path-traversal-anti-pattern

path-traversal-anti-pattern

Security anti-pattern for path traversal vulnerabilities (CWE-22). Use when generating or reviewing code that handles file paths, reads or writes files based on user input, or serves static content. Detects joining user input to paths without proper sanitization or validation.

2étoiles
1forks
Mis à jour 1/22/2026
SKILL.md
readonlyread-only
name
"path-traversal-anti-pattern"
description

"Security anti-pattern for path traversal vulnerabilities (CWE-22). Use when generating or reviewing code that handles file paths, reads or writes files based on user input, or serves static content. Detects joining user input to paths without proper sanitization or validation."

Path Traversal Anti-Pattern

Severity: High

Summary

Path traversal (also known as "directory traversal" or "dot-dot-slash") is a vulnerability that allows an attacker to read or write files outside of the intended directory. This anti-pattern occurs when an application uses user-supplied input to construct a file path without properly validating or sanitizing it. By manipulating the input with sequences like ../, an attacker can navigate up the directory tree and access sensitive files anywhere on the server, such as /etc/passwd, application source code, or credentials.

The Anti-Pattern

The anti-pattern is concatenating user input directly into a file path without first validating that the input is safe and does not contain any directory traversal characters.

BAD Code Example

# VULNERABLE: User input is directly joined with a base directory path.
from flask import request
import os

BASE_DIR = "/var/www/uploads/"

@app.route("/files/view")
def view_file():
    # The 'filename' parameter is taken directly from the request.
    filename = request.args.get("filename")

    # The user input is concatenated with the base directory.
    # No validation is performed to check for path traversal characters.
    file_path = os.path.join(BASE_DIR, filename)

    # Attacker's request: /files/view?filename=../../../../etc/passwd
    # The final `file_path` becomes: /var/www/uploads/../../../../etc/passwd
    # This resolves to: /etc/passwd

    # The application reads and returns the contents of the system's password file.
    try:
        with open(file_path, 'r') as f:
            return f.read()
    except FileNotFoundError:
        return "File not found.", 404

GOOD Code Example

# SECURE: The user input is validated and the final path is canonicalized.
from flask import request
import os

BASE_DIR = "/var/www/uploads/"

@app.route("/files/view/secure")
def view_file_secure():
    filename = request.args.get("filename")

    # 1. Basic validation: Check for malicious characters.
    if ".." in filename or filename.startswith("/"):
        return "Invalid filename.", 400

    # 2. Construct the full path.
    file_path = os.path.join(BASE_DIR, filename)

    # 3. Canonicalize the path: Resolve all symbolic links and `../` sequences.
    #    This is the most critical step.
    real_path = os.path.realpath(file_path)
    real_base_dir = os.path.realpath(BASE_DIR)

    # 4. Ensure the final, resolved path is still within the intended base directory.
    if not real_path.startswith(real_base_dir + os.sep):
        return "Access denied: Path is outside of the allowed directory.", 403

    # Now it is safe to access the file.
    try:
        with open(real_path, 'r') as f:
            return f.read()
    except FileNotFoundError:
        return "File not found.", 404

Detection

  • Trace user input: Follow any user-controlled input (from request parameters, body, headers, etc.) that is used in a file operation.
  • Look for path concatenation: Search for functions that join or concatenate strings to form file paths (e.g., os.path.join, + on strings).
  • Check for missing validation: Verify that before being used, the input is checked for path traversal sequences (../, ..\). A simple search-and-replace for ../ is not sufficient due to potential bypasses like ....//.
  • Ensure path canonicalization: The most important check is to see if the application resolves the final path to its absolute, canonical form and then verifies that it is still within the intended base directory.

Prevention

  • [ ] Never trust user input when constructing file paths.
  • [ ] Validate user input before using it. The best approach is to use a strict allowlist of known-good filenames if possible. If not, disallow path traversal sequences.
  • [ ] Canonicalize the path: After constructing the full path, use a language-specific function (e.g., os.path.realpath() in Python, File.getCanonicalPath() in Java) to resolve it to its absolute form.
  • [ ] Verify the final path: After canonicalization, check that the resulting path starts with the expected base directory. This is the most reliable way to prevent path traversal.
  • [ ] Use indirect references: Instead of passing filenames, consider using IDs or indices from a predefined list of available files, so the user never directly controls a piece of the file path.

Related Security Patterns & Anti-Patterns

References

You Might Also Like

Related Skills

create-pr

create-pr

170Kdev-devops

Creates GitHub pull requests with properly formatted titles that pass the check-pr-title CI validation. Use when creating PRs, submitting changes for review, or when the user says /pr or asks to create a pull request.

n8n-io avatarn8n-io
Obtenir

Guide for performing Chromium version upgrades in the Electron project. Use when working on the roller/chromium/main branch to fix patch conflicts during `e sync --3`. Covers the patch application workflow, conflict resolution, analyzing upstream Chromium changes, and proper commit formatting for patch fixes.

electron avatarelectron
Obtenir
pr-creator

pr-creator

92Kdev-devops

Use this skill when asked to create a pull request (PR). It ensures all PRs follow the repository's established templates and standards.

google-gemini avatargoogle-gemini
Obtenir
clawdhub

clawdhub

87Kdev-devops

Use the ClawdHub CLI to search, install, update, and publish agent skills from clawdhub.com. Use when you need to fetch new skills on the fly, sync installed skills to latest or a specific version, or publish new/updated skill folders with the npm-installed clawdhub CLI.

moltbot avatarmoltbot
Obtenir
tmux

tmux

87Kdev-devops

Remote-control tmux sessions for interactive CLIs by sending keystrokes and scraping pane output.

moltbot avatarmoltbot
Obtenir
create-pull-request

create-pull-request

57Kdev-devops

Create a GitHub pull request following project conventions. Use when the user asks to create a PR, submit changes for review, or open a pull request. Handles commit analysis, branch management, and PR creation using the gh CLI tool.

cline avatarcline
Obtenir