Skip to content

fix: resolve CodeQL security alerts#97

Merged
bh2smith merged 2 commits into
mainfrom
fix/codeql-security-alerts
May 6, 2026
Merged

fix: resolve CodeQL security alerts#97
bh2smith merged 2 commits into
mainfrom
fix/codeql-security-alerts

Conversation

@bh2smith
Copy link
Copy Markdown
Member

@bh2smith bh2smith commented May 6, 2026

Summary

  • Incomplete string escaping (src/types/requestArgs.ts): Column name sanitization escaped double quotes but not backslashes, allowing a crafted input like foo\" to break out of quoting. Fixed by escaping backslashes before quotes.
  • Missing workflow permissions (.github/workflows/pull-request.yaml): CI workflow had no permissions block, giving the GITHUB_TOKEN broad default access. Added contents: read at the workflow level following least-privilege.

Resolves all 3 open CodeQL code scanning alerts:

Test plan

  • CI passes (lint, build, tests)
  • CodeQL re-scan shows alerts resolved

bh2smith and others added 2 commits May 6, 2026 09:34
Fixes CodeQL alert js/incomplete-sanitization. The previous code escaped
double-quote characters but not backslashes, allowing a crafted column
name containing `\"` to break out of the quoting.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
Fixes CodeQL alerts actions/missing-workflow-permissions. Restricts the
GITHUB_TOKEN to read-only contents access, following the principle of
least privilege.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@bh2smith bh2smith merged commit e0d9cb5 into main May 6, 2026
3 of 4 checks passed
@bh2smith bh2smith deleted the fix/codeql-security-alerts branch May 6, 2026 07:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants