PROBLEM: 10 Fortran files use system() calls, creating potential command injection vulnerabilities.
EVIDENCE:
- Grep results show system() calls in:
- /home/ert/code/fortplot/test/test_scatter_enhanced.f90
- /home/ert/code/fortplot/src/figures/fortplot_figure_core.f90
- /home/ert/code/fortplot/src/fortplot_figure_core_io.f90
- And 7 other files
- CLAUDE.md security rules prohibit system() for security risks
IMPACT:
- Command injection attacks possible if user input reaches system() calls
- Security vulnerability in production environments
- Violates secure coding practices
SOLUTION:
- Replace system() calls with secure alternatives
- Use established secure libraries only
- Validate and sanitize all inputs to external commands
- Implement proper error handling for command execution
SEVERITY: HIGH - Security vulnerability requiring immediate attention