Skip to content

fix: detected calls to child_process from a function... in bun-polyfi...#629

Open
orbisai0security wants to merge 1 commit intogarrytan:mainfrom
orbisai0security:fix-fix-detect-child-process-bun-polyfill
Open

fix: detected calls to child_process from a function... in bun-polyfi...#629
orbisai0security wants to merge 1 commit intogarrytan:mainfrom
orbisai0security:fix-fix-detect-child-process-bun-polyfill

Conversation

@orbisai0security
Copy link
Copy Markdown

Summary

Fix high severity security issue in browse/src/bun-polyfill.cjs.

Vulnerability

Field Value
ID javascript.lang.security.detect-child-process.detect-child-process
Severity HIGH
Scanner semgrep
Rule javascript.lang.security.detect-child-process.detect-child-process
File browse/src/bun-polyfill.cjs:69

Description: Detected calls to child_process from a function argument cmd. This could lead to a command injection if the input is user controllable. Try to avoid calls to child_process, and if it is needed en...

Changes

  • browse/src/bun-polyfill.cjs

Verification

  • Build passes
  • Scanner re-scan confirms fix
  • Code review passed

Automated security fix by OrbisAI Security

Detected calls to child_process from a function argument `cmd`
Resolves javascript.lang.security.detect-child-process.detect-child-process
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant