Pathfinder scanned this open-source repository. Scan your own repos free →
← Back to scan results
shivasurya/code-pathfinder

high subprocess with shell=True

scripts/gen_go_modules.py:104

subprocess called with shell=True. This is vulnerable to shell injection.

CWE-78 open

Code

scripts/gen_go_modules.py
101
102def run_go_mod_tidy(directory: Path) -> bool:
103    """Run 'go mod tidy' and return True on success."""
104    result = subprocess.run(
105        ["go", "mod", "tidy"],
106        cwd=directory,
107        capture_output=True,

Dataflow

Source
scripts/gen_go_modules.py:104
Sink
scripts/gen_go_modules.py:104 subprocess.run( ["go", "mod", "tidy"], cwd=directory, capture_output=True, text=True, timeout=120, )

Seen on 10 scans

Get this for your repo.

Pathfinder runs the same scan on your own repos free. Connect via GitHub in 30 seconds.