Skip to content

Conversation

@RinCodeForge927
Copy link

@RinCodeForge927 RinCodeForge927 commented Jan 1, 2026

Fixes a potential command injection vulnerability by enforcing strict validation on external binary paths.

Previously, exec.Command accepted paths without verification, creating an attack vector if variables were compromised. I've introduced a ValidateExecutable function to ensure that:

  1. Paths are absolute and point to existing files.
  2. Files have executable permissions (on *nix).
  3. Filenames match strictly allowlisted binaries (ffmpeg, ffprobe).

This validation is now applied across ffmpeg.go, filemanager.go, and metadata.go before any subprocess execution.

@RinCodeForge927 RinCodeForge927 changed the title Hardened Attack Surface in Data-Flow Management Security Fix: Enforce strict validation for FFmpeg binary paths Jan 1, 2026
@RinCodeForge927 RinCodeForge927 force-pushed the fix/hardening-data-flow branch from b9d30fd to 02583ee Compare January 1, 2026 03:21
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant