Pramod Prasad
|
095cee1140
|
🔒 [Security Fix] Replace exec() with subprocess.run() to prevent arbitrary code execution- Replaced unsafe calls in evaluation scripts to enhance security.- Updated files: - (Line 64) - (Line 64) - (Line 64) - (Line 37)- Implemented for controlled execution.- Added exception handling to catch potential execution errors.- This update mitigates the risk of arbitrary code execution and enhances system security.✅ Recommended: Test all affected evaluation modules to ensure functionality remains intact.
|
2025-01-29 12:10:28 +00:00 |
|
Daya Guo
|
3963f912c0
|
Update README.md
|
2023-12-29 00:08:38 +08:00 |
|
Daya Guo
|
a1874c8784
|
Update run.py
|
2023-12-28 23:18:12 +08:00 |
|
Dejian
|
a4ba628dfd
|
init project
|
2023-11-02 22:07:09 +08:00 |
|