Skip to content

fix(security): prevent Windows command injection and improve RFC 7009 compliance #132

fix(security): prevent Windows command injection and improve RFC 7009 compliance

fix(security): prevent Windows command injection and improve RFC 7009 compliance #132

Triggered via pull request April 2, 2026 10:42
Status Success
Total duration 1m 23s
Artifacts

codeql.yml

on: pull_request
Matrix: Analyze
Fit to window
Zoom out
Zoom in

Annotations

1 warning
Analyze (go)
Starting April 2026, the CodeQL Action will skip computing file coverage information on pull requests to improve analysis performance. File coverage information will still be computed on non-PR analyses. To opt out of this change, set the `CODEQL_ACTION_FILE_COVERAGE_ON_PRS` environment variable to `true`. Alternatively, create a custom repository property with the name `github-codeql-file-coverage-on-prs` and the type "True/false", then set this property to `true` in the repository's settings.