This has lead to a few security relevant issues, so add a test that checks all runtime files for any ! followed by a shellescape() that does not use the {special} arg.
related: Commit: 3fb5e58 (patch 9.2.0479:
[security]: runtime(tar): command injection in tar plugin)
Supported by AI
https://github.com/vim/vim/pull/20286
(1 file)
—
Reply to this email directly, view it on GitHub, or unsubscribe.
Triage notifications on the go with GitHub Mobile for iOS or Android.
You are receiving this because you are subscribed to this thread.![]()