# Precompiled CodeQL query --- format: - 202308110 creator: 2.24.1 name: Command injection.ql dbscheme: b1341734d6870b105e5c9d168ce7dec25d7f72d0 stages: - filename: c76af5287id95fcg0t4lh7uso14.bytes.qlx - filename: 6ac31ep1ec0s809pj2f0ioihu17.bytes.qlx - filename: 09ee668a7827r6ci8rjubf8o7ee.bytes.qlx - filename: e561d0qnpfench9kluu1m6hn338.bytes.qlx - filename: 51e330ptff54nnlbbb2tl6v4i24.bytes.qlx - filename: 5ea3ceid25csqn46ip9p3bhq5m0.bytes.qlx - filename: 3d943fq1q0iokjuvjs4isiea9b8.bytes.qlx - filename: 90b0463pd1mk2gf0rfmdd2o7950.bytes.qlx - filename: a1057f8d4pedqai7g685l46oqa8.bytes.qlx - filename: 3bd457ej3q9ifumh35uk3k9tl52.bytes.qlx - filename: 4c66e35ddrv0o74anogr0s2a0s1.bytes.qlx - filename: 72762evu5a8l343ma5dcma2qc9b.bytes.qlx - offset: 1 results: edges: resultArranger: 4"a"ei12"b"ei12"key"s"val"s nodes: resultArranger: 3"n"ei12"key"s"val"s subpaths: resultArranger: 4"arg"ei12"par"ei12"ret"ei12"out"ei12 '#select': resultArranger: 60ei12"source"ei12"sink"ei120s0ei120s inputsDigest: a60534f8b65246d370b55f1ffe8661f8 metadata: name: Command injection description: |- Building OS commands from user-controlled sources is vulnerable to insertion of malicious command arguments by the user. kind: path-problem id: go/command-injection problem.severity: error security-severity: 9.8 precision: high tags: |- security external/cwe/cwe-078 overlayVersion: 4 --- ...