/top/
/new/
/best/
/ask/
/show/
/job/
^
slacker news
login
about
←back to thread
Finding thousands of exposed Ollama instances using Shodan
(blogs.cisco.com)
166 points
rldjbpin
| 1 comments |
03 Sep 25 08:18 UTC
|
HN request time: 0s
|
source
Show context
deadbabe
◴[
03 Sep 25 10:06 UTC
]
No.
45114029
[source]
▶
>>45113418 (OP)
#
The stakes aren’t that high yet for Ollama to warrant cumbersome auth mechanisms.
replies(2):
>>45114139
#
>>45114224
#
reilly3000
◴[
03 Sep 25 10:41 UTC
]
No.
45114224
[source]
▶
>>45114029
#
If any MCP servers are running, anyone with access to query the chat endpoint can use them. That could include file system access, GitHub tokens and more.
replies(3):
>>45114274
#
>>45114972
#
>>45115474
#
1.
deadbabe
◴[
03 Sep 25 13:23 UTC
]
No.
45115474
[source]
▶
>>45114224
#
That is is completely false, ollama has nothing to do with running commands, it just processes prompts to text responses.
ID:
GO
↑