gitlab.eslint.detect-child-process

178
Download Count*
License

Detected non-literal calls to child_process.exec(). This could lead to a command injection vulnerability.

Run Locally

Run in CI

Defintion

rules:
  - id: eslint.detect-child-process
    metadata:
      cwe: "CWE-95: Improper Neutralization of Directives in Dynamically Evaluated
        Code ('Eval Injection')"
      owasp: "A1: Injection"
      source-rule-url: https://github.com/nodesecurity/eslint-plugin-security/blob/master/rules/detect-child-process.js
      primary_identifier: eslint.detect-child-process
      secondary_identifiers:
        - name: ESLint rule ID security/detect-child-process
          type: eslint_rule_id
          value: security/detect-child-process
      license: MIT
    message: >
      Detected non-literal calls to child_process.exec(). This could lead to a
      command

      injection vulnerability.
    patterns:
      - pattern: child_process.exec(...)
      - pattern-not: child_process.exec('...')
    severity: WARNING
    languages:
      - javascript
      - typescript