Skip to content
Triggered via push June 29, 2024 03:13
Status Success
Total duration 1m 12s
Artifacts 1

maven.yml

on: push
Fit to window
Zoom out
Zoom in

Annotations

69 warnings and 9 notices
Constant values: src/config/ConfigEntry.java#L392
Value `messageIsRequest` is always 'false'
Constant values: src/messageTab/Info/InfoTab.java#L72
Value `isRequest` is always 'false'
Constant values: src/burp/BurpExtender.java#L259
Value `messageIsRequest` is always 'true'
Constant values: src/base/FindUrlAction.java#L325
Value `selectedValue` is always 'null'
Constant values: src/burp/BurpExtender.java#L238
Value `messageIsRequest` is always 'true'
Constant values: src/burp/BurpExtender.java#L263
Value `messageIsRequest` is always 'true'
'if' statement with identical branches: src/test/render.java#L16
'if' statement can be collapsed
Vulnerable declared dependency: pom.xml#L72
Dependency maven:com.github.kevinsawicki:http-request:6.0 is vulnerable * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable declared dependency: pom.xml#L86
Provides transitive vulnerable dependency maven:com.github.seancfoley:ipaddress:5.3.3 * [CVE-2023-50570](https://devhub.checkmarx.com/cve-details/CVE-2023-50570?utm_source=jetbrains&utm_medium=referral) 5.5 Loop with Unreachable Exit Condition ("Infinite Loop") vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
build
Node.js 16 actions are deprecated. Please update the following actions to use Node.js 20: actions/checkout@v3, actions/setup-java@v3, actions/upload-artifact@v2. For more information see: https://github.blog/changelog/2023-09-22-github-actions-transitioning-from-node-16-to-node-20/.
build
The following actions uses node12 which is deprecated and will be forced to run on node16: actions/upload-artifact@v2. For more info: https://github.blog/changelog/2023-06-13-github-actions-all-actions-will-run-on-node16-instead-of-node12-by-default/
Deprecation notice: v1, v2, and v3 of the artifact actions
The following artifacts were uploaded using a version of actions/upload-artifact that is scheduled for deprecation: "jar-with-dependencies". Please update your workflow to use v4 of the artifact actions. Learn more: https://github.blog/changelog/2024-04-16-deprecation-notice-v3-of-the-artifact-actions/
Constant values: src/knife/FindUrlAndRequest.java#L24
Condition `url.startsWith("./")` is always `true`
Nullability and data flow problems: src/messageTab/Info/InfoEntry.java#L23
Variable is already assigned to this value
Nullability and data flow problems: src/burp/RobotInput.java#L232
Method invocation `waitFor` may produce `NullPointerException`
Statement with empty body: src/burp/BurpExtender.java#L250
`if` statement has empty body
Statement with empty body: src/base/FindUrlAction.java#L74
`if` statement has empty body
Statement with empty body: src/knife/OpenWithBrowserMenu.java#L55
`if` statement has empty body
Statement with empty body: src/config/ConfigTableModel.java#L296
`if` statement has empty body
Statement with empty body: src/messageTab/Info/InfoTableModel.java#L92
`if` statement has empty body
Statement with empty body: src/base/FindUrlAction.java#L166
`if` statement has empty body
Statement with empty body: src/config/GUI.java#L403
`else` statement has empty body
Result of method call ignored: src/Deprecated/RunSQLMapMenu.java#L189
Result of `File.createNewFile()` is ignored
Result of method call ignored: src/config/GUI.java#L552
Result of `File.createNewFile()` is ignored
Result of method call ignored: src/Deprecated/RunSQLMapMenu.java#L160
Result of `File.createNewFile()` is ignored
Result of method call ignored: src/config/GUI.java#L557
Result of `File.createNewFile()` is ignored
Call to 'toString()' on array: src/Deprecated/JSONBeautifier.java#L95
Call to 'toString()' on array
Inner class may be 'static': src/config/GUI.java#L573
Inner class `JsonFileFilter` may be 'static'
Magic constant: src/burp/Methods.java#L56
Should be one of: JOptionPane.INFORMATION_MESSAGE, JOptionPane.WARNING_MESSAGE, JOptionPane.ERROR_MESSAGE, ...
String concatenation in loop: src/burp/Methods.java#L179
String concatenation `+=` in loop
String concatenation in loop: src/burp/Methods.java#L154
String concatenation `+=` in loop
String concatenation in loop: src/Deprecated/MessageEditor.java#L256
String concatenation `+=` in loop
String concatenation in loop: src/burp/Methods.java#L156
String concatenation `+=` in loop
String concatenation as argument to 'StringBuilder.append()' call: src/Deprecated/RunSQLMapMenu.java#L120
