π± localai: feat: Assistant API#1092
Conversation
Signed-off-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
Welcome to KubeStellar! Thank you for this PR. Before merge, please ensure:
Resources:
A maintainer will review your PR soon. |
π Mission Scan Resultsπ
|
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n localai -l app.kubernetes.io/name=localai | |
| helm list -n localai 2>/dev/null || echo "Not installed via Helm" | |
| `` |
|
Quality score 62/100 β below threshold (70). Needs manual review. Breakdown: {stepsSpecificity:16,descriptionClarity:6,resolutionCompleteness:9,codePresence:9,metadataQuality:6.5,contentUniqueness:15} |
The referenced PR was about query parameter model detection, not the realtime API. Remove pr field from sourceUrls and update resolution to note no single merged PR was identified for the realtime API. Signed-off-by: Andy Anderson <andy@clubanderson.com>
π Mission Scan Resultsπ
|
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-events -l app.kubernetes.io/name=argo-events | |
| helm list -n argo-events 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/argo-events/argo-events-1068-problem-with-setting-sqs-queue.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/argo-events/argo-events-1132-azure-event-hub-trigger.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-events -l app.kubernetes.io/name=argo-events | |
| helm list -n argo-events 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/argo-events/argo-events-1339-possible-memory-leak-in-sensor.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 4 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \a || (a && b) || c`` |
| Command injection: backtick | \a || c`` |
| Command injection: backtick | \a || (a && b) || c`` |
| Command injection: backtick | \a || c`` |
π solutions/cncf-generated/argo-events/argo-events-3260-argo-lint-should-work-for-argo-event-resources-such-as-eventsou.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-events -l app.kubernetes.io/name=argo-events | |
| helm list -n argo-events 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/argo-events/argo-events-3372-add-allow-adding-readiness-probes-to-eventbus.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-events -l app.kubernetes.io/name=argo-events | |
| helm list -n argo-events 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/argo-events/argo-events-726-the-joinchannel-api-call-is-fully-deprecated-for-new-slack-appli.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-events -l app.kubernetes.io/name=argo-events | |
| helm list -n argo-events 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/argo-events/argo-events-920-infinite-creation-of-new-workflows.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/atlantis/atlantis-1019-intermittent-404-not-found-on-pulls-github-calls.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/atlantis/atlantis-1306-atlantis-outputs-all-refreshed-resources-before-outputting-the-fin.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ |
| Confirm that the issue symptoms are gone. | |
| Confirm Atlantis outputs all refreshed resources before⦠is resolved | |
| Attempt at fixing #1306 |
Might not be the right place for this logic; first time committer, please let me know if there is a better place to do this
See the source issue for community-verified solutions.
Apply the fix for Atlantis outputs all refreshed resources before outputtingβ¦
Inspect the relevant atlantis configuration:
`` |
π solutions/cncf-generated/atlantis/atlantis-2054-terraform-log-streaming-for-custom-workflows.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n atlantis -l app.kubernetes.io/name=atlantis | |
| helm list -n atlantis 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/atlantis/atlantis-3474-changes-in-recloning-for-merge-strategy-leads-to-disappearing-plan.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/atlantis/atlantis-3538-support-forgejo-gitea-webhooks.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 2 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \yaml |
| // code taken from go-github |
func NewEnterpriseClient(baseURL, uploadURL string, httpClient *http.Client) (*Client, error) {
baseEndpoint, err := url.Parse(baseURL)
if err != nil {
return nil, err
}
if !strings.HasSuffix(baseEndpoint.Path, "/") {
baseEndpoint.Path += "/"
}
if !strings.HasSuffix(baseEndpoint.Path, "/api/v3/") &&
!strings.HasPrefix(baseEndpoint.Host, "api.") &&
!strings.Contains(baseEndpoint.Host, ".api.") {
baseEndpoint.Path += "api/v3/"
}
uploadEndpoint, err := url.Parse(uploadURL)
if err != nil {
return nil, err
}
if !strings.HasSuffix(uploadEndpoin
`| | Command injection: backtick |`bash
kubectl get pods -n atlantis -l app.kubernetes.io/name=atlantis
helm list -n atlantis 2>/dev/null || echo "Not installed via Helm"
`` |
π solutions/cncf-generated/atlantis/atlantis-3845-atlantis-unlock-fails-to-delete-plan-of-environment-with-project-n.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/atlantis/atlantis-418-support-installation-as-a-github-app.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n atlantis -l app.kubernetes.io/name=atlantis | |
| helm list -n atlantis 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/atlantis/atlantis-5389-atlantis-runs-plans-on-prs-even-when-no-files-matching-when-modifi.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/backstage/backstage-18422-bug-report-createunifiedtheme-does-not-allow-overrides-for-backs.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \yaml |
| export const lightThemeNew = createTheme({ | |
| ...lightTheme, | |
| defaultPageTheme: 'home', | |
| pageTheme: newPageTheme, | |
| }); | |
| `` |
π solutions/cncf-generated/backstage/backstage-6057-techdocs-support-readme-md-or-docs-readme-md-to-be-treated-as-doc.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/backstage/backstage-6568-scaffolder-have-a-way-to-do-integration-tests-for-fetch-template.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/backstage/backstage-7671-support-google-analytics-4-as-a-analytics-integration.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-23516-support-of-dynamic-subcolumns-in-tables.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| IPv6 address | 2:: |
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \sql |
| CREATE TABLE example (data Object('JSON')) ENGINE = MergeTree ORDER BY tuple(); | |
| INSERT INTO example FORMAT JSONEachRow {"data": {"name": "John", "age": 42, "location": {"country": "USA", "city": "New York"}}}; | |
| SELECT data.name, data.location.city FROM example; | |
| `` |
π solutions/cncf-generated/clickhouse/clickhouse-26748-parallel-processing-on-replicas-reworked.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-28961-local-cache-for-remote-filesystem-rfc.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-36536-implement-ulid-function.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-39459-add-jetstream-persistence-support-for-nats.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \yaml |
| CREATE TABLE event_queue | |
| ( |
raw String
) ENGINE = NATS SETTINGS
nats_url = '127.0.0.1:4222',
nats_queue_group='event_queue',
nats_subjects = 'EVENTS_FOR_CH',
nats_format = 'RawBLOB';
`` |
π solutions/cncf-generated/clickhouse/clickhouse-41817-rfc-table-engine-with-unique-key-support.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-56826-full-mpp-style-execution-mode-and-a-cbo-optimizer.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-8702-add-bitcount-function.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/helm/helm-3208-helm-upgrade-install-no-longer-works.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/helm/helm-5046-helm-completion-fails-in-zsh-prezto-with-bad-math-expression-operand-e.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/k8up/k8up-106-unexpected-status-code-200-while-pushing-to-pushgateway.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n k8up -l app.kubernetes.io/name=k8up | |
| helm list -n k8up 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/k8up/k8up-116-support-auto-schedules.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n k8up -l app.kubernetes.io/name=k8up | |
| helm list -n k8up 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kagent/kagent-171-expose-kagent-functionality-through-the-api-for-external-consumption.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | com/channels/1346225185166065826/1346225185841221644/1351530953939484705 |
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kagent -l app.kubernetes.io/name=kagent | |
| helm list -n kagent 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kagent/kagent-183-feature-add-support-for-aws-bedrock-models.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| AWS Secret Key | AWS_SECRET_ACCESS_KEY=<secret-key> |
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kagent -l app.kubernetes.io/name=kagent | |
| helm list -n kagent 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kanister/kanister-1622-bug-problem-with-long-running-phase.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/kubearmor/kubearmor-1179-index-out-of-bound-on-containers-with-short-names.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | 405b4c292a7a6afcedd56f6874173dd865d49798a347762649689e40a6ef3b15 |
β Security: No malicious content detected
π solutions/cncf-generated/kubearmor/kubearmor-1390-feat-leverage-oci-hooks-for-container-events.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kubearmor -l app.kubernetes.io/name=kubearmor | |
| helm list -n kubearmor 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kubearmor/kubearmor-756-minikube-start-is-failing-with-latest-version-of-minikube-1-26-and.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/kubearmor/kubearmor-889-go-vulnerability-scan.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kubearmor -l app.kubernetes.io/name=kubearmor | |
| helm list -n kubearmor 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kubevirt/kubevirt-15711-source-vm-remains-in-running-after-live-migration-resulting-in-tw.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/kyverno/kyverno-12049-bug-certificate-renewer-does-not-remove-old-ca-certificate-from-se.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/kyverno/kyverno-13310-bug-imagepullsecret-doesn-t-render-properly.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | com/kyverno/kyverno/commit/385eef980e59a2965570a2ef91350e7440d08e84 |
β Security: No malicious content detected
π solutions/cncf-generated/kyverno/kyverno-13683-bug-helm-bitnami-kubectl-will-soon-be-suject-to-bitnami-registrati.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/kyverno/kyverno-3411-feature-json-logging.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kyverno -l app.kubernetes.io/name=kyverno | |
| helm list -n kyverno 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kyverno/kyverno-3542-feature-extend-foreach-to-cover-generate-rules.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kyverno -l app.kubernetes.io/name=kyverno | |
| helm list -n kyverno 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kyverno/kyverno-9930-bug-kyverno-processes-all-pods-in-a-mutate-existing-namespaced-poli.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/localai/localai-1273-feat-assistant-api.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n localai -l app.kubernetes.io/name=localai | |
| helm list -n localai 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/localai/localai-2018-please-support-reranker-api.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n localai -l app.kubernetes.io/name=localai | |
| helm list -n localai 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/ollama/ollama-3690-support-vision-models-image-input-in-openai-api-chat-completions.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/ollama/ollama-403-ollama-windows-version.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/ollama/ollama-4051-enable-flash-attention-on-ggml-gguf-feature-now-merged-into-llama-cp.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ |
| Apply the fix for Enable Flash Attention on GGML/GGUF (feature now merged⦠| |
| Review the relevant ollama configuration: | |
| Flash Attention has landed in llama.cpp (ggml-org/llama.cpp#5021). |
The tldr; is simply to pass the -fa flag to llama.cppβs server.
Review ollama configuration
Verify your ollama version and configuration:
`` |
π solutions/cncf-generated/piraeus-datastore/piraeus-datastore-53-drbd-kernel-module-injector-fails-when-using-drbd9-centos7-.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ ; if gcc -Wp,-MD,/drbd/drbd/.compat_test.4.15.18/.have_blk_queue_split_q_bio_bioset.result.d -nostdinc -isystem /usr/lib/gcc/x86_64-linux-gnu/7/include -I/drbd/drbd -I/drbd/drbd/drbd-headers -I./arch/x86/include -I./arch/x86/include/generated -I./include -I./arch/x86/include/uapi -I./arch/x86/include/generated/uapi -I./include/uapi -I./include/generated/uapi -include ./include/linux/kconfig.h -Iubuntu/include -D__KERNEL__ -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs -fno-strict-aliasing -fno-common -fshort-wchar -Werror-implicit-function-declaration -Wno-format-security -std=gnu89 -fno-PIE -mno-sse -mno-mmx -mno-sse2 -mno-3dnow -mno-avx -m64 -falign-jum |
kubectl logs -f piraeus-op-ns-node-mf7zf -c drbd-kernel-module-injector
Need a git checkout to regenerate drbd/.drbd_git_revision
make[1]: Entering directory `` |
π solutions/cncf-generated/podman-container-tools/podman-container-tools-14303-cannot-start-machine-with-podman-version-4-1-0-in-m.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| IPv6 address | ::1 |
| IPv6 address | ::1 |
β Security: No malicious content detected
π solutions/cncf-generated/podman-container-tools/podman-container-tools-15580-docker-compose-up-force-recreate-fails-with-network.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/podman-container-tools/podman-container-tools-17382-bug-podman-build-secrets-with-environment-variables.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 2 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ |
| FROM python:3.9-slim-bullseye | |
| RUN --mount=type=secret,id=mysecret echo "Secret is" && cat /run/secrets/mysecret | |
| `` | |
| Command injection: backtick | \ |
| FROM python:3.9-slim-bullseye | |
| RUN --mount=type=secret,id=mysecret echo "Secret is" && cat /run/secrets/mysecret | |
| `` |
π solutions/cncf-generated/podman-container-tools/podman-container-tools-21681-mac-current-head-errors-out-on-add-host-using-host-.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | 0cbcd3af7f916dde233efbe6410fef54f439395aa14797fe165ecec223a4428d |
| Base64-encoded long blob | a90605b73f90a2cab9db7142643a111f010ebabc6d8a74eb0bfeda0f525f97cf |
| Base64-encoded long blob | a90605b73f90a2cab9db7142643a111f010ebabc6d8a74eb0bfeda0f525f97cf |
π¨ Security: 4 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ |
host_gateway=$(podman network inspect -f "{{range .Subnets}}{{.Gateway}}{{end}}" podman 2>/dev/null || echo "host-gateway")
docker run --add-host foobar:"$host_gateway" -it busybox
`| | Command injection: backtick |`
host_gateway=$(podman network inspect -f "{{range .Subnets}}{{.Gateway}}{{end}}" podman 2>/dev/null || echo "host-gateway")docker run --add-host foobar:"$host_gateway" -it busybox
`| | Command injection: $() in string |$(podman network inspect -f "{{range .Subnets}}{{.Gateway}}{{end}}" podman 2>/dev/null || echo "host-gateway")| | Command injection: $() in string |$(podman network inspect -f "{{range .Subnets}}{{.Gateway}}{{end}}" podman 2>/dev/null || echo "host-gateway")` |
π solutions/cncf-generated/podman-container-tools/podman-container-tools-27628-add-support-to-migrate-data-in-boltdb-to-sqlite.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/podman-container-tools/podman-container-tools-9169-rfe-make-docker-compose-work-with-rootless-podman.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | 76146dacacd305f5bbb4af41b6d107c06679db432fd1b5de4dd9577a56789dcf |
| Base64-encoded long blob | 8c6053d81a45b455a79e7abbc5b4d8410735f060634d345f70b0530b1d50b2b6 |
| Base64-encoded long blob | 76146dacacd305f5bbb4af41b6d107c06679db432fd1b5de4dd9577a56789dcf |
| Base64-encoded long blob | 8c6053d81a45b455a79e7abbc5b4d8410735f060634d345f70b0530b1d50b2b6 |
β Security: No malicious content detected
π solutions/cncf-generated/tikv/tikv-11940-tikv-running-over-2-years-may-panic.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| IPv6 address | e:: |
| IPv6 address | ::f |
| IPv6 address | ::F |
| IPv6 address | ::ca |
| IPv6 address | e:: |
| IPv6 address | ::f |
| IPv6 address | ::F |
| IPv6 address | ::ca |
β Security: No malicious content detected
π solutions/cncf-generated/tikv/tikv-18838-implement-compareanddelete-for-the-rawkv-api.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | com/pingcap/kvproto/commit/3cb428bfb56c52446311d5d4fd40a36119c526a2 |
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-11035-ssh-ca-generate-signing-key-to-support-ed25519-keys.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ types (which match OpenSSH's constants), thus making key bits only relevant for RSA keys. |
| Test that the new capability is working as expected. | |
| Confirm the feature described in "SSH CA: generate_signing_key to support ed25519 keys" is functioning correctly. | |
| Verify the feature works | |
| Curious about general sentiment here; if it is positive, I'll add docs and a changelog and we can decide what to do about the UI (leave it as-is or drop it for future work). |
See hashicorp/vault#11035 for context. We derive types from the `` |
π solutions/cncf-generated/vault/vault-14671-regression-oidc-login-role-with-oidc-role-type-is-not-allowed.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-1468-patch-api-needed-for-updating-multiple-secrets-stored-at-a-single-uri.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-14696-identity-backend-audit-hmac-request-response-cannot-be-configured.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-21465-v1-14-0-breaks-aws-eks-irsa-credentials-for-dynamodb-backend.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-27772-vault-oidc-flow-breaks-fails-to-prompt-users-to-login-when-their-cli.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \yaml |
start the two versions of vault
[~]$ docker compose up
configure terraform
[~]$ terraform init
; terraform workspace new broken
; terraform workspace new working
bootstrap the older version of vault that wasn't busted (v1.15.6)
[~]$ terraform workspace select working
[~]$ terraform apply -var=vault_addr=http://localhost:8200
bootstrap a more modern version where vault appears busted
[~]$ terraform workspace select broken
[~]$ terraform apply -var=vault_addr=http://localhost:8201
`` |
π solutions/cncf-generated/vault/vault-3790-aws-backend-stsassume-with-external-id.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-8216-vault-agent-doesn-t-honor-sighup-signal.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 2 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
Upgrade to Vault 1.13+ which includes Agent reloadable config
vault version
Send SIGHUP to the agent process to reload configuration
kill -HUP $(pgrep -f "vault agent")
`| | Command injection: $() in string |$(pgrep -f "vault agent")` |
π solutions/cncf-generated/vault/vault-8649-add-telemetry-to-vault-agent.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-8754-sending-arbitrary-headers-in-cli.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 5 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick |
\yaml |
| function vault-curl() { | |
| curl_command="$(vault ${@} -output-curl-string)" | |
| curl_command="${curl_command#curl }" | |
| curl -v --fail -H "Authorization: Bearer |
|
| } |
vault-curl operator generate-root -init
`| | Command injection: $() in string || | Command injection: $() in string |$(gcloud auth print-identity-token)| | Command injection: $() in string || | Command injection: $() in string |$(gcloud auth print-identity-token)` |
β¦ad only) Signed-off-by: Andy Anderson <andy@clubanderson.com>
π Mission Scan Resultsπ
|
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-events -l app.kubernetes.io/name=argo-events | |
| helm list -n argo-events 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/argo-events/argo-events-1068-problem-with-setting-sqs-queue.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/argo-events/argo-events-1132-azure-event-hub-trigger.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-events -l app.kubernetes.io/name=argo-events | |
| helm list -n argo-events 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/argo-events/argo-events-1339-possible-memory-leak-in-sensor.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 4 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \a || (a && b) || c`` |
| Command injection: backtick | \a || c`` |
| Command injection: backtick | \a || (a && b) || c`` |
| Command injection: backtick | \a || c`` |
π solutions/cncf-generated/argo-events/argo-events-3260-argo-lint-should-work-for-argo-event-resources-such-as-eventsou.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-events -l app.kubernetes.io/name=argo-events | |
| helm list -n argo-events 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/argo-events/argo-events-3372-add-allow-adding-readiness-probes-to-eventbus.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-events -l app.kubernetes.io/name=argo-events | |
| helm list -n argo-events 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/argo-events/argo-events-726-the-joinchannel-api-call-is-fully-deprecated-for-new-slack-appli.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n argo-events -l app.kubernetes.io/name=argo-events | |
| helm list -n argo-events 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/argo-events/argo-events-920-infinite-creation-of-new-workflows.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/atlantis/atlantis-1019-intermittent-404-not-found-on-pulls-github-calls.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/atlantis/atlantis-1306-atlantis-outputs-all-refreshed-resources-before-outputting-the-fin.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ |
| Confirm that the issue symptoms are gone. | |
| Confirm Atlantis outputs all refreshed resources before⦠is resolved | |
| Attempt at fixing #1306 |
Might not be the right place for this logic; first time committer, please let me know if there is a better place to do this
See the source issue for community-verified solutions.
Apply the fix for Atlantis outputs all refreshed resources before outputtingβ¦
Inspect the relevant atlantis configuration:
`` |
π solutions/cncf-generated/atlantis/atlantis-2054-terraform-log-streaming-for-custom-workflows.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n atlantis -l app.kubernetes.io/name=atlantis | |
| helm list -n atlantis 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/atlantis/atlantis-3474-changes-in-recloning-for-merge-strategy-leads-to-disappearing-plan.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/atlantis/atlantis-3538-support-forgejo-gitea-webhooks.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 2 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \yaml |
| // code taken from go-github |
func NewEnterpriseClient(baseURL, uploadURL string, httpClient *http.Client) (*Client, error) {
baseEndpoint, err := url.Parse(baseURL)
if err != nil {
return nil, err
}
if !strings.HasSuffix(baseEndpoint.Path, "/") {
baseEndpoint.Path += "/"
}
if !strings.HasSuffix(baseEndpoint.Path, "/api/v3/") &&
!strings.HasPrefix(baseEndpoint.Host, "api.") &&
!strings.Contains(baseEndpoint.Host, ".api.") {
baseEndpoint.Path += "api/v3/"
}
uploadEndpoint, err := url.Parse(uploadURL)
if err != nil {
return nil, err
}
if !strings.HasSuffix(uploadEndpoin
`| | Command injection: backtick |`bash
kubectl get pods -n atlantis -l app.kubernetes.io/name=atlantis
helm list -n atlantis 2>/dev/null || echo "Not installed via Helm"
`` |
π solutions/cncf-generated/atlantis/atlantis-3845-atlantis-unlock-fails-to-delete-plan-of-environment-with-project-n.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/atlantis/atlantis-418-support-installation-as-a-github-app.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n atlantis -l app.kubernetes.io/name=atlantis | |
| helm list -n atlantis 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/atlantis/atlantis-5389-atlantis-runs-plans-on-prs-even-when-no-files-matching-when-modifi.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/backstage/backstage-18422-bug-report-createunifiedtheme-does-not-allow-overrides-for-backs.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \yaml |
| export const lightThemeNew = createTheme({ | |
| ...lightTheme, | |
| defaultPageTheme: 'home', | |
| pageTheme: newPageTheme, | |
| }); | |
| `` |
π solutions/cncf-generated/backstage/backstage-6057-techdocs-support-readme-md-or-docs-readme-md-to-be-treated-as-doc.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/backstage/backstage-6568-scaffolder-have-a-way-to-do-integration-tests-for-fetch-template.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/backstage/backstage-7671-support-google-analytics-4-as-a-analytics-integration.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/backstage/backstage-8090-plugin-api-docs-support-openapi-3-1.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/backstage/backstage-9636-rfc-techdocs-addons-framework.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-23516-support-of-dynamic-subcolumns-in-tables.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| IPv6 address | 2:: |
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \sql |
| CREATE TABLE example (data Object('JSON')) ENGINE = MergeTree ORDER BY tuple(); | |
| INSERT INTO example FORMAT JSONEachRow {"data": {"name": "John", "age": 42, "location": {"country": "USA", "city": "New York"}}}; | |
| SELECT data.name, data.location.city FROM example; | |
| `` |
π solutions/cncf-generated/clickhouse/clickhouse-26748-parallel-processing-on-replicas-reworked.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-28961-local-cache-for-remote-filesystem-rfc.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-36536-implement-ulid-function.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-39459-add-jetstream-persistence-support-for-nats.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \yaml |
| CREATE TABLE event_queue | |
| ( |
raw String
) ENGINE = NATS SETTINGS
nats_url = '127.0.0.1:4222',
nats_queue_group='event_queue',
nats_subjects = 'EVENTS_FOR_CH',
nats_format = 'RawBLOB';
`` |
π solutions/cncf-generated/clickhouse/clickhouse-41817-rfc-table-engine-with-unique-key-support.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-56826-full-mpp-style-execution-mode-and-a-cbo-optimizer.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/clickhouse/clickhouse-8702-add-bitcount-function.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/helm/helm-3208-helm-upgrade-install-no-longer-works.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/helm/helm-5046-helm-completion-fails-in-zsh-prezto-with-bad-math-expression-operand-e.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/helm/helm-6794-enable-release-namespace-creation-in-helm3.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/istio/istio-33469-multi-cluster-dns-breaks-due-to-they-way-iptables-and-conntrack-oper.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| IPv4 address | 100.96.126.31 |
| IPv4 address | 169.254.20.10 |
| IPv4 address | 169.254.20.10 |
| IPv4 address | 100.96.126.31 |
| IPv4 address | 100.96.126.31 |
| IPv4 address | 169.254.20.10 |
| IPv4 address | 169.254.20.10 |
| IPv4 address | 100.96.126.31 |
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n istio -l app.kubernetes.io/name=istio | |
