Skip to content

make MAX_ZIP* settings configurable

10c4133
Select commit
Loading
Failed to load commit list.
Merged

move MAX_ZIP_* to settings #14730

make MAX_ZIP* settings configurable
10c4133
Select commit
Loading
Failed to load commit list.
DryRunSecurity / Cross-Site Scripting Analyzer succeeded Apr 22, 2026 in 42s

DryRun Security

Details

Cross-Site Scripting Analyzer Findings: 1 detected

⚠️ Potential Cross-Site Scripting dojo/tools/anchore_grype/parser.py (click for details)
Type Potential Cross-Site Scripting
Description The parser concatenates external strings (vuln_datasource, vuln_urls[], rel_datasource, rel_urls[]) directly into a finding_references string using f-strings without any escaping or sanitization. If those values originate from untrusted input (scanner output, advisories, or user-supplied data) and are later rendered into an HTML/JS context without appropriate escaping, this creates a path for XSS.
Filename dojo/tools/anchore_grype/parser.py
CodeLink
finding_references += f"**Vulnerability Datasource:** {vuln_datasource}\n"
if vuln_urls:
if len(vuln_urls) == 1:
if vuln_urls[0] != vuln_datasource: