Custom GPT Action schema includes an undocumented "admin" path
Summary
Custom GPT's OpenAPI schema defines a `/admin` path that the model can call, not mentioned in the GPT description. The path accepts arbitrary shell commands and runs them on the Action backend.
Severity & confidence
Critical
Active exploitation in the wild, high blast radius, or direct data exfiltration vector. Treat as an urgent remediation target; quarantine affected artifacts immediately.
Confirmed
Observed directly by Jiffy scanners or validated by multiple independent sources. Indicators are reliable enough to drive automated action.
Indicators
Observed patterns and artifacts associated with this entry. Each indicator can be copied into your detection stack or SIEM.
(?i)paths:\s*[\s\S]{0,500}/(?:admin|debug|internal|__)
Detection rule
A YARA-style pseudo-rule auto-generated from the indicators above. Useful as a starting point — adapt the syntax for your target detection platform.
rule jiffy_ti_2026_000083
{
meta:
source = "jiffy-intel"
severity = "critical"
description = "Auto-generated from Jiffy Intel indicators"
strings:
$content_pattern_0 = "(?i)paths:\\s*[\\s\\S]{0,500}/(?:admin|debug|internal|__)"
condition:
$content_pattern_0
}Auto-generated from the indicators above. Adapt syntax for your detection stack before deploying.
Affected tools
| Tool | Versions | Status |
|---|---|---|
| ChatGPT (GPT Store) | * | vulnerable |
Example artifacts
Sanitized examples of artifacts Jiffy has observed exhibiting this pattern. Publisher handles are redacted; version ranges and status reflect the most recent scan.
- Ops Dashboard GPTCustom GPTRemoved
- Deployer Pro GPTCustom GPTQuarantined
How to remediate
- 01Audit Action OpenAPI schemas on first install.
- 02Reject GPTs whose schemas expose paths outside the stated scope.
Timeline & sources
Timeline
- First observedMar 19, 202629 days ago
- Last updatedApr 28, 2026today
- PublishedMar 29, 202619 days ago
Sources
References
Custom GPT Action Surface Analysis (arXiv 2510.08421)
https://arxiv.org/abs/2510.08421MITRE ATT&CK T1059 — Command and Scripting Interpreter
https://attack.mitre.org/techniques/T1059/OWASP LLM-06: Excessive Agency (2026)
https://genai.owasp.org/llmrisk/llm-06-2026/Scan for patterns like this
Point Jiffy at your GitHub org, IDE config, or a single artifact. Get a scored report in under a minute.
Start a free scan