Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Migrate to eslint 9 and flat config #2192

Merged
merged 131 commits into from
Nov 28, 2024

fix: test-int eslint-config and eslint-config-otter

cd54143
Select commit
Loading
Failed to load commit list.
Merged

Migrate to eslint 9 and flat config #2192

fix: test-int eslint-config and eslint-config-otter
cd54143
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / CodeQL failed Nov 22, 2024 in 4s

9 new alerts including 1 critical severity security vulnerability

New alerts in code changed by this pull request

Security Alerts:

  • 1 critical
  • 6 high
  • 2 medium

Alerts not introduced by this pull request might have been detected because the code changes were too large.

See annotations below for details.

View all branch alerts.

Annotations

Check failure on line 15 in packages/@ama-sdk/core/src/plugins/json-token/json-token.spec.ts

See this annotation in the file changed.

Code scanning / CodeQL

Hard-coded credentials Critical test

The hard-coded value "tokenValue" is used as
authorization header
.

Check warning on line 98 in packages/@o3r/new-version/src/index.ts

See this annotation in the file changed.

Code scanning / CodeQL

Unsafe shell command constructed from library input Medium

This string concatenation which depends on
library input
is later used in a
shell command
.

Check warning on line 78 in packages/@o3r/schematics/src/utility/package-manager-runner.ts

See this annotation in the file changed.

Code scanning / CodeQL

Unsafe shell command constructed from library input Medium

This string concatenation which depends on
library input
is later used in a
shell command
.

Check failure on line 55 in packages/@o3r/styling/builders/style-extractor/helpers/css-variable.extractor.ts

See this annotation in the file changed.

Code scanning / CodeQL

Inefficient regular expression High

This part of the regular expression may cause exponential backtracking on strings starting with 'var(,' and containing many repetitions of ' ,'.

Check failure on line 55 in packages/@o3r/styling/builders/style-extractor/helpers/css-variable.extractor.ts

See this annotation in the file changed.

Code scanning / CodeQL

Inefficient regular expression High

This part of the regular expression may cause exponential backtracking on strings starting with 'var(,(' and containing many repetitions of '),('.

Check failure on line 66 in packages/@o3r/styling/builders/style-extractor/helpers/css-variable.extractor.ts

See this annotation in the file changed.

Code scanning / CodeQL

Inefficient regular expression High

This part of the regular expression may cause exponential backtracking on strings starting with 'var(,' and containing many repetitions of ' ,'.

Check failure on line 66 in packages/@o3r/styling/builders/style-extractor/helpers/css-variable.extractor.ts

See this annotation in the file changed.

Code scanning / CodeQL

Inefficient regular expression High

This part of the regular expression may cause exponential backtracking on strings starting with 'var(,(' and containing many repetitions of '),('.

Check failure on line 35 in tools/@o3r/workspace-helpers/scripts/prepare-doc-root-menu-template.mjs

See this annotation in the file changed.

Code scanning / CodeQL

Regular expression injection High

This regular expression is constructed from a
command-line argument
.

Check failure on line 67 in tools/@o3r/workspace-helpers/scripts/update-doc-summary.mjs

See this annotation in the file changed.

Code scanning / CodeQL

Regular expression injection High

This regular expression is constructed from a
command-line argument
.