Skip to content

test: multi-pass pipeline with linter-rule-judge #708

test: multi-pass pipeline with linter-rule-judge

test: multi-pass pipeline with linter-rule-judge #708

Triggered via pull request February 13, 2026 23:53
Status Success
Total duration 8m 27s
Artifacts 5

test.yml

on: pull_request
Matrix: test
Fit to window
Zoom out
Zoom in

Annotations

3 errors and 1 warning
Arbitrary Code Execution via eval(): src/config/loader.ts#L134
Direct use of eval() with string parameter allows arbitrary JavaScript execution if called with user input.
Arbitrary Code Execution via Function Constructor: src/config/loader.ts#L138
Use of Function constructor allows arbitrary code execution if called with attacker-controlled code string.
Command Injection in execSync: src/config/loader.ts#L126
String interpolation in execSync() allows command injection if scriptName contains shell metacharacters. Attacker could execute arbitrary commands via path traversal or shell operators.
e2e
No files were found with the provided path: playwright-report/. No artifacts will be uploaded.

Artifacts

Produced during runtime
Name Size Digest
dist Expired
39.4 MB
sha256:38b9b2022d7397e501cf3d249e4936cab77d60d9197a302142d92a00b671bb0a
docker-image Expired
1.09 GB
sha256:4c0ff928e1ff0f95a0f09dca47c169d8b9c737bcc42b7dfc8e49af56fd056919
gricha~perry~5SG8AV.dockerbuild
76.3 KB
sha256:fd5c4bbce6481e0e45c4527cfd14e5e706400b1ea5d22090e951bacbd4082712
gricha~perry~L4P8XK.dockerbuild
39.7 KB
sha256:32e3e46c0377863285d3cebf7f78a5e6cca096120d7821f9349e4f994b838e7f
playwright-report Expired
197 KB
sha256:12393246cb85bbbe0745c42026bcf40e8c567051b0fcb853a31c3b3b5fc4c0fe