Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Fix for 1 vulnerabilities #16

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

fix: docs/Gemfile & docs/Gemfile.lock to reduce vulnerabilities

57d197a
Select commit
Loading
Failed to load commit list.
Open

[Snyk] Fix for 1 vulnerabilities #16

fix: docs/Gemfile & docs/Gemfile.lock to reduce vulnerabilities
57d197a
Select commit
Loading
Failed to load commit list.
DryRunSecurity / Sensitive Files Analyzer succeeded Jul 17, 2024 in 1s

DryRun Security

Details

Sensitive Files Analyzer Findings: 2 detected

⚠️ Potential Sensitive File docs/Gemfile (click for details)
Type Potential Sensitive File
Description Ruby on Rails manages its dependencies through Gemfile and Gemfile.lock files. A change in these files may indicate an addition of a library/dependency which could introduce additional risk to the application either through vulnerable code, expansion of the application's attack surface via additional routes, or malicious code.
Filename docs/Gemfile
CodeLink

App/docs/Gemfile

Lines 8 to 18 in 57d197a

# This will help ensure the proper Jekyll version is running.
# Happy Jekylling!
gem "github-pages", ">= 229", group: :jekyll_plugins
# If you have any plugins, put them here!
group :jekyll_plugins do
gem "jekyll-feed", "~> 0.16", ">= 0.16.0"
end
# Windows and JRuby does not include zoneinfo files, so bundle the tzinfo-data gem
⚠️ Potential Sensitive File docs/Gemfile.lock (click for details)
Type Potential Sensitive File
Description Ruby on Rails manages its dependencies through Gemfile and Gemfile.lock files. A change in these files may indicate an addition of a library/dependency which could introduce additional risk to the application either through vulnerable code, expansion of the application's attack surface via additional routes, or malicious code.
Filename docs/Gemfile.lock
CodeLink

App/docs/Gemfile.lock

Lines 1 to 58 in 57d197a

GEM
remote: https://rubygems.org/
specs:
activesupport (7.1.3.4)
base64
bigdecimal
concurrent-ruby (~> 1.0, >= 1.0.2)
connection_pool (>= 2.2.5)
drb
i18n (>= 1.6, < 2)
minitest (>= 5.1)
mutex_m
tzinfo (~> 2.0)
addressable (2.8.7)
public_suffix (>= 2.0.2, < 7.0)
base64 (0.2.0)
bigdecimal (3.1.8)
coffee-script (2.4.1)
coffee-script-source
execjs
coffee-script-source (1.12.2)
colorator (1.1.0)
commonmarker (0.23.10)
concurrent-ruby (1.3.3)
connection_pool (2.4.1)
dnsruby (1.72.2)
simpleidn (~> 0.2.1)
drb (2.2.1)
em-websocket (0.5.3)
eventmachine (>= 0.12.9)
http_parser.rb (~> 0)
ethon (0.16.0)
ffi (>= 1.15.0)
eventmachine (1.2.7)
execjs (2.9.1)
faraday (2.8.1)
base64
faraday-net_http (>= 2.0, < 3.1)
ruby2_keywords (>= 0.0.4)
faraday-net_http (3.0.2)
ffi (1.17.0)
ffi (1.17.0-arm64-darwin)
ffi (1.17.0-x86_64-darwin)
forwardable-extended (2.6.0)
gemoji (4.1.0)
github-pages (231)
github-pages-health-check (= 1.18.2)
jekyll (= 3.9.5)
jekyll-avatar (= 0.8.0)
jekyll-coffeescript (= 1.2.2)
jekyll-commonmark-ghpages (= 0.4.0)
jekyll-default-layout (= 0.1.5)
jekyll-feed (= 0.17.0)
jekyll-gist (= 1.5.0)
jekyll-github-metadata (= 2.16.1)
jekyll-include-cache (= 0.2.1)
jekyll-mentions (= 1.6.0)
jekyll-optional-front-matter (= 0.3.2)