-
Couldn't load subscription status.
- Fork 1
Patchwork PR #50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: autofix-master
Are you sure you want to change the base?
Patchwork PR #50
Conversation
21fdc13 to
fdae94b
Compare
9a0a2db to
c12fd79
Compare
e6fe6b9 to
ce3e591
Compare
ce3e591 to
38f100b
Compare
38f100b to
f173d97
Compare
c12fd79 to
2093038
Compare
2093038 to
fed5ea6
Compare
|
The pull request implements improvements in the documentation of the application's architecture and components within README.md, enhancing clarity. It addresses a command injection vulnerability by changing subprocess calls from
|
313b494 to
6f28d22
Compare
fed5ea6 to
659657c
Compare
Fix subprocess call vulnerability
Sanitized user input to prevent command injection vulnerability by using subprocess.Popen with shell=False.