US 12,001,567 B1
Protections against command line security vulnerabilities
Eyal Rosner, Petach-Tikva (IL); Hod Sinay, Petach-Tikva (IL); and Yonatan Volkov, Petach-Tikva (IL)
Assigned to CyberArk Software Ltd., Petach-Tikva (IL)
Filed by CyberArk Software Ltd., Petach-Tikva (IL)
Filed on Nov. 20, 2023, as Appl. No. 18/514,199.
Int. Cl. G06F 21/60 (2013.01); G06F 21/54 (2013.01); G06F 21/78 (2013.01)
CPC G06F 21/60 (2013.01) [G06F 21/54 (2013.01); G06F 21/78 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method for securing the use of command line entries, the method comprising:
invoking, by a main process, a secondary process in a computing environment in a suspended mode;
providing one or more placeholder command line entry to the secondary process;
retrieving at least one secret by the main process; and
storing an operable command line entry in a memory location associated with the secondary process, wherein the one or more placeholder command line entry is nullified; and
wherein the secondary process is configured to process the operable command line entry and use the at least one secret.