Google Cloud IPs in settings.php
-
Hello,
I am reporting a potential security concern regarding the AIOS firewall settings file (settings.php) that I believe deserves attention.
Our server monitoring system (Sentinel Hash Checker) detected an unexpected modification to the AIOS settings.php file. There was no plugin update for over 2 months — yet the file changed without any manual interaction on our part.
What we found inside the modified file:
The aiowps_googlebot_ip_ranges array was populated with a large number of IP ranges that go significantly beyond legitimate Googlebot crawler IPs. Specifically, the file now contains:
- Google Cloud infrastructure ranges (192.178.4.0/27, 34.x.x.x, etc.)
- Google Cloud IPv6 ranges (2001:4860:4801::/64 blocks)
This is a security concern because these are not Googlebot crawler IPs — they are Google Cloud data center ranges that any third party can rent for a few dollars per month. By whitelisting these ranges in the firewall, AIOS effectively creates a bypass vector: an attacker who provisions a Google Cloud server receives an IP from one of these whitelisted ranges and can bypass all AIOS firewall rules entirely.
Our questions:
- Is AIOS making automatic API calls to update the googlebot_ip_ranges list without user notification or consent?
- If so, from which endpoint are these ranges being pulled?
- Is there a changelog or audit log for automatic settings.php modifications?
We consider this a serious architectural issue. Whitelisting entire cloud provider ranges — not just verified crawler IPs — significantly undermines the security posture that AIOS is supposed to provide.
We are happy to provide the full settings.php content and our server logs if needed for investigation.
Best regards,
Rene from
VisionGaiaTechnology
You must be logged in to reply to this topic.