Skip to content

Merge branch 'AstrBotDevs:master' into Sjshi763/issue4409

4667729
Select commit
Loading
Failed to load commit list.
Open

Sjshi763/issue4409 feature:人格设定支持导出/导入 #4532

Merge branch 'AstrBotDevs:master' into Sjshi763/issue4409
4667729
Select commit
Loading
Failed to load commit list.
Sourcery AI / Sourcery review failed Feb 10, 2026 in 30s

❌ Found 4 blocking security issues

Sourcery found 4 blocking security issues:

  • astrbot/core/computer/booters/local.py:75-83 - Detected subprocess function 'Popen' without a static string. If this data can be controlled by a malicious actor, it may be an instance of command injection. Audit the use of this call to ensure it is not controllable by an external resource. You may consider using 'shlex.escape()'.
  • astrbot/core/computer/booters/local.py:85-93 - Detected subprocess function 'run' without a static string. If this data can be controlled by a malicious actor, it may be an instance of command injection. Audit the use of this call to ensure it is not controllable by an external resource. You may consider using 'shlex.escape()'.
  • astrbot/core/computer/booters/local.py:114-119 - Detected subprocess function 'run' without a static string. If this data can be controlled by a malicious actor, it may be an instance of command injection. Audit the use of this call to ensure it is not controllable by an external resource. You may consider using 'shlex.escape()'.
  • astrbot/core/computer/booters/local.py:115 - Detected subprocess function 'run' with user controlled data. A malicious actor could leverage this to perform command injection. You may consider using 'shlex.quote()'.