Skip to content

Document allow_invalid_primary_key as public parameter

ca35b4b
Select commit
Loading
Failed to load commit list.
Closed

Refine primary key rules for relational operators #1294

Document allow_invalid_primary_key as public parameter
ca35b4b
Select commit
Loading
Failed to load commit list.
Debricked / Vulnerability analysis completed Jan 3, 2026 in 18s

An automation triggered a pipeline warning

Found 9 vulnerabilities. An additional 0 vulnerabilities have been marked as unaffected.

Output from Automations

4 rules were checked:


If a new dependency is added where the license risk is at least medium

then notify all users in the group admins by email

✔️ The rule did not trigger. Manage rule



If a dependency contains a vulnerability which has not been marked as unaffected and which has not triggered this rule for this dependency before

then notify all users in the group admins by email

✔️ The rule did not trigger. Manage rule



If there is a dependency where the license risk is at least high

then send a pipeline warning

✔️ The rule did not trigger. Manage rule



If a dependency contains a vulnerability which has not been marked as unaffected

then send a pipeline warning

⚠️ The rule triggered for the following vulnerabilities, causing a pipeline warning. Manage rule

Vulnerability CVSS2 CVSS3 Dependency Dependency Licenses
CVE-2025-47287 N/A 7.5 tornado (pip) Apache-2.0
CVE-2025-67725 N/A 7.5 tornado (pip) Apache-2.0
CVE-2025-67726 N/A 7.5 tornado (pip) Apache-2.0
CVE-2025-30167 N/A 7.3 jupyter-core (pip) BSD-3-Clause
CVE-2025-50182 N/A 6.1 urllib3 (pip) MIT
CVE-2025-50181 N/A 6.1 urllib3 (pip) MIT
CVE-2025-67724 N/A 6.1 tornado (pip) Apache-2.0
CVE-2024-47081 N/A 5.3 requests (pip) Apache-2.0
CVE-2025-53000 N/A N/A nbconvert (pip) BSD-3-Clause