Huntarr - Your passwords and your entire arr stack's API keys are exposed to anyone on your network, or worse, the internet.
from Sunny@slrpnk.net to selfhosted@lemmy.world on 23 Feb 09:43
https://slrpnk.net/post/34491367

This is a necessary Reddit repost - stay safe folks!

source

Huntarr (afaik) was an attempt to replace the standard arr* apps, such as sonarr, radarr and prowlarr.


Today, after raising security concerns in a post on r/huntarr regarding the lack of development standards in what looks like a 100% vibe-coded project, I was banned. This made my spidey senses tingle, so I decided to do a security review of the codebase. What I found was… not good. TLDR: If you have Huntarr exposed on your stack, anyone can pull your API keys for Sonarr, Radarr, Prowlarr, and every other connected app without logging in, gaining full control over your media stack. The process

I did a security review of Huntarr.io (v9.4.2) and found critical auth bypass vulnerabilities. I’m posting this here because Huntarr sits on top of (and is now trying to replace them as well!) Sonarr, Radarr, Prowlarr, and other *arr apps that have years of security hardening behind them. If you install Huntarr, you’re adding an app with zero authentication on its most sensitive endpoints, and that punches a hole through whatever network security you’ve set up for the rest of your stack.

The worst one: POST /api/settings/general requires no login, no session, no API key. Nothing. Anyone who can reach your Huntarr instance can rewrite your entire configuration and the response comes back with every setting for every integrated application in cleartext. Not just Huntarr’s own proxy credentials - the response includes API keys and instance URLs for Sonarr, Radarr, Prowlarr, Lidarr, Readarr, Whisparr, and every other connected app. One curl command and an attacker has direct API access to your entire media stack:

curl -X POST http://your-huntarr:9705/api/settings/general \
  -H "Content-Type: application/json" \
  -d '{"proxy_enabled": true}'

Full config dump with passwords and API keys for every connected application. If your instance is internet-facing - and it often is, Huntarr incorporates features like Requestarr designed for external access - anyone on the internet can pull your credentials without logging in.

Other findings (21 total across critical/high/medium):

How I found this: Basic code review and standard automated tools (bandit, pip-audit). The kind of stuff any maintainer should be running. The auth bypass isn’t a subtle bug - auth.py has an explicit whitelist that skips auth for /api/settings/general. It’s just not there.

About the maintainer and the codebase:

The maintainer says they have “a series of steering documents I generated that does cybersecurity checks and provides additional hardening” and “Note I also work in cybersecurity.” They say they’ve put in “120+ hours in the last 4 weeks” using “steering documents to advise along the way from cybersecurity, to hardening, and standards”. If that’s true, it’s not showing in the code.

If you work in cybersecurity, you should know not to whitelist your most sensitive endpoint as unauthenticated. You should know that returning TOTP secrets to unauthenticated callers is account takeover. You should know zipfile.extractall() on untrusted input is textbook Zip Slip. This is introductory stuff. The “cybersecurity steering documents” aren’t catching what a basic security scan flags in seconds.

Look at the commit history: dozens of commits with messages like “Update”, “update”, “Patch”, “change”, “Bug Patch” - hundreds of changed files in commits separated by a few minutes. No PR process, no code review, no second pair of eyes - just raw trunk-based development where 50 features get pushed in a day with zero review. Normal OSS projects are slower for a reason: multiple people look at changes before they go in. Huntarr has none of that.

When called out on this, the maintainer said budget constraints: “With a limited budget, you can only go so far unless you want to spend $1000+. I allot $40 a month in the heaviest of tasks.” That’s just not true - you can use AI-assisted development 8 hours a day for $20/month. The real problem isn’t the budget. It’s that the maintainer doesn’t understand the security architecture they’re building and doesn’t understand the tools they’re using to build it. You can’t guide an AI to implement auth if you don’t recognize what’s wrong when it doesn’t.

They also censor security reports and ban people who raise concerns. A user posted security concerns on r/huntarr and it was removed by the moderator - the maintainer controls the subreddit. I was banned from r/huntarr after pointing out these issues in this thread where the maintainer was claiming to work in cybersecurity (which they now deleted).

