Let's say I have a script:
<br/>echo -n "$1" | some_bin "$2" "$3" -t "$4" -m "$5" -p "$6" -e<br/>
I call this from my application using Erlang's ports, passing
<br/>{spawn_executable, "sh"},<br/>{args, ["myscript.sh", Arg1, Arg2, Arg3, ...]}<br/>
Argument 1 (which goes to the echo) is user controlled, the others are not. How can a malicious user crack this? What kind of shenanigans can they do in the shell script? What do I need to do to avoid that?
(some_bin only takes input from stdin.)