Skip to main content
Glama
os-command-injection.py369 B
# The following code is vulnerable to command injections because # it is using untrusted inputs to set up a new process. Therefore # an attacker can execute an arbitrary program that is installed # on the system. def ping(): cmd = "ping -c 1 %s" % request.args.get("host", "www.google.com") status = os.system(cmd) # Noncompliant return str(status == 0)

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/michoo/security_mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server