-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[ 20º ] - Release/v2.1.0 frontend agree: Frontend policy decline/agree functionality #206
[ 20º ] - Release/v2.1.0 frontend agree: Frontend policy decline/agree functionality #206
Conversation
…-opt Feature/cmp 950/contract sign opt
Integration/v2.1.0: Frontend policy decline/agree functionality
|
GitGuardian id | GitGuardian status | Secret | Commit | Filename | |
---|---|---|---|---|---|
9408211 | Triggered | Generic High Entropy Secret | a79919c | src/store/index.js | View secret |
9408211 | Triggered | Generic High Entropy Secret | d11b85a | src/store/index.js | View secret |
9408211 | Triggered | Generic High Entropy Secret | ea216db | src/store/index.js | View secret |
9408211 | Triggered | Generic High Entropy Secret | cc7e7c6 | src/store/index.js | View secret |
🛠 Guidelines to remediate hardcoded secrets
- Understand the implications of revoking this secret by investigating where it is used in your code.
- Replace and store your secrets safely. Learn here the best practices.
- Revoke and rotate these secrets.
- If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.
To avoid such incidents in the future consider
- following these best practices for managing and storing secrets including API keys and other credentials
- install secret detection on pre-commit to catch secret before it leaves your machine and ease remediation.
🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.
Our GitHub checks need improvements? Share your feedbacks!
.github/workflows/trivy.yml
Outdated
|
||
- name: Upload Trivy scan results to GitHub Security tab | ||
if: always() | ||
uses: github/codeql-action/upload-sarif@v2 | ||
uses: github/codeql-action/upload-sarif@v3 |
Check notice
Code scanning / KICS
Unpinned Actions Full Length Commit SHA Note
.github/workflows/trivy.yml
Outdated
|
||
- name: Upload Trivy scan results to GitHub Security tab | ||
if: always() | ||
uses: github/codeql-action/upload-sarif@v2 | ||
uses: github/codeql-action/upload-sarif@v3 |
Check notice
Code scanning / KICS
Unpinned Actions Full Length Commit SHA Note
.github/workflows/trivy.yml
Outdated
|
||
- name: Upload Trivy scan results to GitHub Security tab | ||
uses: github/codeql-action/upload-sarif@v2 | ||
uses: github/codeql-action/upload-sarif@v3 |
Check notice
Code scanning / KICS
Unpinned Actions Full Length Commit SHA Note
Dockerfile
Outdated
@@ -62,15 +63,15 @@ | |||
HEALTHCHECK NONE | |||
|
|||
# add permissions for a user | |||
RUN chown -R 10000:3000 /app && chmod -R 775 /app/ | |||
RUN chown 10000:3000 /entrypoint.sh && chmod -R 775 /entrypoint.sh | |||
RUN chown -R 1000:3000 /app && chmod -R 775 /app/ |
Check notice
Code scanning / KICS
Multiple RUN, ADD, COPY, Instructions Listed Note
5eb7ae2
to
a458abd
Compare
a458abd
to
abe3799
Compare
Revised and no secrets are there..... The token is not a secret is a session token that expires and this ones in concrete are not real secrets |
Why we create this PR?
Users should have the option to choose a contract/policy or decline the passport reciving process
What we want to achieve with this PR?
We want to display available contracts and available policies for the user.
Users can choose one and continue receiving the passport or decline and cancel getting the passport.
What is new?
Added