Skip to content

Conversation

@GHOryy5
Copy link

@GHOryy5 GHOryy5 commented Dec 15, 2025

Summary

This PR adds defensive hardening to the native binary installation flow without changing expected behavior for valid inputs.

Changes

  • Add path validation during archive extraction to prevent traversal outside the target directory
  • Apply timeouts to external network downloads to avoid indefinite hangs
  • Resolve external tool binaries defensively instead of assuming PATH integrity

@github-actions
Copy link

github-actions bot commented Dec 15, 2025

All contributors have signed the CLA ✍️ ✅
Posted by the CLA Assistant Lite bot.

@GHOryy5
Copy link
Author

GHOryy5 commented Dec 15, 2025

I have read the CLA Document and I hereby sign the CLA

github-actions bot added a commit that referenced this pull request Dec 15, 2025
@etraut-openai
Copy link
Collaborator

Is there a bug report associated with this PR? We ask that all bug fixes have an associated bug report in our contribution guidelines. This helps us track and prioritize issues.

Is this addressing a real problem that you've seen, or does it address a theoretical issue?

@etraut-openai etraut-openai added the needs-response Additional information is requested label Dec 15, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

needs-response Additional information is requested

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants