Skip to content

PRI-106 - fix: sql injection by parsing to number #56

PRI-106 - fix: sql injection by parsing to number

PRI-106 - fix: sql injection by parsing to number #56

Triggered via issue September 3, 2024 17:49
@kgmyatthukgmyatthu
commented on #52 7933f76
Status Success
Total duration 31s
Artifacts

ci.yml

on: issue_comment
Repo Workflow Debugging
0s
Repo Workflow Debugging
ci  /  Display useful debugging information
0s
ci / Display useful debugging information
ci  /  Run pr agent on every pull request, respond to user comments
20s
ci / Run pr agent on every pull request, respond to user comments
ci  /  QA merge checks
0s
ci / QA merge checks
ci-test-only  /  Display useful debugging information
ci-test-only / Display useful debugging information
ci-test-only  /  QA merge checks
ci-test-only / QA merge checks
ci-test-only  /  Run pr agent on every pull request, respond to user comments
ci-test-only / Run pr agent on every pull request, respond to user comments
Fit to window
Zoom out
Zoom in