Skip to content

Support tainted strings coming from database for SQLi, SSTi and Code injection #15973

Support tainted strings coming from database for SQLi, SSTi and Code injection

Support tainted strings coming from database for SQLi, SSTi and Code injection #15973

Workflow file for this run

name: Tracing
on:
pull_request:
push:
branches: [master]
schedule:
- cron: '0 4 * * *'
concurrency:
group: ${{ github.workflow }}-${{ github.ref || github.run_id }}
cancel-in-progress: true
jobs:
macos:
runs-on: macos-latest
steps:
- uses: actions/checkout@v4
- uses: ./.github/actions/node/setup
- uses: ./.github/actions/install
- run: yarn test:trace:core:ci
- uses: codecov/codecov-action@v3
ubuntu:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: ./.github/actions/node/setup
- uses: ./.github/actions/install
- uses: ./.github/actions/node/18
- run: yarn test:trace:core:ci
- uses: ./.github/actions/node/20
- run: yarn test:trace:core:ci
- uses: ./.github/actions/node/latest
- run: yarn test:trace:core:ci
- uses: codecov/codecov-action@v3
windows:
runs-on: windows-latest
steps:
- uses: actions/checkout@v4
- uses: actions/setup-node@v3
with:
node-version: '18'
- uses: ./.github/actions/install
- run: yarn test:trace:core:ci
- uses: codecov/codecov-action@v3