Skip to content

Command injection vulnerability: Using template literals with user-controllable path in shell command. Use array form or properly validate/sanitize the path before execution. #31

@joe10832

Description

@joe10832

Command injection vulnerability: Using template literals with user-controllable path in shell command. Use array form or properly validate/sanitize the path before execution.

  execSync('chmod', ['+x', scriptPath], {
    stdio: "inherit",
    cwd: process.cwd(),
  })
  execSync(scriptPath, {
    stdio: "inherit",
    cwd: process.cwd(),
  })
```  @joe10832 /.github/copilot-instructions.md
/.github/instructions/**/*.instructions.md
**/AGENTS.md
/CLAUDE.md
/GEMINI.md

_Originally posted by @copilot-pull-request-reviewer in https://github.com/MunyayLLC/https-github.com-joe10832-onchaintestkit/pull/24#discussion_r2375102741_

Sub-issues

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions