Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix proxyaddress feature for twitter #18

Merged
merged 1 commit into from
Feb 25, 2025

fix bug with proxyAddress

b2869f4
Select commit
Loading
Failed to load commit list.
Merged

Fix proxyaddress feature for twitter #18

fix bug with proxyAddress
b2869f4
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / CodeQL failed Feb 25, 2025 in 12s

47 new alerts including 16 critical severity security vulnerabilities

New alerts in code changed by this pull request

Security Alerts:

  • 16 critical
  • 29 high
  • 2 medium

Alerts not introduced by this pull request might have been detected because the code changes were too large.

See annotations below for details.

View all branch alerts.

Annotations

Check failure on line 49 in packages/adapter-qdrant/src/index.ts

See this annotation in the file changed.

Code scanning / CodeQL

Incomplete multi-character sanitization High

This string may still contain
<script
, which may cause an HTML element injection vulnerability.

Check failure on line 978 in packages/adapter-sqlite/src/index.ts

See this annotation in the file changed.

Code scanning / CodeQL

Incomplete string escaping or encoding High

This replaces only the first occurrence of "*".

Check failure on line 97 in packages/client-direct/src/api.ts

See this annotation in the file changed.

Code scanning / CodeQL

Missing rate limiting High

This route handler performs
a file system access
, but is not rate-limited.

Check failure on line 242 in packages/client-direct/src/api.ts

See this annotation in the file changed.

Code scanning / CodeQL

Missing rate limiting High

This route handler performs
a file system access
, but is not rate-limited.
This route handler performs
a file system access
, but is not rate-limited.

Check failure on line 110 in packages/client-eliza-home/__tests__/services/smart_things_api.test.ts

See this annotation in the file changed.

Code scanning / CodeQL

Hard-coded credentials Critical test

The hard-coded value "Bearer mock-token" is used as
authorization header
.

Check failure on line 125 in packages/client-eliza-home/__tests__/services/smart_things_api.test.ts

See this annotation in the file changed.

Code scanning / CodeQL

Hard-coded credentials Critical test

The hard-coded value "Bearer mock-token" is used as
authorization header
.

Check failure on line 143 in packages/client-eliza-home/__tests__/services/smart_things_api.test.ts

See this annotation in the file changed.

Code scanning / CodeQL

Hard-coded credentials Critical test

The hard-coded value "Bearer mock-token" is used as
authorization header
.

Check failure on line 177 in packages/client-eliza-home/__tests__/services/smart_things_api.test.ts

See this annotation in the file changed.

Code scanning / CodeQL

Hard-coded credentials Critical test

The hard-coded value "Bearer mock-token" is used as
authorization header
.

Check failure on line 192 in packages/client-eliza-home/__tests__/services/smart_things_api.test.ts

See this annotation in the file changed.

Code scanning / CodeQL

Hard-coded credentials Critical test

The hard-coded value "Bearer mock-token" is used as
authorization header
.

Check failure on line 214 in packages/client-eliza-home/__tests__/services/smart_things_api.test.ts

See this annotation in the file changed.

Code scanning / CodeQL

Hard-coded credentials Critical test

The hard-coded value "Bearer mock-token" is used as
authorization header
.

Check failure on line 228 in packages/client-eliza-home/__tests__/services/smart_things_api.test.ts

See this annotation in the file changed.

Code scanning / CodeQL

Hard-coded credentials Critical test

The hard-coded value "Bearer mock-token" is used as
authorization header
.

Check failure on line 227 in packages/client-slack/src/index.ts

See this annotation in the file changed.

Code scanning / CodeQL

Reflected cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 198 in packages/client-slack/src/messages.ts

See this annotation in the file changed.

Code scanning / CodeQL

Server-side request forgery Critical

The
URL
of this request depends on a
user-provided value
.
The
URL
of this request depends on a
user-provided value
.

Check failure on line 53 in packages/core/__tests__/embedding.test.ts

See this annotation in the file changed.

Code scanning / CodeQL

Hard-coded credentials Critical test

The hard-coded value "mock-token" is used as
authorization header
.

Check failure on line 105 in packages/core/src/context.ts

See this annotation in the file changed.

Code scanning / CodeQL

Code injection Critical

Template, which may contain code, depends on a
user-provided value
.

Check failure on line 1454 in packages/core/src/generation.ts

See this annotation in the file changed.

Code scanning / CodeQL

Hard-coded credentials Critical

The hard-coded value "Bearer eliza-app-llm" is used as
authorization header
.

Check failure on line 2193 in packages/core/src/generation.ts

See this annotation in the file changed.

Code scanning / CodeQL

Hard-coded credentials Critical

The hard-coded value "Bearer eliza-app-img" is used as
authorization header
.

Check failure on line 133 in packages/core/src/knowledge.ts

See this annotation in the file changed.

Code scanning / CodeQL

Incomplete multi-character sanitization High

This string may still contain
<script
, which may cause an HTML element injection vulnerability.

Check failure on line 25 in packages/core/src/parsing.ts

See this annotation in the file changed.

Code scanning / CodeQL

Incomplete string escaping or encoding High

This replaces only the first occurrence of "]".

Check failure on line 23 in packages/core/src/parsing.ts

See this annotation in the file changed.

Code scanning / CodeQL

Incomplete string escaping or encoding High

This replaces only the first occurrence of "[".

Check failure on line 89 in packages/core/src/parsing.ts

See this annotation in the file changed.

Code scanning / CodeQL

Polynomial regular expression used on uncontrolled data High

This
regular expression
that depends on
library input
may run slow on strings starting with 'json\n' and with many repetitions of 'json\na'.
This
regular expression
that depends on
library input
may run slow on strings starting with 'json\n' and with many repetitions of 'json\na'.

Check failure on line 108 in packages/core/src/parsing.ts

See this annotation in the file changed.

Code scanning / CodeQL

Polynomial regular expression used on uncontrolled data High

This
regular expression
that depends on
library input
may run slow on strings starting with '["' and with many repetitions of '["a'.
This
regular expression
that depends on
library input
may run slow on strings starting with '["' and with many repetitions of '["a'.

Check failure on line 146 in packages/core/src/parsing.ts

See this annotation in the file changed.

Code scanning / CodeQL

Polynomial regular expression used on uncontrolled data High

This
regular expression
that depends on
library input
may run slow on strings starting with 'json\n' and with many repetitions of 'json\na'.

Check failure on line 239 in packages/core/src/parsing.ts

See this annotation in the file changed.

Code scanning / CodeQL

Polynomial regular expression used on uncontrolled data High

This
regular expression
that depends on
library input
may run slow on strings with many repetitions of ' '.

Check failure on line 136 in packages/core/src/ragknowledge.ts

See this annotation in the file changed.

Code scanning / CodeQL

Incomplete multi-character sanitization High

This string may still contain
<script
, which may cause an HTML element injection vulnerability.