gitlab.eslint.detect-child-process
178
Download Count*
License
Detected non-literal calls to child_process.exec(). This could lead to a command injection vulnerability.
Run Locally
Run in CI
Defintion
rules:
- id: eslint.detect-child-process
metadata:
cwe: "CWE-95: Improper Neutralization of Directives in Dynamically Evaluated
Code ('Eval Injection')"
owasp: "A1: Injection"
source-rule-url: https://github.com/nodesecurity/eslint-plugin-security/blob/master/rules/detect-child-process.js
primary_identifier: eslint.detect-child-process
secondary_identifiers:
- name: ESLint rule ID security/detect-child-process
type: eslint_rule_id
value: security/detect-child-process
license: MIT
message: >
Detected non-literal calls to child_process.exec(). This could lead to a
command
injection vulnerability.
patterns:
- pattern: child_process.exec(...)
- pattern-not: child_process.exec('...')
severity: WARNING
languages:
- javascript
- typescript
Short Link: https://sg.run/nqRr