Fix security scanner findings: XSS, SSRF, and unsafe jQuery pattern#724
Conversation
AlexNPavel
commented
Feb 10, 2026
- Use html.EscapeString instead of template.HTMLEscapeString for user input in http_compare.go (XSS, HIGH)
- Validate issue_key and comment_id formats before URL interpolation in bot_comments_cleaner.py (SSRF, MEDIUM)
- Route string selectors through document.querySelectorAll in jquery.dataTables.js to prevent HTML interpretation (LOW)
- Add pycache/ to .gitignore
|
Skipping CI for Draft Pull Request. |
|
/test security |
b5fb1c3 to
201c7a1
Compare
|
/test security |
|
/test all |
|
@AlexNPavel: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: AlexNPavel, bradmwilliams The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |