Commit Graph

2 Commits

Author SHA1 Message Date
aad3eb257f update gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b to 3.0.0 (#24056)
There are 1 security vulnerabilities found in gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b

CVE-2022-28948
What did I do?
Upgrade gopkg.in/yaml.v3 from v3.0.0-20210107192922-496545a6307b to 3.0.0 for vulnerability fix

What did you expect to happen?
Ideally, no insecure libs should be used.

How can we automate the detection of these types of issues?
By using the GitHub Actions configurations provided by murphysec, we can conduct automatic code security checks in our CI pipeline.

The specification of the pull request
PR Specification from OSCS
2023-09-09 00:37:39 +08:00
24dd3f19cd [feature](extension) support beats output to doris (#18448) 2023-04-16 18:17:48 +08:00