The scripts are written with certain expectations.
This expectation may not be properly met if the `IFS` value is changed.
This can potentially be used to create some sort of exploit.
Explicitly define IFS and then do so at a local variable scope to prevent affecting the callers IFS setting.`
#
main() {
+ local IFS=$' \t\n' # Prevent IFS exploits by overriding with a local scope.
+
if [[ ${SHELL_ENGINE} == "zsh" ]] ; then
emulate ksh
fi
#
bootstrap_main() {
+ local IFS=$' \t\n' # Prevent IFS exploits by overriding with a local scope.
if [[ ${SHELL_ENGINE} == "zsh" ]] ; then
emulate ksh
unset bootstrap_cleanup
}
-bootstrap_main $*
+bootstrap_main ${*}
#
main() {
+ local IFS=$' \t\n' # Prevent IFS exploits by overriding with a local scope.
+
local -i first="$1"
local -i last="$2"
#
main() {
+ local IFS=$' \t\n' # Prevent IFS exploits by overriding with a local scope.
if [[ ${SHELL_ENGINE} == "zsh" ]] ; then
emulate ksh
unset generate_ctags_cleanup
}
-main $*
+main ${*}
#
main() {
+ local IFS=$' \t\n' # Prevent IFS exploits by overriding with a local scope.
+
local file_input="codes.txt"
local mode=$1
local code=
#
install_main() {
+ local IFS=$' \t\n' # Prevent IFS exploits by overriding with a local scope.
if [[ ${SHELL_ENGINE} == "zsh" ]] ; then
emulate ksh
unset install_cleanup
}
-install_main $*
+install_main ${*}
#
package_main() {
+ local IFS=$' \t\n' # Prevent IFS exploits by overriding with a local scope.
if [[ ${SHELL_ENGINE} == "zsh" ]] ; then
emulate ksh
unset package_cleanup
}
-package_main $*
+package_main ${*}
#
test_main() {
+ local IFS=$' \t\n' # Prevent IFS exploits by overriding with a local scope.
local shell_command=bash
if [[ ${SHELL_ENGINE} == "zsh" ]] ; then
unset test_cleanup
}
-test_main $*
+test_main ${*}
# The dependencies of this script are: bash and sed.
#
process_post_main() {
+ local IFS=$' \t\n' # Prevent IFS exploits by overriding with a local scope.
+
local grab_next=
local do_color=dark
local i=0
# The dependencies of this script are: bash and sed.
#
process_pre_main() {
+ local IFS=$' \t\n' # Prevent IFS exploits by overriding with a local scope.
+
local grab_next=
local do_color=dark
local i=0
#!/bin/bash
+main() {
+ local IFS=$' \t\n' # Prevent IFS exploits by overriding with a local scope.
+
+}
+
+main ${*}
#!/bin/bash
+main() {
+ local IFS=$' \t\n' # Prevent IFS exploits by overriding with a local scope.
+
+}
+
+main ${*}
#
generate_main() {
+ local IFS=$' \t\n' # Prevent IFS exploits by overriding with a local scope.
+
local file_source="${2}"
local path_destination="${3}"
local failure=0
#
verify_main() {
+ local IFS=$' \t\n' # Prevent IFS exploits by overriding with a local scope.
+
local path_build="${1}"
local path_expect="${2}"
local test_name="${3}"
#
generate_main() {
+ local IFS=$' \t\n' # Prevent IFS exploits by overriding with a local scope.
+
local file_source="${2}"
local path_destination="${3}"
local failure=0
#
verify_main() {
+ local IFS=$' \t\n' # Prevent IFS exploits by overriding with a local scope.
+
local path_build="${1}"
local path_expect="${2}"
local test_name="${3}"