Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Fix for 2 vulnerabilities #110

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

snyk-bot
Copy link

Snyk has created this PR to fix one or more vulnerable packages in the `npm` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • packages/grafana-ui/package.json

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Breaking Change Exploit Maturity
medium severity 576/1000
Why? Recently disclosed, Has a fix available, CVSS 5.8
Prototype Pollution
SNYK-JS-HIGHLIGHTJS-1045326
Yes No Known Exploit
high severity 629/1000
Why? Has a fix available, CVSS 8.3
Cross-site Scripting (XSS)
SNYK-JS-PRISMJS-597628
Yes No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Commit messages
Package name: @storybook/addon-storysource The new version differs by 250 commits.

See the full diff

Package name: @storybook/react The new version differs by 250 commits.

See the full diff

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic

@guardrails
Copy link

guardrails bot commented Nov 26, 2020

⚠️ We detected security issues in this pull request:
Mode: paranoid | Total findings: 315 | Considered vulnerability: 113

Hard-Coded Secrets (111)

frame.add({ time: 1589189388597, content: 'user registered', level: 'info', id: 'd3b07384d113edec49eaa6238ad5ff00' });

frame.add({ time: 1589189406480, content: 'unknown error', level: 'error', id: 'c157a79031e1c40f85931829bc5fc552' });

"keyId": "7e4d0c6a708866e7",

"LICENSE": "12ab7a0961275f5ce7a428e662279cf49bab887d12b2ff7bfde738346178c28c",

"module.js.LICENSE.txt": "0d8f66cd4afb566cb5b7e1540c68f43b939d3eba12ace290f18abc4f4cb53ed0",

"module.js.map": "8a4ede5b5847dec1c6c30008d07bef8a049408d2b1e862841e30357f82e0fa19",

"plugin.json": "13be5f2fd55bee787c5413b5ba6a1fae2dfe8d2df6c867dadc4657b98f821f90",

"README.md": "2d90145b28f22348d4f50a81695e888c68ebd4f8baec731fdf2d79c8b187a27f",

"module.js": "b4b6945bbf3332b08e5e1cb214a5b85c82557b292577eb58c8eb1703bc8e4577"

{"name":"mykey","key":"eyJrIjoiWHZiSWd3NzdCYUZnNUtibE9obUpESmE3bzJYNDRIc0UiLCJuIjoibXlrZXkiLCJpZCI6MX1=","id":1}

This should return a response: `{"name":"apikeycurl","key":"eyJrIjoiR0ZXZmt1UFc0OEpIOGN5RWdUalBJTllUTk83VlhtVGwiLCJuIjoiYXBpa2V5Y3VybCIsImlkIjo2fQ=="}`.

"secretKey": "dGVzdCBrZXkgYmxlYXNlIGRvbid0IHN0ZWFs"

get_file "https://dl.google.com/go/$filename" "/tmp/$filename" "010a88df924a81ec21b293b5da8f9b11c176d27c0ee3962dc1738d2352d3c02d"

"e7ab86d833bf9faed39801ab3b5cd294f026d26f9a7da63a42390943ead486cc"

"b4138199aa755ebfe171b57cc46910b13258ace5fbc4eaa099c42607cd0bff32"

get_file "https://dl.google.com/go/$filename" "/tmp/$filename" "70ac0dbf60a8ee9236f337ed0daa7a4c3b98f6186d4497826f68e97c0c0413f6"

"9a5d47b51442d68b718af4c7350f4406cdc087e2236a5b9ae52f37aebede6cb3"

"b4138199aa755ebfe171b57cc46910b13258ace5fbc4eaa099c42607cd0bff32"

get_file "https://dl.google.com/go/$filename" "/tmp/$filename" "010a88df924a81ec21b293b5da8f9b11c176d27c0ee3962dc1738d2352d3c02d"

"e7ab86d833bf9faed39801ab3b5cd294f026d26f9a7da63a42390943ead486cc"

"b4138199aa755ebfe171b57cc46910b13258ace5fbc4eaa099c42607cd0bff32"

{ key: 'numericString', value: '12345678901234567890' },


traceID: '2992f2a5b5d037a8aabffd08ef384237',

authHeader := util.GetBasicAuthHeader("api_key", "eyJrIjoidjVuQXdwTWFmRlA2em5hUzR1cmhkV0RMUzU1MTFNNDIiLCJuIjoiYXNkIiwiaWQiOjF9")

"LICENSE": "7df059597099bb7dcf25d2a9aedfaf4465f72d8d",

"README.md": "08ec6d704b6115bef57710f6d7e866c050cb50ee",

"gfx_sheets_darwin_amd64": "1b8ae92c6e80e502bb0bf2d0ae9d7223805993ab",

"gfx_sheets_linux_amd64": "f39e0cc7344d3186b1052e6d356eecaf54d75b49",

"gfx_sheets_windows_amd64.exe": "c8825dfec512c1c235244f7998ee95182f9968de",

"module.js": "aaec6f51a995b7b843b843cd14041925274d960d",

"module.js.LICENSE.txt": "7f822fe9341af8f82ad1b0c69aba957822a377cf",

"module.js.map": "c5a524f5c4237f6ed6a016d43cd46938efeadb45",

"plugin.json": "55556b845e91935cc48fae3aa67baf0f22694c3f"

"keyId": "7e4d0c6a708866e7"

{Uid: "asdfghjklqwertyuiopzxcvbnmasdfghjklqwertyuiopzxcvbnmasdfghjklqwertyuiopzxcvbnm", Error: models.ErrDashboardUidTooLong},

So(ds.SecureJSONData["tlsCACert"], ShouldEqual, "MjNOcW9RdkbUDHZmpco2HCYzVq9dE+i6Yi+gmUJotq5CDA==")

So(ds.SecureJSONData["tlsClientCert"], ShouldEqual, "ckN0dGlyMXN503YNfjTcf9CV+GGQneN+xmAclQ==")

So(ds.SecureJSONData["tlsClientKey"], ShouldEqual, "ZkN4aG1aNkja/gKAB1wlnKFIsy2SRDq4slrM0A==")

"e59c568621e57756495a468f47c74e07c911b037084dd464bb2ed72410970dc849cabd71b48c394faf08a5405dae53741ce9",

want := "dd1f7fdb3466c0d09c2e839d1f1530f8"

const letters = 'ABCDEFGHIJKLMNOPQRSTUVXYZ';


references: [{ refType: 'CHILD_OF', traceID: '1ed38015486087ca', spanID: '3fb050342773d333' }],

