Manus.im Security Disclosure Report (April 2025) - Revised

Date: April 30, 2025

Executive Summary

This report details critical security vulnerabilities discovered within the Manus.im infrastructure. Investigation revealed that an improperly isolated code-server development environment grants authenticated users extensive access to server internals. This includes the root filesystem, sensitive configuration files (e.g., within /etc), internal API tokens, cryptographic tools, and core platform logic. The severity of this exposure presents a significant risk, potentially allowing compromise of the entire Manus.im backend stack. Immediate remediation is strongly advised.


Detailed Findings

The following vulnerabilities were identified through analysis of the Manus.im platform and its associated code-server environment:

1. Root Filesystem Exposure via Code-Server

2. Insecure Handling of API Tokens

3. Exposure of Cryptographic Tools and Potential Key Compromise

4. Potential Concurrency Issues with greenlet

5. Insecure Direct Object References & API Exposure


Recommendations

Based on the findings, the following remediation steps are recommended, categorized by urgency:

Immediate Actions (Critical Priority)

Further Actions (High Priority)


Disclosure Timeline


Conclusion

The vulnerabilities identified in this report represent a critical and immediate risk to the security, integrity, and availability of the Manus.im platform and the confidentiality of its user data. The combination of unrestricted filesystem access from a development environment, exposed API tokens, insecure file handling practices, accessible cryptographic tools, and potentially vulnerable internal logic creates a high-impact attack surface.

Continued operation in the current state poses a severe risk of significant data breaches, potential non-compliance with data protection regulations (e.g., GDPR), substantial financial penalties, and irreparable damage to the Manus.im brand and user trust.

We strongly recommend taking the affected systems offline immediately to conduct a full security audit and implement the critical remediation steps outlined in this report before restoring service to users.


Appendix A: Visual Evidence

The following figures provide visual evidence supporting the findings detailed in this report.

Screenshot showing code-server access to root directory
Figure 1: Code-server interface providing access to the root (/) directory.
Screenshot showing code-server access to /etc directory
Figure 2: Code-server interface providing access to the /etc directory.
Screenshot showing contents of /etc directory
Figure 3: Contents of the /etc directory accessed via file explorer.
Screenshot showing access to sensitive directories like .mysql, .sandbox-runtime
Figure 4: Access to sensitive directories (.mysql, .packages, .sandbox-runtime, deploy).
Screenshot of network traffic logs showing API requests
Figure 5: Network traffic logs showing requests to internal API endpoints and CDN paths.
Screenshot showing HTTP request and response headers
Figure 6: HTTP request/response headers revealing server details and rate limits.
Screenshot showing API request and 405 response
Figure 7: HTTP request to KnowledgeService and 405 Method Not Allowed response.
Screenshot showing access to application code directories
Figure 8: Access to application code directories (flask, next, react).

(Note: Additional screenshots, including one showing potentially binary data (figure_extra.png), were provided but not explicitly referenced unless directly supporting a specific finding.)