test: multi-pass pipeline with linter-rule-judge #712
Annotations
3 errors and 1 warning
|
Arbitrary Code Execution via eval():
src/config/loader.ts#L134
Function uses eval() to execute arbitrary code from string input. This allows execution of any JavaScript code if an attacker can control the expr parameter.
|
|
Arbitrary Code Execution via Function Constructor:
src/config/loader.ts#L138
Function uses new Function() constructor which compiles and executes arbitrary code from string input, similar to eval().
|
|
Command Injection in runConfigScript:
src/config/loader.ts#L126
Uses template literal to construct shell command with scriptName parameter, enabling command injection via path traversal or shell metacharacters.
|
|
e2e
No files were found with the provided path: playwright-report/. No artifacts will be uploaded.
|
Artifacts
Produced during runtime
| Name | Size | Digest | |
|---|---|---|---|
|
dist
Expired
|
39.4 MB |
sha256:6a15ec3c68a3b49252aefaf609e0fdb4a628727f628c92724962a99c62eeec98
|
|
|
docker-image
Expired
|
1.09 GB |
sha256:2043e79e87a6e246653fa560aa9685e134c8ff47c3acf83da0be77782b7778b6
|
|
|
gricha~perry~ITNZT4.dockerbuild
|
38.9 KB |
sha256:04acd1a8bbc2c78709dd7ec11377aa6c2c5cb59e2b95cb26e1a61fdcc8deb09e
|
|
|
gricha~perry~UDIUZB.dockerbuild
|
72 KB |
sha256:f2eb095cd650e02f7200d62c92d10e80fdf77f9c0387b7d52e8410a7fa205cf5
|
|
|
playwright-report
Expired
|
197 KB |
sha256:5d14b05f96fda099ce799817c66d2f7de4f9ffdcf91ef9611e200cc6d04becee
|
|