이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Metadata

ID: javascript-node-security/command-injection

Language: JavaScript

Severity: Warning

Category: Security

CWE: 78

Description

When executing a command, never use unchecked variables. Make sure that each variable in the command has been checked.

Non-Compliant Code Examples

childprocess.exec(`mv ${src} ${dst}`, (error, stdout, stderr) => {});
childprocess.exec('mv ' + src + " " + dst, (error, stdout, stderr) => {});

Compliant Code Examples

childprocess.exec('mv /tmp/src /tmp/dst', (error, stdout, stderr) => {});
https://static.datadoghq.com/static/images/logos/github_avatar.svg https://static.datadoghq.com/static/images/logos/vscode_avatar.svg jetbrains

Seamless integrations. Try Datadog Code Analysis

PREVIEWING: mervebolat/span-id-preprocessing