This repository was archived by the owner on Jul 2, 2024. It is now read-only.
Commit c523834 1 parent bb712c4 commit c523834 Copy full SHA for c523834
File tree 5 files changed +15
-11
lines changed
5 files changed +15
-11
lines changed Original file line number Diff line number Diff line change
1
+ skip-check :
2
+ # The build output cannot be affected by user parameters other than the build entry point and the top-level source location. GitHub Actions workflow_dispatch inputs MUST be empty
3
+ - CKV_GHA_7
Original file line number Diff line number Diff line change 33
33
# Extract: ```bash ... ```
34
34
sed -n "/^ \`\`\`\(bash\|shell\)$/,/^ \`\`\`$/p" "${FILE}" | sed '/^ ```*/d; s/^ //' >> README.sh
35
35
done
36
+ ls -la README.sh
36
37
chmod a+x README.sh
37
38
38
39
- name : 💡 MegaLinter
Original file line number Diff line number Diff line change 1
- .*. mylabs.dev
1
+ mylabs.dev
Original file line number Diff line number Diff line change 1
1
# Configuration file for MegaLinter
2
2
# See all available variables at https://megalinter.io/latest/configuration/ and in linters documentation
3
3
4
- BASH_SHFMT_ARGUMENTS : --indent 2 --space-redirects
4
+ BASH_SHFMT_ARGUMENTS : --case-indent -- indent 2 --space-redirects
5
5
6
6
DISABLE_LINTERS :
7
7
- MARKDOWN_MARKDOWN_LINK_CHECK # Using lychee instead
@@ -26,9 +26,7 @@ PRINT_ALPACA: false
26
26
# Disable creating report directory
27
27
REPORT_OUTPUT_FOLDER : none
28
28
29
- # Issue: https://github.com/bridgecrewio/checkov/issues/3839
30
- # The build output cannot be affected by user parameters other than the build entry point and the top-level source location. GitHub Actions workflow_dispatch inputs MUST be empty
31
- REPOSITORY_CHECKOV_ARGUMENTS : --skip-check CKV_GHA_7
29
+ REPOSITORY_CHECKOV_ARGUMENTS : --quiet
32
30
33
31
# Do not leave debug code in production, Insecure URL
34
32
REPOSITORY_DEVSKIM_ARGUMENTS : --ignore-globs CHANGELOG.md --ignore-rule-ids DS162092,DS137138
Original file line number Diff line number Diff line change 1
1
vulnerabilities :
2
- # │ glob-parent │ CVE-2020-28469 │ HIGH │ fixed │ 3.1.0 │ 5.1.2 │ Regular expression denial of service │
2
+ # │ glob-parent │ CVE-2020-28469 │ HIGH │ fixed │ 3.1.0 │ 5.1.2 │ Regular expression denial of service │
3
3
- id : CVE-2020-28469
4
- # │ json5 │ CVE-2022-46175 │ HIGH │ fixed │ 0.5.1 │ 2.2.2, 1.0.2 │ json5: Prototype Pollution in JSON5 via Parse Method │
4
+ # │ json5 │ CVE-2022-46175 │ HIGH │ fixed │ 0.5.1 │ 2.2.2, 1.0.2 │ json5: Prototype Pollution in JSON5 via Parse Method │
5
5
- id : CVE-2022-46175
6
- # │ loader-utils │ CVE-2022-37601 │ CRITICAL │ fixed │ 0.2.17 │ 2.0.3, 1.4.1 │ loader-utils: prototype pollution in function parseQuery in │
6
+ # │ loader-utils │ CVE-2022-37601 │ CRITICAL │ fixed │ 0.2.17 │ 2.0.3, 1.4.1 │ loader-utils: prototype pollution in function parseQuery in │
7
7
- id : CVE-2022-37601
8
- # │ node-forge │ CVE-2022-24771 │ HIGH │ fixed │ 0.10.0 │ 1.3.0 │ node-forge: Signature verification leniency in checking │
8
+ # │ node-forge │ CVE-2022-24771 │ HIGH │ fixed │ 0.10.0 │ 1.3.0 │ node-forge: Signature verification leniency in checking │
9
9
- id : CVE-2022-24771
10
- # │ node-forge │ CVE-2022-24772 │ HIGH │ fixed │ 0.10.0 │ 1.3.0 │ node-forge: Signature verification failing to check tailing │
10
+ # │ node-forge │ CVE-2022-24772 │ HIGH │ fixed │ 0.10.0 │ 1.3.0 │ node-forge: Signature verification failing to check tailing │
11
11
- id : CVE-2022-24772
12
- # │ nth-check │ CVE-2021-3803 │ HIGH │ fixed │ 1.0.2 │ 2.0.1 │ inefficient regular expression complexity │
12
+ # │ nth-check │ CVE-2021-3803 │ HIGH │ fixed │ 1.0.2 │ 2.0.1 │ inefficient regular expression complexity │
13
13
- id : CVE-2021-3803
14
+ # | ip │ CVE-2023-42282 │ HIGH │ affected │ 1.1.8 │ │ An issue in NPM IP Package v.1.1.8 and before allows an │
15
+ - id : CVE-2023-42282
You can’t perform that action at this time.
0 commit comments