SiteShadow
Back to vulnerability library

CWE-78 OS Command Injection

What this means

SiteShadow flagged code that executes OS commands using untrusted input (directly or as part of a shell string).

Why it matters

Safer examples

1) Avoid shell=True and pass arguments as a list (Python)

import subprocess

subprocess.run(["git", "rev-parse", "--short", "HEAD"], check=True)

2) Prefer execFile/spawn with args (Node)

import { execFile } from "node:child_process";

execFile("git", ["rev-parse", "--short", "HEAD"], (err, stdout) => {
  if (err) throw err;
  console.log(stdout);
});

3) If user input must influence a command, use allowlists

allowed = {"status", "version"}
cmd = cmd if cmd in allowed else "status"
subprocess.run(["mytool", cmd], check=True)

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage