chore: Added a little dev script to help contributors #4793
@sentry/warden / warden
completed
Mar 25, 2026 in 39s
1 issue
Medium
Command injection via solution argument on Windows - `dev.cs:53`
The solution command-line argument is interpolated into shell commands without sanitization (lines 53, 113). On Windows, when passed through cmd.exe /c (line 134), special characters like &, |, or > can escape the double-quote wrapping and execute arbitrary commands. For example, ./dev.cs cleanslate 'foo" & calc & "' could execute calc. While this is a local dev script requiring deliberate malicious input, it's a security anti-pattern.
4 skills analyzed
| Skill | Findings | Duration | Cost |
|---|---|---|---|
| code-review | 0 | 34.3s | $0.12 |
| find-bugs | 1 | 34.0s | $0.14 |
| gha-security-review | 0 | 12.9s | $0.08 |
| security-review | 0 | 26.8s | $0.13 |
Duration: 1m 48s · Tokens: 142.5k in / 3.4k out · Cost: $0.48 (+dedup: $0.01, +extraction: $0.00)
Loading