Security: Command injection via shell=True in emulator process management#425
Merged
veadex merged 2 commits intoOpenWSGR:mainfrom Apr 13, 2026
Conversation
The macOS emulator manager builds shell commands with f-strings and executes them with `shell=True` (e.g., `pgrep -f {self._process_name}`, `open -a {self._path}`, `pkill -9 -f {self._process_name}`, and MuMu tool invocations). If `self._process_name`, `self._path`, or related config-derived values are attacker-controlled (directly or via a malicious config file), this can lead to arbitrary command execution on the host.
Signed-off-by: tomaioo <203048277+tomaioo@users.noreply.github.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Security: Command injection via shell=True in emulator process management
Problem
Severity:
High| File:autowsgr/emulator/os_control/macos.py:L22The macOS emulator manager builds shell commands with f-strings and executes them with
shell=True(e.g.,pgrep -f {self._process_name},open -a {self._path},pkill -9 -f {self._process_name}, and MuMu tool invocations). Ifself._process_name,self._path, or related config-derived values are attacker-controlled (directly or via a malicious config file), this can lead to arbitrary command execution on the host.Solution
Avoid
shell=Trueand pass argument lists tosubprocess(subprocess.run([...], check=True)). Strictly validate/allowlist executable paths and process names from config. Reject values containing shell metacharacters and resolve paths safely before execution.Changes
autowsgr/emulator/os_control/macos.py(modified)