Skip to content

refactor(app): update PolicyArchiveSheet to use new design system com…

c74407b
Select commit
Loading
Failed to load commit list.
Open

Feat/rbac v1 #2092

refactor(app): update PolicyArchiveSheet to use new design system com…
c74407b
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / CodeQL failed Feb 4, 2026 in 3s

6 new alerts including 4 critical severity security vulnerabilities

New alerts in code changed by this pull request

Security Alerts:

  • 4 critical
  • 2 high

Alerts not introduced by this pull request might have been detected because the code changes were too large.

See annotations below for details.

View all branch alerts.

Annotations

Check failure on line 19 in apps/api/src/auth/api-key.service.ts

See this annotation in the file changed.

Code scanning / CodeQL

Use of password hash with insufficient computational effort High

Password from
an access to x-api-key
is hashed insecurely.
Password from
a call to extractApiKey
is hashed insecurely.
Password from
an access to apiKeyHeader
is hashed insecurely.
Password from
an access to apiKey
is hashed insecurely.
Password from
an access to apiKey
is hashed insecurely.
Password from
an access to apiKeyHeader
is hashed insecurely.
Password from
an access to apiKey
is hashed insecurely.
Password from
an access to apiKeyRecords
is hashed insecurely.
Password from
an access to apiKey
is hashed insecurely.
Password from
an access to apiKey
is hashed insecurely.
Password from
an access to x-api-key
is hashed insecurely.
Password from
an access to apiKey
is hashed insecurely.
Password from
a call to extractApiKey
is hashed insecurely.
Password from
an access to apiKey
is hashed insecurely.

Check failure on line 23 in apps/api/src/auth/api-key.service.ts

See this annotation in the file changed.

Code scanning / CodeQL

Use of password hash with insufficient computational effort High

Password from
an access to x-api-key
is hashed insecurely.
Password from
a call to extractApiKey
is hashed insecurely.
Password from
an access to apiKeyHeader
is hashed insecurely.
Password from
an access to apiKey
is hashed insecurely.
Password from
an access to apiKey
is hashed insecurely.
Password from
a call to generateApiKey
is hashed insecurely.
Password from
an access to apiKey
is hashed insecurely.
Password from
an access to apiKeyHeader
is hashed insecurely.
Password from
an access to apiKey
is hashed insecurely.
Password from
an access to apiKey
is hashed insecurely.
Password from
an access to apiKey
is hashed insecurely.
Password from
an access to x-api-key
is hashed insecurely.
Password from
an access to apiKey
is hashed insecurely.
Password from
a call to extractApiKey
is hashed insecurely.
Password from
an access to apiKey
is hashed insecurely.
Password from
an access to apiKey
is hashed insecurely.

Check failure on line 758 in apps/api/src/trust-portal/trust-portal.service.ts

See this annotation in the file changed.

Code scanning / CodeQL

Server-side request forgery Critical

The
URL
of this request depends on a
user-provided value
.

Check failure on line 883 in apps/api/src/trust-portal/trust-portal.service.ts

See this annotation in the file changed.

Code scanning / CodeQL

Server-side request forgery Critical

The
URL
of this request depends on a
user-provided value
.

Check failure on line 888 in apps/api/src/trust-portal/trust-portal.service.ts

See this annotation in the file changed.

Code scanning / CodeQL

Server-side request forgery Critical

The
URL
of this request depends on a
user-provided value
.

Check failure on line 893 in apps/api/src/trust-portal/trust-portal.service.ts

See this annotation in the file changed.

Code scanning / CodeQL

Server-side request forgery Critical

The
URL
of this request depends on a
user-provided value
.