Skip to content

Conversation

@LironJit
Copy link
Owner

@LironJit LironJit commented Nov 6, 2024

No description provided.

Copy link

@jit-ci jit-ci bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

❌ Jit has detected 100 important findings in this PR that you should review.

The first 10 findings are detailed below as separate comments.
Click here to view all the findings on Jit.

It’s highly recommended that you fix these security issues before merging.
Alternatively, comment #jit_ignore_all in this PR to ignore all findings. Admin privileges required.

const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

Copy link

@jit-ci jit-ci bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

❌ Jit has detected 1000 important findings in this PR that you should review.

The first 10 findings are detailed below as separate comments.
Click here to view all the findings on Jit.

It’s highly recommended that you fix these security issues before merging.
Alternatively, comment #jit_ignore_all in this PR to ignore all findings. Admin privileges required.

const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

Copy link

@jit-ci jit-ci bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

❌ The following Jit checks failed to run:

  • secret-detection

#jit_bypass_commit in this PR to bypass, Jit Admin privileges required.

More info in the Jit platform.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants