fix(policy): enhance shell command safety and parsing
Addressing feedback from PR #15006.
Changes:
- Implemented recursive checking for shell command substitutions (e.g.,
echo $(rm -rf /)). - Enforced stricter validation for chained commands.
- Added fail-safe mechanisms: if command parsing fails, the decision defaults to ASK_USER.
- Refactored
toml-loaderfor better testability. - Added comprehensive tests for command injection and substitution scenarios.
Summary of Changes
Hello @allenhutchison, I'm Gemini Code Assist[^1]! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!
This pull request significantly enhances the security and robustness of the policy engine's handling of shell commands. It introduces advanced parsing capabilities to detect and prevent various forms of command injection and substitution, ensuring that only explicitly allowed commands and their sub-components are executed. The changes also include a critical fail-safe mechanism to handle unparseable commands securely, alongside refactoring for better maintainability and comprehensive new tests to validate these security improvements.
Highlights
- Enhanced Shell Command Safety: Implemented recursive checking for shell command substitutions (e.g.,
echo $(rm -rf /)) and enforced stricter validation for chained commands (e.g.,cmd1; cmd2). - Fail-Safe Mechanism: Introduced a fail-safe where if shell command parsing fails, the policy decision defaults to
ASK_USERto prevent unsafe execution of unparseable commands. - Improved Testability and Modularity: Refactored the
toml-loadermodule by extractingargsPatternbuilding logic into a dedicated helper function, improving code organization and testability. - Comprehensive Test Coverage: Added extensive new test cases to cover various command injection and substitution scenarios, ensuring robust validation of shell commands.
Using Gemini Code Assist
The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.
Invoking Gemini
You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.
| Feature | Command | Description |
|---|---|---|
| Code Review | /gemini review |
Performs a code review for the current pull request in its current state. |
| Pull Request Summary | /gemini summary |
Provides a summary of the current pull request in its current state. |
| Comment | @gemini-code-assist | Responds in comments when explicitly tagged, both in pull request comments and review comments. |
| Help | /gemini help |
Displays a list of available commands. |
Customization
To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.
Limitations & Feedback
Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with :thumbsup: and :thumbsdown: on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here.
You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension.
[^1]: Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.
Size Change: +152 B (0%)
Total Size: 21.6 MB
ℹ️ View Unchanged
| Filename | Size | Change |
|---|---|---|
./bundle/gemini.js |
21.6 MB | +152 B (0%) |
./bundle/sandbox-macos-permissive-closed.sb |
1.03 kB | 0 B |
./bundle/sandbox-macos-permissive-open.sb |
890 B | 0 B |
./bundle/sandbox-macos-permissive-proxied.sb |
1.31 kB | 0 B |
./bundle/sandbox-macos-restrictive-closed.sb |
3.29 kB | 0 B |
./bundle/sandbox-macos-restrictive-open.sb |
3.36 kB | 0 B |
./bundle/sandbox-macos-restrictive-proxied.sb |
3.56 kB | 0 B |