include::../description.adoc[] include::../ask-yourself.adoc[] include::../recommended.adoc[] == Sensitive Code Example Arguments like `-delete` or `-exec` for the `find` command can alter the expected behavior and result in vulnerabilities: ---- $input = $_GET['input']; system('/usr/bin/find ' . escapeshellarg($input)); // Sensitive ---- == Compliant Solution Use an allow-list to restrict the arguments to trusted values: [source,php] ---- $input = $_GET['input']; if (in_array($input, $allowed, true)) { system('/usr/bin/find ' . escapeshellarg($input)); } ---- include::../see.adoc[] ifdef::env-github,rspecator-view[] ''' == Implementation Specification (visible only on this page) include::../message.adoc[] ''' endif::env-github,rspecator-view[]