github.com/tiagorlampert/chaos is vulnerable to Remote Code Execution. The vulnerability is due to unsafe concatenation of the filename argument into the buildStr without any sanitization or filtering, which allows a remote attacker to execute arbitrary code.
gist.github.com/slimwang/d1ec6645ba9012a551ea436679244496
github.com/advisories/GHSA-xfjj-f699-rc79
github.com/tiagorlampert/CHAOS/commit/1b451cf62582295b7225caf5a7b506f0bad56f6b
github.com/tiagorlampert/CHAOS/commit/24c9e109b5be34df7b2bce8368eae669c481ed5e
github.com/tiagorlampert/CHAOS/commit/b47438d36e3ad746de8c009e644f6e5396703f25
github.com/tiagorlampert/CHAOS/pull/95