pub fn command_arg() -> Sanitizer<ShellArg>Expand description
Minimal validation for Command::new().arg()
contexts.
Even without shell involvement, control characters can cause:
- NUL-byte truncation in C-backed APIs
- ANSI escape sequence injection in terminal output
- Newline injection in log files
§Rules
§Example
use shell_sanitize_rules::presets;
let s = presets::command_arg();
assert!(s.sanitize("safe-argument").is_ok());
assert!(s.sanitize("has\0null").is_err());