config/brakeman.ignore in alchemy_cms-6.0.0.pre.rc2 vs config/brakeman.ignore in alchemy_cms-6.0.0.pre.rc3
- old
+ new
@@ -56,11 +56,11 @@
"warning_code": 70,
"fingerprint": "1dd8f69d9b1bdd4017212f38098f03d2ecb2db06269fb940090f209eee7570c6",
"check_name": "MassAssignment",
"message": "Specify exact keys allowed for mass assignment instead of using `permit!` which allows any keys",
"file": "app/controllers/alchemy/admin/resources_controller.rb",
- "line": 136,
+ "line": 209,
"link": "https://brakemanscanner.org/docs/warning_types/mass_assignment/",
"code": "params.require(resource_handler.namespaced_resource_name).permit!",
"render_path": null,
"location": {
"type": "method",
@@ -84,11 +84,11 @@
"render_path": [
{
"type": "controller",
"class": "Alchemy::Admin::ElementsController",
"method": "fold",
- "line": 97,
+ "line": 102,
"file": "app/controllers/alchemy/admin/elements_controller.rb",
"rendered": {
"name": "alchemy/admin/elements/fold",
"file": "app/views/alchemy/admin/elements/fold.js.erb"
}
@@ -107,11 +107,11 @@
"warning_code": 70,
"fingerprint": "4b4dc24a6f5251bc1a6851597dfcee39608a2932eb7f81a4a241c00fca8a3043",
"check_name": "MassAssignment",
"message": "Specify exact keys allowed for mass assignment instead of using `permit!` which allows any keys",
"file": "app/controllers/alchemy/admin/elements_controller.rb",
- "line": 150,
+ "line": 155,
"link": "https://brakemanscanner.org/docs/warning_types/mass_assignment/",
"code": "params.fetch(:contents, {}).permit!",
"render_path": null,
"location": {
"type": "method",
@@ -121,10 +121,30 @@
"user_input": null,
"confidence": "Medium",
"note": "`Alchemy::Content` is a polymorphic association of any kind of model extending `Alchemy::Essence`. Since we can't know the attributes of all potential essences we need to permit all attributes. As this all happens inside the password protected /admin namespace this can be considered a false positive."
},
{
+ "warning_type": "Command Injection",
+ "warning_code": 14,
+ "fingerprint": "6addfcb9d23d2d6f699f2f3542169744ff749dc4d0a97f8ac783ab92593e1d84",
+ "check_name": "Execute",
+ "message": "Possible command injection",
+ "file": "lib/alchemy/upgrader.rb",
+ "line": 30,
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
+ "code": "`yarn add @alchemy_cms/admin@~#{Alchemy.version}`",
+ "render_path": null,
+ "location": {
+ "type": "method",
+ "class": "Alchemy::Upgrader",
+ "method": "update_npm_package"
+ },
+ "user_input": "Alchemy.version",
+ "confidence": "Medium",
+ "note": "The alchemy version is safe"
+ },
+ {
"warning_type": "Cross-Site Scripting",
"warning_code": 4,
"fingerprint": "6e6ed4f8b20c07868bc04a4dc419103ecce33bb514eff77790abd57246a4513f",
"check_name": "LinkToHref",
"message": "Potentially unsafe model attribute in `link_to` href",
@@ -253,8 +273,8 @@
"user_input": "params[:id]",
"confidence": "Weak",
"note": ""
}
],
- "updated": "2021-06-29 20:56:10 +0200",
- "brakeman_version": "5.0.1"
+ "updated": "2021-10-26 21:44:59 +0200",
+ "brakeman_version": "5.1.1"
}