Skip to content

Add a bypassed ip store for stored ssrf #121

Add a bypassed ip store for stored ssrf

Add a bypassed ip store for stored ssrf #121

Triggered via push April 14, 2026 11:46
Status Failure
Total duration 9m 34s
Artifacts

qa-tests.yml

on: push
Fit to window
Zoom out
Zoom in

Annotations

3 errors and 1 warning
qa-tests
run_test.py exited with code 1
qa-tests
2026-04-14 11:52:50,398 - ERROR - Error in test test_outbound_domain_blocking: 6 assertion(s) failed<br>`[line 245 → line 217 → line 65] Status code should not be 500, got 500 - Internal Server Error: dev.aikido.agent_api.vulnerabilities.outbound_blocking.BlockedOutboundException: Aikido Zen has blocked an outbound connection - bypassed IP address should be allowed for evil.example.com`<br>`[line 245 → line 217 → line 70] Status code should not be 500, got 500 - Internal Server Error: dev.aikido.agent_api.vulnerabilities.outbound_blocking.BlockedOutboundException: Aikido Zen has blocked an outbound connection - bypassed IP address should be allowed for new domains`<br>`[line 245 → line 217 → line 125] Text 'blocked an outbound connection' is not part of response body: Error: münchen.example.com`<br>`[line 245 → line 217 → line 134] Expected status 200, got 500 - Error: münchen-allowed.example.com - allowed Unicode domain münchen-allowed.example.com should be accessible`<br>`[line 245 → line 217 → line 140] Expected status 200, got 500 - Internal Server Error: dev.aikido.agent_api.vulnerabilities.outbound_blocking.BlockedOutboundException: Aikido Zen has blocked an outbound connection - allowed Punycode domain xn--mnchen-allowed-gsb.example.com should be accessible`<br>`[line 245 → line 217 → line 181] domain1.example.com should not be in hostnames, Bypassed IPs should not report domains`
qa-tests
2026-04-14 11:52:40,143 - ERROR - Error running test: 6 assertion(s) failed<br>`[line 245 → line 217 → line 65] Status code should not be 500, got 500 - Internal Server Error: dev.aikido.agent_api.vulnerabilities.outbound_blocking.BlockedOutboundException: Aikido Zen has blocked an outbound connection - bypassed IP address should be allowed for evil.example.com`<br>`[line 245 → line 217 → line 70] Status code should not be 500, got 500 - Internal Server Error: dev.aikido.agent_api.vulnerabilities.outbound_blocking.BlockedOutboundException: Aikido Zen has blocked an outbound connection - bypassed IP address should be allowed for new domains`<br>`[line 245 → line 217 → line 125] Text 'blocked an outbound connection' is not part of response body: Error: münchen.example.com`<br>`[line 245 → line 217 → line 134] Expected status 200, got 500 - Error: münchen-allowed.example.com - allowed Unicode domain münchen-allowed.example.com should be accessible`<br>`[line 245 → line 217 → line 140] Expected status 200, got 500 - Internal Server Error: dev.aikido.agent_api.vulnerabilities.outbound_blocking.BlockedOutboundException: Aikido Zen has blocked an outbound connection - allowed Punycode domain xn--mnchen-allowed-gsb.example.com should be accessible`<br>`[line 245 → line 217 → line 181] domain1.example.com should not be in hostnames, Bypassed IPs should not report domains`
qa-tests
Node.js 20 actions are deprecated. The following actions are running on Node.js 20 and may not work as expected: actions/setup-java@v4, AikidoSec/firewall-tester-action@v1.0.12. Actions will be forced to run with Node.js 24 by default starting June 2nd, 2026. Node.js 20 will be removed from the runner on September 16th, 2026. Please check if updated versions of these actions are available that support Node.js 24. To opt into Node.js 24 now, set the FORCE_JAVASCRIPT_ACTIONS_TO_NODE24=true environment variable on the runner or in your workflow file. Once Node.js 24 becomes the default, you can temporarily opt out by setting ACTIONS_ALLOW_USE_UNSECURE_NODE_VERSION=true. For more information see: https://github.blog/changelog/2025-09-19-deprecation-of-node-20-on-github-actions-runners/