Skip to content

Commit e6f190d

Browse files
committed
Remove debug logs
1 parent 10dd387 commit e6f190d

File tree

2 files changed

+0
-4
lines changed

2 files changed

+0
-4
lines changed

library/sinks/FileSystem.test.ts

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,6 @@ t.test("it works", async (t) => {
175175
);
176176

177177
if (isWindows) {
178-
console.error("-".repeat(16));
179178
throws(
180179
() =>
181180
rename(new URL("file:/X://../test.txt"), "../test2.txt", () => {}),
@@ -193,7 +192,6 @@ t.test("it works", async (t) => {
193192
rename(new URL("file:/C://../../test.txt"), "../test2.txt", () => {}),
194193
"Zen has blocked a path traversal attack: fs.rename(...) originating from body.file.matches"
195194
);
196-
console.error("-".repeat(16));
197195
} else {
198196
throws(
199197
() => rename(new URL("file:///../test.txt"), "../test2.txt", () => {}),

library/vulnerabilities/path-traversal/detectPathTraversal.ts

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,6 @@ export function detectPathTraversal(
2222
// Also /./ is checked by normal absolute path traversal check (if #219 is merged)
2323
if (isUrl && containsUnsafePathParts(userInput)) {
2424
const filePathFromUrl = parseAsFileUrl(userInput);
25-
console.error("filePathFromUrl", filePathFromUrl);
26-
console.error("origFilePath", filePath);
2725
if (filePathFromUrl && filePath.includes(filePathFromUrl)) {
2826
return true;
2927
}

0 commit comments

Comments
 (0)