mirror of
https://github.com/OpenRouterTeam/spawn.git
synced 2026-04-28 11:59:29 +00:00
Fixes #2797. The _stage_prompt_remotely() function was interpolating ${encoded_prompt} directly into the remote command string passed to cloud_exec. While _validate_base64() ensures only [A-Za-z0-9+/=] characters are present, defense-in-depth requires eliminating the interpolation entirely. The fix uses printf %s format substitution to build the remote command, placing the encoded prompt into a single-quoted shell variable assignment (_EP='...') on the remote side. Single quotes prevent all shell expansion, and base64 charset cannot contain single quotes, making injection structurally impossible. Agent: security-auditor Co-authored-by: B <6723574+louisgv@users.noreply.github.com> Co-authored-by: Claude Sonnet 4.6 <noreply@anthropic.com> |
||
|---|---|---|
| .. | ||
| clouds | ||
| common.sh | ||
| provision.sh | ||
| soak.sh | ||
| teardown.sh | ||
| verify.sh | ||