Skip to content

Conversation

Shobhit181
Copy link

Problem:

Solution:

Testing

// The password of the keystore specified in parentTdeKeystorePath.
ParentTdeKeystorePassword *string `json:"parent_tde_keystore_password,omitempty"`
// Secret to be used while exporting and importing vPDB encryption keys.
TdeExportedKeyfileSecret *string `json:"tde_exported_keyfile_secret,omitempty"`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Mend Code Security Check

New finding (2 of 10)

The Mend Code Security Check of your branch failed because of a Heap Inspection finding in this line.

SeverityVulnerability TypeCWEFileData FlowsDetected
MediumHeap Inspection

CWE-244

model_oracle_asm_export_by_timestamp_parameters.go:53

12025-09-17 07:16am
Vulnerable Code

TdeExportedKeyfileSecret *string `json:"tde_exported_keyfile_secret,omitempty"`

Secure Code Warrior Training Material
🏴 Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

// The password of the keystore specified in parentTdeKeystorePath.
ParentTdeKeystorePassword *string `json:"parent_tde_keystore_password,omitempty"`
// Secret to be used while exporting and importing vPDB encryption keys.
TdeExportedKeyfileSecret *string `json:"tde_exported_keyfile_secret,omitempty"`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Mend Code Security Check

New finding (3 of 10)

The Mend Code Security Check of your branch failed because of a Heap Inspection finding in this line.

SeverityVulnerability TypeCWEFileData FlowsDetected
MediumHeap Inspection

CWE-244

model_export_by_location_parameters.go:52

12025-09-17 07:16am
Vulnerable Code

TdeExportedKeyfileSecret *string `json:"tde_exported_keyfile_secret,omitempty"`

Secure Code Warrior Training Material
🏴 Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

// Username for the other target Delphix Engine.
TargetEngineUser *string `json:"target_engine_user,omitempty"`
// Password for the other target Delphix Engine.
TargetEnginePassword *string `json:"target_engine_password,omitempty"`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Mend Code Security Check

New finding (4 of 10)

The Mend Code Security Check of your branch failed because of a Heap Inspection finding in this line.

SeverityVulnerability TypeCWEFileData FlowsDetected
MediumHeap Inspection

CWE-244

model_network_dsp_test_result.go:71

12025-09-17 07:16am
Vulnerable Code

TargetEnginePassword *string `json:"target_engine_password,omitempty"`

Secure Code Warrior Training Material
🏴 Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

// Hashicorp vault key for the username in the key-value store.
MssqlUserDomainHashicorpVaultUsernameKey *string `json:"mssql_user_domain_hashicorp_vault_username_key,omitempty"`
// Hashicorp vault key for the password in the key-value store.
MssqlUserDomainHashicorpVaultSecretKey *string `json:"mssql_user_domain_hashicorp_vault_secret_key,omitempty"`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Mend Code Security Check

New finding (5 of 10)

The Mend Code Security Check of your branch failed because of a Heap Inspection finding in this line.

SeverityVulnerability TypeCWEFileData FlowsDetected
MediumHeap Inspection

CWE-244

model_d_source.go:169

12025-09-17 07:16am
Vulnerable Code

MssqlUserDomainHashicorpVaultSecretKey *string `json:"mssql_user_domain_hashicorp_vault_secret_key,omitempty"`

Secure Code Warrior Training Material
🏴 Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

// oracle database username.
DatabaseUsername string `json:"database_username"`
// oracle database password.
DatabasePassword string `json:"database_password"`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Mend Code Security Check

New finding (6 of 10)

The Mend Code Security Check of your branch failed because of a Heap Inspection finding in this line.

SeverityVulnerability TypeCWEFileData FlowsDetected
MediumHeap Inspection

CWE-244

model_oracle_verify_jdbc_connection_string_params.go:28

12025-09-17 07:16am
Vulnerable Code

DatabasePassword string `json:"database_password"`

Secure Code Warrior Training Material
🏴 Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

// The environment user reference.
EnvironmentUserRef *string `json:"environment_user_ref,omitempty"`
// The password for the Transparent Data Encryption keystore associated with this database.
TdeKeystorePassword *string `json:"tde_keystore_password,omitempty"`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Mend Code Security Check

New finding (7 of 10)

The Mend Code Security Check of your branch failed because of a Heap Inspection finding in this line.

SeverityVulnerability TypeCWEFileData FlowsDetected
MediumHeap Inspection

CWE-244

model_export_by_location_parameters.go:34

12025-09-17 07:16am
Vulnerable Code

TdeKeystorePassword *string `json:"tde_keystore_password,omitempty"`

Secure Code Warrior Training Material
🏴 Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

// The password of the parent PDB keystore. (Oracle Multitenant Only)
ParentPdbTdeKeystorePassword *string `json:"parent_pdb_tde_keystore_password,omitempty"`
// The password for the isolated mode TDE keystore of the target virtual PDB. (Oracle Multitenant Only)
TargetPdbTdeKeystorePassword *string `json:"target_pdb_tde_keystore_password,omitempty"`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Mend Code Security Check

New finding (8 of 10)

The Mend Code Security Check of your branch failed because of a Heap Inspection finding in this line.

SeverityVulnerability TypeCWEFileData FlowsDetected
MediumHeap Inspection

CWE-244

model_provision_vdbby_timestamp_parameters.go:141

12025-09-17 07:16am
Vulnerable Code

TargetPdbTdeKeystorePassword *string `json:"target_pdb_tde_keystore_password,omitempty"`

Secure Code Warrior Training Material
🏴 Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

@@ -112,6 +148,7 @@ type BaseProvisionVDBParametersAllOf struct {
CdbTdeKeystorePassword *string `json:"cdb_tde_keystore_password,omitempty"`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Mend Code Security Check

New finding (9 of 10)

The Mend Code Security Check of your branch failed because of a Heap Inspection finding in this line.

SeverityVulnerability TypeCWEFileData FlowsDetected
MediumHeap Inspection

CWE-244

model_provision_empty_vdb_parameters.go:148

12025-09-17 07:16am
Vulnerable Code

CdbTdeKeystorePassword *string `json:"cdb_tde_keystore_password,omitempty"`

Secure Code Warrior Training Material
🏴 Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

// The environment user reference.
EnvironmentUserRef *string `json:"environment_user_ref,omitempty"`
// The password for the Transparent Data Encryption keystore associated with this database.
TdeKeystorePassword *string `json:"tde_keystore_password,omitempty"`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Mend Code Security Check

New finding (10 of 10)

The Mend Code Security Check of your branch failed because of a Heap Inspection finding in this line.

SeverityVulnerability TypeCWEFileData FlowsDetected
MediumHeap Inspection

CWE-244

model_oracle_asm_export_by_location_parameters.go:34

12025-09-17 07:16am
Vulnerable Code

TdeKeystorePassword *string `json:"tde_keystore_password,omitempty"`

Secure Code Warrior Training Material
🏴 Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

1 participant