Skip to content

中文Tab分页显示 #64

中文Tab分页显示

中文Tab分页显示 #64

Triggered via push June 3, 2024 05:17
Status Success
Total duration 41s
Artifacts 1

maven.yml

on: push
Fit to window
Zoom out
Zoom in

Annotations

66 warnings and 7 notices
Constant values: src/config/ConfigEntry.java#L392
Value `messageIsRequest` is always 'false'
Constant values: src/burp/BurpExtender.java#L259
Value `messageIsRequest` is always 'true'
Constant values: src/base/FindUrlAction.java#L325
Value `selectedValue` is always 'null'
Constant values: src/burp/BurpExtender.java#L238
Value `messageIsRequest` is always 'true'
Constant values: src/messageTab/Info/InfoTab.java#L72
Value `isRequest` is always 'false'
Constant values: src/burp/BurpExtender.java#L263
Value `messageIsRequest` is always 'true'
'if' statement with identical branches: src/test/render.java#L16
'if' statement can be collapsed
build
Node.js 16 actions are deprecated. Please update the following actions to use Node.js 20: actions/checkout@v3, actions/setup-java@v3, actions/upload-artifact@v2. For more information see: https://github.blog/changelog/2023-09-22-github-actions-transitioning-from-node-16-to-node-20/.
build
The following actions uses node12 which is deprecated and will be forced to run on node16: actions/upload-artifact@v2. For more info: https://github.blog/changelog/2023-06-13-github-actions-all-actions-will-run-on-node16-instead-of-node12-by-default/
Deprecation notice: v1, v2, and v3 of the artifact actions
The following artifacts were uploaded using a version of actions/upload-artifact that is scheduled for deprecation: "jar-with-dependencies". Please update your workflow to use v4 of the artifact actions. Learn more: https://github.blog/changelog/2024-04-16-deprecation-notice-v3-of-the-artifact-actions/
Constant values: src/knife/FindUrlAndRequest.java#L24
Condition `url.startsWith("./")` is always `true`
Nullability and data flow problems: src/messageTab/Info/InfoEntry.java#L23
Variable is already assigned to this value
Nullability and data flow problems: src/burp/RobotInput.java#L232
Method invocation `waitFor` may produce `NullPointerException`
Statement with empty body: src/burp/BurpExtender.java#L250
`if` statement has empty body
Statement with empty body: src/messageTab/Info/InfoTableModel.java#L97
`if` statement has empty body
Statement with empty body: src/base/FindUrlAction.java#L74
`if` statement has empty body
Statement with empty body: src/knife/OpenWithBrowserMenu.java#L55
`if` statement has empty body
Statement with empty body: src/config/ConfigTableModel.java#L296
`if` statement has empty body
Statement with empty body: src/base/FindUrlAction.java#L166
`if` statement has empty body
Statement with empty body: src/config/GUI.java#L403
`else` statement has empty body
Result of method call ignored: src/Deprecated/RunSQLMapMenu.java#L189
Result of `File.createNewFile()` is ignored
Result of method call ignored: src/config/GUI.java#L552
Result of `File.createNewFile()` is ignored
Result of method call ignored: src/Deprecated/RunSQLMapMenu.java#L160
Result of `File.createNewFile()` is ignored
Result of method call ignored: src/config/GUI.java#L557
Result of `File.createNewFile()` is ignored
Call to 'toString()' on array: src/Deprecated/JSONBeautifier.java#L95
Call to 'toString()' on array
Inner class may be 'static': src/config/GUI.java#L573
Inner class `JsonFileFilter` may be 'static'
Magic constant: src/burp/Methods.java#L56
Should be one of: JOptionPane.INFORMATION_MESSAGE, JOptionPane.WARNING_MESSAGE, JOptionPane.ERROR_MESSAGE, ...
String concatenation in loop: src/burp/Methods.java#L179
String concatenation `+=` in loop
String concatenation in loop: src/burp/Methods.java#L154
String concatenation `+=` in loop
String concatenation in loop: src/Deprecated/MessageEditor.java#L256
String concatenation `+=` in loop
String concatenation in loop: src/burp/Methods.java#L156
String concatenation `+=` in loop
String concatenation as argument to 'StringBuilder.append()' call: src/Deprecated/RunSQLMapMenu.java#L120
String concatenation as argument to `StringBuilder.append()` call
String concatenation as argument to 'StringBuilder.append()' call: src/Deprecated/RunSQLMapMenu.java#L123
String concatenation as argument to `StringBuilder.append()` call
String concatenation as argument to 'StringBuilder.append()' call: src/Deprecated/RunSQLMapMenu.java#L150
String concatenation as argument to `StringBuilder.append()` call
String concatenation as argument to 'StringBuilder.append()' call: src/Deprecated/RunSQLMapMenu.java#L147
String concatenation as argument to `StringBuilder.append()` call
Suspicious date format pattern: src/Deprecated/DownloadResponseMenu2.java#L202
Uppercase 'YY' (week year) pattern is used: probably 'yy' (year) was intended
Suspicious date format pattern: src/knife/DownloadResponseMenu.java#L201
Uppercase 'YY' (week year) pattern is used: probably 'yy' (year) was intended
Suspicious 'System.arraycopy()' call: src/base/FindUrlAction.java#L308
Source parameter type 'java.lang.Object\[\]' is not assignable to destination parameter `possibleValues` of type 'java.lang.String\[\]'
Synchronization on a non-final field: src/config/ConfigTableModel.java#L316
Synchronization on a non-final field `configEntries`
Synchronization on a non-final field: src/messageTab/Info/InfoTableModel.java#L138
Synchronization on a non-final field `infoEntries`
Synchronization on a non-final field: src/messageTab/Info/InfoTableModel.java#L114
Synchronization on a non-final field `infoEntries`
Synchronization on a non-final field: src/config/ConfigTableModel.java#L371
Synchronization on a non-final field `configEntries`
Synchronization on a non-final field: src/config/ConfigTableModel.java#L341
Synchronization on a non-final field `configEntries`
Synchronization on a non-final field: src/messageTab/Info/InfoTableModel.java#L127
Synchronization on a non-final field `infoEntries`
Synchronization on a non-final field: src/messageTab/Info/InfoTableModel.java#L153
Synchronization on a non-final field `infoEntries`
Synchronization on a non-final field: src/config/ConfigTableModel.java#L330
Synchronization on a non-final field `configEntries`
Unused assignment: src/knife/OpenWithBrowserMenu.java#L171
Variable `source` initializer `null` is redundant
Unused assignment: src/config/ProcessManager.java#L132
Variable `url1` initializer `""` is redundant
Unused assignment: src/knife/OpenWithBrowserMenu.java#L124
Variable `source` initializer `null` is redundant
Vulnerable API usage: src/base/RequestTask.java#L67
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L33
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L47
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L59
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L40
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L66
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L50
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L61
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L55
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L28
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L43
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L25
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L49
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L31
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L45
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L35
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L58
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L63
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)

Artifacts

Produced during runtime
Name Size
jar-with-dependencies
20.8 MB