Fix shell injection in GitHook SSH passphrase askpass script (#64126)
The passphrase was embedded in a shell script using bare single quotes, which would break or allow command injection if the passphrase contained shell metacharacters (single quotes, $, backticks, etc.). Use shlex.quote() to safely escape the value.
J
Jarek Potiuk committed
1ac3243b8f4f68ee8d0a432a103c80f82e84fc69
Parent: 52dac01
Committed by vatsrahul1001 <rah.sharma11@gmail.com>
on 3/25/2026, 11:47:09 AM