SQL injection detection #96
Annotations
10 errors and 1 warning
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 346: '[product.inventory]'
|
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 22: '[friend, content]'
|
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 71: '[product.inventory]'
|
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 80: '[product.inventory]'
|
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 170: '[ol_quantity]'
|
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 172: '[1]'
|
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 174: '[ol_supply_w_id === warehouseID ? 0 : 1]'
|
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 261: '[h_amount]'
|
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 275: '[h_amount]'
|
test / build
Possible SQL injection detected. The parameter to the query call site traces back to the nonliteral on line 287: '[h_amount]'
|
test / build
The following actions uses Node.js version which is deprecated and will be forced to run on node20: actions/checkout@v3, actions/setup-node@v3. For more info: https://github.blog/changelog/2024-03-07-github-actions-all-actions-will-run-on-node20-instead-of-node16-by-default/
|