Skip to content

test: multi-pass pipeline with linter-rule-judge #712

test: multi-pass pipeline with linter-rule-judge

test: multi-pass pipeline with linter-rule-judge #712

Triggered via pull request February 14, 2026 00:16
Status Success
Total duration 7m 49s
Artifacts 5

test.yml

on: pull_request
Matrix: test
Fit to window
Zoom out
Zoom in

Annotations

3 errors and 1 warning
Arbitrary Code Execution via eval(): src/config/loader.ts#L134
Function uses eval() to execute arbitrary code from string input. This allows execution of any JavaScript code if an attacker can control the expr parameter.
Arbitrary Code Execution via Function Constructor: src/config/loader.ts#L138
Function uses new Function() constructor which compiles and executes arbitrary code from string input, similar to eval().
Command Injection in runConfigScript: src/config/loader.ts#L126
Uses template literal to construct shell command with scriptName parameter, enabling command injection via path traversal or shell metacharacters.
e2e
No files were found with the provided path: playwright-report/. No artifacts will be uploaded.

Artifacts

Produced during runtime
Name Size Digest
dist Expired
39.4 MB
sha256:6a15ec3c68a3b49252aefaf609e0fdb4a628727f628c92724962a99c62eeec98
docker-image Expired
1.09 GB
sha256:2043e79e87a6e246653fa560aa9685e134c8ff47c3acf83da0be77782b7778b6
gricha~perry~ITNZT4.dockerbuild
38.9 KB
sha256:04acd1a8bbc2c78709dd7ec11377aa6c2c5cb59e2b95cb26e1a61fdcc8deb09e
gricha~perry~UDIUZB.dockerbuild
72 KB
sha256:f2eb095cd650e02f7200d62c92d10e80fdf77f9c0387b7d52e8410a7fa205cf5
playwright-report Expired
197 KB
sha256:5d14b05f96fda099ce799817c66d2f7de4f9ffdcf91ef9611e200cc6d04becee