diff --git a/monkey/infection_monkey/exploit/log4shell.py b/monkey/infection_monkey/exploit/log4shell.py index d6c6ec198..146f4c16a 100644 --- a/monkey/infection_monkey/exploit/log4shell.py +++ b/monkey/infection_monkey/exploit/log4shell.py @@ -160,6 +160,8 @@ class Log4ShellExploiter(WebRCE): self.exploit_result.propagation_success = True def _wait_for_victim(self) -> bool: + # TODO: Peridodically check to see if ldap or HTTP servers have exited with an error. If + # they have, return with an error. victim_called_back = False victim_called_back = self._wait_for_victim_to_download_java_bytecode()