Open-uri's [open used in Thor::Actions#get](https://github.com/erikhuda/thor/blob/c74e1d34ef8b3270dcaa821fc1c7b38238929a27/lib/thor/actions/file_manipulation.rb#L82) allows executing system commands [1]. Documentation does not warn that source parameter is vulnerable to malicious input. Example: ``` get "|uname -a > cmd_exec_test;\nhttps://gist.github.com", "/tmp/test_123" ``` [1] http://sakurity.com/blog/2015/02/28/openuri.html