Derived from the flake8-bandit linter.
What it does#
Check for method calls that initiate a subprocess without a shell.
Why is this bad?#
Starting a subprocess without a shell can prevent attackers from executing arbitrary shell commands; however, it is still error-prone. Consider validating the input.
Prone to false positives as it is difficult to determine whether the passed arguments have been validated (#4045).