Skip to content

[GHSA-67hx-6x53-jw92] Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code #2506

[GHSA-67hx-6x53-jw92] Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code

[GHSA-67hx-6x53-jw92] Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code #2506

Triggered via pull request October 20, 2023 13:27
Status Failure
Total duration 1m 8s
Artifacts

delete_staging_and_head_branches.yaml

on: pull_request_target
delete-staging-and-head-branches
54s
delete-staging-and-head-branches
Fit to window
Zoom out
Zoom in

Annotations

1 error and 1 warning
delete-staging-and-head-branches
Process completed with exit code 1.
delete-staging-and-head-branches
The following actions uses node12 which is deprecated and will be forced to run on node16: actions/checkout@v2. For more info: https://github.blog/changelog/2023-06-13-github-actions-all-actions-will-run-on-node16-instead-of-node12-by-default/