Skip to content

fix: sanitize subprocess call in sounds.py#2454

Open
orbisai0security wants to merge 1 commit into3b1b:masterfrom
orbisai0security:fix-fix-v-001-command-injection-sounds
Open

fix: sanitize subprocess call in sounds.py#2454
orbisai0security wants to merge 1 commit into3b1b:masterfrom
orbisai0security:fix-fix-v-001-command-injection-sounds

Conversation

@orbisai0security
Copy link
Copy Markdown

Summary

Fix critical severity security issue in manimlib/utils/sounds.py.

Vulnerability

Field Value
ID V-001
Severity CRITICAL
Scanner multi_agent_ai
Rule V-001
File manimlib/utils/sounds.py:26
CWE CWE-78

Description: The sound utility functions use subprocess.Popen to execute system commands for audio playback. Line 37 uses shell=True on Windows, making it directly vulnerable to command injection. Lines 26 and 32 use argument lists but still pass unsanitized file paths that could exploit vulnerabilities in the audio player executables.

Changes

  • manimlib/utils/sounds.py

Verification

  • Build passes
  • Scanner re-scan confirms fix
  • LLM code review passed

Automated security fix by OrbisAI Security

Automated security fix generated by Orbis Security AI
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants