Skip to content

Merge remote-tracking branch 'origin/main' into chat-log-post-hook

001081b
Select commit
Loading
Failed to load commit list.
Open

refactor: move chat logs to middleware #1924

Merge remote-tracking branch 'origin/main' into chat-log-post-hook
001081b
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / CodeQL failed May 7, 2026 in 27s

7 new alerts including 7 high severity security vulnerabilities

New alerts in code changed by this pull request

Security Alerts:

  • 7 high

Alerts not introduced by this pull request might have been detected because the code changes were too large.

See annotations below for details.

View all branch alerts.

Annotations

Check failure on line 4388 in apps/gateway/src/chat/chat.ts

See this annotation in the file changed.

Code scanning / CodeQL

Insecure randomness High

This uses a cryptographically insecure random number generated at
Math.random()
in a security context.

Check failure on line 4389 in apps/gateway/src/chat/chat.ts

See this annotation in the file changed.

Code scanning / CodeQL

Insecure randomness High

This uses a cryptographically insecure random number generated at
Math.random()
in a security context.

Check failure on line 5391 in apps/gateway/src/chat/chat.ts

See this annotation in the file changed.

Code scanning / CodeQL

Insecure randomness High

This uses a cryptographically insecure random number generated at
Math.random()
in a security context.

Check failure on line 5392 in apps/gateway/src/chat/chat.ts

See this annotation in the file changed.

Code scanning / CodeQL

Insecure randomness High

This uses a cryptographically insecure random number generated at
Math.random()
in a security context.

Check failure on line 6477 in apps/gateway/src/chat/chat.ts

See this annotation in the file changed.

Code scanning / CodeQL

Insecure randomness High

This uses a cryptographically insecure random number generated at
Math.random()
in a security context.

Check failure on line 6478 in apps/gateway/src/chat/chat.ts

See this annotation in the file changed.

Code scanning / CodeQL

Insecure randomness High

This uses a cryptographically insecure random number generated at
Math.random()
in a security context.

Check failure on line 24 in apps/gateway/src/lib/api-key-fingerprint.ts

See this annotation in the file changed.

Code scanning / CodeQL

Use of password hash with insufficient computational effort High

Password from
a call to header
is hashed insecurely.
Password from
an access to xApiKey
is hashed insecurely.
Password from
an access to testApiKeyToken
is hashed insecurely.
Password from an access to testApiKeyToken is hashed insecurely.
Password from an access to testApiKeyToken is hashed insecurely.
Password from an access to testApiKeyToken is hashed insecurely.
Password from an access to testApiKeyToken is hashed insecurely.
Password from an access to testApiKeyToken is hashed insecurely.
Password from an access to testApiKeyToken is hashed insecurely.
Password from a call to header is hashed insecurely.
Password from an access to xApiKey is hashed insecurely.
Password from a call to parseApiToken is hashed insecurely.
Password from a call to extractApiToken is hashed insecurely.
Password from a call to header is hashed insecurely.
Password from an access to xApiKey is hashed insecurely.
Password from a call to header is hashed insecurely.
Password from an access to xApiKey is hashed insecurely.