neeto-compliance 1.0.58
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.editorconfig +10 -0
- data/.husky/helpers/verify_neeto_audit.sh +18 -0
- data/.husky/pre-push +7 -0
- data/.neetoci/neetoci.yml +18 -0
- data/.overcommit.yml +47 -0
- data/.rubocop.yml +596 -0
- data/.ruby-version +1 -0
- data/.semaphore/semaphore.yml +33 -0
- data/CHANGELOG.md +375 -0
- data/Gemfile +36 -0
- data/Gemfile.lock +435 -0
- data/README.md +85 -0
- data/Rakefile +12 -0
- data/bin/console +15 -0
- data/bin/neeto-audit +11 -0
- data/bin/neeto_repos_verifier/client_config.json +7 -0
- data/bin/neeto_repos_verifier/list_verifier.rb +93 -0
- data/bin/setup +8 -0
- data/bin/sync-neeto-repos +5 -0
- data/bin/sync-with-neeto-commons +5 -0
- data/config/brakeman.ignore +604 -0
- data/data/neeto_repos.json +295 -0
- data/lib/neeto-compliance.rb +21 -0
- data/lib/neeto_compliance/github_access.rb +29 -0
- data/lib/neeto_compliance/neeto_commons.rb +16 -0
- data/lib/neeto_compliance/neeto_repos.rb +59 -0
- data/lib/neeto_compliance/runner.rb +43 -0
- data/lib/neeto_compliance/skippable.rb +19 -0
- data/lib/neeto_compliance/sync_neeto_commons/sync_bin.rb +32 -0
- data/lib/neeto_compliance/sync_neeto_commons/sync_formatters.rb +28 -0
- data/lib/neeto_compliance/sync_neeto_commons/sync_husky.rb +33 -0
- data/lib/neeto_compliance/sync_neeto_commons/sync_misc.rb +36 -0
- data/lib/neeto_compliance/sync_neeto_commons/sync_test_support.rb +38 -0
- data/lib/neeto_compliance/sync_neeto_commons.rb +36 -0
- data/lib/neeto_compliance/verifiers/auto_update_prs_with_latest_master_verifier.rb +25 -0
- data/lib/neeto_compliance/verifiers/base.rb +77 -0
- data/lib/neeto_compliance/verifiers/bump_version_with_pr_label_verifier.rb +25 -0
- data/lib/neeto_compliance/verifiers/bundler_version_verifier.rb +48 -0
- data/lib/neeto_compliance/verifiers/circleci_config_verifier.rb +25 -0
- data/lib/neeto_compliance/verifiers/common_gemfile_verifier.rb +25 -0
- data/lib/neeto_compliance/verifiers/common_initializers_verifier.rb +25 -0
- data/lib/neeto_compliance/verifiers/cypress_config_verifier.rb +46 -0
- data/lib/neeto_compliance/verifiers/cypress_plugins_index_verifier.rb +25 -0
- data/lib/neeto_compliance/verifiers/docker_file_dev_verifier.rb +25 -0
- data/lib/neeto_compliance/verifiers/environment_config_verifier.rb +38 -0
- data/lib/neeto_compliance/verifiers/gem_version_verifier.rb +33 -0
- data/lib/neeto_compliance/verifiers/gems_verifier_base.rb +44 -0
- data/lib/neeto_compliance/verifiers/gitignore_file_verifier.rb +37 -0
- data/lib/neeto_compliance/verifiers/jsconfig_verifier.rb +187 -0
- data/lib/neeto_compliance/verifiers/neeto_commons_sync_verifier.rb +42 -0
- data/lib/neeto_compliance/verifiers/neeto_gems_version_verifier.rb +36 -0
- data/lib/neeto_compliance/verifiers/newrelic_verifier.rb +25 -0
- data/lib/neeto_compliance/verifiers/node_version_verifier.rb +84 -0
- data/lib/neeto_compliance/verifiers/package_dependencies_version_verifier.rb +59 -0
- data/lib/neeto_compliance/verifiers/package_json_verifier.rb +46 -0
- data/lib/neeto_compliance/verifiers/roles_verifier.rb +22 -0
- data/lib/neeto_compliance/verifiers/ruby_version_verifier.rb +25 -0
- data/lib/neeto_compliance/verifiers/semaphoreci_config_verifier.rb +74 -0
- data/lib/neeto_compliance/verifiers/sidekiq_queues_verifier.rb +36 -0
- data/lib/neeto_compliance/verifiers/simplecov_config_verifier.rb +29 -0
- data/lib/neeto_compliance/verifiers/sitemap_config_verifier.rb +29 -0
- data/lib/neeto_compliance/verifiers/slugignore_file_verifier.rb +25 -0
- data/lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/bin_files_verifier.rb +29 -0
- data/lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/formatter_files_verifier.rb +29 -0
- data/lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/husky_files_verifier.rb +29 -0
- data/lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/misc_files_verifier.rb +29 -0
- data/lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/test_support_files_verifier.rb +28 -0
- data/lib/neeto_compliance/verifiers/sync_neeto_commons_verifier.rb +31 -0
- data/lib/neeto_compliance/verifiers/webpacker_config_verifier.rb +32 -0
- data/lib/neeto_compliance/verifiers_list.rb +55 -0
- data/lib/neeto_compliance/version.rb +5 -0
- data/neeto-compliance.gemspec +35 -0
- data/package.json +9 -0
- data/yarn.lock +8 -0
- metadata +177 -0
@@ -0,0 +1,604 @@
|
|
1
|
+
{
|
2
|
+
"ignored_warnings": [
|
3
|
+
{
|
4
|
+
"warning_type": "Command Injection",
|
5
|
+
"warning_code": 14,
|
6
|
+
"fingerprint": "0a0e15f9dafcf95f8eb3f73cff6f4d101b1775476d4fbd16c512385cdace28b2",
|
7
|
+
"check_name": "Execute",
|
8
|
+
"message": "Possible command injection",
|
9
|
+
"file": "lib/neeto_compliance/verifiers/common_initializers_verifier.rb",
|
10
|
+
"line": 18,
|
11
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
12
|
+
"code": "`#{verify_command}`",
|
13
|
+
"render_path": null,
|
14
|
+
"location": {
|
15
|
+
"type": "method",
|
16
|
+
"class": "NeetoCompliance::CommonInitializersVerifier",
|
17
|
+
"method": "valid?"
|
18
|
+
},
|
19
|
+
"user_input": "verify_command",
|
20
|
+
"confidence": "Medium",
|
21
|
+
"cwe_id": [
|
22
|
+
77
|
23
|
+
],
|
24
|
+
"note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
|
25
|
+
},
|
26
|
+
{
|
27
|
+
"warning_type": "Command Injection",
|
28
|
+
"warning_code": 14,
|
29
|
+
"fingerprint": "1544155a02dec97b194b2faeb6b73badf6c0b3f9fc2062d720b536a2da0df02c",
|
30
|
+
"check_name": "Execute",
|
31
|
+
"message": "Possible command injection",
|
32
|
+
"file": "lib/neeto_compliance/verifiers/circleci_config_verifier.rb",
|
33
|
+
"line": 18,
|
34
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
35
|
+
"code": "`#{verify_command}`",
|
36
|
+
"render_path": null,
|
37
|
+
"location": {
|
38
|
+
"type": "method",
|
39
|
+
"class": "NeetoCompliance::CircleciConfigVerifier",
|
40
|
+
"method": "valid?"
|
41
|
+
},
|
42
|
+
"user_input": "verify_command",
|
43
|
+
"confidence": "Medium",
|
44
|
+
"cwe_id": [
|
45
|
+
77
|
46
|
+
],
|
47
|
+
"note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
|
48
|
+
},
|
49
|
+
{
|
50
|
+
"warning_type": "Command Injection",
|
51
|
+
"warning_code": 14,
|
52
|
+
"fingerprint": "179c9da0ad088b607b422758a414d8529b6e96ca8c8d6a60e41aee7d64cebde2",
|
53
|
+
"check_name": "Execute",
|
54
|
+
"message": "Possible command injection",
|
55
|
+
"file": "lib/neeto_compliance/verifiers/sitemap_config_verifier.rb",
|
56
|
+
"line": 18,
|
57
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
58
|
+
"code": "`#{verify_command}`",
|
59
|
+
"render_path": null,
|
60
|
+
"location": {
|
61
|
+
"type": "method",
|
62
|
+
"class": "NeetoCompliance::SitemapConfigVerifier",
|
63
|
+
"method": "valid?"
|
64
|
+
},
|
65
|
+
"user_input": "verify_command",
|
66
|
+
"confidence": "Medium",
|
67
|
+
"cwe_id": [
|
68
|
+
77
|
69
|
+
],
|
70
|
+
"note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
|
71
|
+
},
|
72
|
+
{
|
73
|
+
"warning_type": "Command Injection",
|
74
|
+
"warning_code": 14,
|
75
|
+
"fingerprint": "1b24328b139588437cad24c263d3bfe4995f7613b56898fa99a65457b1010cda",
|
76
|
+
"check_name": "Execute",
|
77
|
+
"message": "Possible command injection",
|
78
|
+
"file": "lib/neeto_compliance/sync_neeto_commons/sync_formatters.rb",
|
79
|
+
"line": 23,
|
80
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
81
|
+
"code": "`cp #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} #{file}`",
|
82
|
+
"render_path": null,
|
83
|
+
"location": {
|
84
|
+
"type": "method",
|
85
|
+
"class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommons::SyncFormatters",
|
86
|
+
"method": "s(:self).process"
|
87
|
+
},
|
88
|
+
"user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
|
89
|
+
"confidence": "Medium",
|
90
|
+
"cwe_id": [
|
91
|
+
77
|
92
|
+
],
|
93
|
+
"note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
|
94
|
+
},
|
95
|
+
{
|
96
|
+
"warning_type": "Command Injection",
|
97
|
+
"warning_code": 14,
|
98
|
+
"fingerprint": "3d5197ecbde2765e5614d2a71193ad38c63ab547b4eea083c0842e751b4159db",
|
99
|
+
"check_name": "Execute",
|
100
|
+
"message": "Possible command injection",
|
101
|
+
"file": "lib/neeto_compliance/sync_neeto_commons/sync_husky.rb",
|
102
|
+
"line": 27,
|
103
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
104
|
+
"code": "`cp #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} #{file}`",
|
105
|
+
"render_path": null,
|
106
|
+
"location": {
|
107
|
+
"type": "method",
|
108
|
+
"class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommons::SyncHusky",
|
109
|
+
"method": "s(:self).sync_with_husky_files_in_neeto_commons"
|
110
|
+
},
|
111
|
+
"user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
|
112
|
+
"confidence": "Medium",
|
113
|
+
"cwe_id": [
|
114
|
+
77
|
115
|
+
],
|
116
|
+
"note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
|
117
|
+
},
|
118
|
+
{
|
119
|
+
"warning_type": "Command Injection",
|
120
|
+
"warning_code": 14,
|
121
|
+
"fingerprint": "42d21dd51ae4cb0fe2d24767b76122ee51e665ba304c14cf6de8e2db2730b538",
|
122
|
+
"check_name": "Execute",
|
123
|
+
"message": "Possible command injection",
|
124
|
+
"file": "lib/neeto_compliance/verifiers/webpacker_config_verifier.rb",
|
125
|
+
"line": 14,
|
126
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
127
|
+
"code": "`diff #{commons_copy} #{local_copy} | grep '<'`",
|
128
|
+
"render_path": null,
|
129
|
+
"location": {
|
130
|
+
"type": "method",
|
131
|
+
"class": "NeetoCompliance::WebpackerConfigVerifier",
|
132
|
+
"method": "compare_files"
|
133
|
+
},
|
134
|
+
"user_input": "commons_copy",
|
135
|
+
"confidence": "Medium",
|
136
|
+
"cwe_id": [
|
137
|
+
77
|
138
|
+
],
|
139
|
+
"note": "Both local_copy and commons_copy are defined in the backend."
|
140
|
+
},
|
141
|
+
{
|
142
|
+
"warning_type": "Command Injection",
|
143
|
+
"warning_code": 14,
|
144
|
+
"fingerprint": "569c8874183a7e43dcb77f555b6574045b733e640d7950a45951f392f8a82955",
|
145
|
+
"check_name": "Execute",
|
146
|
+
"message": "Possible command injection",
|
147
|
+
"file": "lib/neeto_compliance/verifiers/cypress_plugins_index_verifier.rb",
|
148
|
+
"line": 18,
|
149
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
150
|
+
"code": "`#{verify_command}`",
|
151
|
+
"render_path": null,
|
152
|
+
"location": {
|
153
|
+
"type": "method",
|
154
|
+
"class": "NeetoCompliance::CypressPluginsIndexVerifier",
|
155
|
+
"method": "valid?"
|
156
|
+
},
|
157
|
+
"user_input": "verify_command",
|
158
|
+
"confidence": "Medium",
|
159
|
+
"cwe_id": [
|
160
|
+
77
|
161
|
+
],
|
162
|
+
"note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
|
163
|
+
},
|
164
|
+
{
|
165
|
+
"warning_type": "Command Injection",
|
166
|
+
"warning_code": 14,
|
167
|
+
"fingerprint": "56d0797e3a02d51297989fdef6166d102244d8baeeeaf9603cf87674bce2fddb",
|
168
|
+
"check_name": "Execute",
|
169
|
+
"message": "Possible command injection",
|
170
|
+
"file": "lib/neeto_compliance/verifiers/neeto_commons_sync_verifier.rb",
|
171
|
+
"line": 39,
|
172
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
173
|
+
"code": "`diff #{local_file} #{common_file.to_s}`",
|
174
|
+
"render_path": null,
|
175
|
+
"location": {
|
176
|
+
"type": "method",
|
177
|
+
"class": "NeetoCompliance::NeetoCommonsSyncVerifier",
|
178
|
+
"method": "same_file?"
|
179
|
+
},
|
180
|
+
"user_input": "local_file",
|
181
|
+
"confidence": "Medium",
|
182
|
+
"cwe_id": [
|
183
|
+
77
|
184
|
+
],
|
185
|
+
"note": "Both local_file and common_file are defined in the backend."
|
186
|
+
},
|
187
|
+
{
|
188
|
+
"warning_type": "Command Injection",
|
189
|
+
"warning_code": 14,
|
190
|
+
"fingerprint": "5a24cb0a1817fea1f9ffbe004f7b95e738727fede385d34d06023c4fbc219e93",
|
191
|
+
"check_name": "Execute",
|
192
|
+
"message": "Possible command injection",
|
193
|
+
"file": "lib/neeto_compliance/verifiers/cypress_config_verifier.rb",
|
194
|
+
"line": 43,
|
195
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
196
|
+
"code": "`diff #{local_file} #{common_file.to_s}`",
|
197
|
+
"render_path": null,
|
198
|
+
"location": {
|
199
|
+
"type": "method",
|
200
|
+
"class": "NeetoCompliance::CypressConfigVerifier",
|
201
|
+
"method": "same_file?"
|
202
|
+
},
|
203
|
+
"user_input": "local_file",
|
204
|
+
"confidence": "Medium",
|
205
|
+
"cwe_id": [
|
206
|
+
77
|
207
|
+
],
|
208
|
+
"note": "local_file is defined in the backend"
|
209
|
+
},
|
210
|
+
{
|
211
|
+
"warning_type": "Command Injection",
|
212
|
+
"warning_code": 14,
|
213
|
+
"fingerprint": "5d7af3ca27abd6d522cc0375ffe4ebdc9234b5878c1d4e0555e97af849ef94e5",
|
214
|
+
"check_name": "Execute",
|
215
|
+
"message": "Possible command injection",
|
216
|
+
"file": "lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/misc_files_verifier.rb",
|
217
|
+
"line": 24,
|
218
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
219
|
+
"code": "system(\"cat #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} | diff #{file} - 1> /dev/null\")",
|
220
|
+
"render_path": null,
|
221
|
+
"location": {
|
222
|
+
"type": "method",
|
223
|
+
"class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommonsVerifier::MiscFilesVerifier",
|
224
|
+
"method": "find_non_complied_misc_files"
|
225
|
+
},
|
226
|
+
"user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
|
227
|
+
"confidence": "Medium",
|
228
|
+
"cwe_id": [
|
229
|
+
77
|
230
|
+
],
|
231
|
+
"note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
|
232
|
+
},
|
233
|
+
{
|
234
|
+
"warning_type": "Command Injection",
|
235
|
+
"warning_code": 14,
|
236
|
+
"fingerprint": "607f1ee1b1f5e61cefa7b30720c213ee4849d5e149720a6896894192a7d7ca00",
|
237
|
+
"check_name": "Execute",
|
238
|
+
"message": "Possible command injection",
|
239
|
+
"file": "lib/neeto_compliance/sync_neeto_commons/sync_husky.rb",
|
240
|
+
"line": 28,
|
241
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
242
|
+
"code": "system(\"chmod +x #{file}\")",
|
243
|
+
"render_path": null,
|
244
|
+
"location": {
|
245
|
+
"type": "method",
|
246
|
+
"class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommons::SyncHusky",
|
247
|
+
"method": "s(:self).sync_with_husky_files_in_neeto_commons"
|
248
|
+
},
|
249
|
+
"user_input": "file",
|
250
|
+
"confidence": "Medium",
|
251
|
+
"cwe_id": [
|
252
|
+
77
|
253
|
+
],
|
254
|
+
"note": "file mentioned here is the files from HUSKY_FILES, defined in backend."
