Skip to content

Hardening suggestions for java-security-toolkit / ryandens/process-builder#25

Closed
pixeebot[bot] wants to merge 1 commit intoryandens/process-builderfrom
pixeebot/ryandens/process-builder
Closed

Hardening suggestions for java-security-toolkit / ryandens/process-builder#25
pixeebot[bot] wants to merge 1 commit intoryandens/process-builderfrom
pixeebot/ryandens/process-builder

Conversation

@pixeebot
Copy link
Copy Markdown

@pixeebot pixeebot Bot commented Feb 14, 2024

I've reviewed the recently opened PR (24 - ✨ add support for checking commands invoked with ProcessBuilder) and have identified some area(s) that could benefit from additional hardening measures.

These changes should help prevent potential security vulnerabilities and improve overall code quality.

Thank you for your consideration!

docs | feedback
Powered by: pixeebot

@pixeebot pixeebot Bot requested a review from ryandens February 14, 2024 20:34
final Set<SystemCommandRestrictions> restrictions)
throws IOException {
runChecks(command, restrictions);
return runtime.exec(command);
Copy link
Copy Markdown
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hardened this system call to make it resistant to injected commands and commands that target sensitive files

final Set<SystemCommandRestrictions> restrictions)
throws IOException {
runChecks(command, restrictions);
return runtime.exec(command);
Copy link
Copy Markdown
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hardened this system call to make it resistant to injected commands and commands that target sensitive files

final Set<SystemCommandRestrictions> restrictions)
throws IOException {
runChecks(command, restrictions);
return runtime.exec(command, envp);
Copy link
Copy Markdown
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hardened this system call to make it resistant to injected commands and commands that target sensitive files

final Set<SystemCommandRestrictions> restrictions)
throws IOException {
runChecks(command, restrictions);
return runtime.exec(command, envp, dir);
Copy link
Copy Markdown
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hardened this system call to make it resistant to injected commands and commands that target sensitive files

final Set<SystemCommandRestrictions> restrictions)
throws IOException {
runChecks(command, restrictions);
return runtime.exec(command, envp);
Copy link
Copy Markdown
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hardened this system call to make it resistant to injected commands and commands that target sensitive files

final Set<SystemCommandRestrictions> restrictions)
throws IOException {
runChecks(command, restrictions);
return runtime.exec(command, envp, dir);
Copy link
Copy Markdown
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hardened this system call to make it resistant to injected commands and commands that target sensitive files

@ryandens
Copy link
Copy Markdown
Member

pixeebot recursion 🤦 this is the library we use to harden things 😆

@ryandens ryandens closed this Feb 14, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants