wiz-sec / open-cvdb

An open project to list all publicly known cloud vulnerabilities and CSP security issues
https://cloudvulndb.org
Creative Commons Attribution 4.0 International
306 stars 61 forks source link

Update spelling.yml #96

Closed korniko98 closed 2 years ago

github-actions[bot] commented 2 years ago

@check-spelling-bot Report

:red_circle: Please review

See the :open_file_folder: files view or the :scroll:action log for details.

Unrecognized words (420) ``` aad ACI Acloudsec adfd admins aec aeeecba airshow allowlist Amitai amitaico analystics api appsecco Arkadiy arkadiyt Arvanitis assumerole atlassian attachme autowarp Avrahami aws AWSEC awsteele Ayrey azurecomcdn azureedge azurescape bacccdf backdooring backdoors Balduzzi Balzarotti bbf bchatelard beem benbridts blakedunson blog blogpost blogspot bootup Brancaleoni Brancato breakingformation Bridts bugbountywriteup bugzilla Bypassable cdc cded cdn cgi Champetier champtar changelog chaosdb Chatelard Cheesepuffs chencococococo chown christophetd cleartext cloudformation cloudformer cloudfront cloudsec cloudsecurityalliance cloudshell cloudsql cloudsqladmin cloudsqlsuperuser cloudtrail cloudvulndb cloudwatch CMK cmu CNAME codeartifact codebuild codestar cognito creativecommons cred credmanifest CSPs csrf cvdb cve cvt cxprocessserver Dataprep Dataproc datocms daveysec defe dekel desync developerguide devops dhcp Diffend Divyanshu dll dns dominguez dpr effc eks Elad eladgabay elasticloadbalancing Elnaggar eltima embracethered enum epereiralopez exfil exfiltrated exfiltrating exploitability extrareplica ezequiel fabricscape fdcf fdw fea fel ffd filesharemount filesystem firewalls fncidr Fosaaen Frichette frichetten func Gabay Gafnit gafnitav gcp Gerstenkorn GHSA Gietz Gietzen githubusercontent gitlab gke globalsecuritydatabase globbing gmail GMoc Golang google googleblog Grzelak GSD guardduty gvisor GVuf Haroon hashicorp hencohen hostname hotpatch hotpatches html http Hudak hyperlink iam ianduffy iann iap ignacio imds imdsv img inawisdom inforce intezer iptables irsl itspeterc ITW ixid ixlib jmx jon Joyneer jpeg jpg json jupyter justm justmorpheus Karan karims kasif kasifdekel kattraxler keycredential Kirda kloudle kms korniko koyeb kubelet kubernetes Lbo leszekgrzegorek Lidor lightsail lightspin linux louisdurufle Loureiro lpe Luttwak LXD Magri mailto markus mbrancato MDP meatballninja Melhaoui metadata mfa mhgeay MHxwa microsoft misconfigurations mitm Mnwx msrc mwaa nechudav nechuta nen netspi Nir nirohfeld notlegit NTLMv nvd NWD NXYe OCID offensi Ohfeld OMI omigod onecloudplease onug opsmorph Osama osamaelnaggar oslogin OWASP Pahima paloaltonetworks passthehashbrwn passwd passwo pastebin patricksanders pbs pdf pentesting pexels PHP pixabay PLCPCP png portswigger Postgre postgresql presigned privesc pwnalytics pwning Qds QEr ramimac Rault RBAC rce rds redhat redteam Rehberger replicator Reser RHEL rhinosecuritylabs Riyaz riyazwalikar ronenshh rph rss runfunctions runtimes ryanjarv sagemaker Sagi Saini sandboxing Sasson Schindel Schmieg sdk secjuice seclab secureworks securityfu sentinelone shirtamari Shitrit Shukla Shustin sigs sigv Siteyou Slaviero smqmo Spen spiske sql src srgb ssl ssm ssrf starbucks sts subdomain Sudo sudoers summitroute superglue suse svg svgrepo symlink synfs synlapse TCf techblog tenchisecurity Tetelman thaidn thefaultinourstars theregister thexplorer threatmanagement threatmodel tinysrgb tls TQmy Traxler trustoncloud Tsarimi twimg Tzadik Tzah unauditable unauditible undelete unsplash upguard url usb usergroupspoofing username VCNx VDB vectra vgp VMs vnhacker vomqb vpc vpn vrp wafs Walikar walkthrough wallpaperflare webcams webscheme website wfw workaround Workflows workspaces Wouter wtm www WYAI xdabbad xml Xor xpatrik xss xutaf xwgw XXE yaml Yanir Yesland ymedialabs youtube Yuval yuvalavra YWdlf Zaddach zego ZXRw ```
To accept :heavy_check_mark: these unrecognized words as correct, run the following commands ... in a clone of the [git@github.com:wiz-sec/open-cvdb.git](https://github.com/wiz-sec/open-cvdb.git) repository on the `korniko98-patch-1` branch ([:information_source: how do I use this?]( https://github.com/check-spelling/check-spelling/wiki/Accepting-Suggestions)): ``` sh update_files() { perl -e ' my $new_expect_file=".github/actions/spelling/expect.txt"; use File::Path qw(make_path); use File::Basename qw(dirname); make_path (dirname($new_expect_file)); open FILE, q{<}, $new_expect_file; chomp(my @words = ); close FILE; my @add=qw('"$patch_add"'); my %items; @items{@words} = @words x (1); @items{@add} = @add x (1); @words = sort {lc($a)."-".$a cmp lc($b)."-".$b} keys %items; open FILE, q{>}, $new_expect_file; for my $word (@words) { print FILE "$word\n" if $word =~ /\w/; }; close FILE; system("git", "add", $new_expect_file); ' } comment_json=$(mktemp) curl -L -s -S \ -H "Content-Type: application/json" \ "https://api.github.com/repos/wiz-sec/open-cvdb/issues/comments/1253276223" > "$comment_json" comment_body=$(mktemp) jq -r ".body // empty" "$comment_json" | tr -d "\\r" > $comment_body rm $comment_json patch_add=$(perl -e '$/=undef; $_=<>; if (m{Unrecognized words[^<]*\n*```\n*([^<]*)```\n*
$}m) { print "$1" } elsif (m{Unrecognized words[^<]*\n\n((?:\w.*\n)+)\n}m) { print "$1" };' < "$comment_body") update_files rm $comment_body git add -u ```

To have the bot do this for you, reply quoting the following line: @check-spelling-bot apply changes.

Available dictionaries could cover words not in the dictionary [cspell:aws/aws.txt](https://raw.githubusercontent.com/check-spelling/cspell-dicts/v20220427/dictionaries/aws/aws.txt) (1485) covers 37 of them [cspell:golang/go.txt](https://raw.githubusercontent.com/check-spelling/cspell-dicts/v20220427/dictionaries/golang/go.txt) (7745) covers 13 of them [cspell:filetypes/filetypes.txt](https://raw.githubusercontent.com/check-spelling/cspell-dicts/v20220427/dictionaries/filetypes/filetypes.txt) (337) covers 13 of them [cspell:django/django.txt](https://raw.githubusercontent.com/check-spelling/cspell-dicts/v20220427/dictionaries/django/django.txt) (2342) covers 10 of them [cspell:css/css.txt](https://raw.githubusercontent.com/check-spelling/cspell-dicts/v20220427/dictionaries/css/css.txt) (993) covers 8 of them Consider adding them using (in `.github/workflows/spelling.yml`): ``` yml with: extra_dictionaries: cspell:aws/aws.txt cspell:golang/go.txt cspell:filetypes/filetypes.txt cspell:django/django.txt cspell:css/css.txt ``` To stop checking additional dictionaries, add: ``` yml with: check_extra_dictionaries: '' ```
Warnings (1) See the [:open_file_folder: files](96/files/) view or the [:scroll:action log](https://github.com/wiz-sec/open-cvdb/actions/runs/3095722402/jobs/5010439023#step:2:1) for details. [:information_source: Warnings](https://github.com/check-spelling/check-spelling/wiki/Event-descriptions) | Count -|- [:information_source: limited-references](https://github.com/check-spelling/check-spelling/wiki/Event-descriptions#limited-references) | 67 See [:information_source: Event descriptions](https://github.com/check-spelling/check-spelling/wiki/Event-descriptions) for more information.
If the flagged items are false positives If items relate to a ... * binary file (or some other file you wouldn't want to check at all). Please add a file path to the `excludes.txt` file matching the containing file. File paths are Perl 5 Regular Expressions - you can [test]( https://www.regexplanet.com/advanced/perl/) yours before committing to verify it will match your files. `^` refers to the file's path from the root of the repository, so `^README\.md$` would exclude [README.md]( ../tree/HEAD/README.md) (on whichever branch you're using). * well-formed pattern. If you can write a [pattern](https://github.com/check-spelling/check-spelling/wiki/Configuration-Examples:-patterns) that would match it, try adding it to the `patterns.txt` file. Patterns are Perl 5 Regular Expressions - you can [test]( https://www.regexplanet.com/advanced/perl/) yours before committing to verify it will match your lines. Note that patterns can't match multiline strings.
github-actions[bot] commented 2 years ago

@check-spelling-bot Report

:red_circle: Please review

See the :open_file_folder: files view or the :scroll:action log for details.

Unrecognized words (420) ``` aad ACI Acloudsec adfd admins aec aeeecba airshow allowlist Amitai amitaico analystics api appsecco Arkadiy arkadiyt Arvanitis assumerole atlassian attachme autowarp Avrahami aws AWSEC awsteele Ayrey azurecomcdn azureedge azurescape bacccdf backdooring backdoors Balduzzi Balzarotti bbf bchatelard beem benbridts blakedunson blog blogpost blogspot bootup Brancaleoni Brancato breakingformation Bridts bugbountywriteup bugzilla Bypassable cdc cded cdn cgi Champetier champtar changelog chaosdb Chatelard Cheesepuffs chencococococo chown christophetd cleartext cloudformation cloudformer cloudfront cloudsec cloudsecurityalliance cloudshell cloudsql cloudsqladmin cloudsqlsuperuser cloudtrail cloudvulndb cloudwatch CMK cmu CNAME codeartifact codebuild codestar cognito creativecommons cred credmanifest CSPs csrf cvdb cve cvt cxprocessserver Dataprep Dataproc datocms daveysec defe dekel desync developerguide devops dhcp Diffend Divyanshu dll dns dominguez dpr effc eks Elad eladgabay elasticloadbalancing Elnaggar eltima embracethered enum epereiralopez exfil exfiltrated exfiltrating exploitability extrareplica ezequiel fabricscape fdcf fdw fea fel ffd filesharemount filesystem firewalls fncidr Fosaaen Frichette frichetten func Gabay Gafnit gafnitav gcp Gerstenkorn GHSA Gietz Gietzen githubusercontent gitlab gke globalsecuritydatabase globbing gmail GMoc Golang google googleblog Grzelak GSD guardduty gvisor GVuf Haroon hashicorp hencohen hostname hotpatch hotpatches html http Hudak hyperlink iam ianduffy iann iap ignacio imds imdsv img inawisdom inforce intezer iptables irsl itspeterc ITW ixid ixlib jmx jon Joyneer jpeg jpg json jupyter justm justmorpheus Karan karims kasif kasifdekel kattraxler keycredential Kirda kloudle kms korniko koyeb kubelet kubernetes Lbo leszekgrzegorek Lidor lightsail lightspin linux louisdurufle Loureiro lpe Luttwak LXD Magri mailto markus mbrancato MDP meatballninja Melhaoui metadata mfa mhgeay MHxwa microsoft misconfigurations mitm Mnwx msrc mwaa nechudav nechuta nen netspi Nir nirohfeld notlegit NTLMv nvd NWD NXYe OCID offensi Ohfeld OMI omigod onecloudplease onug opsmorph Osama osamaelnaggar oslogin OWASP Pahima paloaltonetworks passthehashbrwn passwd passwo pastebin patricksanders pbs pdf pentesting pexels PHP pixabay PLCPCP png portswigger Postgre postgresql presigned privesc pwnalytics pwning Qds QEr ramimac Rault RBAC rce rds redhat redteam Rehberger replicator Reser RHEL rhinosecuritylabs Riyaz riyazwalikar ronenshh rph rss runfunctions runtimes ryanjarv sagemaker Sagi Saini sandboxing Sasson Schindel Schmieg sdk secjuice seclab secureworks securityfu sentinelone shirtamari Shitrit Shukla Shustin sigs sigv Siteyou Slaviero smqmo Spen spiske sql src srgb ssl ssm ssrf starbucks sts subdomain Sudo sudoers summitroute superglue suse svg svgrepo symlink synfs synlapse TCf techblog tenchisecurity Tetelman thaidn thefaultinourstars theregister thexplorer threatmanagement threatmodel tinysrgb tls TQmy Traxler trustoncloud Tsarimi twimg Tzadik Tzah unauditable unauditible undelete unsplash upguard url usb usergroupspoofing username VCNx VDB vectra vgp VMs vnhacker vomqb vpc vpn vrp wafs Walikar walkthrough wallpaperflare webcams webscheme website wfw workaround Workflows workspaces Wouter wtm www WYAI xdabbad xml Xor xpatrik xss xutaf xwgw XXE yaml Yanir Yesland ymedialabs youtube Yuval yuvalavra YWdlf Zaddach zego ZXRw ```
To accept :heavy_check_mark: these unrecognized words as correct, run the following commands ... in a clone of the [git@github.com:wiz-sec/open-cvdb.git](https://github.com/wiz-sec/open-cvdb.git) repository on the `korniko98-patch-1` branch ([:information_source: how do I use this?]( https://github.com/check-spelling/check-spelling/wiki/Accepting-Suggestions)): ``` sh update_files() { perl -e ' my $new_expect_file=".github/actions/spelling/expect.txt"; use File::Path qw(make_path); use File::Basename qw(dirname); make_path (dirname($new_expect_file)); open FILE, q{<}, $new_expect_file; chomp(my @words = ); close FILE; my @add=qw('"$patch_add"'); my %items; @items{@words} = @words x (1); @items{@add} = @add x (1); @words = sort {lc($a)."-".$a cmp lc($b)."-".$b} keys %items; open FILE, q{>}, $new_expect_file; for my $word (@words) { print FILE "$word\n" if $word =~ /\w/; }; close FILE; system("git", "add", $new_expect_file); ' } comment_json=$(mktemp) curl -L -s -S \ -H "Content-Type: application/json" \ "https://api.github.com/repos/wiz-sec/open-cvdb/issues/comments/1253284780" > "$comment_json" comment_body=$(mktemp) jq -r ".body // empty" "$comment_json" | tr -d "\\r" > $comment_body rm $comment_json patch_add=$(perl -e '$/=undef; $_=<>; if (m{Unrecognized words[^<]*\n*```\n*([^<]*)```\n*
$}m) { print "$1" } elsif (m{Unrecognized words[^<]*\n\n((?:\w.*\n)+)\n}m) { print "$1" };' < "$comment_body") update_files rm $comment_body git add -u ```

To have the bot do this for you, reply quoting the following line: @check-spelling-bot apply changes.

Available dictionaries could cover words not in the dictionary [cspell:aws/aws.txt](https://raw.githubusercontent.com/check-spelling/cspell-dicts/v20220427/dictionaries/aws/aws.txt) (1485) covers 37 of them [cspell:golang/go.txt](https://raw.githubusercontent.com/check-spelling/cspell-dicts/v20220427/dictionaries/golang/go.txt) (7745) covers 13 of them [cspell:filetypes/filetypes.txt](https://raw.githubusercontent.com/check-spelling/cspell-dicts/v20220427/dictionaries/filetypes/filetypes.txt) (337) covers 13 of them [cspell:django/django.txt](https://raw.githubusercontent.com/check-spelling/cspell-dicts/v20220427/dictionaries/django/django.txt) (2342) covers 10 of them [cspell:css/css.txt](https://raw.githubusercontent.com/check-spelling/cspell-dicts/v20220427/dictionaries/css/css.txt) (993) covers 8 of them Consider adding them using (in `.github/workflows/spelling.yml`): ``` yml with: extra_dictionaries: cspell:aws/aws.txt cspell:golang/go.txt cspell:filetypes/filetypes.txt cspell:django/django.txt cspell:css/css.txt ``` To stop checking additional dictionaries, add: ``` yml with: check_extra_dictionaries: '' ```
Warnings (1) See the [:open_file_folder: files](96/files/) view or the [:scroll:action log](https://github.com/wiz-sec/open-cvdb/actions/runs/3095773302/jobs/5010553207#step:2:1) for details. [:information_source: Warnings](https://github.com/check-spelling/check-spelling/wiki/Event-descriptions) | Count -|- [:information_source: limited-references](https://github.com/check-spelling/check-spelling/wiki/Event-descriptions#limited-references) | 67 See [:information_source: Event descriptions](https://github.com/check-spelling/check-spelling/wiki/Event-descriptions) for more information.
If the flagged items are false positives If items relate to a ... * binary file (or some other file you wouldn't want to check at all). Please add a file path to the `excludes.txt` file matching the containing file. File paths are Perl 5 Regular Expressions - you can [test]( https://www.regexplanet.com/advanced/perl/) yours before committing to verify it will match your files. `^` refers to the file's path from the root of the repository, so `^README\.md$` would exclude [README.md]( ../tree/HEAD/README.md) (on whichever branch you're using). * well-formed pattern. If you can write a [pattern](https://github.com/check-spelling/check-spelling/wiki/Configuration-Examples:-patterns) that would match it, try adding it to the `patterns.txt` file. Patterns are Perl 5 Regular Expressions - you can [test]( https://www.regexplanet.com/advanced/perl/) yours before committing to verify it will match your lines. Note that patterns can't match multiline strings.