You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fix: prevent shell injection in PR Commands workflow
The comment body was interpolated directly into bash via
${{ github.event.comment.body }}, which meant backticked code
in PR comments (e.g. `req.content_length`) got executed as shell
commands on the self-hosted runner.
Fix: pass comment body, PR number, and repo name through environment
variables instead of direct interpolation. Env vars are safely
quoted by the shell.
0 commit comments