Someone might be able to do a command line injection attack against your system here:
|
await $`docker run --network none --name ${ctx.userId}${input.name} --rm -i -d -v ${codePathFolder}:/app/ -v ${problemPathInput}:/app/inputs/:ro code-runner`; |
. I suggest validating the
input.name field as you can send plaintext for that. I am not sure if zx stops inline bash commands.
Someone might be able to do a command line injection attack against your system here:
lootcode/src/server/api/routers/docker.ts
Line 21 in 4b49b2d
input.namefield as you can send plaintext for that. I am not sure if zx stops inline bash commands.