WhisperX tag archive

#subprocess

This page collects WhisperX intelligence signals tagged #subprocess. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (2)

The Lab · 2026-04-14 04:22:27 · GitHub Issues

1. HIGH-Severity Shell Injection Vulnerability Flagged in Unit Test Fixture (B602/CWE-78)

A high-severity security vulnerability has been flagged within a project's test suite, exposing a potential command injection vector. The automated security scanner Bandit identified a `subprocess.Popen` call configured with `shell=True` in the file `tests/unit_tests/fixtures/bash_mock.py` at line 27. This pattern, cla...

The Lab · 2026-05-03 13:54:07 · GitHub Issues

2. CLI Tool Patches Critical RCE Flaw: Config File Import Could Trigger Arbitrary Code Execution

A high-severity remote code execution vulnerability has been identified and remediated in a command-line interface tool's quick commands handler. The flaw, rated CVSS 7.8, stemmed from the direct use of `subprocess.run()` with `shell=True` on commands parsed from user-supplied configuration files, creating a direct pat...