Skip to content

fix/security: prevent command injection on windows#1272

Merged
evict merged 4 commits intomainfrom
vr/security/prevent-command-injection
Mar 10, 2026
Merged

fix/security: prevent command injection on windows#1272
evict merged 4 commits intomainfrom
vr/security/prevent-command-injection

Conversation

@evict
Copy link
Contributor

@evict evict commented Mar 10, 2026

We should verify the result from the server, and make sure it's a URL. Additionally, the start pattern was dangerous and allows command injection, so we use OpenURL from url.dll directly.

@evict evict self-assigned this Mar 10, 2026
@evict evict force-pushed the vr/security/prevent-command-injection branch from 089fa4b to 681ba1b Compare March 10, 2026 16:24
@evict evict force-pushed the vr/security/prevent-command-injection branch from 681ba1b to 2eb0830 Compare March 10, 2026 16:33
@evict evict merged commit 22191a7 into main Mar 10, 2026
9 checks passed
@evict evict deleted the vr/security/prevent-command-injection branch March 10, 2026 16:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants