Skip to content

Conversation

@restyled-io
Copy link

@restyled-io restyled-io bot commented Feb 9, 2022

Automated style fixes for #83, created by Restyled.

The following restylers made fixes:

To incorporate these changes, merge this Pull Request into the original. We
recommend using the Squash or Rebase strategies.

NOTE: As work continues on the original Pull Request, this process will
re-run and update (force-push) this Pull Request with updated style fixes as
necessary. If the style is fixed manually at any point (i.e. this process finds
no fixes to make), this Pull Request will be closed automatically.

Sorry if this was unexpected. To disable it, see our documentation.

@guardrails
Copy link

guardrails bot commented Feb 9, 2022

⚠️ We detected 119 security issues in this pull request:

Mode: paranoid | Total findings: 119 | Considered vulnerability: 119

Insecure Use of Regular Expressions (14)
Docs Details
💡 Title: Regex DOS (ReDOS), Severity: Medium
if (!isExternalDirectCall(extDirectCall)) throw new Error('staticAnalysisCommon.js: not an external direct call Node')
💡 Title: Regex DOS (ReDOS), Severity: Medium
if (!isThisLocalCall(thisLocalCall.expression)) throw new Error('staticAnalysisCommon.js: not a this local call Node')
💡 Title: Regex DOS (ReDOS), Severity: Medium
if (!isLibraryCall(node.expression)) throw new Error('staticAnalysisCommon.js: not a library call Node')
💡 Title: Regex DOS (ReDOS), Severity: Medium
function isStorageVariableDeclaration (node: VariableDeclarationAstNode): boolean {
💡 Title: Regex DOS (ReDOS), Severity: Medium
function expressionTypeDescription (node: any, typeRegex: string): boolean {
💡 Title: Regex DOS (ReDOS), Severity: Medium
function typeDescription (node: any, typeRegex: string): boolean {
💡 Title: Regex DOS (ReDOS), Severity: Medium
function nodeType (node: any, typeRegex: string): boolean {
💡 Title: Regex DOS (ReDOS), Severity: Medium
function memName (node: any, memNameRegex: any): boolean {
💡 Title: Regex DOS (ReDOS), Severity: Medium
function operator (node: any, opRegex: string): boolean {
💡 Title: Regex DOS (ReDOS), Severity: Medium
💡 Title: Regex DOS (ReDOS), Severity: Medium
return new RegExp(typeRegex).test(node.typeDescriptions.typeString)
💡 Title: Regex DOS (ReDOS), Severity: Medium
return new RegExp(typeRegex).test(node.nodeType)
💡 Title: Regex DOS (ReDOS), Severity: Medium
return (node && !memNameRegex) || new RegExp(memNameRegex).test(node.name) || new RegExp(memNameRegex).test(node.memberName)
💡 Title: Regex DOS (ReDOS), Severity: Medium
return new RegExp(opRegex).test(node.operator)

More info on how to fix Insecure Use of Regular Expressions in TypeScript and JavaScript.


Insecure File Management (12)
Docs Details
💡 Title: Use of non-literal fs filename, Severity: High
const latestChangelog = fs.readFileSync(__dirname + '/changes.md', 'utf8')
💡 Title: Use of non-literal fs filename, Severity: High
const oldChangelog = fs.readFileSync(__dirname + '/CHANGELOG.md', 'utf8')
💡 Title: Use of non-literal fs filename, Severity: High
fs.unlinkSync(__dirname + '/CHANGELOG.md');
💡 Title: Use of non-literal fs filename, Severity: High
fs.unlinkSync(__dirname + '/changes.md');
💡 Title: Use of non-literal fs filename, Severity: High
fs.writeFileSync(__dirname + '/CHANGELOG.md', data);
💡 Title: Use of non-literal fs filename, Severity: High
inputJson.sources[shortFilename] = {content: fs.readFileSync(filename).toString()}
💡 Title: Use of non-literal fs filename, Severity: High
fs.readFile(filename, 'utf8', callback)
💡 Title: Use of non-literal fs filename, Severity: High
return fs.readFileSync(filename, 'utf8')
💡 Title: Use of non-literal fs filename, Severity: High
var data = init.readFile(require('path').resolve(__dirname, 'testWeb3.json'))
💡 Title: Use of non-literal fs filename, Severity: High
fs.readFile(filename, 'utf8', callback)
💡 Title: Use of non-literal fs filename, Severity: High
return fs.readFileSync(filename, 'utf8')
💡 Title: Use of non-literal fs filename, Severity: High
let data = init.readFile(require('path').resolve(__dirname, 'testWeb3.json'))

More info on how to fix Insecure File Management in JavaScript.


Vulnerable Libraries (93)
Severity Details
Medium [email protected] (t) upgrade to: >5.7.3 || >6.4.0 || >7.1.0
High [email protected] (t) upgrade to: >1.2.2 || >2.2.0 || 3.0.0 || >4.0.2
Low [email protected] upgrade to: >=7.1.0
Low [email protected] (t) - no patch available
High [email protected] (t) upgrade to: >=3.5.0
High [email protected] upgrade to: >=0.12.3
High [email protected] upgrade to: >=0.0.1
Critical [email protected] (t) upgrade to: >=1.10.2
Medium [email protected] (t) upgrade to: >=2.8.9 || >=3.0.8
High [email protected] (t) upgrade to: >=1.18.1
High [email protected] (t) upgrade to: >2.0.0
High [email protected] (t) upgrade to: >2.2.2
Low [email protected] (t) upgrade to: >=1.3.6
Low [email protected] (t) upgrade to: >6.0.2
Medium [email protected] (t) upgrade to: >4.16.4
High [email protected] (t) - no patch available
Low [email protected] (t) upgrade to: >=1.3.6
High [email protected] (t) upgrade to: >4.17.20
High [email protected] (t) - no patch available
High [email protected] - no patch available
High [email protected] upgrade to: >=5.3.1
High [email protected] (t) - no patch available
High [email protected] - no patch available
Medium [email protected] (t) upgrade to: >1.1.6
High [email protected] upgrade to: >=5.0.5
Low deep-extend@unknown (t) upgrade to: >0.5.0
High dot-prop@unknown (t) upgrade to: >=4.2.1 || >=5.1.1
Medium extend@unknown (t) upgrade to: >=2.0.2 || >=3.0.2
High [email protected] (t) upgrade to: >4.17.20
High sshpk@unknown (t) upgrade to: >1.13.1
Medium stringstream@unknown (t) upgrade to: >0.0.5
High tough-cookie@unknown (t) upgrade to: >=2.3.3
Medium [email protected] (t) upgrade to: >4.16.4
High [email protected] (t) upgrade to: >6.5.3
High [email protected] (t) upgrade to: >4.17.20
Low [email protected] upgrade to: >=9.0.0
High [email protected] (t) upgrade to: >4.5.0 || >5.3.0 || 6.0.0
High [email protected] (t) - no patch available
High [email protected] - no patch available
Critical handlebars@unknown (t) upgrade to: >4.7.6
Medium hosted-git-info@unknown (t) upgrade to: >=2.8.9 || >=3.0.8
High [email protected] (t) upgrade to: >4.17.20
Low [email protected] (t) upgrade to: >=0.2.1 || >=1.2.3
High [email protected] upgrade to: >=2.2.2
High y18n@unknown (t) upgrade to: >=5.0.5
Low [email protected] upgrade to: >=15.1.0
High [email protected] upgrade to: >=4.0.0
Critical [email protected] (t) upgrade to: >=4.7.7
Medium [email protected] (t) upgrade to: >=2.8.9 || >=3.0.8
Low [email protected] (t) upgrade to: >=1.3.6
High [email protected] (t) upgrade to: >4.17.20
Low [email protected] upgrade to: >=3.9.1
High [email protected] (t) upgrade to: >=5.0.5
High [email protected] (t) upgrade to: >4.17.20
High [email protected] (t) upgrade to: >=4.6.1
Low [email protected] (t) upgrade to: >0.6.3
High [email protected] (t) upgrade to: >=2.0.1
High [email protected] (t) - no patch available
Medium [email protected] (t) - no patch available
High [email protected] (t) upgrade to: >=1.2.2
Critical [email protected] (t) - no patch available
Medium [email protected] (t) upgrade to: >4.16.4
High [email protected] (t) upgrade to: >4.17.20
High [email protected] upgrade to: >=0.25.0
Medium [email protected] (t) upgrade to: >=2.8.9
High [email protected] (t) upgrade to: >4.17.20
Medium [email protected] upgrade to: >=9.2.0
Medium [email protected] (t) upgrade to: >=1.0.7
Medium [email protected] upgrade to: >=16.0.4
High [email protected] (t) upgrade to: >=0.25.0
Medium [email protected] (t) upgrade to: >=2.8.9
High [email protected] (t) upgrade to: >4.17.20
Medium [email protected] upgrade to: >=9.2.0
Medium [email protected] (t) upgrade to: >=1.0.7
Medium [email protected] upgrade to: >=16.0.4
Medium [email protected] (t) upgrade to: >4.1.0
Medium @ethersproject/[email protected] (t) upgrade to: >5.0.9
Medium [email protected] (t) upgrade to: >4.16.4
Medium [email protected] (t) upgrade to: >4.0.48
Medium [email protected] (t) upgrade to: >2.20.5
Medium [email protected] (t) upgrade to: >1.4.1 || >2.0.1
High [email protected] (t) upgrade to: >=2.8.2
High [email protected] (t) upgrade to: >4.4.17
High [email protected] upgrade to: >1.5.2 || >3.0.0-rc.4
High [email protected] (t) upgrade to: >1.3.5 || >3.0.0-rc.4
High [email protected] (t) upgrade to: >1.3.5 || >3.0.0-rc.4
High [email protected] (t) upgrade to: >1.3.6-rc.2 || >3.0.0-rc.4
High [email protected] (t) upgrade to: >1.3.5 || >3.0.0-rc.4
High [email protected] (t) upgrade to: >1.3.5 || >3.0.0-rc.4
High [email protected] (t) upgrade to: >1.0.0 || >1.3.5 || >3.0.0-rc.4
High [email protected] (t) upgrade to: >1.3.6-rc.2 || >=3.0.0-rc.0
High [email protected] (t) upgrade to: >1.3.6-rc.2 || >3.0.0-rc.4
High [email protected] (t) upgrade to: >1.3.5

More info on how to fix Vulnerable Libraries in JavaScript.


👉 Go to the dashboard for detailed results.

📥 Happy? Share your feedback with us.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant