SeaGOAT icon indicating copy to clipboard operation
SeaGOAT copied to clipboard

Sanitize user input to prevent remote code execution vulnerability

Open kantord opened this issue 1 year ago • 0 comments

While SeaGOAT is primarily used locally, there seems to be interest in running it on servers. Since SeaGOAT makes subprocess calls, we should sanitize user input to make sure that it's not possible to inject code

kantord avatar Oct 07 '23 21:10 kantord