Skip to content

Comments

🛡️ Sentinel: [CRITICAL] Restrict shell_execute to allowlist#32

Closed
JustinWoodring wants to merge 1 commit intomainfrom
sentinel-restrict-shell-execute-1560447406316240706
Closed

🛡️ Sentinel: [CRITICAL] Restrict shell_execute to allowlist#32
JustinWoodring wants to merge 1 commit intomainfrom
sentinel-restrict-shell-execute-1560447406316240706

Conversation

@JustinWoodring
Copy link
Owner

Restricted the shell_execute function in the server's scripting engine to only allow yt-dlp, ffmpeg, and ffprobe. This prevents arbitrary command execution by users with script editing permissions. Added tests to verify the restriction.


PR created automatically by Jules for task 1560447406316240706 started by @JustinWoodring

Implements a security control in `slatron-server`'s Rhai scripting engine to restrict `shell_execute` to a specific allowlist of commands (`yt-dlp`, `ffmpeg`, `ffprobe`).

Previous behavior allowed execution of arbitrary commands (though via `Command::new` not shell, first argument was the binary), presenting a risk of arbitrary code execution by script authors.

Changes:
- Modified `slatron-server/src/rhai_engine/mod.rs` to add `ALLOWED_COMMANDS` constant and check `cmd` against it.
- Added unit tests in `slatron-server/src/rhai_engine/security_test.rs` to verify authorized and unauthorized commands.
- Cleaned up lint warnings in security tests.

This addresses the RCE vulnerability documented in `.jules/sentinel.md`.

Co-authored-by: JustinWoodring <41842051+JustinWoodring@users.noreply.github.com>
@google-labs-jules
Copy link
Contributor

👋 Jules, reporting for duty! I'm here to lend a hand with this pull request.

When you start a review, I'll add a 👀 emoji to each comment to let you know I've read it. I'll focus on feedback directed at me and will do my best to stay out of conversations between you and other bots or reviewers to keep the noise down.

I'll push a commit with your requested changes shortly after. Please note there might be a delay between these steps, but rest assured I'm on the job!

For more direct control, you can switch me to Reactive Mode. When this mode is on, I will only act on comments where you specifically mention me with @jules. You can find this option in the Pull Request section of your global Jules UI settings. You can always switch back!

New to Jules? Learn more at jules.google/docs.


For security, I will only act on instructions from the user who triggered this task.

@claude
Copy link

claude bot commented Jan 31, 2026

Code review

No issues found. Checked for bugs and CLAUDE.md compliance.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant