Skip to content

fix: add parameterized queries in sync-brand-to-tokens.cjs...#231

Open
orbisai0security wants to merge 1 commit intonextlevelbuilder:mainfrom
orbisai0security:fix-fix-sql-injection-template-literal-sync-brand-to-tokens
Open

fix: add parameterized queries in sync-brand-to-tokens.cjs...#231
orbisai0security wants to merge 1 commit intonextlevelbuilder:mainfrom
orbisai0security:fix-fix-sql-injection-template-literal-sync-brand-to-tokens

Conversation

@orbisai0security
Copy link
Copy Markdown

Summary

Fix high severity security issue in .claude/skills/brand/scripts/sync-brand-to-tokens.cjs.

Vulnerability

Field Value
ID utils.custom.sql-injection-template-literal
Severity HIGH
Scanner semgrep
Rule utils.custom.sql-injection-template-literal
File .claude/skills/brand/scripts/sync-brand-to-tokens.cjs:247

Description: SQL query constructed using JavaScript template literals with dynamic input. This can lead to SQL injection. Use parameterized queries instead.

Changes

  • .claude/skills/brand/scripts/sync-brand-to-tokens.cjs

Verification

  • Build passes
  • Scanner re-scan confirms fix
  • LLM code review passed

Automated security fix by OrbisAI Security

Automated security fix generated by Orbis Security AI
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant