Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
fix(core): don't allow arbitrary code execution when manipulating cac…
…he (#9329) The Node documentation for `exec` states: > Never pass unsanitized user input to this function. Any input containing shell metacharacters may be used to trigger arbitrary command execution. The `folder` variable comes directly from the `NX_CACHE_DIRECTORY` environment variable (or from `nx.json`). Careful crafting of this variable can result in NX executing arbitrary commands. This patch fixes this by using `execFile`, which does not spawn a shell.
- Loading branch information