Conversation
There was a problem hiding this comment.
❌ Jit has detected 100 important findings in this PR that you should review.
The first 10 findings are detailed below as separate comments.
Click here to view all the findings on Jit.
It’s highly recommended that you fix these security issues before merging.
Alternatively, comment #jit_ignore_all in this PR to ignore all findings. Admin privileges required.
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
There was a problem hiding this comment.
❌ Jit has detected 1000 important findings in this PR that you should review.
The first 10 findings are detailed below as separate comments.
Click here to view all the findings on Jit.
It’s highly recommended that you fix these security issues before merging.
Alternatively, comment #jit_ignore_all in this PR to ignore all findings. Admin privileges required.
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' | ||
| const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ' | ||
| const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP' |
There was a problem hiding this comment.
Security control: Secret Detection
Type: Aws-Access-Token
Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.
Severity: HIGH
Jit Bot commands and options (e.g., ignore issue)
You can trigger Jit actions by commenting on this PR review:
#jit_ignore_fpIgnore and mark this specific single instance of finding as “False Positive”#jit_ignore_acceptIgnore and mark this specific single instance of finding as “Accept Risk”#jit_ignore_type_in_fileIgnore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.#jit_undo_ignoreUndo ignore command
There was a problem hiding this comment.
❌ The following Jit checks failed to run:
- secret-detection
#jit_bypass_commit in this PR to bypass, Jit Admin privileges required.
More info in the Jit platform.
No description provided.