Skip to content

refactor(xcode): harden shell command execution in XcodeClient #36

@diogot

Description

@diogot

Background

During PR #35 review, Copilot flagged potential shell injection concerns in XcodeClient.swift. While the current implementation uses values from internal configuration (not user input), hardening the shell command execution would improve defense-in-depth.

Current Patterns

Several methods in XcodeClient construct shell commands via string interpolation:

  1. rm -fr commands (lines 146, 185, 222) - file deletion via shell
  2. xcodebuild commands (line 224-225) - build execution with piped output
  3. altool upload command (line 162) - App Store upload

Proposed Changes

Option A: Use FileManager for file operations

Replace rm -rf shell commands with FileManager.removeItem(atPath:) for safer file deletion.

Option B: Use Process API with argument arrays

For complex commands like xcodebuild, use Process with properly separated arguments instead of shell string interpolation.

Option C: Input validation

Add validation to ensure scheme names, paths, and other interpolated values don't contain shell metacharacters.

Files to Review

  • Sources/Xproject/Utilities/XcodeClient.swift
  • Sources/Xproject/Utilities/CommandExecutor.swift (if changes affect the executor interface)

Acceptance Criteria

  • Replace rm shell commands with FileManager operations
  • Review all shell command constructions for potential injection points
  • Consider input validation for configuration-derived values
  • Maintain existing functionality and test coverage

References

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions