-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update 20231211 #7
Conversation
Bumps [actions/checkout](https://github.com/actions/checkout) from 3 to 4. - [Release notes](https://github.com/actions/checkout/releases) - [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md) - [Commits](actions/checkout@v3...v4) --- updated-dependencies: - dependency-name: actions/checkout dependency-type: direct:production update-type: version-update:semver-major ... Signed-off-by: dependabot[bot] <[email protected]>
…github_actions/actions/checkout-4 Bump actions/checkout from 3 to 4
…scans Fix manual scan error
…ents Elastic Beanstalk improvements
add permissions_boundary_arn variable to set permissions boundary on all IAM roles
…to example deploy policy
add iam:DeleteRolePermissionsBoundary/iam:PutRolePermissionsBoundary to example deploy policy
…profile Manual scanning: avoid requiring an AWS profile for better usability
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In regards to the CodeQL alert, I think it’s a false positive.
The alert generated because it thinks the code is trying to validate a URL, in which case it would probably be a true vuln. But, in this case, the devs are just trying to match Route53 records that have cloudflare.net
anywhere in the URL, which shouldn’t introduce any risk.
No description provided.