gosec: G204 - Subproccess launched as function arg
G204 doesn't necessarily indicate a bad behaviour. But could help discover potential command injection vector.
This commit is contained in:
parent
0b9372fe0a
commit
eb3fa3e5d4
4 changed files with 12 additions and 1 deletions
|
|
@ -212,6 +212,9 @@ func SetUpTemporaryRepository() (string, error) {
|
|||
if err != nil {
|
||||
return "", err
|
||||
}
|
||||
|
||||
// There's no potential command injection vector here
|
||||
/* #nosec G204 */
|
||||
cmd := exec.Command("createrepo_c", path.Join(dir))
|
||||
err = cmd.Start()
|
||||
if err != nil {
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue