Skip to content

fix types on collapsibleRecipe

9a751ad
Select commit
Loading
Failed to load commit list.
Merged

H-6460: Finish ds-components beta recipe cleanup #8673

fix types on collapsibleRecipe
9a751ad
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / Semgrep PRO succeeded May 11, 2026 in 3s

2 new alerts

New alerts in code changed by this pull request

  • 2 warnings

Alerts not introduced by this pull request might have been detected because the code changes were too large.

See annotations below for details.

View all branch alerts.

Annotations

Check warning on line 382 in libs/@hashintel/ds-components/scripts/migrate-beta-fractal-pilots.ts

See this annotation in the file changed.

Code scanning / Semgrep PRO

Semgrep Finding: javascript.lang.security.audit.detect-non-literal-regexp.detect-non-literal-regexp Warning

RegExp() called with a componentName function argument, this might allow an attacker to cause a Regular Expression Denial-of-Service (ReDoS) within your application as RegExP blocks the main thread. For this reason, it is recommended to use hardcoded regexes instead. If your regex is run on user-controlled input, consider performing input validation or use a regex checking/sanitization library such as https://www.npmjs.com/package/recheck to verify that the regex does not appear vulnerable to ReDoS.

Check warning on line 382 in libs/@hashintel/ds-components/scripts/migrate-beta-fractal-pilots.ts

See this annotation in the file changed.

Code scanning / Semgrep PRO

Semgrep Finding: javascript.lang.security.audit.detect-non-literal-regexp.detect-non-literal-regexp Warning

RegExp() called with a componentNames function argument, this might allow an attacker to cause a Regular Expression Denial-of-Service (ReDoS) within your application as RegExP blocks the main thread. For this reason, it is recommended to use hardcoded regexes instead. If your regex is run on user-controlled input, consider performing input validation or use a regex checking/sanitization library such as https://www.npmjs.com/package/recheck to verify that the regex does not appear vulnerable to ReDoS.