WhisperX tag archive

#shell-injection

This page collects WhisperX intelligence signals tagged #shell-injection. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (9)

The Lab ยท 2026-03-28 10:27:03 ยท GitHub Issues

1. Critical Shell Injection in aios.js: execSync Template String Enables Remote Code Execution

A critical shell injection vulnerability has been identified in the `bin/aios.js` script, exposing systems to potential remote code execution (RCE). The flaw resides on line 15, where the `execSync` function uses a template string to construct a PowerShell command. This construction method allows an attacker to inject ...

The Lab ยท 2026-04-03 15:27:09 ยท GitHub Issues

2. ๐Ÿ” MEDIUM: Shell Injection Vulnerability in Statusline Installer Exposes Node.js Code Execution Risk

A shell injection vulnerability has been identified in the installer for the Statusline project, where unsanitized user input could allow for arbitrary code execution. The flaw is located in the `install.sh` script, specifically lines 142-162, where user-controlled input from the `variant_choice` variable flows directl...

The Lab ยท 2026-04-10 16:22:53 ยท GitHub Issues

3. Security Flaw: Shell Injection Vulnerability in PytestRunner & CoverageAuditor Subprocess Calls

A critical shell injection vulnerability has been identified in two core components of the codebase, exposing systems to potential arbitrary command execution. The flaw resides in the use of `asyncio.create_subprocess_shell()` with unsafe string interpolation, allowing user-controlled input to be interpreted as shell c...

The Lab ยท 2026-04-13 03:22:40 ยท GitHub Issues

4. HIGH-Severity Shell Injection Vulnerability Found in RELEASING/changelog.py (B605)

A high-severity security vulnerability has been flagged in the project's release automation code. The automated security scanner `bandit` identified a `B605` rule violationโ€”'Start Process With A Shell'โ€”on line 281 of the `RELEASING/changelog.py` file. This class of vulnerability, categorized under CWE-78 (Improper Neut...

The Lab ยท 2026-04-14 08:22:38 ยท GitHub Issues

5. HIGH-Severity Shell Injection Risk in Cypress Script (B602) - Subprocess Popen with shell=True

A high-severity security vulnerability has been flagged in a key automation script, exposing the codebase to potential shell injection attacks. The scanner identified a `subprocess.Popen` call configured with `shell=True` in the file `scripts/cypress_run.py` at line 83. This configuration is a known security anti-patte...

The Lab ยท 2026-04-22 11:27:32 ยท GitHub Issues

6. Critical Shell Injection Regression in deleteViaEphemeral Exposes Staging to Path Traversal

A critical security regression has been identified in the staging environment at commit 36240c75, involving the deleteViaEphemeral function. The vulnerability, catalogued as F1502 under CWE-78 (OS Command Injection), stems from shell string concatenation in the deletion logic. The affected code constructs the command a...

The Vault ยท 2026-04-27 00:54:10 ยท GitHub Issues

7. Hook Installer Exposes Unescaped TOTEM_CMD Interpolation โ€” Shell Injection Surface Identified in CLI Package

A security audit has flagged a fragile interpolation pattern in the hook installation mechanism of the CLI package that, if left unaddressed, could enable shell injection. The file `packages/cli/src/commands/install-hooks.ts` writes a generated shell script where the `fallbackCmd` variable is substituted directly into ...

The Lab ยท 2026-04-28 20:54:13 ยท GitHub Issues

8. Terminal Lifecycle Handler Faces Shell-Injection Audit Over Unsafe Command Interpolation

Security researchers have identified a shell-injection vulnerability pathway in the terminal command template used across the codebase. The issue centers on a shell-script string built for `pty.spawn` that directly interpolates user-controlled values โ€” including worktree paths, branch names, and agent prompts โ€” without...

The Lab ยท 2026-05-07 10:31:40 ยท GitHub Issues

9. Shell Injection Vulnerability Exposed in Unix GitOperations::exec via popen

A high-severity shell injection vulnerability has been identified in the Unix implementation of `GitOperations::exec` within `src/git/operations.cpp`. The method constructs shell commands using `popen` with string-interpolated arguments, directly incorporating user-supplied parameters such as branch names and commit me...