SeaGOAT
SeaGOAT copied to clipboard
Sanitize user input to prevent remote code execution vulnerability
While SeaGOAT is primarily used locally, there seems to be interest in running it on servers. Since SeaGOAT makes subprocess calls, we should sanitize user input to make sure that it's not possible to inject code