By using this package unsanitized input from a command line argument flows into gulp-run, where it is used to build a shell command. Forwarding command-line arguments or file paths from the local environment to a function that executes a system command can change the meaning of the command unexpectedly due to unescaped special characters, which may result in a Indirect Command Injection vulnerability.
run()/run.Command() should accept an array and wrap arguments in double quotes if they contain spaces.
This is easy to fix by ourselves, but Snyk will complain rightfully.