|
255
|
+
},
|
256
|
+
{
|
257
|
+
"warning_type": "Command Injection",
|
258
|
+
"warning_code": 14,
|
259
|
+
"fingerprint": "6b624991d4078d8793f2fcf605ae6c3747fd81d281388526fc24bc7b4fac55a7",
|
260
|
+
"check_name": "Execute",
|
261
|
+
"message": "Possible command injection",
|
262
|
+
"file": "lib/neeto_compliance/verifiers/slugignore_file_verifier.rb",
|
263
|
+
"line": 18,
|
264
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
265
|
+
"code": "`#{verify_command}`",
|
266
|
+
"render_path": null,
|
267
|
+
"location": {
|
268
|
+
"type": "method",
|
269
|
+
"class": "NeetoCompliance::SlugignoreFileVerifier",
|
270
|
+
"method": "valid?"
|
271
|
+
},
|
272
|
+
"user_input": "verify_command",
|
273
|
+
"confidence": "Medium",
|
274
|
+
"cwe_id": [
|
275
|
+
77
|
276
|
+
],
|
277
|
+
"note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
|
278
|
+
},
|
279
|
+
{
|
280
|
+
"warning_type": "Command Injection",
|
281
|
+
"warning_code": 14,
|
282
|
+
"fingerprint": "71370e09dd25546b1273e3e6a3c8e65ab2e0bdd4ba0d1c107c0fcac6ec541399",
|
283
|
+
"check_name": "Execute",
|
284
|
+
"message": "Possible command injection",
|
285
|
+
"file": "lib/neeto_compliance/verifiers/newrelic_verifier.rb",
|
286
|
+
"line": 18,
|
287
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
288
|
+
"code": "`#{verify_command}`",
|
289
|
+
"render_path": null,
|
290
|
+
"location": {
|
291
|
+
"type": "method",
|
292
|
+
"class": "NeetoCompliance::NewrelicVerifier",
|
293
|
+
"method": "valid?"
|
294
|
+
},
|
295
|
+
"user_input": "verify_command",
|
296
|
+
"confidence": "Medium",
|
297
|
+
"cwe_id": [
|
298
|
+
77
|
299
|
+
],
|
300
|
+
"note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
|
301
|
+
},
|
302
|
+
{
|
303
|
+
"warning_type": "Command Injection",
|
304
|
+
"warning_code": 14,
|
305
|
+
"fingerprint": "7a6c37477ef89cb8863e4e5e142fb99d59ed9103c3215e6279049c919f0f0209",
|
306
|
+
"check_name": "Execute",
|
307
|
+
"message": "Possible command injection",
|
308
|
+
"file": "lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/test_support_files_verifier.rb",
|
309
|
+
"line": 23,
|
310
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
311
|
+
"code": "system(\"cat #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} | diff #{file} - 1> /dev/null\")",
|
312
|
+
"render_path": null,
|
313
|
+
"location": {
|
314
|
+
"type": "method",
|
315
|
+
"class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommonsVerifier::TestSupportFilesVerifier",
|
316
|
+
"method": "non_complied_test_support_files"
|
317
|
+
},
|
318
|
+
"user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
|
319
|
+
"confidence": "Medium",
|
320
|
+
"cwe_id": [
|
321
|
+
77
|
322
|
+
],
|
323
|
+
"note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
|
324
|
+
},
|
325
|
+
{
|
326
|
+
"warning_type": "Command Injection",
|
327
|
+
"warning_code": 14,
|
328
|
+
"fingerprint": "aba6ca1a7652fe8643697e3af4b4e43f834375f1101d84ce1e017dec5c4c3cf6",
|
329
|
+
"check_name": "Execute",
|
330
|
+
"message": "Possible command injection",
|
331
|
+
"file": "lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/bin_files_verifier.rb",
|
332
|
+
"line": 24,
|
333
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
334
|
+
"code": "system(\"cat #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} | diff #{file} - 1> /dev/null\")",
|
335
|
+
"render_path": null,
|
336
|
+
"location": {
|
337
|
+
"type": "method",
|
338
|
+
"class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommonsVerifier::BinFilesVerifier",
|
339
|
+
"method": "find_non_complied_bin_files"
|
340
|
+
},
|
341
|
+
"user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
|
342
|
+
"confidence": "Medium",
|
343
|
+
"cwe_id": [
|
344
|
+
77
|
345
|
+
],
|
346
|
+
"note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
|
347
|
+
},
|
348
|
+
{
|
349
|
+
"warning_type": "Command Injection",
|
350
|
+
"warning_code": 14,
|
351
|
+
"fingerprint": "abab3d09b40b36e3b9f387cbf7c344ba94acdee14986046cf64d752577d4af4a",
|
352
|
+
"check_name": "Execute",
|
353
|
+
"message": "Possible command injection",
|
354
|
+
"file": "lib/neeto_compliance/verifiers/bump_version_with_pr_label_verifier.rb",
|
355
|
+
"line": 18,
|
356
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
357
|
+
"code": "`#{verify_command}`",
|
358
|
+
"render_path": null,
|
359
|
+
"location": {
|
360
|
+
"type": "method",
|
361
|
+
"class": "NeetoCompliance::BumpVersionWithPrLabelVerifier",
|
362
|
+
"method": "valid?"
|
363
|
+
},
|
364
|
+
"user_input": "verify_command",
|
365
|
+
"confidence": "Medium",
|
366
|
+
"cwe_id": [
|
367
|
+
77
|
368
|
+
],
|
369
|
+
"note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
|
370
|
+
},
|
371
|
+
{
|
372
|
+
"warning_type": "Command Injection",
|
373
|
+
"warning_code": 14,
|
374
|
+
"fingerprint": "add17d8f75504153921279b16facfec7c5ea6fa355d8c3cad83bac953281ad22",
|
375
|
+
"check_name": "Execute",
|
376
|
+
"message": "Possible command injection",
|
377
|
+
"file": "lib/neeto_compliance/sync_neeto_commons/sync_test_support.rb",
|
378
|
+
"line": 33,
|
379
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
380
|
+
"code": "`cp #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} #{file}`",
|
381
|
+
"render_path": null,
|
382
|
+
"location": {
|
383
|
+
"type": "method",
|
384
|
+
"class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommons::SyncTestSupport",
|
385
|
+
"method": "s(:self).sync_support_files"
|
386
|
+
},
|
387
|
+
"user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
|
388
|
+
"confidence": "Medium",
|
389
|
+
"cwe_id": [
|
390
|
+
77
|
391
|
+
],
|
392
|
+
"note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
|
393
|
+
},
|
394
|
+
{
|
395
|
+
"warning_type": "Command Injection",
|
396
|
+
"warning_code": 14,
|
397
|
+
"fingerprint": "b096054fa4b1a017055a1d4eec3f7ac49e9c3b8eb80f089c897c9158fc6c3569",
|
398
|
+
"check_name": "Execute",
|
399
|
+
"message": "Possible command injection",
|
400
|
+
"file": "lib/neeto_compliance/sync_neeto_commons/sync_bin.rb",
|
401
|
+
"line": 27,
|
402
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
403
|
+
"code": "`cp #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} #{file}`",
|
404
|
+
"render_path": null,
|
405
|
+
"location": {
|
406
|
+
"type": "method",
|
407
|
+
"class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommons::SyncBin",
|
408
|
+
"method": "s(:self).sync_bin_files"
|
409
|
+
},
|
410
|
+
"user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
|
411
|
+
"confidence": "Medium",
|
412
|
+
"cwe_id": [
|
413
|
+
77
|
414
|
+
],
|
415
|
+
"note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
|
416
|
+
},
|
417
|
+
{
|
418
|
+
"warning_type": "Command Injection",
|
419
|
+
"warning_code": 14,
|
420
|
+
"fingerprint": "bcaeb36f4a16f121785192f5b526fedb2e38f307d2623364dff71cfaea094696",
|
421
|
+
"check_name": "Execute",
|
422
|
+
"message": "Possible command injection",
|
423
|
+
"file": "lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/formatter_files_verifier.rb",
|
424
|
+
"line": 24,
|
425
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
426
|
+
"code": "system(\"cat #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} | diff #{file} - 1> /dev/null\")",
|
427
|
+
"render_path": null,
|
428
|
+
"location": {
|
429
|
+
"type": "method",
|
430
|
+
"class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommonsVerifier::FormatterFilesVerifier",
|
431
|
+
"method": "find_non_complied_formatter_files"
|
432
|
+
},
|
433
|
+
"user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
|
434
|
+
"confidence": "Medium",
|
435
|
+
"cwe_id": [
|
436
|
+
77
|
437
|
+
],
|
438
|
+
"note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
|
439
|
+
},
|
440
|
+
{
|
441
|
+
"warning_type": "Command Injection",
|
442
|
+
"warning_code": 14,
|
443
|
+
"fingerprint": "c96b160c649d9a8753933a7be5c8741b525bfb2e1844d8bbb4f40fb8412834c4",
|
444
|
+
"check_name": "Execute",
|
445
|
+
"message": "Possible command injection",
|
446
|
+
"file": "lib/neeto_compliance/verifiers/common_gemfile_verifier.rb",
|
447
|
+
"line": 18,
|
448
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
449
|
+
"code": "`#{verify_command}`",
|
450
|
+
"render_path": null,
|
451
|
+
"location": {
|
452
|
+
"type": "method",
|
453
|
+
"class": "NeetoCompliance::CommonGemfileVerifier",
|
454
|
+
"method": "valid?"
|
455
|
+
},
|
456
|
+
"user_input": "verify_command",
|
457
|
+
"confidence": "Medium",
|
458
|
+
"cwe_id": [
|
459
|
+
77
|
460
|
+
],
|
461
|
+
"note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
|
462
|
+
},
|
463
|
+
{
|
464
|
+
"warning_type": "Command Injection",
|
465
|
+
"warning_code": 14,
|
466
|
+
"fingerprint": "cd1faeb9312eb4f92f8840a47943b1945b7d8ac02a7a556dfd977e7192cbd9a2",
|
467
|
+
"check_name": "Execute",
|
468
|
+
"message": "Possible command injection",
|
469
|
+
"file": "lib/neeto_compliance/verifiers/auto_update_prs_with_latest_master_verifier.rb",
|
470
|
+
"line": 18,
|
471
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
472
|
+
"code": "`#{verify_command}`",
|
473
|
+
"render_path": null,
|
474
|
+
"location": {
|
475
|
+
"type": "method",
|
476
|
+
"class": "NeetoCompliance::AutoUpdatePrsWithLatestMasterVerifier",
|
477
|
+
"method": "valid?"
|
478
|
+
},
|
479
|
+
"user_input": "verify_command",
|
480
|
+
"confidence": "Medium",
|
481
|
+
"cwe_id": [
|
482
|
+
77
|
483
|
+
],
|
484
|
+
"note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
|
485
|
+
},
|
486
|
+
{
|
487
|
+
"warning_type": "Command Injection",
|
488
|
+
"warning_code": 14,
|
489
|
+
"fingerprint": "cd549bd21917fa5191058d64894de2e28e6c9657f1c3a77c7da9f58ef0994d55",
|
490
|
+
"check_name": "Execute",
|
491
|
+
"message": "Possible command injection",
|
492
|
+
"file": "lib/neeto_compliance/verifiers/ruby_version_verifier.rb",
|
493
|
+
"line": 18,
|
494
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
495
|
+
"code": "`#{verify_command}`",
|
496
|
+
"render_path": null,
|
497
|
+
"location": {
|
498
|
+
"type": "method",
|
499
|
+
"class": "NeetoCompliance::RubyVersionVerifier",
|
500
|
+
"method": "valid?"
|
501
|
+
},
|
502
|
+
"user_input": "verify_command",
|
503
|
+
"confidence": "Medium",
|
504
|
+
"cwe_id": [
|
505
|
+
77
|
506
|
+
],
|
507
|
+
"note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
|
508
|
+
},
|
509
|
+
{
|
510
|
+
"warning_type": "Command Injection",
|
511
|
+
"warning_code": 14,
|
512
|
+
"fingerprint": "dae89b5d2512acd50f9590a5b86f48c319dd143036bdecbcc25e22163de5f8c1",
|
513
|
+
"check_name": "Execute",
|
514
|
+
"message": "Possible command injection",
|
515
|
+
"file": "lib/neeto_compliance/verifiers/docker_file_dev_verifier.rb",
|
516
|
+
"line": 18,
|
517
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
518
|
+
"code": "`#{verify_command}`",
|
519
|
+
"render_path": null,
|
520
|
+
"location": {
|
521
|
+
"type": "method",
|
522
|
+
"class": "NeetoCompliance::DockerFileDevVerifier",
|
523
|
+
"method": "valid?"
|
524
|
+
},
|
525
|
+
"user_input": "verify_command",
|
526
|
+
"confidence": "Medium",
|
527
|
+
"cwe_id": [
|
528
|
+
77
|
529
|
+
],
|
530
|
+
"note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
|
531
|
+
},
|
532
|
+
{
|
533
|
+
"warning_type": "Command Injection",
|
534
|
+
"warning_code": 14,
|
535
|
+
"fingerprint": "e53d551282bb5a249621de730bb03de7772a31f8b413c7f858e9d8cb1144222c",
|
536
|
+
"check_name": "Execute",
|
537
|
+
"message": "Possible command injection",
|
538
|
+
"file": "lib/neeto_compliance/verifiers/environment_config_verifier.rb",
|
539
|
+
"line": 31,
|
540
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
541
|
+
"code": "system(\"cat #{file} | grep -q '#{command}'\")",
|
542
|
+
"render_path": null,
|
543
|
+
"location": {
|
544
|
+
"type": "method",
|
545
|
+
"class": "NeetoCompliance::EnvironmentConfigVerifier",
|
546
|
+
"method": "config_missing?"
|
547
|
+
},
|
548
|
+
"user_input": "file",
|
549
|
+
"confidence": "Medium",
|
550
|
+
"cwe_id": [
|
551
|
+
77
|
552
|
+
],
|
553
|
+
"note": "file and command mentioned here are the key-value pairs of environment_configs method defined in the backend."
|
554
|
+
},
|
555
|
+
{
|
556
|
+
"warning_type": "Command Injection",
|
557
|
+
"warning_code": 14,
|
558
|
+
"fingerprint": "e94a5761c8e782433a1dea9d381195406bb5506d23932513674e43a12d1a69a3",
|
559
|
+
"check_name": "Execute",
|
560
|
+
"message": "Possible command injection",
|
561
|
+
"file": "lib/neeto_compliance/sync_neeto_commons/sync_misc.rb",
|
562
|
+
"line": 31,
|
563
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
564
|
+
"code": "`cp #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} #{file}`",
|
565
|
+
"render_path": null,
|
566
|
+
"location": {
|
567
|
+
"type": "method",
|
568
|
+
"class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommons::SyncMisc",
|
569
|
+
"method": "s(:self).sync_misc_files"
|
570
|
+
},
|
571
|
+
"user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
|
572
|
+
"confidence": "Medium",
|
573
|
+
"cwe_id": [
|
574
|
+
77
|
575
|
+
],
|
576
|
+
"note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
|
577
|
+
},
|
578
|
+
{
|
579
|
+
"warning_type": "Command Injection",
|
580
|
+
"warning_code": 14,
|
581
|
+
"fingerprint": "f579f44c4e33e0dc59d7eac09fb2e40da3f6a15c342b03420ec741318ebf53cb",
|
582
|
+
"check_name": "Execute",
|
583
|
+
"message": "Possible command injection",
|
584
|
+
"file": "lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/husky_files_verifier.rb",
|
585
|
+
"line": 24,
|
586
|
+
"link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
|
587
|
+
"code": "system(\"cat #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} | diff #{file} - 1> /dev/null\")",
|
588
|
+
"render_path": null,
|
589
|
+
"location": {
|
590
|
+
"type": "method",
|
591
|
+
"class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommonsVerifier::HuskyFilesVerifier",
|
592
|
+
"method": "find_non_complied_husky_files"
|
593
|
+
},
|
594
|
+
"user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
|
595
|
+
"confidence": "Medium",
|
596
|
+
"cwe_id": [
|
597
|
+
77
|
598
|
+
],
|
599
|
+
"note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
|
600
|
+
}
|
601
|
+
],
|
602
|
+
"updated": "2023-03-24 17:47:08 +0530",
|
603
|
+
"brakeman_version": "5.4.1"
|
604
|
+
}
|