security.injection

Command execution using untrusted input

Process execution helpers must not receive request-controlled executables or shell-interpreted arguments.

#Metadata

#Why it matters

Request-controlled process execution can become remote code execution when attackers choose the binary or influence shell parsing.

#Remediation

Dispatch only allowlisted binaries, keep shell mode disabled, and validate or constrain subcommands before execution.

#Repository path

The generated metadata points to critiq-rules/libs/rules/catalog/rules/shared/security.no-command-execution-with-request-input.rule.yaml.