Bump MxIO.ApiClient and MxIO.ApiClient.Abstractions in /src #78
Annotations
10 warnings
code-scanning:
src/repository-webapi-client/RepositoryApiClient.cs#L7
Constructor has 17 parameters, which is greater than the 7 authorized. (https://rules.sonarsource.com/csharp/RSPEC-107)
|
code-scanning:
src/repository-webapi/Extensions/GameTypeExtensions.cs#L45
'System.ApplicationException' should not be thrown by user code. (https://rules.sonarsource.com/csharp/RSPEC-112)
|
code-scanning:
src/repository-webapi/Program.cs#L17
Make sure that this logger's configuration is safe. (https://rules.sonarsource.com/csharp/RSPEC-4792)
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L37
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L37
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L52
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L52
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L67
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L67
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L82
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
nuget-packages
Expired
|
56.1 KB |
|