Skip to content

Don't trim tags, needed for STD plugin #4558

Don't trim tags, needed for STD plugin

Don't trim tags, needed for STD plugin #4558

Triggered via push January 5, 2025 14:28
Status Success
Total duration 6m 34s
Artifacts 1
Fit to window
Zoom out
Zoom in

Annotations

12 errors, 15 warnings, and 15 notices
main
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
RoslynAnalyzers Review code for file path injection vulnerabilities: ArchiSteamFarm/Helpers/SerializableFile.cs#L168
Potential file path injection vulnerability was found where 'Task File.WriteAllTextAsync(string path, string? contents, CancellationToken cancellationToken = default(CancellationToken))' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
RoslynAnalyzers Review code for file path injection vulnerabilities: ArchiSteamFarm/Helpers/SerializableFile.cs#L158
Potential file path injection vulnerability was found where 'Task File.ReadAllTextAsync(string path, CancellationToken cancellationToken = default(CancellationToken))' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
RoslynAnalyzers Review code for file path injection vulnerabilities: ArchiSteamFarm/Helpers/SerializableFile.cs#L170
Potential file path injection vulnerability was found where 'void File.Move(string sourceFileName, string destFileName)' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
RoslynAnalyzers Review code for file path injection vulnerabilities: ArchiSteamFarm/Helpers/SerializableFile.cs#L157
Potential file path injection vulnerability was found where 'bool File.Exists(string? path)' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
RoslynAnalyzers Review code for file path injection vulnerabilities: ArchiSteamFarm/Steam/Bot.cs#L1820
Potential file path injection vulnerability was found where 'void File.Move(string sourceFileName, string destFileName)' in method 'Task Bot.Rename(string newBotName)' may be tainted by user-controlled data from 'BotRenameRequest request' in method 'Task\> BotController.RenamePost(string botName, BotRenameRequest request)'.
RoslynAnalyzers Review code for file path injection vulnerabilities: ArchiSteamFarm/Helpers/SerializableFile.cs#L164
Potential file path injection vulnerability was found where 'Task File.WriteAllTextAsync(string path, string? contents, CancellationToken cancellationToken = default(CancellationToken))' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
RoslynAnalyzers Review code for regex injection vulnerabilities: ArchiSteamFarm/Steam/Interaction/Commands.cs#L2057
Potential regex injection vulnerability was found where 'Regex.Regex(string pattern, RegexOptions options)' in method 'Task\<(string? Response, Dictionary? OwnedGames)\> Commands.ResponseOwns(EAccess access, string query)' may be tainted by user-controlled data from 'CommandRequest request' in method 'Task\> CommandController.CommandPost(CommandRequest request)'.
RoslynAnalyzers Review code for file path injection vulnerabilities: ArchiSteamFarm/Helpers/SerializableFile.cs#L168
Potential file path injection vulnerability was found where 'Task File.WriteAllTextAsync(string path, string? contents, CancellationToken cancellationToken = default(CancellationToken))' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
RoslynAnalyzers Review code for file path injection vulnerabilities: ArchiSteamFarm/Helpers/SerializableFile.cs#L158
Potential file path injection vulnerability was found where 'Task File.ReadAllTextAsync(string path, CancellationToken cancellationToken = default(CancellationToken))' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
RoslynAnalyzers Review code for file path injection vulnerabilities: ArchiSteamFarm/Helpers/SerializableFile.cs#L170
Potential file path injection vulnerability was found where 'void File.Move(string sourceFileName, string destFileName)' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
RoslynAnalyzers Review code for file path injection vulnerabilities: ArchiSteamFarm/Helpers/SerializableFile.cs#L157
Potential file path injection vulnerability was found where 'bool File.Exists(string? path)' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
RoslynAnalyzers Review code for file path injection vulnerabilities: ArchiSteamFarm/Steam/Bot.cs#L1820
Potential file path injection vulnerability was found where 'void File.Move(string sourceFileName, string destFileName)' in method 'Task Bot.Rename(string newBotName)' may be tainted by user-controlled data from 'BotRenameRequest request' in method 'Task\> BotController.RenamePost(string botName, BotRenameRequest request)'.
RoslynAnalyzers Review code for file path injection vulnerabilities: ArchiSteamFarm/Helpers/SerializableFile.cs#L164
Potential file path injection vulnerability was found where 'Task File.WriteAllTextAsync(string path, string? contents, CancellationToken cancellationToken = default(CancellationToken))' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
RoslynAnalyzers Review code for regex injection vulnerabilities: ArchiSteamFarm/Steam/Interaction/Commands.cs#L2057
Potential regex injection vulnerability was found where 'Regex.Regex(string pattern, RegexOptions options)' in method 'Task\<(string? Response, Dictionary? OwnedGames)\> Commands.ResponseOwns(EAccess access, string query)' may be tainted by user-controlled data from 'CommandRequest request' in method 'Task\> CommandController.CommandPost(CommandRequest request)'.
Replace with 'field' keyword: ArchiSteamFarm/SharedInfo.cs#L113
Replace with 'field' keyword
Replace with 'field' keyword: ArchiSteamFarm/Core/OS.cs#L71
Replace with 'field' keyword
Replace with 'field' keyword: ArchiSteamFarm/Steam/Bot.cs#L292
Replace with 'field' keyword

Artifacts

Produced during runtime
Name Size
JustArchiNET~ArchiSteamFarm~SCSTTO.dockerbuild
180 KB