Mitigate command injection risks in bulk_generate_mad.py #8
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
The
build_databasefunction passes user-controlledlanguageandextractor_optionsparameters tosubprocess.check_callwithout validation, creating command injection risk.Changes
Input Validation
validate_language(): Whitelist check against known CodeQL languages (cpp, csharp, go, java, javascript, python, ruby, rust, swift)validate_extractor_options(): Regex validation allowing only[a-zA-Z0-9_\-./=:]to reject shell metacharactersValueErrorwith clear messages on invalid inputSubprocess Hardening
shell=Falsein allsubprocess.check_callinvocationsbuild_database()Documentation
Example
Before:
After:
Testing
Added
test_bulk_generate_mad.pywith 10 test cases covering valid/invalid inputs for both validation functions.Original prompt
This pull request was created as a result of the following prompt from Copilot chat.
💬 We'd love your input! Share your thoughts on Copilot coding agent in our 2 minute survey.