Authorization bypass via protocol-level inconsistency
MLflow (Databricks)
An authorization bypass in MLflow's tracking server allowed unauthorized users to read, modify, and delete experiments and runs by exploiting inconsistencies in how authorization was enforced across different API protocols.
What Tachyon found
Tachyon's agent traced the authorization enforcement path across MLflow's REST and gRPC interfaces and discovered that while the REST API correctly checked permissions, an alternative protocol surface skipped the authorization middleware entirely. The agent validated this by constructing a proof-of-concept request sequence that accessed protected resources without valid credentials.
Why scanners missed it
Traditional SAST tools analyze individual files and functions. This vulnerability required understanding how two different protocol handlers routed to the same underlying data layer — but with different middleware chains. A file-level scanner would see valid auth checks on both paths and report nothing.