Skip to content

SQL injection detection #85

SQL injection detection

SQL injection detection #85

Triggered via pull request July 23, 2024 16:39
Status Failure
Total duration 1m 58s
Artifacts

on_pr.yml

on: pull_request
Fit to window
Zoom out
Zoom in

Annotations

10 errors and 1 warning
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 346: '[product.inventory]'
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 22: '[friend, content]'
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 71: '[product.inventory]'
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 80: '[product.inventory]'
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 170: '[ol_quantity]'
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 172: '[1]'
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 174: '[ol_supply_w_id === warehouseID ? 0 : 1]'
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 261: '[h_amount]'
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 275: '[h_amount]'
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 287: '[h_amount]'
test / build
The following actions uses Node.js version which is deprecated and will be forced to run on node20: actions/checkout@v3, actions/setup-node@v3. For more info: https://github.blog/changelog/2024-03-07-github-actions-all-actions-will-run-on-node20-instead-of-node16-by-default/