diff --git a/Dangerfile b/Dangerfile index 91faaa0b..87c734a6 100644 --- a/Dangerfile +++ b/Dangerfile @@ -19,7 +19,8 @@ suggester.suggest eslint.lint # Report your Ruby app test suite code coverage in Danger. -simplecov.report 'coverage/coverage.json' +# simplecov.report 'coverage/coverage.json' # Report missing test coverage of new changes in Danger -undercover.report +# Commented as undercover reports needs tests to run, which needs a different env +# undercover.report diff --git a/config/brakeman.ignore b/config/brakeman.ignore new file mode 100644 index 00000000..777a653e --- /dev/null +++ b/config/brakeman.ignore @@ -0,0 +1,22 @@ +{ + "ignored_warnings": [ + { + "warning_type": "Cross-Site Scripting", + "warning_code": 106, + "fingerprint": "c8adc1c0caf2c9251d1d8de588fb949070212d0eed5e1580aee88bab2287b772", + "check_name": "SanitizeMethods", + "message": "loofah gem 2.10.0 is vulnerable (CVE-2018-8048). Upgrade to 2.2.1", + "file": "Gemfile.lock", + "line": 214, + "link": "https://github.com/flavorjones/loofah/issues/144", + "code": null, + "render_path": null, + "location": null, + "user_input": null, + "confidence": "Medium", + "note": "2.10.0 is HIGHER than 2.2.1, thus already patched!" + } + ], + "updated": "2021-06-18 15:28:26 +0700", + "brakeman_version": "5.0.1" +} diff --git a/log/.keep b/log/.keep deleted file mode 100644 index e69de29b..00000000