Skip to content

test: multi-pass pipeline with linter-rule-judge #41

test: multi-pass pipeline with linter-rule-judge

test: multi-pass pipeline with linter-rule-judge #41

Triggered via pull request February 13, 2026 21:39
Status Success
Total duration 2m 40s
Artifacts

warden.yml

on: pull_request
Fit to window
Zoom out
Zoom in

Annotations

3 errors
Command Injection via execSync Template Literal: src/config/loader.ts#L126
execSync executes shell command with unsanitized path concatenation. If scriptName contains shell metacharacters (e.g., `; rm -rf /`), arbitrary commands execute.
Arbitrary Code Execution via eval(): src/config/loader.ts#L134
eval() executes arbitrary JavaScript code. If expr parameter receives user input, attackers gain full code execution with application privileges.
Arbitrary Code Execution via Function Constructor: src/config/loader.ts#L138
new Function() creates executable code from strings. If code parameter receives untrusted input, attackers execute arbitrary JavaScript with full application privileges.