Skip to content

make test happy

63cc40c
Select commit
Loading
Failed to load commit list.
Merged

chore: update version to 7.12.14 #766

make test happy
63cc40c
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / CodeQL failed May 15, 2026 in 2s

1 new alert including 1 high severity security vulnerability

New alerts in code changed by this pull request

Security Alerts:

  • 1 high

See annotations below for details.

View all branch alerts.

Annotations

Check failure on line 225 in src/onebot11/connect/http.ts

See this annotation in the file changed.

Code scanning / CodeQL

Use of a broken or weak cryptographic algorithm High

A broken or weak cryptographic algorithm
depends on
sensitive data from an access to friendUid
.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to userId.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to userId.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to userId.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to userId.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to userId.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to user_id.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to userId.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to userId.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to userId.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to userId.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to userId.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to userId.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to userId.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to userId.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to userId.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to user_id.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to user_id.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to userId.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to userId.
A broken or weak cryptographic algorithm
depends on sensitive data from an access to userId.