Skip to content

Commit 48fb01f

Browse files
committed
set js/actions/injection as a high precision warning query
1 parent 2a65d1d commit 48fb01f

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

javascript/ql/src/Security/CWE-094/ExpressionInjection.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
* @description Using user-controlled GitHub Actions contexts like `run:` or `script:` may allow a malicious
44
* user to inject code into the GitHub action.
55
* @kind problem
6-
* @problem.severity error
6+
* @problem.severity warning
77
* @precision high
88
* @id js/actions/injection
99
* @tags actions

0 commit comments

Comments
 (0)