Bump XtremeIdiots.CallOfDuty.DemoReader in /src #154
Annotations
10 warnings
code-scanning:
src/repository-webapi-client/Api/UserProfileApi.cs#L56
Define a constant instead of using this literal 'user-profile' 5 times. (https://rules.sonarsource.com/csharp/RSPEC-1192)
|
code-scanning:
src/repository-webapi-client/RepositoryApiClient.cs#L7
Constructor has 17 parameters, which is greater than the 7 authorized. (https://rules.sonarsource.com/csharp/RSPEC-107)
|
code-scanning:
src/repository-webapi/Controllers/UserProfileController.cs#L186
Define a constant instead of using this literal 'Could not deserialize request body' 4 times. (https://rules.sonarsource.com/csharp/RSPEC-1192)
|
code-scanning:
src/repository-webapi/Controllers/GameServersSecretsController.cs#L36
Define a constant instead of using this literal 'gameservers-keyvault-endpoint' 4 times. (https://rules.sonarsource.com/csharp/RSPEC-1192)
|
code-scanning:
src/repository-webapi/Extensions/GameTypeExtensions.cs#L45
'System.ApplicationException' should not be thrown by user code. (https://rules.sonarsource.com/csharp/RSPEC-112)
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L37
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L52
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L37
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L52
Method 'ExecuteSqlRawAsync' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSqlAsync' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.
|
code-scanning:
src/repository-webapi/Controllers/DataMaintenanceController.cs#L67
Make sure using a dynamically formatted SQL query is safe here. (https://rules.sonarsource.com/csharp/RSPEC-2077)
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
nuget-packages
Expired
|
54.9 KB |
|