chore(ruby): avoid shell invocation in extsources.rb#3813
chore(ruby): avoid shell invocation in extsources.rb#3813orbisai0security wants to merge 1 commit into
Conversation
…y vulnerability Automated security fix generated by Orbis Security AI
|
Thank you for report! Could you detail why the ` (backtick) method call is, especially at high severity, danger in the file's context? |
|
Thanks for the review, you’re right to ask for context. After looking again, I agree this should not be framed as a confirmed high-severity exploitable vulnerability in the current code path. The reason for the change is defensive hardening: the current implementation invokes a shell unnecessarily, while Ruby’s argv form of I’m happy to update the PR title/description to something like: “chore(ruby): avoid shell invocation in extsources.rb” and remove the “high severity” / arbitrary code execution wording. This should be treated as a low-risk hardening cleanup rather than a confirmed security vulnerability. |
|
I don't think extsources.rb requires such strict hardening because now it's clear. |
|
Thanks, that’s fair. I agree that this is not a confirmed vulnerability in the current code, since the path is static and the script is clear. I’ll drop the security framing. My only remaining rationale is cleanup/defence-in-depth: array-form process execution avoids shell parsing without changing behaviour. But I understand if you prefer not to add hardening where the current code is already clear and constrained. |
Summary
This PR updates the Ruby binding helper in
bindings/ruby/extsources.rbto avoid invoking a shell when listing tracked source files.The previous implementation used Ruby backticks to run:
Description: Detected non-static command inside
.... If unverified user data can reach this call site, this is a code injection vulnerability. A malicious actor can inject a malicious script to execute arbitrary code.Changes
bindings/ruby/extsources.rbVerification
Automated security fix by OrbisAI Security