Skip to content

Conversation

priyadam
Copy link
Contributor

Potential fix for https://github.com/OpenSourceFellows/amplify/security/code-scanning/20

To fix this issue, we should ensure that untrusted user input is never used as a format string in a logging or formatting function. The best and most reliable way to do this in Node.js is to provide a constant format string with %s placeholders, and pass all untrusted data as arguments to be interpolated. This way, even if the user supplies malicious format specifiers, they will be treated as plain strings and not interpreted. Specifically, in console.log(paymentIntent, amount, eventOutcome), we should change this to console.log('%s %s %s', paymentIntent, amount, eventOutcome). No new imports or definitions are needed.

Suggested fixes powered by Copilot Autofix. Review carefully before merging.

…olled format string

Fixing string that's fixed

Co-authored-by: Copilot Autofix powered by AI <62310815+github-advanced-security[bot]@users.noreply.github.com>
Copy link

emote

Copy link

Hello there, thanks for opening your first Pull Request. Someone will review it soon.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant