test: multi-pass pipeline with linter-rule-judge #41
Annotations
3 errors
|
Command Injection via execSync Template Literal:
src/config/loader.ts#L126
execSync executes shell command with unsanitized path concatenation. If scriptName contains shell metacharacters (e.g., `; rm -rf /`), arbitrary commands execute.
|
|
Arbitrary Code Execution via eval():
src/config/loader.ts#L134
eval() executes arbitrary JavaScript code. If expr parameter receives user input, attackers gain full code execution with application privileges.
|
|
Arbitrary Code Execution via Function Constructor:
src/config/loader.ts#L138
new Function() creates executable code from strings. If code parameter receives untrusted input, attackers execute arbitrary JavaScript with full application privileges.
|