-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
style: format code with Prettier #14
base: master
Are you sure you want to change the base?
Conversation
This commit fixes the style issues introduced in 7c5d773 according to the output from Prettier. Details: None
Here's the code health analysis summary for commits Analysis Summary
|
res.send(JSON.stringify(req.oidc.user)); | ||
app.get("/profile", requiresAuth(), (req, res) => { | ||
console.log("User accessed /profile"); | ||
res.send(JSON.stringify(req.oidc.user)); |
Check failure
Code scanning / nodejsscan
Untrusted User Input in Response will result in Reflected Cross Site Scripting Vulnerability. Error
if (!projectName || !repoLink || !entryPoint) { | ||
res.send("Invalid Request"); | ||
} | ||
console.log(projectName, repoLink, entryPoint); |
Check failure
Code scanning / CodeQL
Use of externally-controlled format string High
user-provided value
fetch(`https://api.github.com/users/${user_id}/repos`, { | ||
method: "GET", | ||
}) |
Check failure
Code scanning / CodeQL
Server-side request forgery Critical
This commit fixes the style issues introduced in 7c5d773 according to the output
from Prettier.
Details: None