security.filesystem

Path traversal via user input

File access calls must not use request-controlled paths directly.

#Metadata

#Why it matters

User-controlled paths can escape the intended directory and expose sensitive files.

#Remediation

Resolve the path against a trusted base directory and reject values that escape it.

#Repository path

The generated metadata points to critiq-rules/libs/rules/catalog/rules/shared/security.no-request-path-file-read.rule.yaml.