Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GDP-2719 Update to 0.13.1 #53

Merged
merged 541 commits into from
Apr 22, 2024

Use gradle:jdk17 image in Drone pipeline

69dfff2
Select commit
Loading
Failed to load commit list.
Merged

GDP-2719 Update to 0.13.1 #53

Use gradle:jdk17 image in Drone pipeline
69dfff2
Select commit
Loading
Failed to load commit list.
Funding Circle Checks / fc-checks/coberos succeeded Apr 18, 2024 in 1m 8s

Coberos passed with 2 warning(s)

Scan passed

Annotations

Check warning on line 35 in metadata-ingestion/src/datahub/metadata/schema_classes.py

See this annotation in the file changed.

@funding-circle-checks funding-circle-checks / fc-checks/coberos

python.lang.security.audit.non-literal-import.non-literal-import

Untrusted user input in `importlib.import_module()` function allows an attacker to load arbitrary
code. Avoid dynamic values in `importlib.import_module()` or use a whitelist to prevent running
untrusted code.
Raw output
Fingerprint: ee3fb18b6ffc7208620dd66d5eacf3ebeb266769ce02af99a38e01b0101bf046
Category: CWE-706 Use of Incorrectly-Resolved Name or Reference

Check warning on line 32 in metadata-ingestion/src/datahub/metadata/urns.py

See this annotation in the file changed.

@funding-circle-checks funding-circle-checks / fc-checks/coberos

python.lang.security.audit.non-literal-import.non-literal-import

Untrusted user input in `importlib.import_module()` function allows an attacker to load arbitrary
code. Avoid dynamic values in `importlib.import_module()` or use a whitelist to prevent running
untrusted code.
Raw output
Fingerprint: 04233b2ef9aaaca982f57651e47dfa40f8fe1d6a044e8691a5f4a09274e6285f
Category: CWE-706 Use of Incorrectly-Resolved Name or Reference