{ key: 'client-uuid', type: 'string', value: '2a59d08899ef6a8a' },

'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',

id: '8c50d09800ce8dda69a2ff25405c9f65',

expect(data[0].fields[2].values.get(0)).toEqual('2b431b8a98b80b3b2c2f4cd2444ae6cb');

expect(data[1].fields[2].values.get(0)).toEqual('75d73d66cff40f9d1a1f2d5a0bf295d0');

id: '19e8e093d70122b3b53cb6e24efd6e2d',

export GPG_PRIV_KEY="-----BEGIN PGP PRIVATE KEY BLOCK-----

lQdGBF5xFEABEADeBk96IlsnzwPjt6iUFIFa4m/GbDflfMYnUDnKmBebbUPu03Qz
EeMOxZDGFsFeu+a9BNuYjaVGEDJbuScknBj+XHyo7csW10vherOsMZqOMdRu9LLG
VcTUFlVAhb8coVmrh1/24xfwAs5NJmDNuUsMsuAzpXy0Rzp17cyxkGq7K3Pr2OFF
wXlmu5sdyYOx59ZDl1z8DjsWTmZAn9tAPU2gwRSr7suiPV0Eg5jvFXTqZa94hot+
D1DwpwhHlmiRKcNzXydQv0yrX0bKt0ymXyVaTEjtnmrZvDHrke59WGYVZ3JdOKio
QWCA3dLvEoOoc9+uDehMubUB87rLTbhl9WSI9eJSbvktmHK1p5wrO3vH5Y+Alfxu
BN1Rpgt/8izo8FFx/Psp9E07aaNdzlEhvStVYlEZyvZRW2srZOGqkU1yXEBIVVsQ
mffY4migb6QO5cp+Czg1cK931QZcEakHYCgb6MsK0XBAUJRcKodNaYScWAfQLarW
kn5lEB3huZ98olVXMVL8jUZPBbt8MVKz7iqwHfhKvX0f/9+fLHD6pMX5BYv8oNWI
t5YgaPt4F+R1tSKUzpOPKtFVIPPtiwSHDp43oqkZ+mqz6ghAR/w7nkafY0Si4yFz
rwRkyZQGcMGcaeWyhdRtHeFkWj0l3axBVj+g6xxrtvPN31WPN1fAd9E2KwARAQAB
/gcDAl1q70rZmFAS9Ldh/SW9NUoBRiBjXb6ORDUQiY1x7SDwCgJIAskAGgoF/a0i
YE61mRbO1AXW9QSzmE5MB1mKuzc3b52YdRyXCtDpD5vVH3wwpYYII23LF7h33sP6
m53Rd0lXQq69G+ugKSyDCogckDyRYQqeEMSjzMeK61rNmwr2FmfWlCxUYouZkPAl
7Xxef7tc0H/Lm5CuCFLBo0ZDU5v+lEq8/xoDQhm6+V0Kyzu4MKGRXS7s+bsJDvJy
d/qT9QtpIKHa9kXx1MipWyDoAcqGva7tbNzu3RQGUrB682Pk+VVNoDC659rcTOh5
fwnmpWfJor6vYTvlg67abEebu2PzMlKKq/J9relGcyB1NfmX2dx8/bEq5HKLH7my
Ya4Gk6BouSZU1D6VfNPbzUKjs8gwKWAS7gVkRUY7ZAv6kIKnbnFlR7XqRHOabdbx
3FTltXJ0iewpERp1OPvoaNWU2Px4HyRDUTU9cAKds8TLqKzereMxOT4neDkzjJxp
NSX6lXH/evwtxjkBvkeMyjPutSJLYxaPzinURLTMprn/W9fZnuIY2yZvB9ZMscg9
s3OVSOULtMlMH/zWVXNKwT0iV0Wk+T5O4hNfViX7DSN+tLZ7eIfaJxpWG4t568It
pRUo5KqitRrgKreij4b9eQeGsrx5Faz3ezVSigeLz7YIbJd6Aod7KZxXdJnogjCD
sZIgOf49FEspY3b2nHFyC7WUfrfcxED00ggnGmIvj6S1nCAge9tJf5cWaXU3RyiL
+OHJaOU9oZ9NEIYOD4TJuwVFJtzYYNJDB+DmXKCFLIb/pdrutRUI+PSTBGFfVhoZ
dDLKQ49n+1ec9ZGchaNNxhJmuY006c6OdOHb22tiad2xizDCgtF1KVL7IDqxQGhI
DwlY/q7NehYdioOeJOcb5hVdrWl/iroBYdymfyKmGo0fsQ1Gc4rN1RqwVhR8agIM
9hS7XLr+kXaA9e/KQ53ykVtYgbVLYZS1C6zBMp5e+Y+X7yN6KbV1Ey1cTMrIOohW
XUIYAOTxQVBb8Q7Dtaseb18Hr0NvVojeQaz/ypr7uNYpx8CzWkjbkJiE6O6vNehh
bCikT8ROUx3UG3HKYWm+4wrldmyW0UJDESl9u1TqG9Umu1JGHwq4hDRfR4NJFDic
kcsRr057nwyCmglGk0gseecR+9rtgOVPgIQQLWytuvAUJkJ1HklW3tNg7R4qh9Gz
4GiPjXtV7BSG1JXDa9Ejb/zFR8tbckfaDhnGDrV/0hjGv6GAOn3xc3+5sC6uo/xt
nkbpYI6KGWJ4sTlqwsLaCo3vOSadpTLa3DViQm7WlpqYp6UVtA4cgx6CRw9CzoY9
KFdpBoCLS5CxKuZPFU1wbqUvpJUxG1jBXVuYB1zSZlD6kKrA7CV0v9DgfNfaRqFi
Ni2cafCRmtnGEgqh5u4fBFbCYDitMfMmkGcY64B5b+X72FXW2gZP+De/ewgHTzVl
r1aiRcK4wGRNKszmfV1hwd4nSGJj0EzWkh8BeyORIKhyVzcD2VrAO0liqV6mKEXO
96junlCfXiu4WIEbvPq2HHQzOMOppjEfXoFzDt6uxETzEyibSyJP8r6vdRq114D0
dZxMIkZ/WYS7M1YlDzzpbBjmQiw/6nWNCNV5s5rtHnFDwVEi1Zl1x0sSV/ZUBZ6A
toh2i0VhxuxRVJ/DlnRicEhpkGyvJDe9jWt5mS18t78tO5BDfbbqnTbVTCTUNEan
wKtldIiLAAST3csojR5hHzwD3c/N8uhEhDLLNUt5/Hgb0DenN1BhxK+0JkNpcmNs
ZUNJIEJvdCA8ZW5naW5lZXJpbmdAZ3JhZmFuYS5jb20+iQJOBBMBCAA4FiEE3tBb
McdoEfwn2qRbStVWUNx2PisFAl5xFEACGwMFCwkIBwIGFQoJCAsCBBYCAwECHgEC
F4AACgkQStVWUNx2PivFlw/+JiYjFlVK3oipKBSqTEUeGFFfPyn9cfrYyJMRIb9e
1RoS+vJXWvMDdCzUr3Xbk6QoZfbYA9kzHvyQXoZ+J/TrOlMs0k4QQG4fCfRNdNKd
fE3WmC8y+3IHMHZWJ75tUk7Ng3i/4EucqqzZ3zTS1GLHmpD3DM5sEQbdqMbEWlHZ
p3iQ2kMtAZr5N2ahfQ7g5VY2aA1yDzX3kSRtZ+XvkEHkhp/Z1iN6uWZvw4+txDjV
TFBZAc5PxcdsZnJrgRmLrMB7i0IWvxDSSV9amP+ikdGIBYiYPfRGIaoqjFrut3Xz
77BNW8uT7qYuMEVp4BpSKvHqrIuT/cwaKrBiC+Df6w22xaa4jzaIiyZ6mZu3Lkgg
fnnZP17UFHwN0wfPqH/zCTEYPcR6TpXvE9GnmEBwS5t2kyq3aH3G403bpc40hhAt