One more thing - the project’s README has a “Support - Building My Daughter’s Future” section soliciting donations. That’s a red flag for me. You’re asking people to fund your development while shipping code with 21 unpatched security vulnerabilities, no code review process, and banning people who point out the problems, while doing an appeal to emotion about your daughter. If you need money, that’s fine - but you should be transparent about what you’re spending it on and you should be shipping code that doesn’t put your users at risk.

Proof repo with automated CI: github.com/rfsbraz/huntarr-security-review

Docker Compose setup that pulls the published Huntarr image and runs a Python script proving each vulnerability. GitHub Actions runs it on every push - check the workflow results yourself or run it locally with docker compose up -d && python3 scripts/prove_vulns.py.

For what it’s worth, and to prove I’m not an AI hater, the prove_vulns script itself was vibe coded - I identified the vulnerabilities through code review, wrote up the repro steps, and had AI generate the proof script.

Full security review (21 findings): github.com/…/Huntarr.io_SECURITY_REVIEW.md

What happens next: The maintainer will most likely prompt these problems away - feed the findings to an AI and ship a patch. But fixing 21 specific findings doesn’t fix the process that created them. No code review, no PR process, no automated testing, no one who understands security reviewing what ships. The next batch of features will have the next batch of vulnerabilities. This is only the start. If the community doesn’t push for better coding standards, controlled development, and a sensible roadmap, people will keep running code that nobody has reviewed.

If you’re running Huntarr, keep it off any network you don’t fully trust until this is sorted. The *arr apps it wraps have their own API key auth - Huntarr bypasses that entirely.

Please let others know about this. If you have a Huntarr instance, share this with your community. If you know someone who runs one, share it with them. The more people know about the risks, the more pressure there will be on the maintainer to fix them and improve their development process.

Edit: Looks like r/huntarr went private and the repo got deleted or privated github.com/plexguide/Huntarr.io . I’m sorry for everyone that donated to this guy’s “Daughter College Fund”.

Edit 2: Thanks for all the love on the comments, I’ll do my best to reach out to everyone I can. People asking me for help on security reviews, believe me when I say I did little more than the basics - the project was terrible.

#selfhosted

threaded - newest

pjusk@lemmy.dbzer0.com on 23 Feb 10:42 next collapse

This is wild and a rather unfortunate situation… Ty for sharing.

irmadlad@lemmy.world on 23 Feb 10:46 next collapse

As I commented in another thread, I don’t run 'arr anything, but I’m thankful that there are competent people who can make sense of all the code involved to do a proper audit.

Sunny@slrpnk.net on 23 Feb 10:57 next collapse

Absolutely, in an optimal world it would be easier to audit software ourselves through tooling, but we’re not there yet. Personally looking to build a pipeline to run apps i wan to host through tools such as:, semgrep, grype and trivy, to at least get somewhat of an overview.

avidamoeba@lemmy.ca on 23 Feb 11:23 collapse

Secuarr?

SlurpingPus@lemmy.world on 24 Feb 05:10 collapse

Once again I’m glad that I just search trackers with the browser and download torrents with a torrents client, like a peasant.

irmadlad@lemmy.world on 24 Feb 05:20 collapse

I’ll be honest, if 'arr were my modus operandi, I would most likely take your approach because the alternative would keep me up at night worrying.

era@lemmy.world on 23 Feb 11:05 next collapse

I don’t personally run Huntarr but thank you so much for your amazing work!

Sunny@slrpnk.net on 23 Feb 12:02 collapse

Want to stress that it was not me personally who did this deep dive, its a repost from reddit. So all kudos goes to them!

basic_user@lemmy.world on 23 Feb 13:35 next collapse

Thank you for your thorough analysis and report. Very interesting read. Just doing the basics, as you say, is more than a layman like me can do!

Sunny@slrpnk.net on 23 Feb 13:55 collapse

Want to stress that it was not me personally who did this deep dive, its a repost from reddit. So all kudos goes to them!

homesweethomeMrL@lemmy.world on 23 Feb 13:51 next collapse

The maintainer says they have “a series of steering documents I generated that does cybersecurity checks and provides additional hardening” and “Note I also work in cybersecurity.”

Yeah, that’s a big no. No one ‘generates’ ‘steering documents’. No one I would take seriously, anyway.

One more thing - the project’s README has a “Support - Building My Daughter’s Future” section soliciting donations.

