chore: Added a little dev script to help contributors #4793
@sentry/warden / warden: find-bugs
completed
Mar 25, 2026 in 35s
1 issue
find-bugs: Found 1 issue (1 medium)
Medium
Command injection via solution argument on Windows - `dev.cs:53`
The solution command-line argument is interpolated into shell commands without sanitization (lines 53, 113). On Windows, when passed through cmd.exe /c (line 134), special characters like &, |, or > can escape the double-quote wrapping and execute arbitrary commands. For example, ./dev.cs cleanslate 'foo" & calc & "' could execute calc. While this is a local dev script requiring deliberate malicious input, it's a security anti-pattern.
Duration: 34.0s · Tokens: 46.5k in / 1.3k out · Cost: $0.14
Annotations
Check warning on line 53 in dev.cs
sentry-warden / warden: find-bugs
Command injection via solution argument on Windows
The `solution` command-line argument is interpolated into shell commands without sanitization (lines 53, 113). On Windows, when passed through `cmd.exe /c` (line 134), special characters like `&`, `|`, or `>` can escape the double-quote wrapping and execute arbitrary commands. For example, `./dev.cs cleanslate 'foo" & calc & "'` could execute `calc`. While this is a local dev script requiring deliberate malicious input, it's a security anti-pattern.
Loading