7Fotajk616LQOYDQbS+V2doMeYJDJPdXkb/469tUPSmbKDtGrInxfSaZmB7Hzqn1
VGIM2GceF7D7MZVD6Aicpv6+ce9Ktym4j7HudOll22+or9iR7Y3fCoE7WY4ib0ty
nH7fESPTEsvGICWQE1AhlykrKECGMtCst2YLncdvBrCE4Yqt9Gx0kmVN3wSDtpiG
YZzklmSlpx33mTE9GRGmpCPFp97PcKPKVSC93vFDmopc2TBp5fbGP979UizHhufP
FeOdB0UEXnEUQAEQAOplFNhohqy1cLcWkaIFXvM0vM3BUHnRMOgTKbaK8XsMldVH
pDr7kjhETNMaSN2W1VE9jGeL4SgLZ8Eod4j5stpGxLppoh3aKiab0p4di8MmaHtb
6L/6khtKq4kQXGN4OL1edhP/C/ebEDcea1hpRJp3U8u9FhfLTqoPG+zlL0YecScS
y/cU66Nd5iykBDGM40O3ZBzwHOtrXs9IbRYW8uATZfLvGyYrKTbK9kYp/qvHytoz
84LmWQuY5qZ87ubTduZqEjamsayZmB2hUcPGfc+BG/UO405sYOhyunhR0/+DOvkw
PTNEJhJUx8lEm6JKTY1L6FLIHxRngrMMjscPhx73SoyisiPWoV+vooed5c4/ILRZ
hz81jOnC+8BDJAQ42TjFqmpNTgcBe0lR/7X/ri0pVQknk3/ondqQj4nsnA5HrDzd
T2fYyZQDprczBTtKdTOwiSWsav0eYzdewlXiEdFC9JB9lpQpFW5d72B6DOB7jPEm
sYzP1AeCFZqxRO0j4UviB+o0/+97KEDUNrTS/XQjwzZYj7ICqB5u2Iownp7NLkzi
g5DDAGUjJPLMFj23G2D59YkSspnfiO408qIdy7hDOfq2DIT2M06L06a/gwQy1jBS
Jpnp9y9LmsP14EqQPMKxqgpKuq9DUYYtZtdAC9SAF3wFkC1TqPAMOIOo8MUNABEB
AAH+BwMCp9MSpoxVzSn0eUy9grFaH7kE4eOnsSME3siWQxEWViK9AhhxHWdyNO4l
YJYKXuX3xNjv07APE5EyU4QKd9+YguWDFQ+ETuK2nF7qb3PP2jlHkK3SA9vH4fSV
iP5ofbFmGgpt4BN6bLNN9XH4M4KHd8qr4n+vD2mASKQZu5v2ERftDtDe70wDcKta
Yveoy8giHAMypYmleSXjflbQ8m05HYurFbUxBtWFhtbOJYPzUnTnaLjnmcZ2MtvD
+yMvMe4W9OUvjd3zmh4bv3vfo+2fSe5V7NU6DqX4/vzM9H1lNvwcUJa11+4/EGrm
erI9pf/naioNeHn1if09J8OQ7ZBNrTQdmR+GHb5tm/gFxF6LBu7+CRSxf/jniKl/
xNSZ0Z6ShwZ7jQdQD4yLOMrTljZ4gZqTKqmPzTwbb3792fFGEevHbcZtBBNPU7v8
eyq+lH48klZRbw5FGM63GxvbqlknOfG7wLQ1+0cgfsXBNnRZuiB32vPSpg/VtEOY
rxvxnEpPDTVoQ3xWIV1d3ej8WRO5F1aVtEk4N8UZlYrn5A5H+UIUsvPPTinEfCP4
qCKUIeAlYAGhazcLBg9ssFULeUDhfw1TVmPoq+WUyK9y13pFmmth3bJchFHQTPyY
a97FCqiF2XKnUolQOTC+/XLpS1Qvh1qye5Rt+vfEtK59OlZ4aQoal7jF1znDsr4C
U4CutNvizPPW02TVpAlhS3EMVMpNmU3irsvhUIMwkwERyUCLl6ZSgk2LyWUsJHx6
Czq6Hgt7viCk86N2MSmsz5HHUXkJWbmGrmYPQxvpizZJs+dh12Bfcbia8auSxFmw
rx8tlQpGfKA5IBeXhUICcnaOaqPj0Jk+61FAgRg/6aFYsbH3QjyvTWUOMksm/r1j
LQ95XhRp91PzhQ/i9sktH23yak0Zj9YGJm84DdOTBalivfqCmg+7UHS/hkWFMdS5
hzbIxTlcXoK3xnDmSRhYSHR4mvM0AzEfBzpEfM6Z3nSG2HQO3RHPIdzQH0iRKKHw
txocLgG2YVHnDju/jO1/Ic/CitPCFovKGEoJL8ss6LNSUVcLvp82DKjNtsZ0Y8xc
mmu0qogFCn0t/qXliEPBRdRgKjPGy7BNuZwEXRDDFAiXjfPG+VUhmrksv7tQHMwp
kM1u1tFp+YkZHbxEjZ0F9kr/uoiWh7Gj/QAmcW9Oirlk1s3a3DnodJ+kmgWrfGV2
NqLjNB4uh3ntl+t4buJCuTYmqEIzUgvlm5GYcQ+N8C1KcSLFTkCL70YXOccOGjgs
KUpbeCam2XI6VnsnarMuXK7w6/4dgOgfarNFj0wvcxw1w/zhpCtH7xoR73kpZsOQ
qTe3c7F8Ug6pRFe02HkQ7hbsaOHUy2ypnOYU7OXA/xV5y/Wl4/a5khJtqpYYenoj
Ou1vsg3RNK9mdDf1fhzZsq1NOPjWtRmtKg4Da5O0ttEb0MwvvkDY3uhWSVQnX/tR
WK2wWcHpOYnGVNs46BBExHmsmJsWrnjXNQi0hf3YCqj88TFqZwgtNR9Us9lbtsCu
GuralK4yzh3NnDtWCgLYZsYIWpR09ZzlFuTNHfKJHfmc1glCz+q3Urp0adqzdeeV
t+BeRUJpoL+o4yUjz6wsHSxEEZ6IkYBv/7o//y/eBUyO1kim0noaSW/DyAFrMMfF
nSdHP8dmHhxPqQz/El8PlzaFne9ShbX2IyhzKzTVXFY45M6c2yLvmghYvv2MNOK+
dFuD//txGa04PiwFp7wILF5itngpIsmAOrsDfStxQZe5DELMZUeuw2PViQI2BBgB
CAAgFiEE3tBbMcdoEfwn2qRbStVWUNx2PisFAl5xFEACGwwACgkQStVWUNx2Piv9
/w/+O0mQioTTIMplowS9smcfj7SEjk6BQEeF47EAVMC+waeOh5ekFHDej2cA/OAG
bdx8cpxb198FCGciZutprSoLkB1N8XCL5LHTQflaU0Ia8zmEVj4n0KzTR+sQG6aM
z9U+PBgNnSbk1JmUJp64NNgbavQkKS41fBv28oVXKAYzbhpC2iIMYzdiyzSolm45
HFc+15hFoXNX22TeQg3+5AwlBbV7ohaWCq2mW8cZXjW9E4/PFsFJ2A9Wj+3a3AZ8
GItxipDC/5pHnF4ZpVs3QztLUrKt5/PWc89UOU42E5CswYsRc9EXS5EMzoMJmsrp
At/96HrACSKNZG8aJKj4UD0OcNR2YU4iyg/3OTDgychsKV+izmNU7njgjt4IRx2q
QiuT8xhoI/CKEJlUTcRlBMhExz1c0jzbLYnfwSe5eKkKRbrDpNsCyY6jl3y/38MB
Uv8g+VfNUajzQTOajojzpxIMLhP6+cCAFLL4kYd3O7UAOW9vOWmg2PqRSnbO7WLV
9iEEWaPbLBC267xxXBmAqgSfH1BBsiNiqedGNnY3ZP3zTo033JKuFjkZ/L7pwYD3
WVWEHpS+9gSACfi/Id3k0XeS2PnqynA2r39u0ms7b++pksc4+TjrBj8wADkyz7za
TYHzuKB4q3w8B8FoqNShsyywlLumEJIYACy15GeAQGnRAZo=
=f4Ve
-----END PGP PRIVATE KEY BLOCK-----
"

export GPG_PUB_KEY="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"

'CHKSUM': 'beca3d7819a6bdcfbd044576df4fc284053b48f468b2f03428fe66f4ceb2c05d9b5411357fa15003cb0' +

'311406c255084cf7283a3b8fce644c340c2f6aa910b9f',

const clientKey string = `-----BEGIN RSA PRIVATE KEY-----

-----BEGIN PRIVATE KEY-----

placeholder="Begins with -----BEGIN RSA PRIVATE KEY-----"

placeholder="Begins with -----BEGIN RSA PRIVATE KEY-----"

- git clone "https://$$env:GITHUB_TOKEN@github.com/grafana/grafana-enterprise.git"

- git clone "https://$$env:GITHUB_TOKEN@github.com/grafana/grafana-enterprise.git"

- git clone "https://$$env:GITHUB_TOKEN@github.com/grafana/grafana-enterprise.git"

# Example: mysql://user:secret@host:port/database

# Example: mysql://user:secret@host:port/database

- #16 Add support for Basic Auth (use http://username:password@yourgraphitedomain.com)

"access_token": "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6ImlCakwxUmNxemhpeTRmcHhJeGRacW9oTTJZayIsImtpZCI6ImlCakwxUmNxemhpeTRmcHhJeGRacW9oTTJZayJ9.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.ga5qudt4LDMKTStAxUmzjyZH8UFBAaFirJqpTdmYny4NtkH6JT2EILvjTjYxlKeTQisvwx9gof0PyicZIab9d6wlMa2xiLzr2nmaOonYClY8fqBaRTgc1xVjrKFw5SCgpx3FnEyJhIWvVPIfaWaogSHcQbIpe4kdk4tz-ccmrx0D1jsziSI4BZcJcX04aJuHZGz9k4mQZ_AA5sQSeQaNuojIng6rYoIifAXFYBZPTbeeeqmiGq8v0IOLeNKbC0POeQCJC_KKBG6Z_MV2KgPxFEzQuX2ZFmRD_wGPteV5TUBxh1kARdqexA3e0zAKSawR9kmrAiZ21lPr4tX2Br_HDg"

"access_token": "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsIng1dCI6ImlCakwxUmNxemhpeTRmcHhJeGRacW9oTTJZayIsImtpZCI6ImlCakwxUmNxemhpeTRmcHhJeGRacW9oTTJZayJ9.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.Pw8c8gpoZptw3lGreQoHQaMVOozSaTE5D38Vm2aCHRB3DvD3N-Qcm1x0ZCakUEV2sJd7jvx4XtPFuW7063T0V1deExL4rzzvIo0ZfMmURf9tCTiKFKYibqf8_PtfPSz0t9eNDEUGmWDh1Wgssb4W_H-wPqgl9VPMT7T6ynkfIm0-ODPZTBzgSHiY8C_L1-DkhsK7XiqbUlSDgx9FpfChZS3ah8QhA8geqnb_HVuSktg7WhpxmogSpK5QdrwSE3jsbItpzOfLJ4iBd2ExzS2C0y8H_Coluk3Y1YA07tAxJ6Y7oBv-XwGqNfZhveOCQOzX-U3dFod3fXXysjB0UB89WQ"

os.Setenv("GF_DATABASE_URL", "mysql://user:secret@localhost:3306/database")

So(appliedEnvOverrides, ShouldContain, "GF_DATABASE_URL=mysql://user:-redacted-@localhost:3306/database")

"id_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJyb2xlIjoiQWRtaW4iLCJlbWFpbCI6ImpvaG4uZG9lQGV4YW1wbGUuY29tIn0.9PtHcCaXxZa2HDlASyKIaFGfOKlw2ILQo32xlvhvhRg",

"id_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJlbWFpbCI6ImpvaG4uZG9lQGV4YW1wbGUuY29tIn0.k5GwPcZvGe2BE_jgwN0ntz0nz4KlYhEd0hRRLApkTJ4",

"id_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJyb2xlIjoiQWRtaW4iLCJlbWFpbCI6ImpvaG4uZG9lQGV4YW1wbGUuY29tIn0.9PtHcCaXxZa2HDlASyKIaFGfOKlw2ILQo32xlvhvhRg",

"id_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJyb2xlIjoiQWRtaW4iLCJlbWFpbCI6ImpvaG4uZG9lQGV4YW1wbGUuY29tIn0.9PtHcCaXxZa2HDlASyKIaFGfOKlw2ILQo32xlvhvhRg",

"id_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJyb2xlIjoiQWRtaW4iLCJlbWFpbCI6ImpvaG4uZG9lQGV4YW1wbGUuY29tIn0.9PtHcCaXxZa2HDlASyKIaFGfOKlw2ILQo32xlvhvhRg",

"id_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJyb2xlIjoiQWRtaW4ifQ.k5GwPcZvGe2BE_jgwN0ntz0nz4KlYhEd0hRRLApkTJ4",

"id_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJlbWFpbCI6ImpvaG4uZG9lQGV4YW1wbGUuY29tIn0.k5GwPcZvGe2BE_jgwN0ntz0nz4KlYhEd0hRRLApkTJ4",

"id_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJsb2dpbiI6ImpvaG5kb2UiLCJlbWFpbCI6ImpvaG4uZG9lQGV4YW1wbGUuY29tIn0.sg4sRJCNpax_76XMgr277fdxhjjtNSWXKIOFv4_GJN8",

"id_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJsb2dpbiI6ImpvaG5kb2UiLCJlbWFpbCI6ImpvaG4uZG9lQGV4YW1wbGUuY29tIn0.sg4sRJCNpax_76XMgr277fdxhjjtNSWXKIOFv4_GJN8",

"id_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJsb2dpbiI6ImpvaG5kb2UiLCJlbWFpbCI6ImpvaG4uZG9lQGV4YW1wbGUuY29tIiwibmFtZSI6IkpvaG4gRG9lIn0.oMsXH0mHxUSYMXh6FonZIWh8LgNIcYbKRLSO1bwnfSI",

"id_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJsb2dpbiI6ImpvaG5kb2UiLCJlbWFpbCI6ImpvaG4uZG9lQGV4YW1wbGUuY29tIiwibmFtZSI6IkpvaG4gRG9lIn0.oMsXH0mHxUSYMXh6FonZIWh8LgNIcYbKRLSO1bwnfSI",

"id_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCIsInppcCI6IkRFRiJ9.eJyrVkrNTczMUbJSysrPyNNLyU91SK1IzC3ISdVLzs9V0lEqys9JBco6puRm5inVAgCFRw_6.XrV4ZKhw19dTcnviXanBD8lwjeALCYtDiESMmGzC-ho",

"id_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCIsInppcCI6IkRFRiJ9.00eJyrVkrNTczMUbJSysrPyNNLyU91SK1IzC3ISdVLzs9V0lEqys9JBco6puRm5inVAgCFRw_6.XrV4ZKhw19dTcnviXanBD8lwjeALCYtDiESMmGzC-ho",

"id_token": "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCIsInppcCI6IkdaSVAifQ.H4sIAAAAAAAAAKtWSs1NzMxRslLKys_I00vJT3VIrUjMLchJ1UvOz1XSUSrKz0kFyjqm5GbmKdUCANotxTkvAAAA.85AXm3JOF5qflEA0goDFvlbZl2q3eFvqVcehz860W-o",

'git clone "https://$$env:GITHUB_TOKEN@github.com/grafana/grafana-enterprise.git"',

curl http://admin:admin@localhost:3000/api/search

?curl http://admin:admin@localhost:3000/api/org

}' http://admin:oldpass@<your_grafana_host>:3000/api/user/password

to the request HTTP URL, like http://admin:admin@localhost:3000/api/orgs

to the request HTTP URL, like http://admin:admin@localhost:3000/api/orgs/1/users

curl -X POST -H "Content-Type: application/json" -d '{"name":"apiorg"}' http://admin:admin@localhost:3000/api/orgs

curl -X POST -H "Content-Type: application/json" -d '{"loginOrEmail":"admin", "role": "Admin"}' http://admin:admin@localhost:3000/api/orgs/<org id of new org>/users

curl -X POST http://admin:admin@localhost:3000/api/user/using/<id of new org>

curl -X POST -H "Content-Type: application/json" -d '{"name":"apikeycurl", "role": "Admin"}' http://admin:admin@localhost:3000/api/auth/keys

Example: `mysql://user:secret@host:port/database`

STATUS=$(curl -s -o /dev/null -w '%{http_code}' http://admin:admin@grafana.loc/api/alert-notifications/1)

http://admin:admin@grafana.loc/api/alert-notifications

STATUS=$(curl -s -o /dev/null -w '%{http_code}' http://admin:admin@grafana.loc/api/alert-notifications/2)

http://admin:admin@grafana.loc/api/alert-notifications

http://admin:admin@grafana.loc/api/alert-notifications/2

http://admin:admin@grafana.loc/api/admin/pause-all-alerts

http://admin:admin@grafana.loc/api/admin/pause-all-alerts

# url = "postgres://user:password@localhost/schema?sslmode=disable"

# ## http://admin:secret@couchbase-0.example.com:8091/

# # servers = ["http://user:pass@localhost:9200"]

# ## mongodb://user:auth_key@10.10.3.30:27017,

# ## rethinkdb://user:auth_key@10.10.3.30:28105,

# # servers = ["rethinkdb://username:auth_key@127.0.0.1:28015"]

# ## postgres://[pqgotest[:password]]@localhost[/dbname]\

# ## postgres://[pqgotest[:password]]@localhost[/dbname]\

# ## postgres://[pqgotest[:password]]@localhost[/dbname]\

SECRET_KEY = '$(date +%s | sha256sum | base64 | head -c 64)'

"password": "sha1$1b11b$edeb0a67a9622f1f2cfeabf9188a711f5ac7d236",

More info on how to fix Hard-Coded Secrets in General, Python and Javascript.


Insecure Use of Dangerous Function (15)

grunt.util._.extend(config[key], require(path + option)(config, grunt));

require(entrypoint()).run(includeInternalScripts);

cmd := exec.Command(executablePath)









os.system('cp -pr nssm/nssm-2.24 .')



More info on how to fix Insecure Use of Dangerous Function in Javascript, Go and Python.


Information Disclosure (3)



for (const package of packagesToProcessbyBabel) {

More info on how to fix Information Disclosure in Javascript.


Insecure File Management (82)

return fs.lstatSync(resolvedPath).isSymbolicLink();

if (isLinkedMode() || !fs.existsSync(resolvedJsDir)) {



fileData = fs.readFileSync(srcLocation + '/' + file);


yamlFile, err := ioutil.ReadFile(filename)

pem, err := ioutil.ReadFile(caCertFile)

fileBytes, err := ioutil.ReadFile(configFile)

f, err := os.Open(file)


r, err := os.OpenFile(w.Filename, os.O_RDONLY, 0644)



f, err := os.Open(imagePath)

if data, err := ioutil.ReadFile(path); err != nil {

return os.OpenFile(w.Filename, os.O_WRONLY|os.O_APPEND|os.O_CREATE, 0644)

reader, err := os.Open(path)


return ioutil.ReadFile(filename)

yamlFile, err := ioutil.ReadFile(filename)

reader, err := os.Open(dashboardFilePath)

defer reader.Close()

byteValue, err := ioutil.ReadFile(manifestPath)

f, err := os.Open(fp)

defer f.Close()

reader, err := os.Open(jsonFPath)

defer reader.Close()

reader, err := os.Open(pluginJSONFilePath)

defer reader.Close()

data, err := ioutil.ReadFile(path)

yamlFile, err := ioutil.ReadFile(filename)

file, err := os.Open(filePath)

defer file.Close()

if err := os.Chmod(setting.SocketPath, 0660); err != nil {

yamlFile, err := ioutil.ReadFile(filename)

data, err := ioutil.ReadFile(file)


f, err := ioutil.ReadFile(s)

if err := os.MkdirAll(filepath.Dir(newFile), 0755); err != nil {

if err := os.MkdirAll(newFile, 0755); err != nil {

defer f.Close()

imgData, err := ioutil.ReadFile(pa)


fileReader, err := os.Open(imageDiskPath)

defer fileReader.Close()

file, err := os.Open(imageDiskPath)


file, err := os.Open(imageDiskPath)

if err := ioutil.WriteFile(s.pidFile, []byte(pid), 0644); err != nil {


'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/app_insights/app_insights_querystring_builder.test.ts',

'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/app_insights/app_insights_querystring_builder.ts',

'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/azure_log_analytics/azure_log_analytics_datasource.test.ts',

'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/azure_log_analytics/azure_log_analytics_datasource.ts',

'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/azure_monitor/azure_monitor_datasource.test.ts',

'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/azure_monitor/azure_monitor_datasource.ts',

'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/app_insights/app_insights_datasource.ts',

'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/app_insights/app_insights_datasource.test.ts',

'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/insights_analytics/insights_analytics_datasource.ts',

'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/azure_monitor/azure_monitor_filter_builder.test.ts',

'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/azure_monitor/azure_monitor_filter_builder.ts',

'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/components/AnalyticsConfig.test.tsx',

'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/components/AzureCredentialsForm.test.tsx',

'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/components/InsightsConfig.test.tsx',

'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/components/__snapshots__/AnalyticsConfig.test.tsx.snap',

'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/components/__snapshots__/AzureCredentialsForm.test.tsx.snap',

'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/components/__snapshots__/InsightsConfig.test.tsx.snap',

'/tmp/a/grafana/public/app/plugins/datasource/grafana-azure-monitor-datasource/components/__snapshots__/ConfigEditor.test.tsx.snap'




if not os.path.isdir('/tmp/scratch'):



nssm_file = get_nssm('/tmp/cache', NSSM_VERSION)

generate_firewall_wxs(env, PRODUCT_VERSION, '/tmp/scratch/grafana-firewall.wxs', target_dir_name)

generate_service_wxs(env, PRODUCT_VERSION, '/tmp/scratch/grafana-service.wxs', target_dir_name, NSSM_VERSION)

generate_product_wxs(env, config, features, '/tmp/scratch/product.wxs', target_dir_name)


msi_filename = '/tmp/scratch/grafana-{}{}.windows-amd64.msi'.format(PRODUCT_VERSION, hash)

msi_filename = '/tmp/scratch/grafana-enterprise-{}{}.windows-amd64.msi'.format(PRODUCT_VERSION, hash)

More info on how to fix Insecure File Management in Javascript, Go and Python.


