You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When IO.read is guarded by a check like File.exists?, isn't that a valid guard against injecting the | character into Kernel.open? I don't imagine that many systems out there have files lying around named |.txt.
Apologies if I sounded dismissive, that wasn't my intention. We do value false positive reports, but for now we have other product priorities. Therefore, we do not immediately act on false positive reports but instead track them for later consideration.
That being said, I have forwarded your documentation suggestion to the relevant team.
Description of the false positive
When
IO.read
is guarded by a check likeFile.exists?
, isn't that a valid guard against injecting the|
character intoKernel.open
? I don't imagine that many systems out there have files lying around named|.txt
.Code samples or links to source code
https://github.com/github/codeql/blob/81593ece5aa7701ec0b103932f84ff65ae506e0b/ruby/ql/lib/codeql/ruby/security/KernelOpenQuery.qll#L83C1-L87
URL to the alert on GitHub code scanning (optional)
The text was updated successfully, but these errors were encountered: