Skip to content

Conversation

sameer6pre
Copy link
Owner

Vulnerability Details

  • File Path: Project_Snake_Game/snake-game.cpp
  • Vulnerability Type: Command Injection
  • Risk Level: High

Explanation:
The use of the system function with a hardcoded command can be exploited if the input is not properly sanitized or if the command is dynamically constructed. While in this case the command is static ('cls'), the use of system is inherently risky as it executes shell commands, which could lead to command injection vulnerabilities if the command string were to be influenced by user input.

Please review and address the issue accordingly.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant