-
## Describe the bug
**Command Name**
`az aks command invoke -n $AKS_NAME -c "kubectl cluster-info"`
**Errors:**
```
(KubernetesOperationError) Failed to run command due to cluster perf issue,…
-
Observed: `TaintedInput - src/test.php:9:6 - Detected tainted html in path: my_read (src/test.php:9:6) -> call to echo (src/test.php:9:6) -> echo#1 (see https://psalm.dev/205)`
Expected: `TaintedInpu…
-
## Step 10: Data flow and taint tracking analysis
Great! You made it to the final step!
In step 9 we found expressions in the source code that are likely to have integers supplied from remote input,…
-
## Step 10: Data flow and taint tracking analysis
Great! You made it to the final step!
In step 9 we found expressions in the source code that are likely to have integers supplied from remote input,…
-
Follow up for #4661. Works for plain functions and static methods (really great :+1:, thanks for that). Could that be implemented for non-static methods too? May be a little tricky without taint-speci…
-
This is currently not found: https://psalm.dev/r/664f7b7006
```php
-
Steps:
* Create a `psalm.xml` with `psalm-baseline.xml`
* Ensure the `psalm.xml` has `errorBaseline="psalm-baseline.xml"`
* Run Taint Analysis with a separate baseline, `psalm-taint-baseline.xml`…
-
## Step 10: Data flow and taint tracking analysis
Great! You made it to the final step!
In step 9 we found expressions in the source code that are likely to have integers supplied from remote input,…
-
## Step 10: Data flow and taint tracking analysis
Great! You made it to the final step!
In step 9 we found expressions in the source code that are likely to have integers supplied from remote input,…
-
## Step 10: Data flow and taint tracking analysis
Great! You made it to the final step!
In step 9 we found expressions in the source code that are likely to have integers supplied from remote input,…