Skip to content

Add SSTI, stored XSS, and SSRF vulnerability modules with Kotlin support

530d315
Select commit
Loading
Failed to load commit list.
Closed

Add SSTI, stored XSS, and SSRF vulnerability modules with Kotlin support #2

Add SSTI, stored XSS, and SSRF vulnerability modules with Kotlin support
530d315
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / OpenTaint failed Mar 31, 2026 in 4s

7 new alerts including 7 errors

New alerts in code changed by this pull request

  • 7 errors

See annotations below for details.

View all branch alerts.

Annotations

Check failure on line 29 in src/main/java/org/seqra/spring/content/MarketingTemplateService.java

See this annotation in the file changed.

Code scanning / OpenTaint

Unvalidated user data flows into template engine Error

Potential template injection: unvalidated user data flows into template engine

Check failure on line 28 in src/main/java/org/seqra/spring/content/NotificationTemplateService.java

See this annotation in the file changed.

Code scanning / OpenTaint

Unvalidated user data flows into template engine Error

Potential template injection: unvalidated user data flows into template engine

Check failure on line 30 in src/main/java/org/seqra/spring/content/TemplateRenderingService.java

See this annotation in the file changed.

Code scanning / OpenTaint

Unvalidated user data flows into template engine Error

Potential template injection: unvalidated user data flows into template engine

Check failure on line 59 in src/main/java/org/seqra/spring/messaging/MessageController.java

See this annotation in the file changed.

Code scanning / OpenTaint

Potential cross-site scripting (XSS) Error

Potential XSS: writing user input directly to a web page.

Check failure on line 98 in src/main/java/org/seqra/spring/messaging/MessageController.java

See this annotation in the file changed.

Code scanning / OpenTaint

Potential cross-site scripting (XSS) Error

Potential XSS: writing user input directly to a web page.

Check failure on line 133 in src/main/java/org/seqra/spring/messaging/MessageController.java

See this annotation in the file changed.

Code scanning / OpenTaint

Potential cross-site scripting (XSS) Error

Potential XSS: writing user input directly to a web page.

Check failure on line 33 in src/main/kotlin/org/seqra/spring/proxy/UrlFetchService.kt

See this annotation in the file changed.

Code scanning / OpenTaint

Potential server-side request forgery (SSRF) Error

Potential SSRF: the web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, it does not sufficiently ensure that the request is being sent to the expected destination.