Skip to content

M54: On-demand diffusion runtime acquisition — one-click install from UI #103

M54: On-demand diffusion runtime acquisition — one-click install from UI

M54: On-demand diffusion runtime acquisition — one-click install from UI #103

Triggered via push March 27, 2026 21:33
Status Failure
Total duration 57s
Artifacts

ci.yml

on: push
Matrix: Go Build & Test
Python Test & Lint
12s
Python Test & Lint
Security Regression Tests
44s
Security Regression Tests
Test Count Drift Check
37s
Test Count Drift Check
Dependency Vulnerability Audit
52s
Dependency Vulnerability Audit
Documentation Validation
7s
Documentation Validation
Shell Script Lint
7s
Shell Script Lint
Validate YAML configs
8s
Validate YAML configs
Verify action & container pins
7s
Verify action & container pins
Supply Chain & SBOM Verification
32s
Supply Chain & SBOM Verification
Release Branch Hardened Gate
Release Branch Hardened Gate
Fit to window
Zoom out
Zoom in

Annotations

4 errors and 5 warnings
Python Test & Lint
Process completed with exit code 1.
Dependency Vulnerability Audit
Process completed with exit code 1.
Dependency Vulnerability Audit
requests: GHSA-gc5v-m9x4-r6x2 — ### Impact The `requests.utils.extract_zipped_paths()` utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could pre-create a malicious file that would be loaded in place of the legitimate one. ### Affected usages **Standard usage of the Requests library is not affected by this vulnerability.** Only applications that call `extract_zipped_paths()` directly are impacted. ### Remediation Upgrade to at least Requests 2.33.0, where the library now extracts files to a non-deterministic location. If developers are unable to upgrade, they can set `TMPDIR` in their environment to a directory with restricted write access.
Dependency Vulnerability Audit
pygments: GHSA-5239-wwwm-4pmq — A security flaw has been discovered in pygments up to 2.19.2. The impacted element is the function AdlLexer of the file pygments/lexers/archetype.py. The manipulation results in inefficient regular expression complexity. The attack is only possible with local access. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
Documentation Validation
test-counts.json may be stale: ~1286 tests vs documented 1141 (drift: +145)
Supply Chain & SBOM Verification
Restore cache failed: Dependencies file is not found in /home/runner/work/SecAI_OS/SecAI_OS. Supported file pattern: go.mod
Test Count Drift Check
Restore cache failed: Dependencies file is not found in /home/runner/work/SecAI_OS/SecAI_OS. Supported file pattern: go.mod
Security Regression Tests
Restore cache failed: Dependencies file is not found in /home/runner/work/SecAI_OS/SecAI_OS. Supported file pattern: go.mod
Dependency Vulnerability Audit
Restore cache failed: Dependencies file is not found in /home/runner/work/SecAI_OS/SecAI_OS. Supported file pattern: go.mod