Insecure Use of Regular Expressions (6)

const regex = new RegExp(`Logs \\(${logs.length}\\)`);

if (/^[\-+]\d+[dmwy]([\s,]+[\-+]\d+[dmwy])*$/.test(date)) {

return item.replace(new RegExp('(' + query + ')', 'ig'), function ($1, match) {

(function($){$.color={};$.color.make=function(r,g,b,a){var o={};o.r=r||0;o.g=g||0;o.b=b||0;o.a=a!=null?a:1;o.add=function(c,d){for(var i=0;i<c.length;++i)o[c.charAt(i)]+=d;return o.normalize()};o.scale=function(c,f){for(var i=0;i<c.length;++i)o[c.charAt(i)]*=f;return o.normalize()};o.toString=function(){if(o.a>=1){return"rgb("+[o.r,o.g,o.b].join(",")+")"}else{return"rgba("+[o.r,o.g,o.b,o.a].join(",")+")"}};o.normalize=function(){function clamp(min,value,max){return value<min?min:value>max?max:value}o.r=clamp(0,parseInt(o.r),255);o.g=clamp(0,parseInt(o.g),255);o.b=clamp(0,parseInt(o.b),255);o.a=clamp(0,o.a,1);return o};o.clone=function(){return $.color.make(o.r,o.b,o.g,o.a)};return o.normalize()};$.color.extract=function(elem,css){var c;do{c=elem.css(css).toLowerCase();if(c!=""&&c!="transparent")break;elem=elem.parent()}while(elem.length&&!$.nodeName(elem.get(0),"body"));if(c=="rgba(0, 0, 0, 0)")c="transparent";return $.color.parse(c)};$.color.parse=function(str){var res,m=$.color.make;if(res=/rgb\(\s*([0-9]{1,3})\s*,\s*([0-9]{1,3})\s*,\s*([0-9]{1,3})\s*\)/.exec(str))return m(parseInt(res[1],10),parseInt(res[2],10),parseInt(res[3],10));if(res=/rgba\(\s*([0-9]{1,3})\s*,\s*([0-9]{1,3})\s*,\s*([0-9]{1,3})\s*,\s*([0-9]+(?:\.[0-9]+)?)\s*\)/.exec(str))return m(parseInt(res[1],10),parseInt(res[2],10),parseInt(res[3],10),parseFloat(res[4]));if(res=/rgb\(\s*([0-9]+(?:\.[0-9]+)?)\%\s*,\s*([0-9]+(?:\.[0-9]+)?)\%\s*,\s*([0-9]+(?:\.[0-9]+)?)\%\s*\)/.exec(str))return m(parseFloat(res[1])*2.55,parseFloat(res[2])*2.55,parseFloat(res[3])*2.55);if(res=/rgba\(\s*([0-9]+(?:\.[0-9]+)?)\%\s*,\s*([0-9]+(?:\.[0-9]+)?)\%\s*,\s*([0-9]+(?:\.[0-9]+)?)\%\s*,\s*([0-9]+(?:\.[0-9]+)?)\s*\)/.exec(str))return m(parseFloat(res[1])*2.55,parseFloat(res[2])*2.55,parseFloat(res[3])*2.55,parseFloat(res[4]));if(res=/#([a-fA-F0-9]{2})([a-fA-F0-9]{2})([a-fA-F0-9]{2})/.exec(str))return m(parseInt(res[1],16),parseInt(res[2],16),parseInt(res[3],16));if(res=/#([a-fA-F0-9])([a-fA-F0-9])([a-fA-F0-9])/.exec(str))return m(parseInt(res[1]+res[1],16),parseInt(res[2]+res[2],16),parseInt(res[3]+res[3],16));var name=$.trim(str).toLowerCase();if(name=="transparent")return m(255,255,255,0);else{res=lookupColors[name]||[0,0,0];return m(res[0],res[1],res[2])}};var lookupColors={aqua:[0,255,255],azure:[240,255,255],beige:[245,245,220],black:[0,0,0],blue:[0,0,255],brown:[165,42,42],cyan:[0,255,255],darkblue:[0,0,139],darkcyan:[0,139,139],darkgrey:[169,169,169],darkgreen:[0,100,0],darkkhaki:[189,183,107],darkmagenta:[139,0,139],darkolivegreen:[85,107,47],darkorange:[255,140,0],darkorchid:[153,50,204],darkred:[139,0,0],darksalmon:[233,150,122],darkviolet:[148,0,211],fuchsia:[255,0,255],gold:[255,215,0],green:[0,128,0],indigo:[75,0,130],khaki:[240,230,140],lightblue:[173,216,230],lightcyan:[224,255,255],lightgreen:[144,238,144],lightgrey:[211,211,211],lightpink:[255,182,193],lightyellow:[255,255,224],lime:[0,255,0],magenta:[255,0,255],maroon:[128,0,0],navy:[0,0,128],olive:[128,128,0],orange:[255,165,0],pink:[255,192,203],purple:[128,0,128],violet:[128,0,128],red:[255,0,0],silver:[192,192,192],white:[255,255,255],yellow:[255,255,0]}})(jQuery);

var regex = new RegExp( '(' + this.query + ')', 'gi' );

test: /\.(png|jpg|gif|ttf|eot|svg|woff(2)?)(\?[a-z0-9=&.]+)?$/,

More info on how to fix Insecure Use of Regular Expressions in Javascript.


Insecure Network Communication (9)

InsecureSkipVerify: ns.Cfg.Smtp.SkipVerify,

InsecureSkipVerify: tlsSkipVerify,

options.TLSConfig = &tls.Config{InsecureSkipVerify: true}

tls.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,

InsecureSkipVerify: hs.Cfg.PluginsAppsSkipVerifyTLS,

InsecureSkipVerify: skipTLSVerify,

InsecureSkipVerify: info.TlsSkipVerify,

InsecureSkipVerify: server.Config.SkipVerifySSL,

PreferServerCipherSuites: false,

More info on how to fix Insecure Network Communication in Go.


Insecure Configuration (1)

_ "net/http/pprof"

More info on how to fix Insecure Configuration in Go.


Insecure Use of SQL Queries (55)

rawSQL := fmt.Sprintf("SELECT COUNT(*) as count from %s where org_id=?", dialect.Quote(query.Target))

return fmt.Sprintf("INSERT INTO %s (%s) SELECT %s FROM %s", quote(targetTable), targetColsSQL, sourceColsSQL, quote(sourceTable))

sql := "SELECT 1 FROM " + db.Quote("INFORMATION_SCHEMA") + "." + db.Quote("STATISTICS") + " WHERE " + db.Quote("TABLE_SCHEMA") + " = DATABASE() AND " + db.Quote("TABLE_NAME") + "=? AND " + db.Quote("INDEX_NAME") + "=?"

sql := "SELECT 1 FROM " + db.Quote("INFORMATION_SCHEMA") + "." + db.Quote("COLUMNS") + " WHERE " + db.Quote("TABLE_SCHEMA") + " = DATABASE() AND " + db.Quote("TABLE_NAME") + "=? AND " + db.Quote("COLUMN_NAME") + "=?"

if _, err := sess.Exec(fmt.Sprintf("DELETE FROM %v WHERE dashboard_id != -1 AND org_id != -1;", db.Quote(table.Name))); err != nil {

sql := "SELECT 1 FROM " + db.Quote("pg_indexes") + " WHERE" + db.Quote("tablename") + "=? AND " + db.Quote("indexname") + "=?"

if _, err := sess.Exec(fmt.Sprintf("DELETE FROM %v WHERE dashboard_id != -1 AND org_id != -1;", db.Quote(table.Name))); err != nil {

sql := "SELECT 1 FROM " + db.Quote("sqlite_master") + " WHERE " + db.Quote("type") + "='index' AND " + db.Quote("tbl_name") + "=? AND " + db.Quote("name") + "=?"

if _, err := sess.Exec(fmt.Sprintf("DELETE FROM %q WHERE dashboard_id != -1 AND org_id != -1;", table.Name)); err != nil {

if _, err := sess.Exec(fmt.Sprintf("DELETE FROM %s;", table.Name)); err != nil {

sql := "DELETE from user_auth_token WHERE user_id IN (?" + user_id_params + ")"

b.sql.WriteString(fmt.Sprintf(" WHERE %s", strings.Join(wheres, " AND ")))

buffer.WriteString(` WHERE id IN (?` + strings.Repeat(",?", len(cmd.AlertIds)-1) + `)`)


tagsSubQuery := fmt.Sprintf(`


deleteExpiredSQL := `DELETE FROM dashboard_version WHERE id IN (?` + strings.Repeat(",?", len(versionIdsToDelete)-1) + `)`

rawSQL := fmt.Sprintf("SELECT COUNT(*) as count from %s where org_id=?", dialect.Quote(q.Target))

rawSQL := fmt.Sprintf("SELECT COUNT(*) as count from %s where user_id=?", dialect.Quote(query.Target))

rawSQL := fmt.Sprintf("SELECT COUNT(*) as count from %s where user_id=?", dialect.Quote(q.Target))

rawSQL := fmt.Sprintf("SELECT COUNT(*) as count from %s", dialect.Quote(query.Target))

sb.sql.WriteString(` AND

var rawSQL = `SELECT COUNT(*) AS count, type FROM ` + dialect.Quote("alert_notification") + ` GROUP BY type`

var rawSQL = `SELECT COUNT(*) AS count, type FROM ` + dialect.Quote("data_source") + ` GROUP BY type`

var rawSQL = `SELECT COUNT(*) AS count, type, access FROM ` + dialect.Quote("data_source") + ` GROUP BY type, access`

sb.Write(`(SELECT COUNT(*) FROM ` + dialect.Quote("user") + `) AS users,`)

sb.Write(`(SELECT COUNT(*) FROM ` + dialect.Quote("org") + `) AS orgs,`)

sb.Write(`(SELECT COUNT(*) FROM ` + dialect.Quote("dashboard") + `) AS dashboards,`)

sb.Write(`(SELECT COUNT(*) FROM ` + dialect.Quote("data_source") + `) AS datasources,`)

sb.Write(`(SELECT COUNT(*) FROM ` + dialect.Quote("star") + `) AS stars,`)

sb.Write(`(SELECT COUNT(*) FROM ` + dialect.Quote("playlist") + `) AS playlists,`)

sb.Write(`(SELECT COUNT(*) FROM ` + dialect.Quote("alert") + `) AS alerts,`)

sb.Write(`(SELECT COUNT(*) FROM `+dialect.Quote("user")+` WHERE last_seen_at > ?) AS active_users,`, activeUserDeadlineDate)

sb.Write(`(SELECT COUNT(id) FROM `+dialect.Quote("dashboard")+` WHERE is_folder = ?) AS folders,`, dialect.BooleanStr(true))



sb.Write(`(SELECT COUNT(id) FROM ` + dialect.Quote("dashboard_provisioning") + `) AS provisioned_dashboards,`)

sb.Write(`(SELECT COUNT(id) FROM ` + dialect.Quote("dashboard_snapshot") + `) AS snapshots,`)

sb.Write(`(SELECT COUNT(id) FROM ` + dialect.Quote("dashboard_version") + `) AS dashboard_versions,`)

sb.Write(`(SELECT COUNT(id) FROM ` + dialect.Quote("annotation") + `) AS annotations,`)

sb.Write(`(SELECT COUNT(id) FROM ` + dialect.Quote("team") + `) AS teams,`)

sb.Write(`(SELECT COUNT(id) FROM ` + dialect.Quote("user_auth_token") + `) AS auth_tokens,`)

var rawSQL = `SELECT

var rawSQL = `SELECT COUNT(id) AS Count FROM ` + dialect.Quote("user")



var rawSQL = `SELECT

var rawSQL = `SELECT

disableSQL := "UPDATE " + dialect.Quote("user") + " SET is_disabled=? WHERE Id IN (?" + user_id_params + ")"

"DELETE FROM " + dialect.Quote("user") + " WHERE id = ?",


if _, err := sess.Exec("UPDATE "+mg.Dialect.Quote("temp_user")+

err := sess.SQL(fmt.Sprintf("SELECT id, login from %s WHERE rands = ''", mg.Dialect.Quote("user"))).Find(&users)

if _, err := sess.Exec("UPDATE "+mg.Dialect.Quote("user")+

return fmt.Sprintf(` FROM %s%s`, policy, measurement)

More info on how to fix Insecure Use of SQL Queries in Go.


Insecure Use of Crypto (7)


hash := md5.New()

"crypto/md5"

hasher := md5.New()



"crypto/md5"

More info on how to fix Insecure Use of Crypto in Go.


Insecure Processing of Data (6)

response, err := http.Get(url)

_, err = io.Copy(dst, src)

if _, err := io.Copy(buf, src); err != nil {

env = Environment(loader=file_loader)

var atn = new antlr4.atn.ATNDeserializer().deserialize(serializedATN);

var atn = new antlr4.atn.ATNDeserializer().deserialize(serializedATN);

More info on how to fix Insecure Processing of Data in Go, Python and Javascript.


Insecure Use of Language/Framework API (19)


ts.closer.Close()


http.ListenAndServe(":3010", nil)



hasher.Write([]byte(key)) // nolint: errcheck


sw.syslog.Close()

fd.Close()

w.mw.fd.Close()


fd.Close()


l.fd.Close()




assert isinstance(event, dict)

More info on how to fix Insecure Use of Language/Framework API in Go and Python.


Vulnerable Libraries (1)

More info on how to fix Vulnerable Libraries in Go.


👉 Go to the dashboard for detailed results.

📥 Happy? Share your feedback with us.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant