Commit 9d12fa78 authored by Jacob Vosmaer's avatar Jacob Vosmaer

Add comment about untrusted origin_cmd

parent ca66ab51
......@@ -17,6 +17,9 @@ class GitlabShell
@repos_path = @config.repos_path
end
# The origin_cmd variable contains UNTRUSTED input. If the user ran
# ssh git@gitlab.example.com 'evil command', then origin_cmd contains
# 'evil command'.
def exec(origin_cmd)
unless origin_cmd
puts "Welcome to GitLab, #{username}!"
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment