WhisperX tag archive

#Shell Injection

This page collects WhisperX intelligence signals tagged #Shell Injection. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (9)

The Lab · 2026-03-28 20:26:53 · GitHub Issues

1. GitHub Project Exposes Critical Shell Injection Flaw in AppleScript Rename Function

A critical security vulnerability has been exposed in a GitHub project's file renaming function, where the use of AppleScript creates a direct path for shell injection attacks. The flaw allows attackers to inject arbitrary AppleScript commands by manipulating filenames containing shell metacharacters, as the project's ...

The Lab · 2026-04-09 06:27:11 · GitHub Issues

2. PraisonAI Codebase Exposes 29 Shell Injection Vulnerabilities (CWE-78) Post-Audit

A critical security audit of the PraisonAI codebase has revealed 29 unaddressed shell injection vulnerabilities, classified as CWE-78, posing a direct risk of arbitrary command execution. These high-risk flaws persist despite a recent security push that successfully patched other issues, indicating a deliberate deferra...

The Lab · 2026-04-13 03:22:25 · GitHub Issues

3. HIGH-Severity Shell Injection Flaw Found in Unit Test Fixture (B602 / CWE-78)

A high-severity security vulnerability has been flagged in a project's test suite, exposing a potential shell injection risk. The automated security scanner Bandit identified a `subprocess.Popen` call configured with `shell=True` in the file `tests/unit_tests/fixtures/bash_mock.py` at line 27. This pattern, classified ...

The Lab · 2026-04-13 03:22:37 · GitHub Issues

4. HIGH-Severity Shell Injection Risk Found in Cypress Script (B602 / CWE-78)

A high-severity security vulnerability has been flagged in a key automation script, exposing the codebase to potential shell injection attacks. The automated scanner `bandit` identified the use of `subprocess.Popen` with `shell=True` in the file `scripts/cypress_run.py` at line 83. This coding pattern, classified under...

The Lab · 2026-04-13 03:22:38 · GitHub Issues

5. HIGH-Severity Shell Injection Flaw Found in GitHub Project's 'check-env.py' Script

A high-severity security vulnerability has been flagged in a GitHub project's environment-checking script. The automated security scanner Bandit identified a `subprocess.Popen` call with `shell=True` in the file `scripts/check-env.py` at line 50. This coding pattern, classified under CWE-78 (Improper Neutralization of ...

The Lab · 2026-04-14 05:22:32 · GitHub Issues

6. HIGH-Severity Shell Injection Vulnerability in RELEASING/changelog.py (B605)

A high-severity security vulnerability has been flagged in the project's release automation code. The automated security scanner Bandit identified a 'Start Process With A Shell' flaw (Rule B605) on line 281 of the `RELEASING/changelog.py` file. This class of vulnerability, categorized under CWE-78, indicates a potentia...

The Lab · 2026-04-28 19:54:17 · GitHub Issues

7. Shell Injection Vulnerability in Chat Application Docker Entrypoint Exposes BACKEND_URL to Arbitrary Nginx Config Injection

A high-severity shell injection vulnerability has been identified in the Docker entrypoint script of a chat application's frontend Nginx container. The flaw, tracked in `src/chat-app/frontend/docker-entrypoint.sh` (lines 11–14), allows an attacker who controls the `BACKEND_URL` environment variable to inject arbitrary ...

The Lab · 2026-05-03 13:54:07 · GitHub Issues

8. CLI Tool Patches Critical RCE Flaw: Config File Import Could Trigger Arbitrary Code Execution

A high-severity remote code execution vulnerability has been identified and remediated in a command-line interface tool's quick commands handler. The flaw, rated CVSS 7.8, stemmed from the direct use of `subprocess.run()` with `shell=True` on commands parsed from user-supplied configuration files, creating a direct pat...

The Lab · 2026-05-05 08:31:40 · GitHub Issues

9. Shell Injection Flaw Discovered in ai-qa-responder GitHub Actions Workflow

A shell injection vulnerability has been identified in `.github/workflows/ai-qa-responder.yml`, the GitHub Actions workflow handling automated responses in AI-powered Q&A discussions. The flaw affects two user-controlled GitHub event values interpolated directly via `${{ }}` expressions inside `run:` blocks: `github.ev...