Command execution using untrusted input
Process execution helpers must not receive request-controlled executables or shell-interpreted arguments.
#Metadata
#Why it matters
Request-controlled process execution can become remote code execution when attackers choose the binary or influence shell parsing.
#Remediation
Dispatch only allowlisted binaries, keep shell mode disabled, and validate or constrain subcommands before execution.
#Repository path
The generated metadata points to critiq-rules/libs/rules/catalog/rules/shared/security.no-command-execution-with-request-input.rule.yaml.