Skip to content

fix: use fully qualified paths to prevent shell injection #93

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Oct 27, 2024

Conversation

virgofx
Copy link
Member

@virgofx virgofx commented Oct 27, 2024

This just adds additional security as we require these files to be in the system

@virgofx virgofx self-assigned this Oct 27, 2024
@virgofx virgofx force-pushed the fix-use-fully-qualified-paths-for-commands branch 3 times, most recently from f3b4293 to 5e85c69 Compare October 27, 2024 23:38
This just adds additional security as we require these files to be in the system
@virgofx virgofx force-pushed the fix-use-fully-qualified-paths-for-commands branch from 5e85c69 to fc8dc01 Compare October 27, 2024 23:39
Copy link

@virgofx virgofx added the bug Something isn't working label Oct 27, 2024
Copy link

Release Plan

No terraform modules updated in this pull request.

✅ Wiki Check ℹ️

Note: The following Terraform modules no longer exist in source; however, corresponding tags/releases exist. Automation tag/release deletion is disabledno subsequent action will take place.

v1.2.0, v1.1.1, v1.1.0, v1.0.1, v1.0.0, v1

Powered by techpivot/terraform-module-releaser

@virgofx virgofx merged commit cc2510a into main Oct 27, 2024
7 checks passed
@virgofx virgofx deleted the fix-use-fully-qualified-paths-for-commands branch October 27, 2024 23:41
@release-preview release-preview bot mentioned this pull request Oct 27, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working security
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant