Security: Reacttest

57
Vulnerabilities
6
Credential Leaks
FAIL
Quality Gate
C
OWASP Grade
29.4h
Tech Debt (C)
Elite
DORA Rating

AI Fix Prompts

Auto-generated prompts to fix every issue — copy into Claude, GPT, or any AI coder

View AI Prompts
Repobility's GitHub App fixes findings like these · https://github.com/apps/repobility-bot

Quality Gate: Default Gate

Same analyzer free for public repos: https://repobility.com
MetricCondition
overall_score0.0 >= 50
security_score0.0 >= 40
critical_vulnerabilities3.0 <= 0
critical_credentials2.0 <= 0
duplication_pct0.9 <= 20

DORA Metrics

Powered by Repobility · code-quality intelligence
Deploy Frequencydaily (1.9/week)
Lead Time55.4 hours
MTTR0.0 hours
Change Failure Rate0.0%
Total Commits70
Overall RatingELITE

Vulnerabilities (57)

Generated by the Repobility scanner · https://repobility.com
SeverityIDPackageVersionSummary
criticalGHSA-8r6j-v8pm-fqw3fsevents-Code injection in fsevents
criticalGHSA-9qr9-h5gf-34mpnext-Next.js is vulnerable to RCE in React flight protocol
criticalGHSA-f82v-jwr5-mffwnext-Authorization Bypass in Next.js Middleware
highGHSA-fr5h-rqp8-mj6gnext-Next.js Server-Side Request Forgery in Server Actions
highGHSA-25mp-g6fv-mqxxnext-Unexpected server crash in Next.js.
highGHSA-5j59-xgg2-r9c4next-Next has a Denial of Service with Server Components - Incomplete Fix Follow-Up
highGHSA-5vj8-3v2h-h38vnext-Remote Code Execution in next
highGHSA-gp8f-8m3g-qvj9next-Next.js Cache Poisoning
highGHSA-h25m-26qc-wcjfnext-Next.js HTTP request deserialization can lead to DoS when using insecure React Server Components
highGHSA-67rr-84xm-4c7rnext-Next.JS vulnerability can lead to DoS via cache poisoning
highGHSA-c2qf-rxjj-qqgwsemver-semver vulnerable to Regular Expression Denial of Service
highGHSA-m34x-wgrh-g897next-Directory traversal vulnerability in Next.js
highGHSA-77r5-gw3j-2mpfnext-Next.js Vulnerable to HTTP Request Smuggling
highGHSA-mwv6-3258-q52cnext-Next Vulnerable to Denial of Service with Server Components
highGHSA-hg79-j56m-fxgvreact-Cross-Site Scripting in react
highGHSA-7gfc-8cq8-jh5fnext-Next.js authorization bypass vulnerability
highGHSA-7mvr-c777-76hpplaywright-Playwright downloads and installs browsers without verifying the authenticity of the SSL certificate
highGHSA-3f5c-4qxj-vmpfnext-Next.js Directory Traversal Vulnerability
highGHSA-54xq-cgqr-rpm3sharp-sharp vulnerability in libwebp dependency CVE-2023-4863
highGHSA-9gr3-7897-pp7mnext-XSS in Image Optimization API for Next.js
highGHSA-x6fg-f45m-jf5qsemver-Regular Expression Denial of Service in semver
highGHSA-fq54-2j52-jc42next-Next.js Denial of Service (DoS) condition
highGHSA-h68q-55jf-x68wchart.js-Prototype pollution in chart.js
mediumGHSA-gp95-ppv5-3jc5sharp-sharp vulnerable to Command Injection in post-installation over build environment
mediumMAL-2023-462fsevents-Malicious code in fsevents (npm)
mediumGHSA-mwcw-c2x4-8c55nanoid-Predictable results in nanoid generation when given non-integer values
mediumGHSA-qrpm-p2h7-hrv2nanoid-Exposure of Sensitive Information to an Unauthorized Actor in nanoid
mediumGHSA-3x4c-7xq6-9pq8next-Next.js: Unbounded next/image disk cache growth can exhaust storage
mediumGHSA-4342-x723-ch2fnext-Next.js Improper Middleware Redirect Handling Leads to SSRF
mediumGHSA-5f7q-jpqc-wp7hnext-Next.js has Unbounded Memory Consumption via PPR Resume Endpoint
mediumGHSA-7m27-7ghc-44w9next-Next.js Allows a Denial of Service (DoS) with Server Actions
mediumGHSA-9g9p-9gw9-jx7fnext-Next.js self-hosted applications vulnerable to DoS via Image Optimizer remotePatterns configuration
mediumGHSA-fmvm-x8mv-47mjnext-Improper CSP in Image Optimization API for Next.js versions between 10.0.0 and 12.1.0
mediumGHSA-fq77-7p7r-83rjnext-Directory Traversal in Next.js
mediumGHSA-g5qg-72qw-gw5vnext-Next.js Affected by Cache Key Confusion for Image Optimization API Routes
mediumGHSA-g77x-44xx-532mnext-Denial of Service condition in Next.js image optimization
mediumGHSA-ggv3-7p47-pfv8next-Next.js: HTTP request smuggling in rewrites
mediumGHSA-h27x-g6w4-24gqnext-Next.js: Unbounded postponed resume buffering can lead to DoS
mediumGHSA-mq59-m269-xvcxnext-Next.js: null origin can bypass Server Actions CSRF checks
mediumGHSA-qw96-mm2g-c8m7next-Next.js has cross site scripting (XSS) vulnerability via the 404 or 500 /_error page
mediumGHSA-vxf5-wxwp-m7g9next-Open Redirect in Next.js
mediumGHSA-w37m-7fhw-fmv9next-Next Server Actions Source Code Exposure
mediumGHSA-wff4-fpwg-qqv3next-Unexpected server crash in Next.js
mediumGHSA-wr66-vrwm-5g5xnext-Denial of Service Vulnerability in next.js
mediumGHSA-x56p-c8cg-q435next-Open Redirect in Next.js versions
mediumGHSA-xv57-4mr9-wg8vnext-Next.js Content Injection Vulnerability for Image Optimization
mediumGHSA-566m-qj78-rww5postcss-Regular Expression Denial of Service in postcss
mediumGHSA-7fh5-64p2-3v2jpostcss-PostCSS line return parsing error
mediumGHSA-hwj9-h5mp-3pm3postcss-Regular Expression Denial of Service in postcss
mediumGHSA-g53w-52xc-2j85react-Cross-Site Scripting in react

Credential Findings (6)

Page rendered by Aljefra Mapper · scored by Repobility (https://repobility.com)
SeverityPatternFileLine
criticalVault Tokenbackend/StocksApi/Program.cs64
criticalVault Tokenbackend/StocksApi/Program.cs119
highPassword Assignment.github/workflows/deploy-azure.yml183
high[sast:aljefra/ssrf-http-client] SSRF via HTTP Client with Dynamic URLfrontend/src/hooks/useStocks.ts40
high[sast:aljefra/ssrf-http-client] SSRF via HTTP Client with Dynamic URLfrontend-next/app/_hooks/useStocks.ts16
high[sast:aljefra/ssrf-http-client] SSRF via HTTP Client with Dynamic URLfrontend-next/app/api/stocks/[companyId]/route.ts114