Skip to content

chore(main): release 1.1.4 #11

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conversation

Mubashwer
Copy link
Owner

🤖 I have created a release beep boop

1.1.4 (2023-04-01)

Bug Fixes

  • ci: fix uploading archived binary to github release (629fde8)

This PR was generated with Release Please. See documentation.

@Mubashwer Mubashwer merged commit 21c7d20 into main Apr 1, 2023
@Mubashwer Mubashwer deleted the release-please--branches--main--components--release-please-action branch April 1, 2023 16:59
@Mubashwer
Copy link
Owner Author

🤖 Release is at https://github.com/Mubashwer/git-mob/releases/tag/v1.1.4 🌻

Mubashwer added a commit that referenced this pull request Jul 1, 2025
- Add path-clean dependency to sanitize file paths
- Fix 7 CodeQL path injection vulnerabilities in src/commands/setup.rs:
  * Alert #13: hooks_dir.exists() with unsanitized path from git config
  * Alert #12: hooks_dir.exists() with unsanitized global hooks directory
  * Alert #11: fs::rename() with unsanitized backup path construction
  * Alert #10: fs::set_permissions() with unsanitized file path
  * Alert #9: fs::write() with unsanitized file path
  * Alert #8: fs::create_dir_all() with unsanitized prepare_commit_msg_path
  * Alert #7: fs::create_dir_all() with unsanitized local hooks directory

- Use PathClean::clean() to normalize paths and remove directory traversal sequences
- Ensure all file system operations use sanitized paths to prevent path injection attacks
- Maintain backward compatibility and pass all existing tests

Fixes: GitHub Security Advisory alerts #7-#13
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant