Closed as not planned
Description
Testing #64
- create another file alongside
test.py
calledevil.py
. Inevil.py
, putprint('malicious code')
- while
test.py
is the active file, run the debugpy and enter the argsone & python ./evil.py
- See that
./evil.py
gets run.
If someone malicious wanted to run their own python script, they could inject a call into the args. Perhaps we should be sanitizing the input in some way in case it can be interfered with?