Skip to content
This repository has been archived by the owner on Apr 19, 2024. It is now read-only.

Test recommendation #13

Open
macowie opened this issue Dec 20, 2022 · 1 comment
Open

Test recommendation #13

macowie opened this issue Dec 20, 2022 · 1 comment

Comments

@macowie
Copy link
Collaborator

macowie commented Dec 20, 2022

If I mention the Github advisory GHSA-93q8-gq69-wqmw, the action should identify the corresponding CVE and fetch a recommendation from Tidelift

@github-actions
Copy link

👋 It looks like you are talking about CVE-2021-3807. The maintainer has provided more information to help you handle this CVE.

Is this a real issue with this project? true

How likely are you impacted (out of 10)? 0

You are only affected if you run the regex on untrusted user input in a server context, which it's very unlikely anyone is doing, since this regex is mainly used in command-line tools.

Is there a workaround available? true

Run the regex with https://github.com/sindresorhus/super-regex

Data provided by Tidelift, in partnership with the maintainer of this project

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

1 participant