From fb016bf25733207d0875302bac7cfb27c7e901b9 Mon Sep 17 00:00:00 2001 From: larrybr Date: Fri, 28 Apr 2023 00:28:06 +0000 Subject: Make CLI .load slightly harder to abuse. FossilOrigin-Name: 2779f9270cc431786d0e16ef05ec05b0f22dda2307f3bf17467ad0b25304e160 --- src/shell.c.in | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) (limited to 'src/shell.c.in') diff --git a/src/shell.c.in b/src/shell.c.in index 18690214b..7285067be 100644 --- a/src/shell.c.in +++ b/src/shell.c.in @@ -9192,7 +9192,8 @@ static int do_meta_command(char *zLine, ShellState *p){ const char *zFile, *zProc; char *zErrMsg = 0; failIfSafeMode(p, "cannot run .load in safe mode"); - if( nArg<2 ){ + if( nArg<2 || azArg[1][0]==0 ){ + /* Must have a non-empty FILE. (Will not load self.) */ raw_printf(stderr, "Usage: .load FILE ?ENTRYPOINT?\n"); rc = 1; goto meta_command_exit; -- cgit v1.2.3