Skip to content

fix: sanitize subprocess call in sherlock_interactives.py#2887

Open
orbisai0security wants to merge 1 commit into
sherlock-project:masterfrom
orbisai0security:fix-fix-v-001-subprocess-shell-injection
Open

fix: sanitize subprocess call in sherlock_interactives.py#2887
orbisai0security wants to merge 1 commit into
sherlock-project:masterfrom
orbisai0security:fix-fix-v-001-subprocess-shell-injection

Conversation

@orbisai0security
Copy link
Copy Markdown

Summary

Fix critical severity security issue in tests/sherlock_interactives.py.

Vulnerability

Field Value
ID V-001
Severity CRITICAL
Scanner multi_agent_ai
Rule V-001
File tests/sherlock_interactives.py:17
CWE CWE-78

Description: The test suite uses subprocess.check_output with shell=True, allowing arbitrary command injection. The 'command' parameter is constructed from user-controllable input without sanitization. An attacker who can control the command string can inject shell metacharacters (;, &&, ||, |, $(), etc.) to execute arbitrary commands on the system with the privileges of the Python process.

Changes

  • tests/sherlock_interactives.py

Verification

  • Build passes
  • Scanner re-scan confirms fix
  • LLM code review passed

Automated security fix by OrbisAI Security

Automated security fix generated by Orbis Security AI
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant