Skip to content

Potential fix for pull request finding 'Unused variable, import, func…

caa18eb
Select commit
Loading
Failed to load commit list.
Merged

Add master.sh one-shot bootstrap script for full-stack project scaffolding #31

Potential fix for pull request finding 'Unused variable, import, func…
caa18eb
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / Semgrep OSS failed Jan 28, 2026 in 6s

93 new alerts including 2 errors

New alerts in code changed by this pull request

  • 2 errors
  • 79 warnings
  • 12 notes

Alerts not introduced by this pull request might have been detected because the code changes were too large.

See annotations below for details.

View all branch alerts.

Annotations

Check failure on line 155 in security/encryption/kms.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.node-crypto.security.gcm-no-tag-length.gcm-no-tag-length Error

The call to 'createDecipheriv' with the Galois Counter Mode (GCM) mode of operation is missing an expected authentication tag length. If the expected authentication tag length is not specified or otherwise checked, the application might be tricked into verifying a shorter-than-expected authentication tag. This can be abused by an attacker to spoof ciphertexts or recover the implicit authentication key of GCM, allowing arbitrary forgeries.

Check failure on line 16 in server/package-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.detect-child-process.detect-child-process Error

Detected calls to child_process from a function argument command. This could lead to a command injection if the input is user controllable. Try to avoid calls to child_process, and if it is needed ensure user input is correctly sanitized or sandboxed.

Check warning on line 166 in server/package-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.express.security.audit.express-path-join-resolve-traversal.express-path-join-resolve-traversal Warning

Possible writing outside of the destination, make sure that the target path is nested in the intended destination

Check warning on line 151 in server/package-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 151 in server/package-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.express.security.audit.express-path-join-resolve-traversal.express-path-join-resolve-traversal Warning

Possible writing outside of the destination, make sure that the target path is nested in the intended destination

Check warning on line 129 in server/package-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 129 in server/package-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.express.security.audit.express-path-join-resolve-traversal.express-path-join-resolve-traversal Warning

Possible writing outside of the destination, make sure that the target path is nested in the intended destination

Check warning on line 107 in server/package-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 107 in server/package-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.express.security.audit.express-path-join-resolve-traversal.express-path-join-resolve-traversal Warning

Possible writing outside of the destination, make sure that the target path is nested in the intended destination

Check warning on line 92 in server/package-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 92 in server/package-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.express.security.audit.express-path-join-resolve-traversal.express-path-join-resolve-traversal Warning

Possible writing outside of the destination, make sure that the target path is nested in the intended destination

Check warning on line 70 in server/package-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 70 in server/package-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.express.security.audit.express-path-join-resolve-traversal.express-path-join-resolve-traversal Warning

Possible writing outside of the destination, make sure that the target path is nested in the intended destination

Check warning on line 47 in server/package-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 47 in server/package-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.express.security.audit.express-path-join-resolve-traversal.express-path-join-resolve-traversal Warning

Possible writing outside of the destination, make sure that the target path is nested in the intended destination

Check warning on line 160 in server/git-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 160 in server/git-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.express.security.audit.express-path-join-resolve-traversal.express-path-join-resolve-traversal Warning

Possible writing outside of the destination, make sure that the target path is nested in the intended destination

Check warning on line 145 in server/git-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 145 in server/git-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.express.security.audit.express-path-join-resolve-traversal.express-path-join-resolve-traversal Warning

Possible writing outside of the destination, make sure that the target path is nested in the intended destination

Check warning on line 130 in server/git-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 130 in server/git-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.express.security.audit.express-path-join-resolve-traversal.express-path-join-resolve-traversal Warning

Possible writing outside of the destination, make sure that the target path is nested in the intended destination

Check warning on line 115 in server/git-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 115 in server/git-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.express.security.audit.express-path-join-resolve-traversal.express-path-join-resolve-traversal Warning

Possible writing outside of the destination, make sure that the target path is nested in the intended destination

Check warning on line 100 in server/git-api.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 136 in server/preview-server.ts

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.