| helm list -n istio 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/k8up/k8up-106-unexpected-status-code-200-while-pushing-to-pushgateway.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n k8up -l app.kubernetes.io/name=k8up | |
| helm list -n k8up 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/k8up/k8up-116-support-auto-schedules.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n k8up -l app.kubernetes.io/name=k8up | |
| helm list -n k8up 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kagent/kagent-171-expose-kagent-functionality-through-the-api-for-external-consumption.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | com/channels/1346225185166065826/1346225185841221644/1351530953939484705 |
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kagent -l app.kubernetes.io/name=kagent | |
| helm list -n kagent 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kagent/kagent-183-feature-add-support-for-aws-bedrock-models.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| AWS Secret Key | AWS_SECRET_ACCESS_KEY=<secret-key> |
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kagent -l app.kubernetes.io/name=kagent | |
| helm list -n kagent 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kanister/kanister-1622-bug-problem-with-long-running-phase.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/kubearmor/kubearmor-1179-index-out-of-bound-on-containers-with-short-names.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | 405b4c292a7a6afcedd56f6874173dd865d49798a347762649689e40a6ef3b15 |
β Security: No malicious content detected
π solutions/cncf-generated/kubearmor/kubearmor-1390-feat-leverage-oci-hooks-for-container-events.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kubearmor -l app.kubernetes.io/name=kubearmor | |
| helm list -n kubearmor 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kubearmor/kubearmor-756-minikube-start-is-failing-with-latest-version-of-minikube-1-26-and.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/kubearmor/kubearmor-889-go-vulnerability-scan.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kubearmor -l app.kubernetes.io/name=kubearmor | |
| helm list -n kubearmor 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kubevirt/kubevirt-14015-mark-virtiofs-field-in-filesystem-as-omitempty-to-allow-non-virti.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kubevirt -l app.kubernetes.io/name=kubevirt | |
| helm list -n kubevirt 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kubevirt/kubevirt-15711-source-vm-remains-in-running-after-live-migration-resulting-in-tw.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/kyverno/kyverno-12049-bug-certificate-renewer-does-not-remove-old-ca-certificate-from-se.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/kyverno/kyverno-13310-bug-imagepullsecret-doesn-t-render-properly.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | com/kyverno/kyverno/commit/385eef980e59a2965570a2ef91350e7440d08e84 |
β Security: No malicious content detected
π solutions/cncf-generated/kyverno/kyverno-13683-bug-helm-bitnami-kubectl-will-soon-be-suject-to-bitnami-registrati.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/kyverno/kyverno-3411-feature-json-logging.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kyverno -l app.kubernetes.io/name=kyverno | |
| helm list -n kyverno 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kyverno/kyverno-3542-feature-extend-foreach-to-cover-generate-rules.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n kyverno -l app.kubernetes.io/name=kyverno | |
| helm list -n kyverno 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/kyverno/kyverno-9930-bug-kyverno-processes-all-pods-in-a-mutate-existing-namespaced-poli.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/localai/localai-1273-feat-assistant-api.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n localai -l app.kubernetes.io/name=localai | |
| helm list -n localai 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/localai/localai-2018-please-support-reranker-api.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n localai -l app.kubernetes.io/name=localai | |
| helm list -n localai 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/localai/localai-3714-add-support-for-realtime-api.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
| kubectl get pods -n localai -l app.kubernetes.io/name=localai | |
| helm list -n localai 2>/dev/null || echo "Not installed via Helm" | |
| `` |
π solutions/cncf-generated/ollama/ollama-2430-v1-models-openai-compatibility-api.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/ollama/ollama-283-do-not-prompt-to-install-cli-if-already-on-path.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/ollama/ollama-3690-support-vision-models-image-input-in-openai-api-chat-completions.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/ollama/ollama-403-ollama-windows-version.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/ollama/ollama-4051-enable-flash-attention-on-ggml-gguf-feature-now-merged-into-llama-cp.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ |
| Apply the fix for Enable Flash Attention on GGML/GGUF (feature now merged⦠| |
| Review the relevant ollama configuration: | |
| Flash Attention has landed in llama.cpp (ggml-org/llama.cpp#5021). |
The tldr; is simply to pass the -fa flag to llama.cppβs server.
Review ollama configuration
Verify your ollama version and configuration:
`` |
π solutions/cncf-generated/ollama/ollama-5091-kv-cache-quantization.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/piraeus-datastore/piraeus-datastore-53-drbd-kernel-module-injector-fails-when-using-drbd9-centos7-.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ ; if gcc -Wp,-MD,/drbd/drbd/.compat_test.4.15.18/.have_blk_queue_split_q_bio_bioset.result.d -nostdinc -isystem /usr/lib/gcc/x86_64-linux-gnu/7/include -I/drbd/drbd -I/drbd/drbd/drbd-headers -I./arch/x86/include -I./arch/x86/include/generated -I./include -I./arch/x86/include/uapi -I./arch/x86/include/generated/uapi -I./include/uapi -I./include/generated/uapi -include ./include/linux/kconfig.h -Iubuntu/include -D__KERNEL__ -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs -fno-strict-aliasing -fno-common -fshort-wchar -Werror-implicit-function-declaration -Wno-format-security -std=gnu89 -fno-PIE -mno-sse -mno-mmx -mno-sse2 -mno-3dnow -mno-avx -m64 -falign-jum |
kubectl logs -f piraeus-op-ns-node-mf7zf -c drbd-kernel-module-injector
Need a git checkout to regenerate drbd/.drbd_git_revision
make[1]: Entering directory `` |
π solutions/cncf-generated/podman-container-tools/podman-container-tools-14303-cannot-start-machine-with-podman-version-4-1-0-in-m.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| IPv6 address | ::1 |
| IPv6 address | ::1 |
β Security: No malicious content detected
π solutions/cncf-generated/podman-container-tools/podman-container-tools-15580-docker-compose-up-force-recreate-fails-with-network.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/podman-container-tools/podman-container-tools-17382-bug-podman-build-secrets-with-environment-variables.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 2 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ |
| FROM python:3.9-slim-bullseye | |
| RUN --mount=type=secret,id=mysecret echo "Secret is" && cat /run/secrets/mysecret | |
| `` | |
| Command injection: backtick | \ |
| FROM python:3.9-slim-bullseye | |
| RUN --mount=type=secret,id=mysecret echo "Secret is" && cat /run/secrets/mysecret | |
| `` |
π solutions/cncf-generated/podman-container-tools/podman-container-tools-21681-mac-current-head-errors-out-on-add-host-using-host-.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | 0cbcd3af7f916dde233efbe6410fef54f439395aa14797fe165ecec223a4428d |
| Base64-encoded long blob | a90605b73f90a2cab9db7142643a111f010ebabc6d8a74eb0bfeda0f525f97cf |
| Base64-encoded long blob | a90605b73f90a2cab9db7142643a111f010ebabc6d8a74eb0bfeda0f525f97cf |
π¨ Security: 4 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ |
host_gateway=$(podman network inspect -f "{{range .Subnets}}{{.Gateway}}{{end}}" podman 2>/dev/null || echo "host-gateway")
docker run --add-host foobar:"$host_gateway" -it busybox
`| | Command injection: backtick |`
host_gateway=$(podman network inspect -f "{{range .Subnets}}{{.Gateway}}{{end}}" podman 2>/dev/null || echo "host-gateway")docker run --add-host foobar:"$host_gateway" -it busybox
`| | Command injection: $() in string |$(podman network inspect -f "{{range .Subnets}}{{.Gateway}}{{end}}" podman 2>/dev/null || echo "host-gateway")| | Command injection: $() in string |$(podman network inspect -f "{{range .Subnets}}{{.Gateway}}{{end}}" podman 2>/dev/null || echo "host-gateway")` |
π solutions/cncf-generated/podman-container-tools/podman-container-tools-27628-add-support-to-migrate-data-in-boltdb-to-sqlite.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/podman-container-tools/podman-container-tools-9169-rfe-make-docker-compose-work-with-rootless-podman.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | 76146dacacd305f5bbb4af41b6d107c06679db432fd1b5de4dd9577a56789dcf |
| Base64-encoded long blob | 8c6053d81a45b455a79e7abbc5b4d8410735f060634d345f70b0530b1d50b2b6 |
| Base64-encoded long blob | 76146dacacd305f5bbb4af41b6d107c06679db432fd1b5de4dd9577a56789dcf |
| Base64-encoded long blob | 8c6053d81a45b455a79e7abbc5b4d8410735f060634d345f70b0530b1d50b2b6 |
β Security: No malicious content detected
π solutions/cncf-generated/tikv/tikv-11940-tikv-running-over-2-years-may-panic.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| IPv6 address | e:: |
| IPv6 address | ::f |
