SiteShadow
Back to vulnerability library

CWE-676 Use of Potentially Dangerous Function

What this means

SiteShadow flagged use of functions/APIs that are commonly unsafe when any part of their input can be attacker-controlled (dynamic eval, unsafe deserialization, shell execution, unsafe file operations).

Why it matters

Dangerous functions can enable execution or data exposure.

Safer examples

1) Avoid dynamic evaluation APIs

Avoid eval / Function / exec and parse known formats instead (see CWE-94 / CWE-95).

2) Avoid unsafe deserialization

Prefer JSON + schema validation over native object deserialization (see CWE-502).

3) Prefer safe subprocess usage

Use argument arrays and allowlists; avoid shell strings (see CWE-77 / CWE-78 / CWE-88).

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage