-
Notifications
You must be signed in to change notification settings - Fork 5.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Linter: gosec, Rule: G204 - Audit use of command execution. Should we enable it? #12905
Comments
-1 This one feels like noise. Calling commands is pretty fundamental to telegraf, so these would be ignored. While I see some value in making us be explicit about ignoring them, I don't think it adds enough to justify the noise. |
I think this might be useful as it refers to "you could inject commands" I think. E.g. by passing a config param |
With
Currently they are excluded by default by:
|
This comment was interesting, stating this rule was a way of auditing code. I'm still -1 one this one :) |
Use Case
This issue starts discussion about enabling:
Rule is mapped to CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection').
Expected behavior
Decision if rule should be enabled or not.
Actual behavior
For this rule following findings were found in current code:
Additional info
For this rule no additional configuration can be provided.
The text was updated successfully, but these errors were encountered: