Back to home page

EIC code displayed by LXR

 
 

    


File indexing completed on 2026-05-10 08:36:19

0001 //===--- CommandInterpreterCheck.h - clang-tidy------------------*- C++ -*-===//
0002 //
0003 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
0004 // See https://llvm.org/LICENSE.txt for license information.
0005 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
0006 //
0007 //===----------------------------------------------------------------------===//
0008 
0009 #ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_CERT_COMMAND_PROCESSOR_CHECK_H
0010 #define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_CERT_COMMAND_PROCESSOR_CHECK_H
0011 
0012 #include "../ClangTidyCheck.h"
0013 
0014 namespace clang::tidy::cert {
0015 
0016 /// Execution of a command processor can lead to security vulnerabilities,
0017 /// and is generally not required. Instead, prefer to launch executables
0018 /// directly via mechanisms that give you more control over what executable is
0019 /// actually launched.
0020 ///
0021 /// For the user-facing documentation see:
0022 /// http://clang.llvm.org/extra/clang-tidy/checks/cert/env33-c.html
0023 class CommandProcessorCheck : public ClangTidyCheck {
0024 public:
0025   CommandProcessorCheck(StringRef Name, ClangTidyContext *Context)
0026       : ClangTidyCheck(Name, Context) {}
0027   void registerMatchers(ast_matchers::MatchFinder *Finder) override;
0028   void check(const ast_matchers::MatchFinder::MatchResult &Result) override;
0029 };
0030 
0031 } // namespace clang::tidy::cert
0032 
0033 #endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_CERT_COMMAND_PROCESSOR_CHECK_H