-
Notifications
You must be signed in to change notification settings - Fork 6
fixing encoding/decoding problem #175
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
| `Found ${ongoingAttempts.length} ongoing attempts for user ${userSession.userId} on assignment ${assignment.id}`, | ||
| ); | ||
| if (ongoingAttempts.length > 0) { | ||
| console.log( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Mend Code Security Check
New finding (1 of 2)
The Mend Code Security Check of your branch failed because of a Log Forging finding in this line.
| Severity | Vulnerability Type | CWE | File | Data Flows | Detected | ||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Log Forging | 1 | 2025-10-22 10:37pm | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||
| ); | |
| console.log( | |
| `Found ${ongoingAttempts.length} ongoing attempts for user ${userSession.userId} on assignment ${assignment.id}`, | |
| ); | |
| if (ongoingAttempts.length > 0) { | |
| console.log( |
1 Data Flow/s detected
| createAssignmentAttempt( |
| return this.attemptService.createAssignmentAttempt( |
| async createAssignmentAttempt( |
| await this.validateNewAttempt(assignment, userSession); |
| private async validateNewAttempt( |
| `User ${userSession.userId} has ongoing attempts for assignment ${assignment.id}`, |
| console.log( |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Log Forging Training
● Videos
▪ Secure Code Warrior Log Forging Video
● Further Reading
🏴 Suppress Finding
- ... as False Alarm
- ... as Acceptable Risk
| const ongoingAttempts = attempts.filter( | ||
| (sub) => !sub.submitted && (!sub.expiresAt || sub.expiresAt >= now), | ||
| ); | ||
| console.log( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Mend Code Security Check
New finding (2 of 2)
The Mend Code Security Check of your branch failed because of a Log Forging finding in this line.
| Severity | Vulnerability Type | CWE | File | Data Flows | Detected | ||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Log Forging | 1 | 2025-10-22 10:37pm | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||
| orderBy: { createdAt: "desc" }, | |
| }); | |
| const ongoingAttempts = attempts.filter( | |
| (sub) => !sub.submitted && (!sub.expiresAt || sub.expiresAt >= now), | |
| ); | |
| console.log( |
1 Data Flow/s detected
| createAssignmentAttempt( |
| return this.attemptService.createAssignmentAttempt( |
| async createAssignmentAttempt( |
| await this.validateNewAttempt(assignment, userSession); |
| private async validateNewAttempt( |
| `Found ${ongoingAttempts.length} ongoing attempts for user ${userSession.userId} on assignment ${assignment.id}`, |
| console.log( |
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Log Forging Training
● Videos
▪ Secure Code Warrior Log Forging Video
● Further Reading
🏴 Suppress Finding
- ... as False Alarm
- ... as Acceptable Risk
Learner bug fixes, urget hot fixes for timers, attempts