Phase
Phase 1 — Critical Security | Track 1.2 — Execution Controls | Priority: P1 MEDIUM
Vulnerability Details
File: operator_use/agent/tools/builtin/control_center.py:128
CWE: CWE-78
`os.system()` spawns a shell and is vulnerable to injection. Replace with `subprocess.run()`.
Fix
```python
Before
os.system("cls" if os.name == "nt" else "clear")
After
subprocess.run(["cls" if os.name == "nt" else "clear"], shell=False, check=False)
```
Acceptance Criteria
References
Phase
Phase 1 — Critical Security| Track 1.2 — Execution Controls | Priority: P1 MEDIUMVulnerability Details
File:
operator_use/agent/tools/builtin/control_center.py:128CWE: CWE-78
`os.system()` spawns a shell and is vulnerable to injection. Replace with `subprocess.run()`.
Fix
```python
Before
os.system("cls" if os.name == "nt" else "clear")
After
subprocess.run(["cls" if os.name == "nt" else "clear"], shell=False, check=False)
```
Acceptance Criteria
References