Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: develop => main #3216

Merged
merged 236 commits into from
Feb 5, 2025

Add chracters

7ae0e0d
Select commit
Loading
Failed to load commit list.
Merged

chore: develop => main #3216

Add chracters
7ae0e0d
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / CodeQL failed Feb 5, 2025 in 3s

12 new alerts including 2 critical severity security vulnerabilities

New alerts in code changed by this pull request

Security Alerts:

  • 2 critical
  • 8 high
  • 2 medium

Alerts not introduced by this pull request might have been detected because the code changes were too large.

See annotations below for details.

View all branch alerts.

Annotations

Check failure on line 198 in packages/client-slack/src/messages.ts

See this annotation in the file changed.

Code scanning / CodeQL

Server-side request forgery Critical

The
URL
of this request depends on a
user-provided value
.
The
URL
of this request depends on a
user-provided value
.

Check failure on line 89 in packages/core/src/parsing.ts

See this annotation in the file changed.

Code scanning / CodeQL

Polynomial regular expression used on uncontrolled data High

This
regular expression
that depends on
library input
may run slow on strings starting with 'json\n' and with many repetitions of 'json\na'.
This
regular expression
that depends on
library input
may run slow on strings starting with 'json\n' and with many repetitions of 'json\na'.

Check failure on line 108 in packages/core/src/parsing.ts

See this annotation in the file changed.

Code scanning / CodeQL

Polynomial regular expression used on uncontrolled data High

This
regular expression
that depends on
library input
may run slow on strings starting with '["' and with many repetitions of '["a'.
This
regular expression
that depends on
library input
may run slow on strings starting with '["' and with many repetitions of '["a'.

Check failure on line 146 in packages/core/src/parsing.ts

See this annotation in the file changed.

Code scanning / CodeQL

Polynomial regular expression used on uncontrolled data High

This
regular expression
that depends on
library input
may run slow on strings starting with 'json\n' and with many repetitions of 'json\na'.

Check failure on line 159 in packages/core/src/parsing.ts

See this annotation in the file changed.

Code scanning / CodeQL

Polynomial regular expression used on uncontrolled data High

This
regular expression
that depends on
library input
may run slow on strings starting with '{' and with many repetitions of '{'.

Check failure on line 236 in packages/core/src/parsing.ts

See this annotation in the file changed.

Code scanning / CodeQL

Polynomial regular expression used on uncontrolled data High

This
regular expression
that depends on
library input
may run slow on strings with many repetitions of ' '.

Check failure on line 102 in packages/plugin-autonome/__tests__/actions/launchAgent.test.ts

See this annotation in the file changed.

Code scanning / CodeQL

Hard-coded credentials Critical test

The hard-coded value "Bearer mock-jwt-token" is used as
authorization header
.

Check failure on line 347 in packages/plugin-spheron/src/utils/index.ts

See this annotation in the file changed.

Code scanning / CodeQL

Polynomial regular expression used on uncontrolled data High

This
regular expression
that depends on
library input
may run slow on strings with many repetitions of '0'.
This
regular expression
that depends on
library input
may run slow on strings with many repetitions of '0'.

Check warning on line 19 in scripts/update-package-access.js

See this annotation in the file changed.

Code scanning / CodeQL

Shell command built from environment values Medium

This shell command depends on an uncontrolled
file name
.

Check warning on line 43 in scripts/update-versions.js

See this annotation in the file changed.

Code scanning / CodeQL

Shell command built from environment values Medium

This shell command depends on an uncontrolled
absolute path
.
This shell command depends on an uncontrolled
absolute path
.
This shell command depends on an uncontrolled
file name
.
This shell command depends on an uncontrolled
absolute path
.

Check failure on line 37 in tests/test1.mjs

See this annotation in the file changed.

Code scanning / CodeQL

Incomplete URL substring sanitization High test

'
https://commerce.coinbase.com/pay/
' can be anywhere in the URL, and arbitrary hosts may come before or after it.

Check failure on line 62 in tests/test1.mjs

See this annotation in the file changed.

Code scanning / CodeQL

Incomplete URL substring sanitization High test

'
https://commerce.coinbase.com/pay/
' can be anywhere in the URL, and arbitrary hosts may come before or after it.