Skip to content

helm fixes (#320)

8f1be71
Select commit
Loading
Failed to load commit list.
Merged

Create new release #312

helm fixes (#320)
8f1be71
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / CodeQL succeeded Sep 9, 2025 in 4s

9 new alerts including 4 high severity security vulnerabilities

New alerts in code changed by this pull request

Security Alerts:

  • 4 high
  • 5 medium

Alerts not introduced by this pull request might have been detected because the code changes were too large.

See annotations below for details.

View all branch alerts.

Annotations

Check warning on line 12 in .github/workflows/workflow-multiarch.yml

See this annotation in the file changed.

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {}

Check warning on line 139 in .github/workflows/workflow-multiarch.yml

See this annotation in the file changed.

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}

Check warning on line 225 in .github/workflows/workflow-multiarch.yml

See this annotation in the file changed.

Code scanning / CodeQL

Workflow does not contain permissions Medium

Actions job or workflow does not limit the permissions of the GITHUB_TOKEN. Consider setting an explicit permissions block, using the following as a minimal starting point: {contents: read}

Check failure on line 36 in services/chatbot/src/chatbot/chat_api.py

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (password)
as clear text.

Check failure on line 80 in services/chatbot/src/chatbot/chat_api.py

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (password)
as clear text.
This expression logs
sensitive data (password)
as clear text.
This expression logs
sensitive data (password)
as clear text.
This expression logs
sensitive data (password)
as clear text.

Check warning on line 103 in services/workshop/crapi/merchant/views.py

See this annotation in the file changed.

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.
Stack trace information
flows to this location and may be exposed to an external user.
Stack trace information
flows to this location and may be exposed to an external user.
Stack trace information
flows to this location and may be exposed to an external user.

Check failure on line 393 in services/workshop/crapi/shop/views.py

See this annotation in the file changed.

Code scanning / CodeQL

SQL query built from user-controlled sources High

This SQL query depends on a
user-provided value
.

Check warning on line 399 in services/workshop/crapi/shop/views.py

See this annotation in the file changed.

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.

Check failure on line 47 in services/community/api/server.go

See this annotation in the file changed.

Code scanning / CodeQL

Disabled TLS certificate check High

InsecureSkipVerify should not be used in production code.