turkdevops / portapps.github.io

🌍 Portapps website
https://portapps.io
MIT License
0 stars 1 forks source link

Bump actions/cache from 2.1.4 to 2.1.5 #84

Closed dependabot[bot] closed 3 years ago

dependabot[bot] commented 3 years ago

Bumps actions/cache from 2.1.4 to 2.1.5.

Release notes

Sourced from actions/cache's releases.

v2.1.5

  • Fix permissions error seen when extracting caches with GNU tar that were previously created using BSD tar (actions/cache#527)
Commits


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
dependabot[bot] commented 3 years ago

The following labels could not be found: :game_die: dependencies, :robot: bot.

guardrails[bot] commented 3 years ago

:warning: We detected 10 security issues in this pull request:

Mode: paranoid | Total findings: 10 | Considered vulnerability: 0

Hard-Coded Secrets (2)
Docs | Details ----- | -------- [:bulb:](https://docs.guardrails.io/docs/en/vulnerabilities/general/hard-coded_secrets.html?utm_source=ghpr) | Title: **Hard-coded Secrets**
https://github.com/turkdevops/portapps.github.io/blob/4094812c8831748365f80aa19ce4054f90e4cf5d/_config.yml#L117 [:bulb:](https://docs.guardrails.io/docs/en/vulnerabilities/general/hard-coded_secrets.html?utm_source=ghpr) | Title: **Hard-coded Secrets**
https://github.com/turkdevops/portapps.github.io/blob/4094812c8831748365f80aa19ce4054f90e4cf5d/_config.yml#L118 More info on how to fix Hard-Coded Secrets in [General](https://docs.guardrails.io/docs/en/vulnerabilities/general/hard-coded_secrets.html?utm_source=ghpr). ---
Insecure Use of Dangerous Function (1)
Docs | Details ----- | -------- [:bulb:](https://docs.guardrails.io/docs/en/vulnerabilities/javascript/insecure_use_of_dangerous_function.html?utm_source=ghpr) | Title: **Use of child process and non-literal exec()**
https://github.com/turkdevops/portapps.github.io/blob/4094812c8831748365f80aa19ce4054f90e4cf5d/gulpfile.js#L7 More info on how to fix Insecure Use of Dangerous Function in [JavaScript](https://docs.guardrails.io/docs/en/vulnerabilities/javascript/insecure_use_of_dangerous_function.html?utm_source=ghpr). ---
Insecure File Management (6)
Docs | Details ----- | -------- [:bulb:](https://docs.guardrails.io/docs/en/vulnerabilities/javascript/Insecure_file_management.html?utm_source=ghpr) | Title: **Use of non-literal fs filename**
https://github.com/turkdevops/portapps.github.io/blob/4094812c8831748365f80aa19ce4054f90e4cf5d/gulpfile.js#L216 [:bulb:](https://docs.guardrails.io/docs/en/vulnerabilities/javascript/Insecure_file_management.html?utm_source=ghpr) | Title: **Use of non-literal fs filename**
https://github.com/turkdevops/portapps.github.io/blob/4094812c8831748365f80aa19ce4054f90e4cf5d/gulpfile.js#L219 [:bulb:](https://docs.guardrails.io/docs/en/vulnerabilities/javascript/Insecure_file_management.html?utm_source=ghpr) | Title: **Use of non-literal fs filename**
https://github.com/turkdevops/portapps.github.io/blob/4094812c8831748365f80aa19ce4054f90e4cf5d/gulpfile.js#L222 [:bulb:](https://docs.guardrails.io/docs/en/vulnerabilities/javascript/Insecure_file_management.html?utm_source=ghpr) | Title: **Use of non-literal require**
https://github.com/turkdevops/portapps.github.io/blob/4094812c8831748365f80aa19ce4054f90e4cf5d/gulpfile.js#L278 [:bulb:](https://docs.guardrails.io/docs/en/vulnerabilities/javascript/Insecure_file_management.html?utm_source=ghpr) | Title: **Use of non-literal fs filename**
https://github.com/turkdevops/portapps.github.io/blob/4094812c8831748365f80aa19ce4054f90e4cf5d/gulpfile.js#L282 [:bulb:](https://docs.guardrails.io/docs/en/vulnerabilities/javascript/Insecure_file_management.html?utm_source=ghpr) | Title: **Use of non-literal fs filename**
https://github.com/turkdevops/portapps.github.io/blob/4094812c8831748365f80aa19ce4054f90e4cf5d/gulpfile.js#L285 More info on how to fix Insecure File Management in [JavaScript](https://docs.guardrails.io/docs/en/vulnerabilities/javascript/Insecure_file_management.html?utm_source=ghpr). ---
Insecure Use of Regular Expressions (1)
Docs | Details ----- | -------- [:bulb:](https://docs.guardrails.io/docs/en/vulnerabilities/javascript/insecure_use_of_regular_expressions.html?utm_source=ghpr) | Title: **Regex DOS (ReDOS)**
https://github.com/turkdevops/portapps.github.io/blob/4094812c8831748365f80aa19ce4054f90e4cf5d/src/js/main.js#L33 More info on how to fix Insecure Use of Regular Expressions in [JavaScript](https://docs.guardrails.io/docs/en/vulnerabilities/javascript/insecure_use_of_regular_expressions.html?utm_source=ghpr).

πŸ‘‰ Go to the dashboard for detailed results.

πŸ“₯ Happy? Share your feedback with us.

dependabot[bot] commented 3 years ago

Superseded by #88.