fix: prevent command injection vulnerabilities in subprocess calls
Directly incorporating external or user-defined input into an OS command exposes the system to possible command injection attacks. This vulnerability allows attackers to execute unauthorized commands on the operating system, potentially leading to a compromise of system integrity.
Please ensure that the NEXT_CHANGELOG.md file is updated with any relevant changes. If this is not necessary for your PR, please include the following in your PR description: NO_CHANGELOG=true and rerun the job.
If integration tests don't run automatically, an authorized user can run them manually by following the instructions below:
Trigger: go/deco-tests-run/sdk-go
Inputs:
- PR number: 1194
- Commit SHA:
63e8c71442193094081ba8ef5803c1a2e2c57818
Checks will be approved automatically on success.