4k4xs4pH1r3 / Capture-the-Flag

CTF Competition
0 stars 1 forks source link

Update python:slim Docker digest to 4e8ae72 #644

Closed renovate[bot] closed 2 weeks ago

renovate[bot] commented 2 weeks ago

This PR contains the following updates:

Package Type Update Change
python final digest 450bb2e -> 4e8ae72

[!WARNING] Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Configuration

πŸ“… Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

β™» Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

πŸ”• Ignore: Close this PR and you won't be reminded about this update again.



This PR was generated by Mend Renovate. View the repository job log.

difflens[bot] commented 2 weeks ago

View changes in DiffLens

guardrails[bot] commented 2 weeks ago

:warning: We detected 1 security issue in this pull request:

Insecure Access Control (1)
Severity | Details | Docs :-: | :-- | :-: High | Title: **Missing User Instruction**
https://github.com/4k4xs4pH1r3/Capture-the-Flag/blob/d7e6962a1bf074e8f2a39fb2778ba8f2fae6433b/Backend/Dockerfile#L2 | [:books:](https://docs.guardrails.io/docs/en/vulnerabilities/dockerfile/insecure_access_control.html?utm_source=ghpr#fd54f200-402c-4333-a5a4-36ef6709af2f) More info on how to fix Insecure Access Control in [Dockerfile](https://docs.guardrails.io/docs/en/vulnerabilities/dockerfile/insecure_access_control.html?utm_source=ghpr).

πŸ‘‰ Go to the dashboard for detailed results.

πŸ“₯ Happy? Share your feedback with us.

secure-code-warrior-for-github[bot] commented 2 weeks ago

Micro-Learning Topic: Insufficient access control (Detected by phrase)

Matched on "Insecure Access Control"

Restrictions on what authenticated users are allowed to do are often not properly enforced. Attackers can exploit these flaws to access unauthorized functionality and/or data, such as access other users' accounts, view sensitive files, modify other users’ data, change access rights, etc. Source: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project

Try a challenge in Secure Code Warrior