Files
codeql/go/old-change-notes/2021-01-08-git-as-interpreter.md
2022-05-20 10:07:19 -07:00

325 B

lgtm,codescanning

  • Added git as a potentially-exploitable command interpreter for the purposes of the go/command-injection query. Because some of its options can cause it to execute an arbitrary command, unsanitized user data can be dangerous to include in its argument list. Such cases will now be flagged as an alert.