-
Notifications
You must be signed in to change notification settings - Fork 15
security: [LOW] Potential DoS via unbounded string concatenation in e2e.sh #3190
Copy link
Copy link
Open
Labels
safe-to-workSecurity triage: safe for automated processingSecurity triage: safe for automated processing
Description
File: sh/e2e/e2e.sh
Severity: LOW
Finding: Multiple string concatenation patterns without length bounds
Lines 98-99, 177-178, 390-391, 432-435, 466-468, 479-481, 500-501 use unbounded string concatenation:
CLOUDS="${CLOUDS} $1"
cloud_failed="${cloud_failed} ${agent}"If AGENTS_TO_TEST or CLOUDS contains thousands of items (e.g., via manifest.json manipulation), these concatenations could consume excessive memory or cause shell performance degradation.
While this is unlikely in practice (manifest.json is version-controlled and small), the pattern could be problematic if copied to contexts with unbounded input.
Recommendation: Use arrays instead of space-delimited strings for collecting agent/cloud names, or add sanity checks on list length.
-- security/shell-scanner
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
safe-to-workSecurity triage: safe for automated processingSecurity triage: safe for automated processing