Skip to content

fix: resolve CodeQL code scanning security alerts#97

Merged
shrijayan merged 3 commits intomainfrom
fix/code-scanning-alerts
Mar 27, 2026
Merged

fix: resolve CodeQL code scanning security alerts#97
shrijayan merged 3 commits intomainfrom
fix/code-scanning-alerts

Conversation

@shrijayan
Copy link
Copy Markdown
Owner

  • Validate ITWILLSYNC_CONFIG_DIR env var (path injection, CWE-22)
  • Use Object.fromEntries for env copy (property injection, CWE-94)
  • Sanitize firewall rule labels and log messages (log injection, CWE-117)
  • Validate port range in CLI arg parsing (input validation, CWE-20)
  • Validate semver format in version sync script (input validation, CWE-20)

- Validate ITWILLSYNC_CONFIG_DIR env var (path injection, CWE-22)
- Use Object.fromEntries for env copy (property injection, CWE-94)
- Sanitize firewall rule labels and log messages (log injection, CWE-117)
- Validate port range in CLI arg parsing (input validation, CWE-20)
- Validate semver format in version sync script (input validation, CWE-20)
shrijayan and others added 2 commits March 27, 2026 11:06
The path validation added to getHubDir() expanded the taint surface for
CodeQL, introducing 34 new alerts instead of fixing existing ones. For a
local CLI tool, env vars and CLI args are user-controlled by design.

Retains: log injection fix, label sanitization, semver validation,
buildEnv refactor.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Error messages in a local CLI tool are not user-controlled attack vectors.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@shrijayan shrijayan merged commit ba25b6a into main Mar 27, 2026
7 checks passed
@shrijayan shrijayan deleted the fix/code-scanning-alerts branch March 27, 2026 05:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant