generated from CMU-17313Q/NodeBB
-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Installing SNYK mutation tool for Static Analysis #47
Closed
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Merged my Proj1 Edits -nalseaf
Merged Project 1 changes mthani2
Merged Project 1 changes fdounis
Merged project 1 changes thali
… posting functionality
Merged project 1 to project 2 -- sarrakhelfi
Anonymous posting frontend
Anonymous Post Full Feature
…dy implemented before, but refined)
…e page loads to the topic.tpl file
…reaction instead of /post/3/reaction when button is clicked
…n.json file inside
…folder, with the server-side logic for handling reactions
…nd keep emoji count
… folder to start testing on the backend
…est/back-end directory. This file will house all tests related to the emoji reactions API endpoints.
…ccessfully added to a post. This ensures that the POST /api/post/:postId/reaction endpoint functions correctly under normal conditions
…actions. Attempting to add a reaction that is not among the predefined valid emojis (👍, ❤️, 😂) should result in a 400 Bad Request response with an appropriate error message.
…actions. The API should respond with a 403 Forbidden status and an appropriate error message when a user who is not logged in attempts to add a reaction.
… errors during reaction addition. Simulate a database error and verify that the API responds with a 500 Internal Server Error and an appropriate error message.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
PR integrates Snyk into our CI/CD pipeline as a static analysis tool for identifying known vulnerabilities in our dependencies. Snyk scans the project’s node_modules for any security issues, giving us insights into outdated or vulnerable packages and providing remediation suggestions.
Why Snyk?
Workflow Details:
The Snyk Vulnerability Scan workflow is triggered on each push to main and for every pull request targeting main.
Snyk will authenticate using a SNYK_TOKEN stored in GitHub Secrets, ensuring secure access.
The scan output provides a detailed list of vulnerabilities and potential fixes, allowing the team to prioritize remediation based on severity.
Steps Included:
Output Details:
Snyk will generate a report listing detected vulnerabilities with links to additional information on each issue.
Each finding includes: