Fix: fix issue #22 Address with severe security check issues #29
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
The latest possible version that can be installed is 1.0.2 because of the following conflicting dependencies:
react-scripts@5.0.1 requires nth-check@^1.0.2 via a transitive dependency on css-select@2.1.0
No patched version available for nth-check
PostCSS line return parsing error
Upgrade postcss to fix 1 Dependabot alert in package-lock.json
Upgrade postcss to version 8.4.31 or later
Potential file system race condition
scripts/utils/test-script-template.js:127
scripts/generate-keys.js:92
server/utils/vaultService.js:94
Often it is necessary to check the state of a file before using it. These checks usually take a file name to be checked, and if the check returns positively, then the file is opened or otherwise operated upon.
However, in the time between the check and the operation, the underlying file referenced by the file name could be changed by an attacker, causing unexpected behavior.
User-controlled bypass of security check
server/routes/emails.js:24
server/middleware/authMiddleware.js:124
Using user-controlled data in a permissions check may allow a user to gain unauthorized access to protected functionality or data.
Remote property injection
server/utils/tokenProvider.js:166
Dynamically computing object property names from untrusted input may have multiple undesired consequences. For example, if the property access is used as part of a write, an attacker may overwrite vital properties of objects, such as proto. This attack is known as prototype pollution attack and may serve as a vehicle for denial-of-service attacks. A similar attack vector, is to replace the toString property of an object with a primitive. Whenever toString is then called on that object, either explicitly or implicitly as part of a type coercion, an exception will be raised.
security scan
Missing download info for lirantal/lockfile-lint-action@master
build error
AnalyticsService.js: Unexpected token (480:5)