fix/security: prevent command injection on windows by evict · Pull Request #1272 · sourcegraph/src-cli

Skip to content

Navigation Menu

Sign in

Appearance settings

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

Appearance settings

Conversation

@evict

Copy link Copy Markdown

Contributor

@evict evict commented

Mar 10, 2026

We should verify the result from the server, and make sure it's a URL. Additionally, the start pattern was dangerous and allows command injection, so we use OpenURL from url.dll directly.

@evict evict self-assigned this

Mar 10, 2026

@evict evict force-pushed the vr/security/prevent-command-injection branch from 089fa4b to 681ba1b Compare

March 10, 2026 16:24

@evict evict force-pushed the vr/security/prevent-command-injection branch from 681ba1b to 2eb0830 Compare

March 10, 2026 16:33

@evict evict merged commit 22191a7 into main

Mar 10, 2026

9 checks passed

@evict evict deleted the vr/security/prevent-command-injection branch

March 10, 2026 16:41

burmudar pushed a commit that referenced this pull request

Mar 23, 2026

burmudar pushed a commit that referenced this pull request

Mar 23, 2026

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Reviewers

@burmudar burmudar burmudar approved these changes

@cbrnrd cbrnrd cbrnrd approved these changes

@andreeleuterio andreeleuterio Awaiting requested review from andreeleuterio

Assignees

@evict evict

Labels

None yet

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

3 participants

@evict @burmudar @cbrnrd