Description
During a security audit at TaskVault Industries, you discovered an internal task management application called “TaskVault”. This application appears to contain sensitive information about the company’s projects, including potentially access credentials and secrets. Our team has managed to identify the server hosting the application, but it’s protected by multiple proxy layers and an authentication system. Your mission is to exploit the weaknesses in this architecture to bypass the protections and access the confidential data stored in TaskVault.
Files
- docker-compose.yml
-
taskvault.tar.xz
13.04 KiB – 347384c6b9b4cffb7fbf7574e5b75d09eabd26a6530febd57f4b8f6f11d05673
Author

Challenge Instructions
- First, download docker-compose.yml:
curl https://hackropole.fr/challenges/fcsc2025-web-taskvault/docker-compose.public.yml -o docker-compose.yml
- Launch the challenge by executing in the same folder:
docker compose up
- Access the challenge at http://localhost:8000/.
In case you encounter problems, please consult the FAQ.
Flag
Submit your solution
You can submit your writeup for this challenge. Read the FAQ to learn how to proceed.
You need to be logged in to submit a writeup.