Skip to content

fix: sanitize subprocess call in wtf.py#1742

Open
orbisai0security wants to merge 1 commit intoopeninterpreter:mainfrom
orbisai0security:fix-v-002-subprocess-shell-injection
Open

fix: sanitize subprocess call in wtf.py#1742
orbisai0security wants to merge 1 commit intoopeninterpreter:mainfrom
orbisai0security:fix-v-002-subprocess-shell-injection

Conversation

@orbisai0security
Copy link
Copy Markdown

Summary

Fix critical severity security issue in scripts/wtf.py.

Vulnerability

Field Value
ID V-002
Severity CRITICAL
Scanner multi_agent_ai
Rule V-002
File scripts/wtf.py:190

Description: Multiple subprocess.Popen and subprocess.check_output calls in scripts/wtf.py use shell=True with dynamically constructed command strings. When shell=True is used, the entire command string is passed to /bin/sh -c, enabling injection of arbitrary shell commands via metacharacters (;, &&, |, $()) if any portion of the command string is attacker-influenced.

Changes

  • scripts/wtf.py

Verification

  • Build passes
  • Scanner re-scan confirms fix
  • LLM code review passed

Automated security fix by OrbisAI Security

Automated security fix generated by Orbis Security AI
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant