fix(agent): validate request path before forwarding to ExApp#105
Conversation
Signed-off-by: Oleksander Piskun <oleksandr2088@icloud.com>
📝 WalkthroughWalkthroughThis PR introduces path traversal attack protection to the SPOA message handler. A new regex pattern detects parent-directory ( 🚥 Pre-merge checks | ✅ 3 | ❌ 2❌ Failed checks (1 warning, 1 inconclusive)
✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. Comment |
There was a problem hiding this comment.
🧹 Nitpick comments (1)
haproxy_agent.py (1)
32-34: ⚡ Quick winAdd regression tests for the traversal matcher.
This regex is security-sensitive and easy to weaken accidentally. A small table of match/non-match cases for raw, mixed-case encoded, and boundary inputs would lock the behavior in.
ℹ️ Review info
⚙️ Run configuration
Configuration used: Organization UI
Review profile: CHILL
Plan: Pro Plus
Run ID: 2b6c4b29-28a4-4a1b-bf1c-442676931c99
📒 Files selected for processing (1)
haproxy_agent.py
No description provided.