- 
                Notifications
    You must be signed in to change notification settings 
- Fork 1
Patchwork PR #50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: autofix-master
Are you sure you want to change the base?
Patchwork PR #50
Conversation
21fdc13    to
    fdae94b      
    Compare
  
    9a0a2db    to
    c12fd79      
    Compare
  
    e6fe6b9    to
    ce3e591      
    Compare
  
    ce3e591    to
    38f100b      
    Compare
  
    38f100b    to
    f173d97      
    Compare
  
    c12fd79    to
    2093038      
    Compare
  
    2093038    to
    fed5ea6      
    Compare
  
    | The pull request implements improvements in the documentation of the application's architecture and components within README.md, enhancing clarity. It addresses a command injection vulnerability by changing subprocess calls from  
 
 
 | 
313b494    to
    6f28d22      
    Compare
  
    fed5ea6    to
    659657c      
    Compare
  
    
Fix subprocess call vulnerability
Sanitized user input to prevent command injection vulnerability by using subprocess.Popen with shell=False.