Skip to content

[GHSA-qwrq-vxvw-537r] git-shallow-clone OS Command Injection vulnerability #4754

[GHSA-qwrq-vxvw-537r] git-shallow-clone OS Command Injection vulnerability

[GHSA-qwrq-vxvw-537r] git-shallow-clone OS Command Injection vulnerability #4754

Triggered via pull request November 3, 2024 12:32
@DSimsek000DSimsek000
opened #4979
Status Success
Total duration 1m 15s
Artifacts

create_staging_branch.yaml

on: pull_request_target
ensure-base-is-staging
1m 6s
ensure-base-is-staging
Fit to window
Zoom out
Zoom in

Annotations

2 warnings
ensure-base-is-staging
The following actions uses node12 which is deprecated and will be forced to run on node16: actions/checkout@v2. For more info: https://github.blog/changelog/2023-06-13-github-actions-all-actions-will-run-on-node16-instead-of-node12-by-default/
ensure-base-is-staging
The following actions use a deprecated Node.js version and will be forced to run on node20: actions/checkout@v2. For more info: https://github.blog/changelog/2024-03-07-github-actions-all-actions-will-run-on-node20-instead-of-node16-by-default/