🛡️ Sentinel: Fix insecure variable expansion and command injection risks #26
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🛡️ Sentinel: [CRITICAL/HIGH] Fix insecure variable expansion
Severity: HIGH
Vulnerability:
entrypoint.shcaused passwords with spaces to be truncated or expanded unexpectedly.VPNCMD_*environment variables was subject to shell globbing and failed to execute multiple commands correctly due to logic errors in the loop.gencert.shreferenced incorrect binary paths, preventing certificate generation.Fix:
$usernameand$passwordand usedread -rto prevent backslash interpretation.VPNCMDloops to useset -f(noglob) to safely execute dynamic commands without wildcard expansion, while allowing argument splitting.gencert.shto/usr/local/bin/.Verification:
tests/test_password_logic.shto verify password integrity with special characters.tests/test_vpncmd_loop.shto verify multiple commands execution.bash -n.PR created automatically by Jules for task 8002437946464667488 started by @bluPhy