| IPv6 address | ::F |
| IPv6 address | ::ca |
| IPv6 address | e:: |
| IPv6 address | ::f |
| IPv6 address | ::F |
| IPv6 address | ::ca |
β Security: No malicious content detected
π solutions/cncf-generated/tikv/tikv-18838-implement-compareanddelete-for-the-rawkv-api.json
β Schema: Valid kc-mission-v1
| Type | Value |
|---|---|
| Base64-encoded long blob | com/pingcap/kvproto/commit/3cb428bfb56c52446311d5d4fd40a36119c526a2 |
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-11035-ssh-ca-generate-signing-key-to-support-ed25519-keys.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \ types (which match OpenSSH's constants), thus making key bits only relevant for RSA keys. |
| Test that the new capability is working as expected. | |
| Confirm the feature described in "SSH CA: generate_signing_key to support ed25519 keys" is functioning correctly. | |
| Verify the feature works | |
| Curious about general sentiment here; if it is positive, I'll add docs and a changelog and we can decide what to do about the UI (leave it as-is or drop it for future work). |
See hashicorp/vault#11035 for context. We derive types from the `` |
π solutions/cncf-generated/vault/vault-14671-regression-oidc-login-role-with-oidc-role-type-is-not-allowed.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-1468-patch-api-needed-for-updating-multiple-secrets-stored-at-a-single-uri.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-14696-identity-backend-audit-hmac-request-response-cannot-be-configured.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-21465-v1-14-0-breaks-aws-eks-irsa-credentials-for-dynamodb-backend.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-27772-vault-oidc-flow-breaks-fails-to-prompt-users-to-login-when-their-cli.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 1 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \yaml |
start the two versions of vault
[~]$ docker compose up
configure terraform
[~]$ terraform init
; terraform workspace new broken
; terraform workspace new working
bootstrap the older version of vault that wasn't busted (v1.15.6)
[~]$ terraform workspace select working
[~]$ terraform apply -var=vault_addr=http://localhost:8200
bootstrap a more modern version where vault appears busted
[~]$ terraform workspace select broken
[~]$ terraform apply -var=vault_addr=http://localhost:8201
`` |
π solutions/cncf-generated/vault/vault-3790-aws-backend-stsassume-with-external-id.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-8216-vault-agent-doesn-t-honor-sighup-signal.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 2 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick | \bash |
Upgrade to Vault 1.13+ which includes Agent reloadable config
vault version
Send SIGHUP to the agent process to reload configuration
kill -HUP $(pgrep -f "vault agent")
`| | Command injection: $() in string |$(pgrep -f "vault agent")` |
π solutions/cncf-generated/vault/vault-8649-add-telemetry-to-vault-agent.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
β Security: No malicious content detected
π solutions/cncf-generated/vault/vault-8754-sending-arbitrary-headers-in-cli.json
β Schema: Valid kc-mission-v1
β Sensitive data: None detected
π¨ Security: 5 finding(s)
| Type | Match |
|---|---|
| Command injection: backtick |
\yaml |
| function vault-curl() { | |
| curl_command="$(vault ${@} -output-curl-string)" | |
| curl_command="${curl_command#curl }" | |
| curl -v --fail -H "Authorization: Bearer |
|
| } |
vault-curl operator generate-root -init
`| | Command injection: $() in string || | Command injection: $() in string |$(gcloud auth print-identity-token)| | Command injection: $() in string || | Command injection: $() in string |$(gcloud auth print-identity-token)` |
|
Thank you for your contribution! Your PR has been merged. Check out what's new:
Stay connected: Slack #kubestellar-dev | Multi-Cluster Survey |
π± New Mission: localai β feat: Assistant API
Type: feature | Source: mudler/LocalAI#1273 (6 reactions)
Fix PR: mudler/LocalAI#1703
File:
solutions/cncf-generated/localai/localai-1273-feat-assistant-api.jsonCopilot: Please enhance this mission
The JSON file has been pre-filled with content from the source issue. Please improve:
node scripts/scanner.mjsto validateAuto-generated by CNCF Mission Generator