Skip to content

security: escape docker item names to prevent shell injection#143

Merged
Cleboost merged 1 commit into
masterfrom
fix/docker-injection
May 11, 2026
Merged

security: escape docker item names to prevent shell injection#143
Cleboost merged 1 commit into
masterfrom
fix/docker-injection

Conversation

@Cleboost
Copy link
Copy Markdown
Owner

This pull request improves the safety of shell command execution in the DockerManager implementation by properly escaping single quotes in container or image names. This prevents potential command injection vulnerabilities when handling Docker commands.

Security improvements to command execution:

  • In src/ui/docker.rs, all constructed shell commands that interpolate user-controlled names (n_c) now escape single quotes by replacing each ' with '', ensuring safer command execution for both toggle and delete actions. [1] [2]

@Cleboost Cleboost merged commit 1a72f87 into master May 11, 2026
1 check passed
@Cleboost Cleboost deleted the fix/docker-injection branch May 11, 2026 00:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant