Skip to content

fix: resolve CodeQL sanitization high findings#1630

Merged
OneStepAt4time merged 1 commit intodevelopfrom
fix/codeql-sanitization-main-blocker
Apr 10, 2026
Merged

fix: resolve CodeQL sanitization high findings#1630
OneStepAt4time merged 1 commit intodevelopfrom
fix/codeql-sanitization-main-blocker

Conversation

@OneStepAt4time
Copy link
Copy Markdown
Owner

Summary\n- harden workDir validation to enforce allowlist boundaries before resolving untrusted paths\n- strengthen hook command escaping on POSIX and Windows to prevent shell interpretation\n- replace fast audit hash chaining primitive with PBKDF2 stretching\n- add regression tests for path pre-check and shell escaping\n\n## Context\nThis PR addresses high-severity non-rate-limit CodeQL blockers for promotion PR #1629.\n\n## Validation\n- npm ci\n- npm run lint\n- npm run build\n- npx tsc --noEmit\n- npm test

@OneStepAt4time OneStepAt4time force-pushed the fix/codeql-sanitization-main-blocker branch from 5e43972 to fb78b1d Compare April 10, 2026 22:30
- enforce allowlist boundary checks before resolving untrusted workDir paths
- harden hook command path escaping for POSIX and Windows shells
- replace audit hash chaining primitive with PBKDF2 stretching
- extend regression coverage for path pre-check and shell escaping

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant