Affected by GO-2024-3269
and 3 other vulnerabilities
GO-2024-3269 : Connecting to a malicious Codespaces via GH CLI could allow command execution on the user's computer in github.com/cli/cli
GO-2024-3296 : Recursive repository cloning can leak authentication tokens to non-GitHub submodule hosts in github.com/cli/cli
GO-2024-3310 : Downloading malicious GitHub Actions workflow artifact results in path traversal vulnerability in github.com/cli/cli
GO-2025-3467 : `gh attestation verify` returns incorrect exit code during verification if no attestations are present in github.com/cli/cli
The highest tagged major version is
v2 .
Discover Packages
github.com/cli/cli
pkg
cmd
alias
expand
package
Version:
v1.12.1
Opens a new window with list of versions in this module.
Published: Jun 30, 2021
License: MIT
Opens a new window with license information.
Imports: 9
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
Documentation
Documentation
¶
ExpandAlias processes argv to see if it should be rewritten according to a user's aliases. The
second return value indicates whether the alias should be executed in a new shell process instead
of running gh itself.
Source Files
¶
Click to show internal directories.
Click to hide internal directories.