Commit 83ef461
authored
Prevent shell command execution from commit messages (#15)
Previously, commit messages were passed via a variable, which allowed
embedded shell commands (e.g. `$(...)`) to be executed during parsing.
For example, this happened in this run:
https://github.com/tarantool/sdvg/actions/runs/16798902022/job/47575402000
Now the message is fetched directly via `git` and safely piped through
`sed`, ensuring arbitrary code is not executed.1 parent 897ffa0 commit 83ef461
1 file changed
+1
-2
lines changed| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
32 | 32 | | |
33 | 33 | | |
34 | 34 | | |
35 | | - | |
36 | | - | |
| 35 | + | |
37 | 36 | | |
38 | 37 | | |
39 | 38 | | |
| |||
0 commit comments