Skip to content

ci: allow translator kiro websearch hotfix file in path guard

eb578ad
Select commit
Loading
Failed to load commit list.
Closed

fix: resolve executor compile regressions #271

ci: allow translator kiro websearch hotfix file in path guard
eb578ad
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / CodeQL failed Feb 23, 2026 in 4s

31 new alerts including 3 critical severity security vulnerabilities

New alerts in code changed by this pull request

Security Alerts:

  • 3 critical
  • 24 high
  • 4 medium

Alerts not introduced by this pull request might have been detected because the code changes were too large.

See annotations below for details.

View all branch alerts.

Annotations

Check failure on line 135 in sdk/cliproxy/auth/types.go

See this annotation in the file changed.

Code scanning / CodeQL

Use of a broken or weak cryptographic hashing algorithm on sensitive data High

Sensitive data (password)
is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.
Sensitive data (password)
is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.

Check failure on line 2163 in sdk/cliproxy/auth/conductor.go

See this annotation in the file changed.

Code scanning / CodeQL

Use of a broken or weak cryptographic hashing algorithm on sensitive data High

Sensitive data (password)
is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.
Sensitive data (password)
is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.

Check failure on line 2111 in sdk/cliproxy/auth/conductor.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to apiKeyModelAlias
flows to a logging call.

Check failure on line 2108 in sdk/cliproxy/auth/conductor.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to apiKeyModelAlias
flows to a logging call.

Check failure on line 2108 in sdk/cliproxy/auth/conductor.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to apiKey
flows to a logging call.

Check failure on line 199 in pkg/llmproxy/thinking/apply.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to apiKeyModelAlias
flows to a logging call.

Check failure on line 175 in pkg/llmproxy/thinking/apply.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to apiKeyModelAlias
flows to a logging call.

Check failure on line 126 in pkg/llmproxy/thinking/apply.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to apiKeyModelAlias
flows to a logging call.

Check failure on line 1306 in pkg/llmproxy/runtime/executor/codex_websockets_executor.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to apiKeyModelAlias
flows to a logging call.

Check failure on line 1303 in pkg/llmproxy/runtime/executor/codex_websockets_executor.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to apiKeyModelAlias
flows to a logging call.

Check failure on line 1303 in pkg/llmproxy/runtime/executor/codex_websockets_executor.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to apiKeyModelAlias
flows to a logging call.

Check failure on line 1298 in pkg/llmproxy/runtime/executor/codex_websockets_executor.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to apiKeyModelAlias
flows to a logging call.

Check failure on line 664 in pkg/llmproxy/registry/model_registry.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to apiKeyModelAlias
flows to a logging call.

Check failure on line 251 in pkg/llmproxy/logging/request_logger.go

See this annotation in the file changed.

Code scanning / CodeQL

Uncontrolled data used in path expression High

This path depends on a
user-provided value
.
This path depends on a
user-provided value
.

Check failure on line 1306 in pkg/llmproxy/executor/codex_websockets_executor.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to apiKeyModelAlias
flows to a logging call.

Check failure on line 1303 in pkg/llmproxy/executor/codex_websockets_executor.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to apiKeyModelAlias
flows to a logging call.

Check failure on line 1303 in pkg/llmproxy/executor/codex_websockets_executor.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to apiKeyModelAlias
flows to a logging call.

Check failure on line 1298 in pkg/llmproxy/executor/codex_websockets_executor.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to apiKeyModelAlias
flows to a logging call.

Check failure on line 941 in pkg/llmproxy/executor/antigravity_executor.go

See this annotation in the file changed.

Code scanning / CodeQL

Uncontrolled data used in network request Critical

The
URL
of this request depends on a
user-provided value
.
The
URL
of this request depends on a
user-provided value
.

Check failure on line 216 in pkg/llmproxy/executor/antigravity_executor.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to apiKeyModelAlias
flows to a logging call.

Check failure on line 57 in pkg/llmproxy/auth/kiro/token.go

See this annotation in the file changed.

Code scanning / CodeQL

Uncontrolled data used in path expression High

This path depends on a
user-provided value
.

Check failure on line 43 in pkg/llmproxy/auth/kiro/token.go

See this annotation in the file changed.

Code scanning / CodeQL

Uncontrolled data used in path expression High

This path depends on a
user-provided value
.
This path depends on a user-provided value.
This path depends on a user-provided value.

Check failure on line 1058 in pkg/llmproxy/api/server.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to claudeAPIKeyCount
flows to a logging call.

Check failure on line 1057 in pkg/llmproxy/api/server.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by an access to geminiAPIKeyCount
flows to a logging call.

Check failure on line 417 in pkg/llmproxy/api/middleware/response_writer.go

See this annotation in the file changed.

Code scanning / CodeQL

Clear-text logging of sensitive information High

Sensitive data returned by HTTP request headers
flows to a logging call.