Bump actions/dependency-review-action from 3 to 4 #105
Annotations
10 warnings
code-scanning:
src/repository-webapi-client/RepositoryApiClient.cs#L7
Constructor has 17 parameters, which is greater than the 7 authorized. (https://rules.sonarsource.com/csharp/RSPEC-107)
|
code-scanning:
src/repository-webapi/Extensions/GameTypeExtensions.cs#L45
'System.ApplicationException' should not be thrown by user code. (https://rules.sonarsource.com/csharp/RSPEC-112)
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L52
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L37
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L52
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L37
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L67
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L67
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L82
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L82
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
nuget-packages
Expired
|
56.2 KB |
|