ruby-command-injection

profile photo of Vasilii ErmilovVasilii Ermilov
Author
unknown
Download Count*

Secure defaults for Command injection prevention

Run Locally

Rules (5)

profile photo of semgrepsemgrep

Use of eval with user-controllable input detected. This can lead to attackers running arbitrary code. Ensure external data does not reach here, otherwise this is a security vulnerability. Consider other ways to do this without eval.

profile photo of semgrepsemgrep

Detected non-static command inside $EXEC. Audit the input to '$EXEC'. If unverified user data can reach this call site, this is a code injection vulnerability. A malicious actor can inject a malicious script to execute arbitrary code.

profile photo of semgrepsemgrep

Detected non-static command inside 'open'. Audit the input to 'open'. If unverified user data can reach this call site, this is a code injection vulnerability. A malicious actor can inject a malicious script to execute arbitrary code.