Skip to content

Conversation

@manuel-sommer
Copy link
Contributor

@dryrunsecurity
Copy link

dryrunsecurity bot commented Nov 5, 2025

DryRun Security

🔴 Risk threshold exceeded.

This pull request includes a sensitive edit flagged in dojo/forms.py (sensitive file path), with guidance that sensitive paths and allowed authors can be configured in .dryrunsecurity.yaml; the finding is marked failing but non-blocking.

🔴 Configured Codepaths Edit in dojo/forms.py
Vulnerability Configured Codepaths Edit
Description Sensitive edits detected for this file. Sensitive file paths and allowed authors can be configured in .dryrunsecurity.yaml.

We've notified @mtesauro.


All finding details can be found in the DryRun Security Dashboard.

Copy link
Contributor

@mtesauro mtesauro left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approved

@Maffooch Maffooch requested a review from Jino-T November 6, 2025 07:26
@valentijnscholten valentijnscholten added this to the 2.52.1 milestone Nov 6, 2025
@valentijnscholten valentijnscholten merged commit 253772b into DefectDojo:bugfix Nov 6, 2025
150 checks passed
@manuel-sommer manuel-sommer deleted the fix_testform_datevalidation branch November 9, 2025 15:06
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants