Skip to main content

command_arg

Function command_arg 

Source
pub fn command_arg() -> Sanitizer<ShellArg>
Expand description

Minimal validation for Command::new().arg() contexts.

Even without shell involvement, control characters can cause:

  • NUL-byte truncation in C-backed APIs
  • ANSI escape sequence injection in terminal output
  • Newline injection in log files

§Rules

§Example

use shell_sanitize_rules::presets;

let s = presets::command_arg();
assert!(s.sanitize("safe-argument").is_ok());
assert!(s.sanitize("has\0null").is_err());