Skip to content

add Java runtime support to configuration template

1041ce4
Select commit
Loading
Failed to load commit list.
Merged

Feature: Add java runtime (for PMD) [PLUTO-1420] #114

add Java runtime support to configuration template
1041ce4
Select commit
Loading
Failed to load commit list.
Codacy Production / Codacy Static Code Analysis succeeded May 15, 2025 in 0s

Your pull request is up to standards!

Codacy found no issues in your code

Annotations

Check notice on line 4 in constants/permissions.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

constants/permissions.go#L4

comment on exported const DefaultFilePerms should be of the form "DefaultFilePerms ..."

Check warning on line 145 in plugins/runtime-utils.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

plugins/runtime-utils.go#L145

`path.Join(...)` always joins using a forward slash.

Check failure on line 32 in tools/pmdRunner.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

tools/pmdRunner.go#L32

Detected non-static command inside Command.

Check failure on line 32 in tools/pmdRunner.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

tools/pmdRunner.go#L32

OS command injection is a critical vulnerability that can lead to a full system compromise as it may allow an adversary to pass in arbitrary commands or arguments to be executed.

Check failure on line 34 in tools/pmdRunner.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

tools/pmdRunner.go#L34

Detected non-static command inside Command.

Check failure on line 34 in tools/pmdRunner.go

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

tools/pmdRunner.go#L34

OS command injection is a critical vulnerability that can lead to a full system compromise as it may allow an adversary to pass in arbitrary commands or arguments to be executed.