Yuck.

defaultusername@lemmy.dbzer0.com on 23 Feb 13:56 next collapse

My password is huntarr2

SubUrbanIT@lemmy.world on 23 Feb 14:24 next collapse

Huntarr123?

usernameusername@sh.itjust.works on 23 Feb 15:49 collapse

All I see is ********

ohshit604@sh.itjust.works on 23 Feb 16:54 collapse

Huh, swear I’ve seen this somewhere.

myplacedk@lemmy.world on 24 Feb 01:27 collapse

I’ll give you a hint: Originally it was *******.

Wait, let me try again - hunter2

Ferrous@lemmy.ml on 23 Feb 14:16 next collapse

Thanks for this.

I’m starting to get worried about how much AI slop is being pushed on top of the venerable arr stack. A few months ago I was evaluating a music solution, and came across a promising solution called Soulsync, only to learn it was vibe coded. Since that fiasco, it looks like there is a new one called Aurral 2.0 with the same issue.

Its a shame since the arr developers are real deal.

peacefulpixel@lemmy.world on 23 Feb 14:53 next collapse

i know this will hurt feelings but this is just gonna keep happening as long as y’all use GenAI. this is quite literally what it was made for

myplacedk@lemmy.world on 24 Feb 01:28 collapse

…as long as y’all use GenAI incorrectly.

It has it’s uses i programming. Doing all the coding for you is not one of them.

Bazoogle@lemmy.world on 24 Feb 05:22 collapse

Doing all the coding for you is not one of them.

yet. If AI can do anything well, I think it should be writing code, given the formulaic nature of code. We are NOT there yet. But it will one day, no doubt.

mlg@lemmy.world on 23 Feb 15:28 next collapse

Gamefreak used an additional hardcoded RSA public key auth in Pokémon Black/White because for some reason they didn’t trust OpenSSL to not fail for their HTTPS API connections, and yet here we are in 2026 with unauthenticated API endpoints.

Was ChatGPT unable to generate swagger docs they could have lazily plugged into an API scanner bruh

Or better yet notice the big fat “unathenticated” label when you look at the endpoint list.

Decronym@lemmy.decronym.xyz on 23 Feb 15:30 next collapse

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

Fewer Letters More Letters
HTTP Hypertext Transfer Protocol, the Web
HTTPS HTTP over SSL
SSL Secure Sockets Layer, for transparent encryption

1 acronyms in this thread; the most compressed thread commented on today has 10 acronyms.

[Thread #112 for this comm, first seen 23rd Feb 2026, 23:31] [FAQ] [Full list] [Contact] [Source code]

makearmy@lemmy.makearmy.io on 23 Feb 15:46 next collapse

OP is a GOD

fta@lemmy.zip on 23 Feb 16:20 next collapse

Thanks for forwarding.

Looks like the repo was deleted: github.com/plexguide/Huntarr.io

Dultas@lemmy.world on 23 Feb 18:05 next collapse

The dev also shutdown their subreddit

And I believe the codebase was mirrored / forked before deletion.

CocaineShrimp@sh.itjust.works on 23 Feb 19:18 collapse

Good

CocaineShrimp@sh.itjust.works on 23 Feb 19:32 next collapse

Thank you for this. I have seen a few *arr combination projects I wanted to look into; so I may have had come across this one.

It’s unfortunate that the “developer” chose to nope out, instead of fixing it or at least seeking help from the community. This is one of the good aspects of OSS - that we can and should audit ourselves. But if it was all vibe coded, maybe they didn’t know that an audit is good and should be welcomed; instead of rejected and shutdown.

punkibas@lemmy.zip on 24 Feb 01:53 next collapse

Hoy shit! What a trainwreck of an app

x00z@lemmy.world on 24 Feb 03:51 next collapse

I already had a feeling from navigating the interface.

Thanks for your work.

Fmstrat@lemmy.world on 24 Feb 04:30 next collapse

If you are willing, I would love to see a blog post, video, or repo of exactly how you conducted this audit. Great read, and would like to learn more of your specific process (beyond the readmes and man pages).

NastyNative@mander.xyz on 27 Feb 04:57 collapse

This is great thank you for this since the next step on my journey is the ARR stack!

Sunny@slrpnk.net on 27 Feb 10:36 collapse

Best lf luck, hit me up if you have any questions regarding it 😊