Skip to content

Conversation

@ayala-orca
Copy link
Collaborator

No description provided.

@ayala-orca ayala-orca requested a review from roi-orca as a code owner November 21, 2024 11:43
Copy link

@orca-security-us orca-security-us bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Orca Security Scan Summary

Status Check Issues by priority
Passed Passed Secrets high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Static Application Security Testing Scan high 0   medium 0   low 0   info 0 View in Orca

Copy link

@orca-security-staging orca-security-staging bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Orca Security Scan Summary

Status Check Issues by priority
Passed Passed Infrastructure as Code high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Secrets high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Static Application Security Testing Scan high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Vulnerabilities high 0   medium 0   low 0   info 0 View in Orca

Copy link

@orca-security-orcadevroi orca-security-orcadevroi bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Orca Security Scan Summary

Status Check Issues by priority
Passed Passed Infrastructure as Code high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Secrets high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Vulnerabilities high 0   medium 0   low 0   info 0 View in Orca

@ayala-orca ayala-orca closed this Nov 21, 2024
@ayala-orca ayala-orca reopened this Nov 21, 2024
Copy link

@orca-security-us orca-security-us bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Orca Security Scan Summary

Status Check Issues by priority
Passed Passed Secrets high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Static Application Security Testing Scan high 1   medium 0   low 0   info 0 View in Orca
🛡️ The following SAST misconfigurations have been detected
NAME FILE
high User Controlled Strings in exec() Can Lead to Command Injection ...rableTaskHolder.java View in code

Copy link

@orca-security-orcadevroi orca-security-orcadevroi bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Orca Security Scan Summary

Status Check Issues by priority
Passed Passed Infrastructure as Code high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Secrets high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Vulnerabilities high 0   medium 0   low 0   info 0 View in Orca

Copy link

@orca-security-staging orca-security-staging bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Orca Security Scan Summary

Status Check Issues by priority
Passed Passed Infrastructure as Code high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Secrets high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Static Application Security Testing Scan high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Vulnerabilities high 0   medium 0   low 0   info 0 View in Orca

Copy link

@orca-security-us orca-security-us bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Orca Security Scan Summary

Status Check Issues by priority
Passed Passed Secrets high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Static Application Security Testing Scan high 1   medium 2   low 0   info 0 View in Orca
🛡️ The following SAST misconfigurations have been detected
NAME FILE
high User Controlled Strings in exec() Can Lead to Command Injection ...rableTaskHolder.java View in code
medium Unsafe reflection allows attackers to manipulate method invocation flag.go View in code
medium Unsafe reflection allows attackers to manipulate method invocation flag.go View in code

Copy link

@orca-security-orcadevroi orca-security-orcadevroi bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Orca Security Scan Summary

Status Check Issues by priority
Passed Passed Infrastructure as Code high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Secrets high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Vulnerabilities high 0   medium 0   low 0   info 0 View in Orca

Copy link

@orca-security-staging orca-security-staging bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Orca Security Scan Summary

Status Check Issues by priority
Passed Passed Infrastructure as Code high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Secrets high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Static Application Security Testing Scan high 0   medium 2   low 0   info 0 View in Orca
Passed Passed Vulnerabilities high 0   medium 0   low 0   info 0 View in Orca
🛡️ The following SAST misconfigurations have been detected
NAME FILE
medium Unsafe reflection allows attackers to manipulate method invocation flag.go View in code
medium Unsafe reflection allows attackers to manipulate method invocation flag.go View in code

@ayala-orca ayala-orca closed this Nov 21, 2024
@ayala-orca ayala-orca reopened this Nov 21, 2024
Copy link

@orca-security-us orca-security-us bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Orca Security Scan Summary

Status Check Issues by priority
Passed Passed Secrets high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Static Application Security Testing Scan high 1   medium 2   low 0   info 0 View in Orca
🛡️ The following SAST misconfigurations have been detected
NAME FILE
high User Controlled Strings in exec() Can Lead to Command Injection ...rableTaskHolder.java View in code
medium Unsafe reflection allows attackers to manipulate method invocation flag.go View in code
medium Unsafe reflection allows attackers to manipulate method invocation flag.go View in code

Copy link

@orca-security-orcadevroi orca-security-orcadevroi bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Orca Security Scan Summary

Status Check Issues by priority
Passed Passed Infrastructure as Code high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Secrets high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Vulnerabilities high 0   medium 0   low 0   info 0 View in Orca

Copy link

@orca-security-staging orca-security-staging bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Orca Security Scan Summary

Status Check Issues by priority
Passed Passed Infrastructure as Code high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Secrets high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Static Application Security Testing Scan high 0   medium 2   low 0   info 0 View in Orca
Passed Passed Vulnerabilities high 0   medium 0   low 0   info 0 View in Orca
🛡️ The following SAST misconfigurations have been detected
NAME FILE
medium Unsafe reflection allows attackers to manipulate method invocation flag.go View in code
medium Unsafe reflection allows attackers to manipulate method invocation flag.go View in code

@ayala-orca ayala-orca closed this Nov 21, 2024
@ayala-orca ayala-orca reopened this Nov 21, 2024
Copy link

@orca-security-us orca-security-us bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Orca Security Scan Summary

Status Check Issues by priority
Passed Passed Secrets high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Static Application Security Testing Scan high 1   medium 2   low 0   info 0 View in Orca
🛡️ The following SAST misconfigurations have been detected
NAME FILE
high User Controlled Strings in exec() Can Lead to Command Injection ...rableTaskHolder.java View in code
medium Unsafe reflection allows attackers to manipulate method invocation flag.go View in code
medium Unsafe reflection allows attackers to manipulate method invocation flag.go View in code

Copy link

@orca-security-staging orca-security-staging bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Orca Security Scan Summary

Status Check Issues by priority
Passed Passed Infrastructure as Code high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Secrets high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Static Application Security Testing Scan high 0   medium 2   low 0   info 0 View in Orca
Passed Passed Vulnerabilities high 0   medium 0   low 0   info 0 View in Orca
🛡️ The following SAST misconfigurations have been detected
NAME FILE
medium Unsafe reflection allows attackers to manipulate method invocation flag.go View in code
medium Unsafe reflection allows attackers to manipulate method invocation flag.go View in code

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants