Skip to content

Conversation

@mosharaf13
Copy link
Contributor

Closes #30

What happened 👀

  • Setup ci/cd

Insight 📝

  • Setup auto deployment to fly.io

Proof Of Work 📹

Screen Shot 2023-06-29 at 2 20 46 PM

@mosharaf13 mosharaf13 requested a review from a user June 29, 2023 07:23
@mosharaf13 mosharaf13 mentioned this pull request Jun 29, 2023
@github-actions
Copy link

github-actions bot commented Jun 29, 2023

1 Error
🚫 Brakeman static analysis detected issues in the code. If this is a false positive, mark it as such.

BRAKEMAN REPORT

Application path Rails version Brakeman version Started at Duration
/home/runner/work/google-scrapper-ruby/google-scrapper-ruby 7.0.1 5.4.1 2023-06-29 08:43:15 +0000 1.861099257 seconds
Checks performed
BasicAuth, BasicAuthTimingAttack, CSRFTokenForgeryCVE, ContentTag, CookieSerialization, CreateWith, CrossSiteScripting, DefaultRoutes, Deserialize, DetailedExceptions, DigestDoS, DynamicFinders, EOLRails, EOLRuby, EscapeFunction, Evaluation, Execute, FileAccess, FileDisclosure, FilterSkipping, ForgerySetting, HeaderDoS, I18nXSS, JRubyXML, JSONEncoding, JSONEntityEscape, JSONParsing, LinkTo, LinkToHref, MailTo, MassAssignment, MimeTypeDoS, ModelAttrAccessible, ModelAttributes, ModelSerialize, NestedAttributes, NestedAttributesBypass, NumberToCurrency, PageCachingCVE, Pathname, PermitAttributes, QuoteTableName, Redirect, RegexDoS, Render, RenderDoS, RenderInline, ResponseSplitting, RouteDoS, SQL, SQLCVEs, SSLVerify, SafeBufferManipulation, SanitizeConfigCve, SanitizeMethods, SelectTag, SelectVulnerability, Send, SendFile, SessionManipulation, SessionSettings, SimpleFormat, SingleQuotes, SkipBeforeFilter, SprocketsPathTraversal, StripTags, SymbolDoSCVE, TemplateInjection, TranslateBug, UnsafeReflection, UnsafeReflectionMethods, ValidationRegex, VerbConfusion, WeakRSAKey, WithoutProtection, XMLDoS, YAMLParsing

SUMMARY

Scanned/Reported Total
Controllers 4
Models 4
Templates 10
Errors 0
Security Warnings 1 (1)
Warning Type Total
Information Disclosure 1

SECURITY WARNINGS

Confidence Class Method Warning Type CWE ID Message
High Information Disclosure [200] Detailed exceptions are enabled in production

Code coverage is now at 0.00% (0/88 lines)

Generated by 🚫 Danger

@sanG-github sanG-github removed their request for review September 26, 2023 02:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants