mirror of
https://github.com/OpenRouterTeam/spawn.git
synced 2026-05-11 13:20:05 +00:00
Add allowlist validation for the bun binary path resolved via `command -v bun` before using it in symlink operations that may run with sudo privileges. If bun is found at an unexpected location, skip the symlink and warn the user. This prevents a privilege escalation attack where a malicious binary on PATH could be symlinked to /usr/local/bin/bun with elevated privileges. Agent: security-auditor Co-authored-by: B <6723574+louisgv@users.noreply.github.com> Co-authored-by: Claude Sonnet 4.6 <noreply@anthropic.com> |
||
|---|---|---|
| .. | ||
| aws | ||
| cli | ||
| digitalocean | ||
| docker | ||
| e2e | ||
| gcp | ||
| hetzner | ||
| local | ||
| shared | ||
| sprite | ||
| test | ||