Skip to content

Command Injection CVE #44

Command Injection CVE

Command Injection CVE #44

Workflow file for this run

name: upload-cve-reports
on:
pull_request:
branches: ["master"]
types: [opened, reopened]
workflow_dispatch:
# Allows you to run this workflow form Actions tab
jobs:
Testing:
runs-on: ubuntu-latest
steps:
- name: Checkout repository
uses: actions/checkout@v3
- name: Setup Node.js
uses: actions/setup-node@v3
with:
node-version: '16'
- name: Install dependencies
run: npm install
- name: Run unit tests
run: npm test
Printing-Hello:
runs-on: ubuntu-latest
steps:
- run: echo "Hello, thanks for contribution"
Taking-pull-request-file:
runs-on: ubuntu-latest
steps:
- name: Checkout repository
uses: actions/checkout@v3
- name: Setup Node.js
uses: actions/setup-node@v3
with:
node-version: '16'
- name: Retrieve file content
id: retrieve-file
uses: ./
with:
file_path: 'data.json'
pr_number: ${{ github.event.pull_request.number }}
token: ${{ secrets.GITHUB_TOKEN }}
# personal_token: ${{ secrets.PERSONAL_ACCESS_TOKEN }}
api_key: ${{ secrets.YOUR_API_KEY }}
api_user: ${{ secrets.YOUR_API_USER }}
api_org: ${{ secrets.YOUR_API_ORG }}
- name: Print file content
run: echo "${{ steps.retrieve-file.outputs.file_content }}"