neeto-compliance 1.0.58

Sign up to get free protection for your applications and to get access to all the features.
Files changed (76) hide show
  1. checksums.yaml +7 -0
  2. data/.editorconfig +10 -0
  3. data/.husky/helpers/verify_neeto_audit.sh +18 -0
  4. data/.husky/pre-push +7 -0
  5. data/.neetoci/neetoci.yml +18 -0
  6. data/.overcommit.yml +47 -0
  7. data/.rubocop.yml +596 -0
  8. data/.ruby-version +1 -0
  9. data/.semaphore/semaphore.yml +33 -0
  10. data/CHANGELOG.md +375 -0
  11. data/Gemfile +36 -0
  12. data/Gemfile.lock +435 -0
  13. data/README.md +85 -0
  14. data/Rakefile +12 -0
  15. data/bin/console +15 -0
  16. data/bin/neeto-audit +11 -0
  17. data/bin/neeto_repos_verifier/client_config.json +7 -0
  18. data/bin/neeto_repos_verifier/list_verifier.rb +93 -0
  19. data/bin/setup +8 -0
  20. data/bin/sync-neeto-repos +5 -0
  21. data/bin/sync-with-neeto-commons +5 -0
  22. data/config/brakeman.ignore +604 -0
  23. data/data/neeto_repos.json +295 -0
  24. data/lib/neeto-compliance.rb +21 -0
  25. data/lib/neeto_compliance/github_access.rb +29 -0
  26. data/lib/neeto_compliance/neeto_commons.rb +16 -0
  27. data/lib/neeto_compliance/neeto_repos.rb +59 -0
  28. data/lib/neeto_compliance/runner.rb +43 -0
  29. data/lib/neeto_compliance/skippable.rb +19 -0
  30. data/lib/neeto_compliance/sync_neeto_commons/sync_bin.rb +32 -0
  31. data/lib/neeto_compliance/sync_neeto_commons/sync_formatters.rb +28 -0
  32. data/lib/neeto_compliance/sync_neeto_commons/sync_husky.rb +33 -0
  33. data/lib/neeto_compliance/sync_neeto_commons/sync_misc.rb +36 -0
  34. data/lib/neeto_compliance/sync_neeto_commons/sync_test_support.rb +38 -0
  35. data/lib/neeto_compliance/sync_neeto_commons.rb +36 -0
  36. data/lib/neeto_compliance/verifiers/auto_update_prs_with_latest_master_verifier.rb +25 -0
  37. data/lib/neeto_compliance/verifiers/base.rb +77 -0
  38. data/lib/neeto_compliance/verifiers/bump_version_with_pr_label_verifier.rb +25 -0
  39. data/lib/neeto_compliance/verifiers/bundler_version_verifier.rb +48 -0
  40. data/lib/neeto_compliance/verifiers/circleci_config_verifier.rb +25 -0
  41. data/lib/neeto_compliance/verifiers/common_gemfile_verifier.rb +25 -0
  42. data/lib/neeto_compliance/verifiers/common_initializers_verifier.rb +25 -0
  43. data/lib/neeto_compliance/verifiers/cypress_config_verifier.rb +46 -0
  44. data/lib/neeto_compliance/verifiers/cypress_plugins_index_verifier.rb +25 -0
  45. data/lib/neeto_compliance/verifiers/docker_file_dev_verifier.rb +25 -0
  46. data/lib/neeto_compliance/verifiers/environment_config_verifier.rb +38 -0
  47. data/lib/neeto_compliance/verifiers/gem_version_verifier.rb +33 -0
  48. data/lib/neeto_compliance/verifiers/gems_verifier_base.rb +44 -0
  49. data/lib/neeto_compliance/verifiers/gitignore_file_verifier.rb +37 -0
  50. data/lib/neeto_compliance/verifiers/jsconfig_verifier.rb +187 -0
  51. data/lib/neeto_compliance/verifiers/neeto_commons_sync_verifier.rb +42 -0
  52. data/lib/neeto_compliance/verifiers/neeto_gems_version_verifier.rb +36 -0
  53. data/lib/neeto_compliance/verifiers/newrelic_verifier.rb +25 -0
  54. data/lib/neeto_compliance/verifiers/node_version_verifier.rb +84 -0
  55. data/lib/neeto_compliance/verifiers/package_dependencies_version_verifier.rb +59 -0
  56. data/lib/neeto_compliance/verifiers/package_json_verifier.rb +46 -0
  57. data/lib/neeto_compliance/verifiers/roles_verifier.rb +22 -0
  58. data/lib/neeto_compliance/verifiers/ruby_version_verifier.rb +25 -0
  59. data/lib/neeto_compliance/verifiers/semaphoreci_config_verifier.rb +74 -0
  60. data/lib/neeto_compliance/verifiers/sidekiq_queues_verifier.rb +36 -0
  61. data/lib/neeto_compliance/verifiers/simplecov_config_verifier.rb +29 -0
  62. data/lib/neeto_compliance/verifiers/sitemap_config_verifier.rb +29 -0
  63. data/lib/neeto_compliance/verifiers/slugignore_file_verifier.rb +25 -0
  64. data/lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/bin_files_verifier.rb +29 -0
  65. data/lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/formatter_files_verifier.rb +29 -0
  66. data/lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/husky_files_verifier.rb +29 -0
  67. data/lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/misc_files_verifier.rb +29 -0
  68. data/lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/test_support_files_verifier.rb +28 -0
  69. data/lib/neeto_compliance/verifiers/sync_neeto_commons_verifier.rb +31 -0
  70. data/lib/neeto_compliance/verifiers/webpacker_config_verifier.rb +32 -0
  71. data/lib/neeto_compliance/verifiers_list.rb +55 -0
  72. data/lib/neeto_compliance/version.rb +5 -0
  73. data/neeto-compliance.gemspec +35 -0
  74. data/package.json +9 -0
  75. data/yarn.lock +8 -0
  76. metadata +177 -0
@@ -0,0 +1,604 @@
1
+ {
2
+ "ignored_warnings": [
3
+ {
4
+ "warning_type": "Command Injection",
5
+ "warning_code": 14,
6
+ "fingerprint": "0a0e15f9dafcf95f8eb3f73cff6f4d101b1775476d4fbd16c512385cdace28b2",
7
+ "check_name": "Execute",
8
+ "message": "Possible command injection",
9
+ "file": "lib/neeto_compliance/verifiers/common_initializers_verifier.rb",
10
+ "line": 18,
11
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
12
+ "code": "`#{verify_command}`",
13
+ "render_path": null,
14
+ "location": {
15
+ "type": "method",
16
+ "class": "NeetoCompliance::CommonInitializersVerifier",
17
+ "method": "valid?"
18
+ },
19
+ "user_input": "verify_command",
20
+ "confidence": "Medium",
21
+ "cwe_id": [
22
+ 77
23
+ ],
24
+ "note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
25
+ },
26
+ {
27
+ "warning_type": "Command Injection",
28
+ "warning_code": 14,
29
+ "fingerprint": "1544155a02dec97b194b2faeb6b73badf6c0b3f9fc2062d720b536a2da0df02c",
30
+ "check_name": "Execute",
31
+ "message": "Possible command injection",
32
+ "file": "lib/neeto_compliance/verifiers/circleci_config_verifier.rb",
33
+ "line": 18,
34
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
35
+ "code": "`#{verify_command}`",
36
+ "render_path": null,
37
+ "location": {
38
+ "type": "method",
39
+ "class": "NeetoCompliance::CircleciConfigVerifier",
40
+ "method": "valid?"
41
+ },
42
+ "user_input": "verify_command",
43
+ "confidence": "Medium",
44
+ "cwe_id": [
45
+ 77
46
+ ],
47
+ "note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
48
+ },
49
+ {
50
+ "warning_type": "Command Injection",
51
+ "warning_code": 14,
52
+ "fingerprint": "179c9da0ad088b607b422758a414d8529b6e96ca8c8d6a60e41aee7d64cebde2",
53
+ "check_name": "Execute",
54
+ "message": "Possible command injection",
55
+ "file": "lib/neeto_compliance/verifiers/sitemap_config_verifier.rb",
56
+ "line": 18,
57
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
58
+ "code": "`#{verify_command}`",
59
+ "render_path": null,
60
+ "location": {
61
+ "type": "method",
62
+ "class": "NeetoCompliance::SitemapConfigVerifier",
63
+ "method": "valid?"
64
+ },
65
+ "user_input": "verify_command",
66
+ "confidence": "Medium",
67
+ "cwe_id": [
68
+ 77
69
+ ],
70
+ "note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
71
+ },
72
+ {
73
+ "warning_type": "Command Injection",
74
+ "warning_code": 14,
75
+ "fingerprint": "1b24328b139588437cad24c263d3bfe4995f7613b56898fa99a65457b1010cda",
76
+ "check_name": "Execute",
77
+ "message": "Possible command injection",
78
+ "file": "lib/neeto_compliance/sync_neeto_commons/sync_formatters.rb",
79
+ "line": 23,
80
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
81
+ "code": "`cp #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} #{file}`",
82
+ "render_path": null,
83
+ "location": {
84
+ "type": "method",
85
+ "class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommons::SyncFormatters",
86
+ "method": "s(:self).process"
87
+ },
88
+ "user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
89
+ "confidence": "Medium",
90
+ "cwe_id": [
91
+ 77
92
+ ],
93
+ "note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
94
+ },
95
+ {
96
+ "warning_type": "Command Injection",
97
+ "warning_code": 14,
98
+ "fingerprint": "3d5197ecbde2765e5614d2a71193ad38c63ab547b4eea083c0842e751b4159db",
99
+ "check_name": "Execute",
100
+ "message": "Possible command injection",
101
+ "file": "lib/neeto_compliance/sync_neeto_commons/sync_husky.rb",
102
+ "line": 27,
103
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
104
+ "code": "`cp #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} #{file}`",
105
+ "render_path": null,
106
+ "location": {
107
+ "type": "method",
108
+ "class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommons::SyncHusky",
109
+ "method": "s(:self).sync_with_husky_files_in_neeto_commons"
110
+ },
111
+ "user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
112
+ "confidence": "Medium",
113
+ "cwe_id": [
114
+ 77
115
+ ],
116
+ "note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
117
+ },
118
+ {
119
+ "warning_type": "Command Injection",
120
+ "warning_code": 14,
121
+ "fingerprint": "42d21dd51ae4cb0fe2d24767b76122ee51e665ba304c14cf6de8e2db2730b538",
122
+ "check_name": "Execute",
123
+ "message": "Possible command injection",
124
+ "file": "lib/neeto_compliance/verifiers/webpacker_config_verifier.rb",
125
+ "line": 14,
126
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
127
+ "code": "`diff #{commons_copy} #{local_copy} | grep '<'`",
128
+ "render_path": null,
129
+ "location": {
130
+ "type": "method",
131
+ "class": "NeetoCompliance::WebpackerConfigVerifier",
132
+ "method": "compare_files"
133
+ },
134
+ "user_input": "commons_copy",
135
+ "confidence": "Medium",
136
+ "cwe_id": [
137
+ 77
138
+ ],
139
+ "note": "Both local_copy and commons_copy are defined in the backend."
140
+ },
141
+ {
142
+ "warning_type": "Command Injection",
143
+ "warning_code": 14,
144
+ "fingerprint": "569c8874183a7e43dcb77f555b6574045b733e640d7950a45951f392f8a82955",
145
+ "check_name": "Execute",
146
+ "message": "Possible command injection",
147
+ "file": "lib/neeto_compliance/verifiers/cypress_plugins_index_verifier.rb",
148
+ "line": 18,
149
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
150
+ "code": "`#{verify_command}`",
151
+ "render_path": null,
152
+ "location": {
153
+ "type": "method",
154
+ "class": "NeetoCompliance::CypressPluginsIndexVerifier",
155
+ "method": "valid?"
156
+ },
157
+ "user_input": "verify_command",
158
+ "confidence": "Medium",
159
+ "cwe_id": [
160
+ 77
161
+ ],
162
+ "note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
163
+ },
164
+ {
165
+ "warning_type": "Command Injection",
166
+ "warning_code": 14,
167
+ "fingerprint": "56d0797e3a02d51297989fdef6166d102244d8baeeeaf9603cf87674bce2fddb",
168
+ "check_name": "Execute",
169
+ "message": "Possible command injection",
170
+ "file": "lib/neeto_compliance/verifiers/neeto_commons_sync_verifier.rb",
171
+ "line": 39,
172
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
173
+ "code": "`diff #{local_file} #{common_file.to_s}`",
174
+ "render_path": null,
175
+ "location": {
176
+ "type": "method",
177
+ "class": "NeetoCompliance::NeetoCommonsSyncVerifier",
178
+ "method": "same_file?"
179
+ },
180
+ "user_input": "local_file",
181
+ "confidence": "Medium",
182
+ "cwe_id": [
183
+ 77
184
+ ],
185
+ "note": "Both local_file and common_file are defined in the backend."
186
+ },
187
+ {
188
+ "warning_type": "Command Injection",
189
+ "warning_code": 14,
190
+ "fingerprint": "5a24cb0a1817fea1f9ffbe004f7b95e738727fede385d34d06023c4fbc219e93",
191
+ "check_name": "Execute",
192
+ "message": "Possible command injection",
193
+ "file": "lib/neeto_compliance/verifiers/cypress_config_verifier.rb",
194
+ "line": 43,
195
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
196
+ "code": "`diff #{local_file} #{common_file.to_s}`",
197
+ "render_path": null,
198
+ "location": {
199
+ "type": "method",
200
+ "class": "NeetoCompliance::CypressConfigVerifier",
201
+ "method": "same_file?"
202
+ },
203
+ "user_input": "local_file",
204
+ "confidence": "Medium",
205
+ "cwe_id": [
206
+ 77
207
+ ],
208
+ "note": "local_file is defined in the backend"
209
+ },
210
+ {
211
+ "warning_type": "Command Injection",
212
+ "warning_code": 14,
213
+ "fingerprint": "5d7af3ca27abd6d522cc0375ffe4ebdc9234b5878c1d4e0555e97af849ef94e5",
214
+ "check_name": "Execute",
215
+ "message": "Possible command injection",
216
+ "file": "lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/misc_files_verifier.rb",
217
+ "line": 24,
218
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
219
+ "code": "system(\"cat #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} | diff #{file} - 1> /dev/null\")",
220
+ "render_path": null,
221
+ "location": {
222
+ "type": "method",
223
+ "class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommonsVerifier::MiscFilesVerifier",
224
+ "method": "find_non_complied_misc_files"
225
+ },
226
+ "user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
227
+ "confidence": "Medium",
228
+ "cwe_id": [
229
+ 77
230
+ ],
231
+ "note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
232
+ },
233
+ {
234
+ "warning_type": "Command Injection",
235
+ "warning_code": 14,
236
+ "fingerprint": "607f1ee1b1f5e61cefa7b30720c213ee4849d5e149720a6896894192a7d7ca00",
237
+ "check_name": "Execute",
238
+ "message": "Possible command injection",
239
+ "file": "lib/neeto_compliance/sync_neeto_commons/sync_husky.rb",
240
+ "line": 28,
241
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
242
+ "code": "system(\"chmod +x #{file}\")",
243
+ "render_path": null,
244
+ "location": {
245
+ "type": "method",
246
+ "class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommons::SyncHusky",
247
+ "method": "s(:self).sync_with_husky_files_in_neeto_commons"
248
+ },
249
+ "user_input": "file",
250
+ "confidence": "Medium",
251
+ "cwe_id": [
252
+ 77
253
+ ],
254
+ "note": "file mentioned here is the files from HUSKY_FILES, defined in backend."
255
+ },
256
+ {
257
+ "warning_type": "Command Injection",
258
+ "warning_code": 14,
259
+ "fingerprint": "6b624991d4078d8793f2fcf605ae6c3747fd81d281388526fc24bc7b4fac55a7",
260
+ "check_name": "Execute",
261
+ "message": "Possible command injection",
262
+ "file": "lib/neeto_compliance/verifiers/slugignore_file_verifier.rb",
263
+ "line": 18,
264
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
265
+ "code": "`#{verify_command}`",
266
+ "render_path": null,
267
+ "location": {
268
+ "type": "method",
269
+ "class": "NeetoCompliance::SlugignoreFileVerifier",
270
+ "method": "valid?"
271
+ },
272
+ "user_input": "verify_command",
273
+ "confidence": "Medium",
274
+ "cwe_id": [
275
+ 77
276
+ ],
277
+ "note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
278
+ },
279
+ {
280
+ "warning_type": "Command Injection",
281
+ "warning_code": 14,
282
+ "fingerprint": "71370e09dd25546b1273e3e6a3c8e65ab2e0bdd4ba0d1c107c0fcac6ec541399",
283
+ "check_name": "Execute",
284
+ "message": "Possible command injection",
285
+ "file": "lib/neeto_compliance/verifiers/newrelic_verifier.rb",
286
+ "line": 18,
287
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
288
+ "code": "`#{verify_command}`",
289
+ "render_path": null,
290
+ "location": {
291
+ "type": "method",
292
+ "class": "NeetoCompliance::NewrelicVerifier",
293
+ "method": "valid?"
294
+ },
295
+ "user_input": "verify_command",
296
+ "confidence": "Medium",
297
+ "cwe_id": [
298
+ 77
299
+ ],
300
+ "note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
301
+ },
302
+ {
303
+ "warning_type": "Command Injection",
304
+ "warning_code": 14,
305
+ "fingerprint": "7a6c37477ef89cb8863e4e5e142fb99d59ed9103c3215e6279049c919f0f0209",
306
+ "check_name": "Execute",
307
+ "message": "Possible command injection",
308
+ "file": "lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/test_support_files_verifier.rb",
309
+ "line": 23,
310
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
311
+ "code": "system(\"cat #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} | diff #{file} - 1> /dev/null\")",
312
+ "render_path": null,
313
+ "location": {
314
+ "type": "method",
315
+ "class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommonsVerifier::TestSupportFilesVerifier",
316
+ "method": "non_complied_test_support_files"
317
+ },
318
+ "user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
319
+ "confidence": "Medium",
320
+ "cwe_id": [
321
+ 77
322
+ ],
323
+ "note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
324
+ },
325
+ {
326
+ "warning_type": "Command Injection",
327
+ "warning_code": 14,
328
+ "fingerprint": "aba6ca1a7652fe8643697e3af4b4e43f834375f1101d84ce1e017dec5c4c3cf6",
329
+ "check_name": "Execute",
330
+ "message": "Possible command injection",
331
+ "file": "lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/bin_files_verifier.rb",
332
+ "line": 24,
333
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
334
+ "code": "system(\"cat #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} | diff #{file} - 1> /dev/null\")",
335
+ "render_path": null,
336
+ "location": {
337
+ "type": "method",
338
+ "class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommonsVerifier::BinFilesVerifier",
339
+ "method": "find_non_complied_bin_files"
340
+ },
341
+ "user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
342
+ "confidence": "Medium",
343
+ "cwe_id": [
344
+ 77
345
+ ],
346
+ "note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
347
+ },
348
+ {
349
+ "warning_type": "Command Injection",
350
+ "warning_code": 14,
351
+ "fingerprint": "abab3d09b40b36e3b9f387cbf7c344ba94acdee14986046cf64d752577d4af4a",
352
+ "check_name": "Execute",
353
+ "message": "Possible command injection",
354
+ "file": "lib/neeto_compliance/verifiers/bump_version_with_pr_label_verifier.rb",
355
+ "line": 18,
356
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
357
+ "code": "`#{verify_command}`",
358
+ "render_path": null,
359
+ "location": {
360
+ "type": "method",
361
+ "class": "NeetoCompliance::BumpVersionWithPrLabelVerifier",
362
+ "method": "valid?"
363
+ },
364
+ "user_input": "verify_command",
365
+ "confidence": "Medium",
366
+ "cwe_id": [
367
+ 77
368
+ ],
369
+ "note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
370
+ },
371
+ {
372
+ "warning_type": "Command Injection",
373
+ "warning_code": 14,
374
+ "fingerprint": "add17d8f75504153921279b16facfec7c5ea6fa355d8c3cad83bac953281ad22",
375
+ "check_name": "Execute",
376
+ "message": "Possible command injection",
377
+ "file": "lib/neeto_compliance/sync_neeto_commons/sync_test_support.rb",
378
+ "line": 33,
379
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
380
+ "code": "`cp #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} #{file}`",
381
+ "render_path": null,
382
+ "location": {
383
+ "type": "method",
384
+ "class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommons::SyncTestSupport",
385
+ "method": "s(:self).sync_support_files"
386
+ },
387
+ "user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
388
+ "confidence": "Medium",
389
+ "cwe_id": [
390
+ 77
391
+ ],
392
+ "note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
393
+ },
394
+ {
395
+ "warning_type": "Command Injection",
396
+ "warning_code": 14,
397
+ "fingerprint": "b096054fa4b1a017055a1d4eec3f7ac49e9c3b8eb80f089c897c9158fc6c3569",
398
+ "check_name": "Execute",
399
+ "message": "Possible command injection",
400
+ "file": "lib/neeto_compliance/sync_neeto_commons/sync_bin.rb",
401
+ "line": 27,
402
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
403
+ "code": "`cp #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} #{file}`",
404
+ "render_path": null,
405
+ "location": {
406
+ "type": "method",
407
+ "class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommons::SyncBin",
408
+ "method": "s(:self).sync_bin_files"
409
+ },
410
+ "user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
411
+ "confidence": "Medium",
412
+ "cwe_id": [
413
+ 77
414
+ ],
415
+ "note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
416
+ },
417
+ {
418
+ "warning_type": "Command Injection",
419
+ "warning_code": 14,
420
+ "fingerprint": "bcaeb36f4a16f121785192f5b526fedb2e38f307d2623364dff71cfaea094696",
421
+ "check_name": "Execute",
422
+ "message": "Possible command injection",
423
+ "file": "lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/formatter_files_verifier.rb",
424
+ "line": 24,
425
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
426
+ "code": "system(\"cat #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} | diff #{file} - 1> /dev/null\")",
427
+ "render_path": null,
428
+ "location": {
429
+ "type": "method",
430
+ "class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommonsVerifier::FormatterFilesVerifier",
431
+ "method": "find_non_complied_formatter_files"
432
+ },
433
+ "user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
434
+ "confidence": "Medium",
435
+ "cwe_id": [
436
+ 77
437
+ ],
438
+ "note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
439
+ },
440
+ {
441
+ "warning_type": "Command Injection",
442
+ "warning_code": 14,
443
+ "fingerprint": "c96b160c649d9a8753933a7be5c8741b525bfb2e1844d8bbb4f40fb8412834c4",
444
+ "check_name": "Execute",
445
+ "message": "Possible command injection",
446
+ "file": "lib/neeto_compliance/verifiers/common_gemfile_verifier.rb",
447
+ "line": 18,
448
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
449
+ "code": "`#{verify_command}`",
450
+ "render_path": null,
451
+ "location": {
452
+ "type": "method",
453
+ "class": "NeetoCompliance::CommonGemfileVerifier",
454
+ "method": "valid?"
455
+ },
456
+ "user_input": "verify_command",
457
+ "confidence": "Medium",
458
+ "cwe_id": [
459
+ 77
460
+ ],
461
+ "note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
462
+ },
463
+ {
464
+ "warning_type": "Command Injection",
465
+ "warning_code": 14,
466
+ "fingerprint": "cd1faeb9312eb4f92f8840a47943b1945b7d8ac02a7a556dfd977e7192cbd9a2",
467
+ "check_name": "Execute",
468
+ "message": "Possible command injection",
469
+ "file": "lib/neeto_compliance/verifiers/auto_update_prs_with_latest_master_verifier.rb",
470
+ "line": 18,
471
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
472
+ "code": "`#{verify_command}`",
473
+ "render_path": null,
474
+ "location": {
475
+ "type": "method",
476
+ "class": "NeetoCompliance::AutoUpdatePrsWithLatestMasterVerifier",
477
+ "method": "valid?"
478
+ },
479
+ "user_input": "verify_command",
480
+ "confidence": "Medium",
481
+ "cwe_id": [
482
+ 77
483
+ ],
484
+ "note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
485
+ },
486
+ {
487
+ "warning_type": "Command Injection",
488
+ "warning_code": 14,
489
+ "fingerprint": "cd549bd21917fa5191058d64894de2e28e6c9657f1c3a77c7da9f58ef0994d55",
490
+ "check_name": "Execute",
491
+ "message": "Possible command injection",
492
+ "file": "lib/neeto_compliance/verifiers/ruby_version_verifier.rb",
493
+ "line": 18,
494
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
495
+ "code": "`#{verify_command}`",
496
+ "render_path": null,
497
+ "location": {
498
+ "type": "method",
499
+ "class": "NeetoCompliance::RubyVersionVerifier",
500
+ "method": "valid?"
501
+ },
502
+ "user_input": "verify_command",
503
+ "confidence": "Medium",
504
+ "cwe_id": [
505
+ 77
506
+ ],
507
+ "note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
508
+ },
509
+ {
510
+ "warning_type": "Command Injection",
511
+ "warning_code": 14,
512
+ "fingerprint": "dae89b5d2512acd50f9590a5b86f48c319dd143036bdecbcc25e22163de5f8c1",
513
+ "check_name": "Execute",
514
+ "message": "Possible command injection",
515
+ "file": "lib/neeto_compliance/verifiers/docker_file_dev_verifier.rb",
516
+ "line": 18,
517
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
518
+ "code": "`#{verify_command}`",
519
+ "render_path": null,
520
+ "location": {
521
+ "type": "method",
522
+ "class": "NeetoCompliance::DockerFileDevVerifier",
523
+ "method": "valid?"
524
+ },
525
+ "user_input": "verify_command",
526
+ "confidence": "Medium",
527
+ "cwe_id": [
528
+ 77
529
+ ],
530
+ "note": "verify_command is defined in the backend. It is safe to assume the code is not vulnerable to Command Injection."
531
+ },
532
+ {
533
+ "warning_type": "Command Injection",
534
+ "warning_code": 14,
535
+ "fingerprint": "e53d551282bb5a249621de730bb03de7772a31f8b413c7f858e9d8cb1144222c",
536
+ "check_name": "Execute",
537
+ "message": "Possible command injection",
538
+ "file": "lib/neeto_compliance/verifiers/environment_config_verifier.rb",
539
+ "line": 31,
540
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
541
+ "code": "system(\"cat #{file} | grep -q '#{command}'\")",
542
+ "render_path": null,
543
+ "location": {
544
+ "type": "method",
545
+ "class": "NeetoCompliance::EnvironmentConfigVerifier",
546
+ "method": "config_missing?"
547
+ },
548
+ "user_input": "file",
549
+ "confidence": "Medium",
550
+ "cwe_id": [
551
+ 77
552
+ ],
553
+ "note": "file and command mentioned here are the key-value pairs of environment_configs method defined in the backend."
554
+ },
555
+ {
556
+ "warning_type": "Command Injection",
557
+ "warning_code": 14,
558
+ "fingerprint": "e94a5761c8e782433a1dea9d381195406bb5506d23932513674e43a12d1a69a3",
559
+ "check_name": "Execute",
560
+ "message": "Possible command injection",
561
+ "file": "lib/neeto_compliance/sync_neeto_commons/sync_misc.rb",
562
+ "line": 31,
563
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
564
+ "code": "`cp #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} #{file}`",
565
+ "render_path": null,
566
+ "location": {
567
+ "type": "method",
568
+ "class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommons::SyncMisc",
569
+ "method": "s(:self).sync_misc_files"
570
+ },
571
+ "user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
572
+ "confidence": "Medium",
573
+ "cwe_id": [
574
+ 77
575
+ ],
576
+ "note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
577
+ },
578
+ {
579
+ "warning_type": "Command Injection",
580
+ "warning_code": 14,
581
+ "fingerprint": "f579f44c4e33e0dc59d7eac09fb2e40da3f6a15c342b03420ec741318ebf53cb",
582
+ "check_name": "Execute",
583
+ "message": "Possible command injection",
584
+ "file": "lib/neeto_compliance/verifiers/sync_neeto_commons_verifier/husky_files_verifier.rb",
585
+ "line": 24,
586
+ "link": "https://brakemanscanner.org/docs/warning_types/command_injection/",
587
+ "code": "system(\"cat #{NeetoCompliance::SyncNeetoCommons.neeto_commons_url}#{file} | diff #{file} - 1> /dev/null\")",
588
+ "render_path": null,
589
+ "location": {
590
+ "type": "method",
591
+ "class": "NeetoCompliance::NeetoCompliance::SyncNeetoCommonsVerifier::HuskyFilesVerifier",
592
+ "method": "find_non_complied_husky_files"
593
+ },
594
+ "user_input": "NeetoCompliance::SyncNeetoCommons.neeto_commons_url",
595
+ "confidence": "Medium",
596
+ "cwe_id": [
597
+ 77
598
+ ],
599
+ "note": "neeto_commons_url return the path of commons directory of the specific neeto_compliance gem specifiec in Gemfile. Hence, is it safe to assume the code is not vulnerable to Command Injection."
600
+ }
601
+ ],
602
+ "updated": "2023-03-24 17:47:08 +0530",
603
+ "brakeman_version": "5.4.1"
604
+ }