Files
codeql/go/old-change-notes/2021-01-08-git-as-interpreter.md
2022-05-20 10:07:19 -07:00

3 lines
325 B
Markdown

lgtm,codescanning
* Added `git` as a potentially-exploitable command interpreter for the purposes of the `go/command-injection` query. Because some of its options can cause it to execute an arbitrary command, unsanitized user data can be dangerous to include in its argument list. Such cases will now be flagged as an alert.