DO NOT MERGE #8591
Closed
DO NOT MERGE #8591
GitHub Actions / Test Report
failed
Nov 5, 2025 in 0s
107 tests run, 0 skipped, 12 failed.
Annotations
github-actions / Test Report
io.HTTP Header (1)
The content security policy is missing the report-to directive. This was found on URL https://performancetest-qa.processmaker.net
github-actions / Test Report
io.HTTP Header (2)
The cookie with the name 'device_id' does not have the flag 'HttpOnly' set. This may leak sensitive information. This was found on URL https://performancetest-qa.processmaker.net.
github-actions / Test Report
io.HTTP Header (3)
The Referrer-Policy header is not set for URL https://performancetest-qa.processmaker.net.
github-actions / Test Report
io.Cross-Site Scripting (XSS) (1)
The potentially vulnerable code was found on url 'https://performancetest-qa.processmaker.net/vendor/processmaker/packages/package-ai/js/webhook.js'. An attacker may be able to inject JavaScript using the the code 'location.href' at line 2:288441 and control its display using the code 'setTimeout' at line 2:34103
github-actions / Test Report
io.Cross-Site Scripting (XSS) (2)
The potentially vulnerable code was found on url 'https://performancetest-qa.processmaker.net/vendor/processmaker/packages/package-savedsearch/js/addSaveButton.js'. An attacker may be able to inject JavaScript using the the code 'location.href' at line 2:315254 and control its display using the code 'setTimeout' at line 2:230985
github-actions / Test Report
io.Cross-Site Scripting (XSS) (3)
The potentially vulnerable code was found on url 'https://performancetest-qa.processmaker.net/builds/login/js/app-login.js'. An attacker may be able to inject JavaScript using the the code 'document.cookie' at line 2:12994 and control its display using the code 'setTimeout' at line 2:1267
github-actions / Test Report
io.Transport Layer Security (TLS/SSL) (1)
The cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 is weak.
github-actions / Test Report
io.Transport Layer Security (TLS/SSL) (2)
The cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 is weak.
github-actions / Test Report
io.Transport Layer Security (TLS/SSL) (3)
The server is configured to use average ciphers like SEED + 128+256 Bit CBC ciphers (AES, CAMELLIA and ARIA) which are deprecated
github-actions / Test Report
io.Transport Layer Security (TLS/SSL) (4)
OCSP_stapling is not offered by the server.
github-actions / Test Report
io.Portscan (1)
Found open port '443/tcp' with service name 'awselb/2.0'
github-actions / Test Report
io.Portscan (2)
Found open port '80/tcp' with service name 'awselb/2.0'
Loading