[stable32] build(deps-dev): bump @zip.js/zip.js from 2.8.11 to 2.8.15 #71922
static-code-analysis.yml
on: pull_request
static-code-analysis
2m 0s
static-code-analysis-security
6m 19s
static-code-analysis-ocp
3m 6s
static-code-analysis-ncu
2m 12s
Annotations
2 errors and 1 warning
|
TaintedCallable:
apps/workflowengine/lib/Manager.php#L495
apps/workflowengine/lib/Manager.php:495:39: TaintedCallable: Detected tainted text (see https://psalm.dev/243)
|
|
TaintedCallable:
apps/workflowengine/lib/Manager.php#L462
apps/workflowengine/lib/Manager.php:462:38: TaintedCallable: Detected tainted text (see https://psalm.dev/243)
|
|
static-code-analysis-security
This run of the CodeQL Action does not have permission to access Code Scanning API endpoints. As a result, it will not be opted into any experimental features. This could be because the Action is running on a pull request from a fork. If not, please ensure the Action has the 'security-events: write' permission. Details: Resource not accessible by integration - https://docs.github.com/rest
|