Hi guys how are you? It seems that in the execute_ws_function method there is a possible vulnerability. the "text" parameter is being passed without any sanitation or validation. to implement appropriate measures for sanitizing and validating the input before utilizing it within the function, like for example subprocess module with the shlex.quote in python
Pay now to fund the work behind this issue.
Get updates on progress being made.
Maintainer is rewarded once the issue is completed.
You're funding impactful open source efforts
You want to contribute to this effort
You want to get funding like this too