Commit: runtime(racket): Make visual K mapping more robust for shell injection

1 view
Skip to first unread message

Christian Brabandt

unread,
4:17 AM (17 hours ago) 4:17 AM
to vim...@googlegroups.com
runtime(racket): Make visual K mapping more robust for shell injection

Commit: https://github.com/vim/vim/commit/82ebaa79b03f0f9d66eeba51570c62a83096108f
Author: Christian Brabandt <c...@256bit.org>
Date: Wed Apr 1 08:10:15 2026 +0000

runtime(racket): Make visual K mapping more robust for shell injection

fyi @benknoble

Signed-off-by: Christian Brabandt <c...@256bit.org>

diff --git a/runtime/ftplugin/racket.vim b/runtime/ftplugin/racket.vim
index 14a98ab79..000f0ea3b 100644
--- a/runtime/ftplugin/racket.vim
+++ b/runtime/ftplugin/racket.vim
@@ -5,6 +5,7 @@
" URL: https://github.com/benknoble/vim-racket
" Last Change: 2025 Aug 09
" 2026 Mar 31 by Vim project: use shellescape for the K mapping
+" 2026 Apr 01 by Vim project: make K mapping more robust for shell injection

if exists("b:did_ftplugin")
finish
@@ -52,7 +53,7 @@ if !exists("no_plugin_maps") && !exists("no_racket_maps")
try
let l:old_a = @a
normal! gv"ay
- call system("raco docs '". shellescape(@a) . "'")
+ call system("raco docs -- ". string(shellescape(@a)))
redraw!
return @a
finally
Reply all
Reply to author
Forward
0 new messages