mirror of
https://github.com/OpenRouterTeam/spawn.git
synced 2026-05-11 21:40:48 +00:00
Add allowlist validation for the bun binary path resolved via `command -v bun` before using it in symlink operations that may run with sudo privileges. If bun is found at an unexpected location, skip the symlink and warn the user. This prevents a privilege escalation attack where a malicious binary on PATH could be symlinked to /usr/local/bin/bun with elevated privileges. Agent: security-auditor Co-authored-by: B <6723574+louisgv@users.noreply.github.com> Co-authored-by: Claude Sonnet 4.6 <noreply@anthropic.com> |
||
|---|---|---|
| .. | ||
| install.ps1 | ||
| install.sh | ||