We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent e24fb58 commit 6fdac03Copy full SHA for 6fdac03
main.py
@@ -21,6 +21,6 @@ def func_calls():
21
# Introduce a command injection vulnerability
22
user_input = input("Enter a command to execute: ")
23
command = "ping " + user_input
24
- subprocess.call(command, shell=True)
+ subprocess.call(command, shell=False)
25
26
- print("Command executed!")
+ print("Command executed!")
0 commit comments