test: multi-pass pipeline with linter-rule-judge #708
Annotations
3 errors and 1 warning
|
Arbitrary Code Execution via eval():
src/config/loader.ts#L134
Direct use of eval() with string parameter allows arbitrary JavaScript execution if called with user input.
|
|
Arbitrary Code Execution via Function Constructor:
src/config/loader.ts#L138
Use of Function constructor allows arbitrary code execution if called with attacker-controlled code string.
|
|
Command Injection in execSync:
src/config/loader.ts#L126
String interpolation in execSync() allows command injection if scriptName contains shell metacharacters. Attacker could execute arbitrary commands via path traversal or shell operators.
|
|
e2e
No files were found with the provided path: playwright-report/. No artifacts will be uploaded.
|
Artifacts
Produced during runtime
| Name | Size | Digest | |
|---|---|---|---|
|
dist
Expired
|
39.4 MB |
sha256:38b9b2022d7397e501cf3d249e4936cab77d60d9197a302142d92a00b671bb0a
|
|
|
docker-image
Expired
|
1.09 GB |
sha256:4c0ff928e1ff0f95a0f09dca47c169d8b9c737bcc42b7dfc8e49af56fd056919
|
|
|
gricha~perry~5SG8AV.dockerbuild
|
76.3 KB |
sha256:fd5c4bbce6481e0e45c4527cfd14e5e706400b1ea5d22090e951bacbd4082712
|
|
|
gricha~perry~L4P8XK.dockerbuild
|
39.7 KB |
sha256:32e3e46c0377863285d3cebf7f78a5e6cca096120d7821f9349e4f994b838e7f
|
|
|
playwright-report
Expired
|
197 KB |
sha256:12393246cb85bbbe0745c42026bcf40e8c567051b0fcb853a31c3b3b5fc4c0fe
|
|