prevent windows exec unintentional relative pathing #792
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Hi maintainers! I'm Josh and I work at Bison Trails. We're doing an internal hackathon this week.
Our team loves aws-vault, but it got flagged during a recent security review. Our team voted to use our hackathon time to patch vulnerabilities in our favorite OSS tools and specifically to try to get aws-vault approved for usage within our organization.
What's here:
$PATH
. see more here https://blog.golang.org/path-securityImpact:
These changes should improve aws-vault's security posture. We identified this vulnerability using Salus and the OSSF scorecard. The specific issues I am hoping to address here are:
os/exec
withgolang.org/x/sys/execabs
on all go files that are built for windows.What's next:
assumerolewithwebidentity