Sentinel

Securing open-source digital forensics tools.

Digital forensics investigators rely on open-source tools every day. These tools process sensitive evidence, parse complex file formats, and help solve crimes. Yet many have never received a professional security review.

Through our Sentinel program, Mobasi performs security reviews for open-source forensics tools. Our team identifies vulnerabilities, documents findings, and works with maintainers through responsible disclosure to resolve issues before they can be exploited.

We are systematically reviewing tools in the digital forensic ecosystem to identify vulnerabilities and improve security. If you'd like your tool to be included or accelerated, please reach out below.

Our review process

  • Deep code review for security vulnerabilities
  • Dependency analysis and supply chain reviews
  • Coordinated responsible disclosure with maintainers
  • Pull requests with fixes where appropriate
  • Public recognition for participating projects

Our track record

Since launching Sentinel, we've identified multiple critical and high-severity vulnerabilities across widely-used forensics tools. We work closely with maintainers to ensure issues are addressed before public disclosure.

Vulnerability index

ToolTypeCVESeverityDate
ArelleUnauthenticated RCE via /rest/configureCVE-2026-42796CRITICAL2026-05-04
Detect-It-EasyPath Traversal Arbitrary File WriteCVE-2026-43616HIGH2026-05-04
Sleuth Kittsk_recover Path TraversalCVE-2026-40024HIGH2026-03-05
Sleuth KitAPFS Keybag Parser OOB ReadCVE-2026-40025MEDIUM2026-03-05
Sleuth KitISO9660 SUSP ER Length Trust OOB ReadCVE-2026-40026MEDIUM2026-03-05
ALEAPPNQ Vault Path Traversal / RCECVE-2026-40027HIGH2026-03-05
NSA GhidraArbitrary Code Execution via @execute AnnotationCVE-2026-4946HIGH2026-02-20
HayabusaXSS from HTML InputsCVE-2026-40028MEDIUM2026-02-20
parseusbsCommand Injection via LNK FilenameCVE-2026-40029HIGH2026-02-20
parseusbsCommand Injection via -v Volume ArgumentCVE-2026-40030HIGH2026-02-20
unfurlPermanent Debug ModeCVE-2026-40035CRITICAL2026-01-28
bulk_extractorHeap Overflow AttackCVE-2026-24857HIGH2026-01-28
unfurlDecompression Bomb DoSCVE-2026-40036HIGH2026-01-28
tcpflowOut of Bounds WriteCVE-2026-25061MEDIUM2026-02-20
MemProcFSDLL/Shared Library HijackingCVE-2026-40031HIGH2026-02-20
UACCommand Injection via Placeholder SubstitutionCVE-2026-40032HIGH2026-04-05

Some vulnerabilities remain under embargo during responsible disclosure. This table is updated as disclosures are made public.

Submit a tool for review

Maintain an open-source forensics tool? We'd like to help ensure it's secure. Submit your tool for consideration in our review program.

Submit a tool for review