Open nullify-proactiveops[bot] opened 4 weeks ago
Severity Threshold: 🔵 MEDIUM
🔴 CRITICAL
🟡 HIGH
🔵 MEDIUM
⚪ LOW
ID: 01JB0Q1PJ1QGZX8SAEBX3E99H1 Language: Go Severity: 🔴 CRITICAL CWE-89
ID: 01JB0Q1PJ1QGZX8SAEBX3E99H1
Language: Go
Severity: 🔴 CRITICAL
CWE-89
SQL Injection is a critical vulnerability that can lead to data or system compromise. By dynamically generating SQL query strings, user input may be able to influence the logic of the SQL statement. This could lead to an adversary accessing information they should not have access to or in some circumstances, being able to execute OS functionality or code. Read more: https://cwe.mitre.org/data/definitions/89.html https://github.com/proactiveops/opa_lambda/blob/f0d5a686bf50bce8c4c5f14b70d1964955b890a9/lambda/policyevaluator/policyevaluator.go#L41
Reply with /nullify to interact with me like another developer
/nullify
/nullify this isn't a SQL query. It is an Open Policy Agent query. The concatenated string is setting the name of query properly.
Severity Threshold: 🔵 MEDIUM
1 Potential vulnerability sources found within this repo
🔴 CRITICAL
🟡 HIGH
🔵 MEDIUM
⚪ LOW
ID: 01JB0Q1PJ1QGZX8SAEBX3E99H1
Language: Go
Severity: 🔴 CRITICAL
CWE-89
Injection
SQL Injection is a critical vulnerability that can lead to data or system compromise. By dynamically generating SQL query strings, user input may be able to influence the logic of the SQL statement. This could lead to an adversary accessing information they should not have access to or in some circumstances, being able to execute OS functionality or code. Read more: https://cwe.mitre.org/data/definitions/89.html https://github.com/proactiveops/opa_lambda/blob/f0d5a686bf50bce8c4c5f14b70d1964955b890a9/lambda/policyevaluator/policyevaluator.go#L41
Reply with
/nullify
to interact with me like another developer