Open
Description
The provided Semgrep report contains a security vulnerability detection. The code injection vulnerability detected in the 'syscall.Exec' call site is not addressed.
To address this issue, we need to modify the code to prevent non-static command execution inside the 'Exec' function. Here's an example of how to fix it:
Original Code:
err := syscall.Exec(command, []string{command, "-c", "ls -la"}, os.Environ())
Modified Code:
command = string(os.SandboxEnv(
Metadata
Metadata
Assignees
Labels
No labels