OliveTin: OS Command Injection via password argument type and webhook JSON extraction bypasses shell safety checks in github.com/OliveTin/OliveTin
password
{ "review_status": "UNREVIEWED", "url": "https://pkg.go.dev/vuln/GO-2026-4547" }
"https://vuln.go.dev/ID/GO-2026-4547.json"