Tainted input for Docker API High

Passing an unsanitized user argument to a function call makes your code insecure. This might allow attackers to modify sensitive data, run code, and perform other unwanted actions.

Detector ID
javascript/tainted-input-for-docker-api@v1.0
Category
Common Weakness Enumeration (CWE) external icon