Files
codeql/go/old-change-notes/2020-11-04-unsafe-unzip-symlink.md
2022-05-20 10:07:19 -07:00

3 lines
251 B
Markdown

lgtm,codescanning
* A new query `go/unsafe-unzip-symlink` has been added. The query checks for extracting symbolic links from an archive without using `filepath.EvalSymlinks`. This could lead to a file being written outside the destination directory.