String concatenation as argument to `StringBuilder.append()` call
String concatenation as argument to 'StringBuilder.append()' call: src/Deprecated/RunSQLMapMenu.java#L123
String concatenation as argument to `StringBuilder.append()` call
String concatenation as argument to 'StringBuilder.append()' call: src/Deprecated/RunSQLMapMenu.java#L150
String concatenation as argument to `StringBuilder.append()` call
String concatenation as argument to 'StringBuilder.append()' call: src/Deprecated/RunSQLMapMenu.java#L147
String concatenation as argument to `StringBuilder.append()` call
Suspicious date format pattern: src/Deprecated/DownloadResponseMenu2.java#L202
Uppercase 'YY' (week year) pattern is used: probably 'yy' (year) was intended
Suspicious date format pattern: src/knife/DownloadResponseMenu.java#L201
Uppercase 'YY' (week year) pattern is used: probably 'yy' (year) was intended
Suspicious 'System.arraycopy()' call: src/base/FindUrlAction.java#L308
Source parameter type 'java.lang.Object\[\]' is not assignable to destination parameter `possibleValues` of type 'java.lang.String\[\]'
Synchronization on a non-final field: src/config/ConfigTableModel.java#L316
Synchronization on a non-final field `configEntries`
Synchronization on a non-final field: src/messageTab/Info/InfoTableModel.java#L147
Synchronization on a non-final field `infoEntries`
Synchronization on a non-final field: src/messageTab/Info/InfoTableModel.java#L122
Synchronization on a non-final field `infoEntries`
Synchronization on a non-final field: src/config/ConfigTableModel.java#L371
Synchronization on a non-final field `configEntries`
Synchronization on a non-final field: src/messageTab/Info/InfoTableModel.java#L153
Synchronization on a non-final field `infoEntries`
Synchronization on a non-final field: src/config/ConfigTableModel.java#L341
Synchronization on a non-final field `configEntries`
Synchronization on a non-final field: src/messageTab/Info/InfoTableModel.java#L109
Synchronization on a non-final field `infoEntries`
Synchronization on a non-final field: src/messageTab/Info/InfoTableModel.java#L133
Synchronization on a non-final field `infoEntries`
Synchronization on a non-final field: src/config/ConfigTableModel.java#L330
Synchronization on a non-final field `configEntries`
Unused assignment: src/knife/OpenWithBrowserMenu.java#L171
Variable `source` initializer `null` is redundant
Unused assignment: src/config/ProcessManager.java#L132
Variable `url1` initializer `""` is redundant
Unused assignment: src/knife/OpenWithBrowserMenu.java#L124
Variable `source` initializer `null` is redundant
Vulnerable API usage: src/base/RequestTask.java#L67
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L33
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L47
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L59
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L40
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L66
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L50
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L61
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L55
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L28
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L43
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L25
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L49
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L31
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L45
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L35
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L58
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable API usage: src/base/RequestTask.java#L63
Vulnerable API usage * [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable declared dependency: pom.xml#L154
Dependency maven:org.beanshell:bsh:2.0b5 is vulnerable * [CVE-2016-2510](https://devhub.checkmarx.com/cve-details/CVE-2016-2510?utm_source=jetbrains&utm_medium=referral) 8.1 Data Processing Errors vulnerability with High severity found Results powered by [Checkmarx](https://checkmarx.com)(c)
Vulnerable declared dependency: pom.xml#L161
Provides transitive vulnerable dependency maven:commons-collections:commons-collections:3.2.2 * [Cx78f40514-81ff](https://devhub.checkmarx.com/cve-details/Cx78f40514-81ff?utm_source=jetbrains&utm_medium=referral) 7.5 Uncontrolled Recursion vulnerability with High severity found Results powered by [Checkmarx](https://checkmarx.com)(c)

Artifacts

Produced during runtime
Name Size
jar-with-dependencies
21.6 MB