[security] Fix command injection, path traversal in installer + marketplace #6
Labels
No labels
athena
athena-gemini
audit
clotho
clotho-gemini
codex
darbs-claude
security
wiki
No milestone
No project
No assignees
1 participant
Notifications
Due date
-
Dependencies
No dependencies set.
Reference: core/go-scm#6
Loading…
Add table
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
AX sweep findings:
Fix all, add tests.
Codex Fix Attempt
Codex ran full build/test cycle (all passed) but could not commit — sandbox blocks .git writes. The original security findings remain valid and need manual fix or re-dispatch with write access.
Security Scan: Attack Vector Map
Good news: Original SSH injection and path traversal issues appear mitigated in current worktree.
Warning: dispatch.go:267/:281 are generic remote-shell primitives. Currently fed validated inputs but new call sites could re-open injection.