Don't trim tags, needed for STD plugin #4558
Annotations
12 errors, 15 warnings, and 15 notices
Missing required attribute:
ArchiSteamFarm.OfficialPlugins.SteamTokenDumper/ArchiSteamFarm.OfficialPlugins.SteamTokenDumper.csproj#L22
Element Copy doesn't have required attribute SourceFiles
|
Missing required attribute:
ArchiSteamFarm.OfficialPlugins.MobileAuthenticator/ArchiSteamFarm.OfficialPlugins.MobileAuthenticator.csproj#L22
Element Copy doesn't have required attribute SourceFiles
|
Missing required attribute:
ArchiSteamFarm.OfficialPlugins.ItemsMatcher/ArchiSteamFarm.OfficialPlugins.ItemsMatcher.csproj#L23
Element Copy doesn't have required attribute SourceFiles
|
XML highlighting:
ArchiSteamFarm.OfficialPlugins.ItemsMatcher/ArchiSteamFarm.OfficialPlugins.ItemsMatcher.csproj#L23
Attribute SourceFolders is not allowed here
|
XML highlighting:
ArchiSteamFarm.OfficialPlugins.SteamTokenDumper/ArchiSteamFarm.OfficialPlugins.SteamTokenDumper.csproj#L22
Attribute SourceFolders is not allowed here
|
XML highlighting:
ArchiSteamFarm.OfficialPlugins.MobileAuthenticator/ArchiSteamFarm.OfficialPlugins.MobileAuthenticator.csproj#L22
Attribute SourceFolders is not allowed here
|
Missing required attribute:
ArchiSteamFarm.OfficialPlugins.SteamTokenDumper/ArchiSteamFarm.OfficialPlugins.SteamTokenDumper.csproj#L22
Element Copy doesn't have required attribute SourceFiles
|
Missing required attribute:
ArchiSteamFarm.OfficialPlugins.MobileAuthenticator/ArchiSteamFarm.OfficialPlugins.MobileAuthenticator.csproj#L22
Element Copy doesn't have required attribute SourceFiles
|
Missing required attribute:
ArchiSteamFarm.OfficialPlugins.ItemsMatcher/ArchiSteamFarm.OfficialPlugins.ItemsMatcher.csproj#L23
Element Copy doesn't have required attribute SourceFiles
|
XML highlighting:
ArchiSteamFarm.OfficialPlugins.ItemsMatcher/ArchiSteamFarm.OfficialPlugins.ItemsMatcher.csproj#L23
Attribute SourceFolders is not allowed here
|
XML highlighting:
ArchiSteamFarm.OfficialPlugins.SteamTokenDumper/ArchiSteamFarm.OfficialPlugins.SteamTokenDumper.csproj#L22
Attribute SourceFolders is not allowed here
|
XML highlighting:
ArchiSteamFarm.OfficialPlugins.MobileAuthenticator/ArchiSteamFarm.OfficialPlugins.MobileAuthenticator.csproj#L22
Attribute SourceFolders is not allowed here
|
main
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
RoslynAnalyzers Review code for file path injection vulnerabilities:
ArchiSteamFarm/Helpers/SerializableFile.cs#L168
Potential file path injection vulnerability was found where 'Task File.WriteAllTextAsync(string path, string? contents, CancellationToken cancellationToken = default(CancellationToken))' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
|
RoslynAnalyzers Review code for file path injection vulnerabilities:
ArchiSteamFarm/Helpers/SerializableFile.cs#L158
Potential file path injection vulnerability was found where 'Task File.ReadAllTextAsync(string path, CancellationToken cancellationToken = default(CancellationToken))' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
|
RoslynAnalyzers Review code for file path injection vulnerabilities:
ArchiSteamFarm/Helpers/SerializableFile.cs#L170
Potential file path injection vulnerability was found where 'void File.Move(string sourceFileName, string destFileName)' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
|
RoslynAnalyzers Review code for file path injection vulnerabilities:
ArchiSteamFarm/Helpers/SerializableFile.cs#L157
Potential file path injection vulnerability was found where 'bool File.Exists(string? path)' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
|
RoslynAnalyzers Review code for file path injection vulnerabilities:
ArchiSteamFarm/Steam/Bot.cs#L1820
Potential file path injection vulnerability was found where 'void File.Move(string sourceFileName, string destFileName)' in method 'Task Bot.Rename(string newBotName)' may be tainted by user-controlled data from 'BotRenameRequest request' in method 'Task\> BotController.RenamePost(string botName, BotRenameRequest request)'.
|
RoslynAnalyzers Review code for file path injection vulnerabilities:
ArchiSteamFarm/Helpers/SerializableFile.cs#L164
Potential file path injection vulnerability was found where 'Task File.WriteAllTextAsync(string path, string? contents, CancellationToken cancellationToken = default(CancellationToken))' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
|
RoslynAnalyzers Review code for regex injection vulnerabilities:
ArchiSteamFarm/Steam/Interaction/Commands.cs#L2057
Potential regex injection vulnerability was found where 'Regex.Regex(string pattern, RegexOptions options)' in method 'Task\<(string? Response, Dictionary? OwnedGames)\> Commands.ResponseOwns(EAccess access, string query)' may be tainted by user-controlled data from 'CommandRequest request' in method 'Task\> CommandController.CommandPost(CommandRequest request)'.
|
RoslynAnalyzers Review code for file path injection vulnerabilities:
ArchiSteamFarm/Helpers/SerializableFile.cs#L168
Potential file path injection vulnerability was found where 'Task File.WriteAllTextAsync(string path, string? contents, CancellationToken cancellationToken = default(CancellationToken))' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
|
RoslynAnalyzers Review code for file path injection vulnerabilities:
ArchiSteamFarm/Helpers/SerializableFile.cs#L158
Potential file path injection vulnerability was found where 'Task File.ReadAllTextAsync(string path, CancellationToken cancellationToken = default(CancellationToken))' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
|
RoslynAnalyzers Review code for file path injection vulnerabilities:
ArchiSteamFarm/Helpers/SerializableFile.cs#L170
Potential file path injection vulnerability was found where 'void File.Move(string sourceFileName, string destFileName)' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
|
RoslynAnalyzers Review code for file path injection vulnerabilities:
ArchiSteamFarm/Helpers/SerializableFile.cs#L157
Potential file path injection vulnerability was found where 'bool File.Exists(string? path)' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
|
RoslynAnalyzers Review code for file path injection vulnerabilities:
ArchiSteamFarm/Steam/Bot.cs#L1820
Potential file path injection vulnerability was found where 'void File.Move(string sourceFileName, string destFileName)' in method 'Task Bot.Rename(string newBotName)' may be tainted by user-controlled data from 'BotRenameRequest request' in method 'Task\> BotController.RenamePost(string botName, BotRenameRequest request)'.
|
RoslynAnalyzers Review code for file path injection vulnerabilities:
ArchiSteamFarm/Helpers/SerializableFile.cs#L164
Potential file path injection vulnerability was found where 'Task File.WriteAllTextAsync(string path, string? contents, CancellationToken cancellationToken = default(CancellationToken))' in method 'Task SerializableFile.Write(string filePath, string json)' may be tainted by user-controlled data from 'string botNames' in method 'Task\> BotController.BotPost(string botNames, BotRequest request)'.
|
RoslynAnalyzers Review code for regex injection vulnerabilities:
ArchiSteamFarm/Steam/Interaction/Commands.cs#L2057
Potential regex injection vulnerability was found where 'Regex.Regex(string pattern, RegexOptions options)' in method 'Task\<(string? Response, Dictionary? OwnedGames)\> Commands.ResponseOwns(EAccess access, string query)' may be tainted by user-controlled data from 'CommandRequest request' in method 'Task\> CommandController.CommandPost(CommandRequest request)'.
|
Replace with 'field' keyword:
ArchiSteamFarm/Steam/Storage/BotConfig.cs#L288
Replace with 'field' keyword
|
Replace with 'field' keyword:
ArchiSteamFarm/Web/GitHub/Data/ReleaseResponse.cs#L131
Replace with 'field' keyword
|
Replace with 'field' keyword:
ArchiSteamFarm/SharedInfo.cs#L113
Replace with 'field' keyword
|
Replace with 'field' keyword:
ArchiSteamFarm/Storage/GlobalConfig.cs#L361
Replace with 'field' keyword
|
Replace with 'field' keyword:
ArchiSteamFarm/Storage/GlobalConfig.cs#L362
Replace with 'field' keyword
|
Replace with 'field' keyword:
ArchiSteamFarm/Web/GitHub/Data/ReleaseResponse.cs#L132
Replace with 'field' keyword
|
Replace with 'field' keyword:
ArchiSteamFarm/Steam/Storage/BotConfig.cs#L289
Replace with 'field' keyword
|
Replace with 'field' keyword:
ArchiSteamFarm/Web/GitHub/Data/ReleaseResponse.cs#L133
Replace with 'field' keyword
|
Replace with 'field' keyword:
ArchiSteamFarm/Steam/Data/InventoryResponse.cs#L79
Replace with 'field' keyword
|
Replace with 'field' keyword:
ArchiSteamFarm/Core/OS.cs#L71
Replace with 'field' keyword
|
Replace with 'field' keyword:
ArchiSteamFarm/Storage/GlobalConfig.cs#L360
Replace with 'field' keyword
|
Replace with 'field' keyword:
ArchiSteamFarm/Steam/Storage/BotConfig.cs#L287
Replace with 'field' keyword
|
Replace with 'field' keyword:
ArchiSteamFarm/Collections/FixedSizeConcurrentQueue.cs#L47
Replace with 'field' keyword
|
Replace with 'field' keyword:
ArchiSteamFarm/Storage/GlobalConfig.cs#L363
Replace with 'field' keyword
|
Replace with 'field' keyword:
ArchiSteamFarm/Steam/Bot.cs#L292
Replace with 'field' keyword
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
JustArchiNET~ArchiSteamFarm~SCSTTO.dockerbuild
|
180 KB |
|