Call to 'Runtime.exec()' with non-constant string
Reports calls to java.lang.Runtime.exec()
which take a dynamically-constructed string as the command to execute.
Constructed execution strings are a common source of security breaches. By default, this inspection ignores compile-time constants.
Example:
String i = getUserInput();
Runtime runtime = Runtime.getRuntime();
runtime.exec("foo" + i); // reports warning
- By ID
Can be used to locate inspection in e.g. Qodana configuration files, where you can quickly enable or disable it, or adjust its settings.
CallToRuntimeExecWithNonConstantString
Use the inspection settings to consider any static
final
fields as constant. Be careful, because strings like the following will be ignored when the option is enabled:
static final String COMMAND = "ping " + getDomainFromUserInput() + "'";
Here you can find the description of settings available for the Call to 'Runtime.exec()' with non-constant string inspection, and the reference of their default values.
Inspection Details | |
---|---|
By default bundled with: | |
Can be installed with plugin: | Java, 243.23126 |
Thanks for your feedback!