Skip to content

[pre-commit.ci] auto fixes from pre-commit.com hooks

614a9b9
Select commit
Loading
Failed to load commit list.
Merged

control-service: Fix Java Google Formatter #3435

[pre-commit.ci] auto fixes from pre-commit.com hooks
614a9b9
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / CodeQL failed Feb 24, 2025 in 3s

17 new alerts including 4 critical severity security vulnerabilities

New alerts in code changed by this pull request

Security Alerts:

  • 4 critical
  • 12 high
  • 1 medium

Alerts not introduced by this pull request might have been detected because the code changes were too large.

See annotations below for details.

View all branch alerts.

Annotations

Check failure on line 72 in projects/vdk-control-cli/src/vdk/internal/control/command_groups/job/secrets.py

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (secret)
as clear text.
This expression logs
sensitive data (secret)
as clear text.

Check failure on line 49 in projects/vdk-core/src/vdk/internal/builtin_plugins/config/secrets_config.py

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (secret)
as clear text.

Check failure on line 39 in projects/vdk-core/src/vdk/internal/builtin_plugins/job_secrets/datajobs_service_secrets.py

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (secret)
as clear text.

Check warning on line 71 in projects/vdk-plugins/vdk-jobs-troubleshooting/src/vdk/plugin/jobs_troubleshoot/troubleshoot_utilities/healthcheck_server.py

See this annotation in the file changed.

Code scanning / CodeQL

Binding a socket to all network interfaces Medium

'' binds a socket to all interfaces.

Check failure on line 624 in projects/vdk-plugins/vdk-server/src/vdk/plugin/server/installer.py

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (password)
as clear text.
This expression logs
sensitive data (password)
as clear text.

Check failure on line 667 in projects/frontend/data-pipelines/gui/e2e/integration/frontend-tests/manage/data-jobs/executions/data-job-executions.spec.js

See this annotation in the file changed.

Code scanning / CodeQL

Useless regular-expression character escape High

The escape sequence '\d' is equivalent to just 'd', so the sequence is not a character class when it is used in a
regular expression
.

Check failure on line 1467 in projects/frontend/data-pipelines/gui/e2e/integration/frontend-tests/manage/data-jobs/executions/data-job-executions.spec.js

See this annotation in the file changed.

Code scanning / CodeQL

Useless regular-expression character escape High

The escape sequence '\d' is equivalent to just 'd', so the sequence is not a character class when it is used in a
regular expression
.

Check failure on line 1622 in projects/frontend/data-pipelines/gui/e2e/integration/frontend-tests/manage/data-jobs/executions/data-job-executions.spec.js

See this annotation in the file changed.

Code scanning / CodeQL

Useless regular-expression character escape High

The escape sequence '\d' is equivalent to just 'd', so the sequence is not a character class when it is used in a
regular expression
.

Check failure on line 202 in projects/frontend/data-pipelines/gui/e2e/plugins/helpers/http-helpers.plugins.js

See this annotation in the file changed.

Code scanning / CodeQL

Hard-coded credentials Critical

The hard-coded value "... removed from logs ..." is used as
authorization header
.

Check failure on line 208 in projects/frontend/data-pipelines/gui/e2e/plugins/helpers/http-helpers.plugins.js

See this annotation in the file changed.

Code scanning / CodeQL

Hard-coded credentials Critical

The hard-coded value "... removed from logs ..." is used as
authorization header
.

Check failure on line 10 in projects/frontend/data-pipelines/gui/e2e/plugins/helpers/util-helpers.plugins.js

See this annotation in the file changed.

Code scanning / CodeQL

Useless regular-expression character escape High

The escape sequence '.' is equivalent to just '.', so the sequence may still represent a meta-character when it is used in a
regular expression
.

Check failure on line 10 in projects/frontend/data-pipelines/gui/e2e/plugins/helpers/util-helpers.plugins.js

See this annotation in the file changed.

Code scanning / CodeQL

Useless regular-expression character escape High

The escape sequence '.' is equivalent to just '.', so the sequence may still represent a meta-character when it is used in a
regular expression
.

Check failure on line 10 in projects/frontend/data-pipelines/gui/e2e/plugins/helpers/util-helpers.plugins.js

See this annotation in the file changed.

Code scanning / CodeQL

Useless regular-expression character escape High

The escape sequence '.' is equivalent to just '.', so the sequence may still represent a meta-character when it is used in a
regular expression
.

Check failure on line 10 in projects/frontend/data-pipelines/gui/e2e/plugins/helpers/util-helpers.plugins.js

See this annotation in the file changed.

Code scanning / CodeQL

Useless regular-expression character escape High

The escape sequence '.' is equivalent to just '.', so the sequence may still represent a meta-character when it is used in a
regular expression
.

Check failure on line 10 in projects/frontend/data-pipelines/gui/e2e/plugins/helpers/util-helpers.plugins.js

See this annotation in the file changed.

Code scanning / CodeQL

Useless regular-expression character escape High

The escape sequence '.' is equivalent to just '.', so the sequence may still represent a meta-character when it is used in a
regular expression
.

Check failure on line 15 in projects/frontend/shared-components/gui/projects/documentation-ui/src/app/auth.ts

See this annotation in the file changed.

Code scanning / CodeQL

Hard-coded credentials Critical documentation

The hard-coded value "Lt44bhN5yMowdEHuxO3v1SBDKsS3aXW4GcJ" is used as
authorization header
.

Check failure on line 114 in projects/control-service/projects/pipelines_control_service/src/main/java/com/vmware/taurus/service/webhook/WebHookService.java

See this annotation in the file changed.

Code scanning / CodeQL

Server-side request forgery Critical

Potential server-side request forgery due to a
user-provided value
.