-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
work around cloning repos #28
Conversation
…t dir, and extracting from the folder
await removePreviousClone(path) | ||
|
||
return new Promise<string>((resolve, reject) => { | ||
const child = spawn('git', ['clone', info.href, path]) |
Check failure
Code scanning / CodeQL
Second order command injection High
library input
Command line argument that depends on
library input
Command line argument that depends on
library input
Command line argument that depends on
library input
Command line argument that depends on
library input
Command line argument that depends on
library input
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm going to try and commit a change to see if I can fix this
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Well, looks like my test didn't help. I think they are suggesting checking for a valid remote and I thought checking for "upload-pack" would work.
https://codeql.github.com/codeql-query-help/javascript/js-second-order-command-line-injection/
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hmm, I wonder if there is a way to ignore that error line or file... Unless it's necessary, then I don't mind adding checks. CodeQL can get in the way sometimes.
Superseded by #29 |
cleaning previous downloads, removing .git dir, and extracting from the cloned folder