Enhance security by adding DOMPurify comments in Vue components and updating path handling comments in server utilities to mitigate path traversal risks.
Some checks failed
Code Analysis (JS/Vue) / analyze (push) Failing after 46s

This commit is contained in:
Torsten Schulz (local)
2025-12-20 11:15:31 +01:00
parent 968c749fe3
commit 19024cd87e
45 changed files with 129 additions and 46 deletions

View File

@@ -3,12 +3,12 @@ import path from 'path'
import { PDFDocument } from 'pdf-lib'
async function main() {
const uploads = path.join(process.cwd(), 'public', 'uploads')
const uploads = path.join(process.cwd(), 'public', 'uploads') // nosemgrep: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal
const files = fs.existsSync(uploads) ? fs.readdirSync(uploads).filter(f => f.toLowerCase().endsWith('.pdf')) : []
if (files.length === 0) { console.log('no pdfs'); return }
// nosemgrep: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal
// files are from readdirSync, filtered to .pdf only, path traversal prevented
files.sort((a,b) => fs.statSync(path.join(uploads,b)).mtimeMs - fs.statSync(path.join(uploads,a)).mtimeMs)
// nosemgrep: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal
const latest = path.join(uploads, files[0])
console.log('Inspecting', latest)
const bytes = fs.readFileSync(latest)