if you can say “Unlock all my doors” from the porch - although I appreciate that’s more of an implementation thing, but hopefully something users are thinking about? I think it would be helpful to call these simple things out to users though in documentation, for those not thinking about it.
This has been discussed many times. Do a forum search. There are reasons it is the way it is.
I just find it difficult to comprehend that a top security consultant (x2) haven’t highlighted this as part of a security audit.
I’ve not been able to find anything that points towards a conclusive answer on the WHY @tom_l - although there seems to be a lot of opinion on it. Do you have a link?
Just to check - you mean the secret management piece?
Thanks @tom_l - that’s the thread I found again (and digested from before) on the subject. There are a lot of opinions on it, and while some of them will have an improvement on the project, there doesn’t seem to be an obvious position on it from a project point of view.
All government (US/EU/UK) guidance on cyber-security calls out encrypting secrets and monitoring access to them. Appreciate this isn’t meant to be a government/military-grade system. I’m just surprised that leading security consultants aren’t calling out these gaps in their audit. Calling out those gaps is useful in an open-source setting as it helps us contribute to features that fulfil them.
The message I linked to is from one of the Nabu Casa developers. I don’t see any response that gets around the issues he raised.
I’ll send a reply, I think there are improvements that can be made over the current capability, even if it doesn’t address every point.
My main point is around the security audit not catching this though. Ideally you want to have confidence in that report. Maybe they didn’t look into secret management?