Steve Perkins (a4193e1a) at 10 Nov 16:56
Apply 1 suggestion(s) to 1 file(s)
@GitLabDuo Please make that change.
Steve Perkins (93f52c26) at 10 Nov 16:55
Apply 1 suggestion(s) to 1 file(s)
@GitLabDuo Can you make this change here?
Steve Perkins (3ae4f1bc) at 10 Nov 16:52
Duo Workflow: Resolve issue #3
Relates to issue #3
This MR was created by Duo in Session 1255185
Vulnerability ID: 236933790
Severity: HIGH
Scanner: Dependency Scanning
Location: package-lock.json
Affected Package: ws (WebSocket library)
The ws package is affected by a Denial of Service (DoS) vulnerability when handling requests with many HTTP headers. This can lead to application unavailability and resource exhaustion.
Any WebSocket functionality in the application, including:
Update ws package to the latest secure version:
npm update ws
Check for transitive dependencies that might also use ws:
npm ls ws
Review WebSocket usage in the application:
grep -r "WebSocket\|ws" src/
npm audit
npm ls ws
After remediation, monitor for:
This is a HIGH severity vulnerability that should be addressed promptly, especially if the application has public-facing WebSocket endpoints.
Vulnerability ID: 236933791
Severity: HIGH
Scanner: Dependency Scanning
Location: package-lock.json
Affected Package: tar-fs
The tar-fs package is vulnerable to link following and path traversal attacks when extracting crafted tar files. This vulnerability allows attackers to write files outside the intended extraction directory.
Any code that uses tar-fs to extract tar archives, particularly:
Update tar-fs package to the latest secure version:
npm update tar-fs
Review package-lock.json to ensure the vulnerable version is removed
Audit tar-fs usage in the codebase:
grep -r "tar-fs" src/
npm audit
npm ls tar-fs
This is a HIGH severity vulnerability that should be addressed promptly, especially if the application processes user-uploaded tar files.
Vulnerability ID: 236933810
Severity: CRITICAL
Scanner: SAST
Location: chart/templates/deployment.yaml:17
The Kubernetes deployment configuration allows privilege escalation, which poses a critical security risk. This vulnerability could allow a container to escalate its privileges and potentially compromise the entire cluster.
spec:
template:
spec:
securityContext:
runAsNonRoot: true
runAsUser: 1000
fsGroup: 2000
containers:
- name: your-container
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: true
runAsNonRoot: true
runAsUser: 1000
capabilities:
drop:
- ALL
This is a CRITICAL security vulnerability that should be addressed immediately before any production deployment.
Steve Perkins (44da5cac) at 10 Nov 16:37
Merge branch 'duo-edit-20251110-163218' into 'main'
... and 2 more commits
This change addresses the issue where newly added swag items show "Just now" instead of precise timestamps.
Fixes issue #2
Steve Perkins (adb014a4) at 10 Nov 16:35
Apply 1 suggestion(s) to 1 file(s)
This change addresses the issue where newly added swag items show "Just now" instead of precise timestamps.
Fixes issue #2
Steve Perkins (739f7d7c) at 10 Nov 16:32
fix: eliminate 'Just now' timestamp and show precise relative times
Currently, the swag items are being timestamped with a general date/time, but we need more precise timestamps for each individual swag item collected. This will help with better tracking and analytics of when specific items were obtained during the conference.
The timestamp should capture the exact moment when each swag item is added to the collection, providing more granular data for reporting and analysis purposes.
Steve Perkins (b7a4bf2a) at 10 Nov 16:27
Merge branch 'workloads/7d63021d20c' into 'main'
... and 2 more commits
Relates to issue #2
This MR was created by Duo in Session 1254938
@GitLabDuo In the deployed app, why do I see a timestamp of "Just now"?
@GitLabDuo Would this change still allow sorting features to work for more recently or least recently added items?
Steve Perkins (9fb264b1) at 10 Nov 16:23
Apply 1 suggestion(s) to 1 file(s)