Path traversal via user input
File access calls must not use request-controlled paths directly.
#Metadata
#Why it matters
User-controlled paths can escape the intended directory and expose sensitive files.
#Remediation
Resolve the path against a trusted base directory and reject values that escape it.
#Repository path
The generated metadata points to critiq-rules/libs/rules/catalog/rules/shared/security.no-request-path-file-read.rule.yaml.