[POP-3188] Service Client v0.2.0
Extends service-client so as to support other system request types.
Semgrep found 2 tainted-path findings:
The application builds a file path from potentially untrusted data, which can lead to a path traversal vulnerability. An attacker can manipulate the path which the application uses to access files. If the application does not validate user input and sanitize file paths, sensitive files such as configuration or user data can be accessed, potentially creating or overwriting files. To prevent this vulnerability, validate and sanitize any input that is used to create references to file paths. Also, enforce strict file access controls. For example, choose privileges allowing public-facing applications to access only the required files.
View Dataflow Graph
flowchart LR
classDef invis fill:white, stroke: none
classDef default fill:#e7f5ff, color:#1c7fd6, stroke: none
subgraph File0["<b>iris-mpc-cpu/src/utils/serialization/graph.rs</b>"]
direction LR
%% Source
subgraph Source
direction LR
v0["<a href=https://github.com/worldcoin/iris-mpc/blob/b9a3055a2f496f4cb1358508df96af007fdd26f7/iris-mpc-cpu/src/utils/serialization/graph.rs#L321 target=_blank style='text-decoration:none; color:#1c7fd6'>[Line: 321] path</a>"]
end
%% Intermediate
%% Sink
subgraph Sink
direction LR
v1["<a href=https://github.com/worldcoin/iris-mpc/blob/b9a3055a2f496f4cb1358508df96af007fdd26f7/iris-mpc-cpu/src/utils/serialization/graph.rs#L321 target=_blank style='text-decoration:none; color:#1c7fd6'>[Line: 321] &path</a>"]
end
end
%% Class Assignment
Source:::invis
Sink:::invis
File0:::invis
%% Connections
Source --> Sink