Uh oh!
There was an error while loading.Please reload this page.
- Notifications
You must be signed in to change notification settings - Fork11k
Learn/first#41400
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.
Already on GitHub?Sign in to your account
base:master
Are you sure you want to change the base?
Learn/first#41400
Uh oh!
There was an error while loading.Please reload this page.
Conversation
vercelbot commentedDec 16, 2025 • edited
Loading Uh oh!
There was an error while loading.Please reload this page.
edited
Uh oh!
There was an error while loading.Please reload this page.
The latest updates on your projects. Learn more aboutVercel for GitHub.
|
Important Review skippedDraft detected. Please check the settings in the CodeRabbit UI or the You can disable this status message by setting the ✨ Finishing touches🧪 Generate unit tests (beta)
Comment |
This pull request has been ignored for the connected project Preview Branches by Supabase. |
⛔Snyk checks have failed. 1 issues have been found so far.
💻 Catch issues earlier using the plugins forVS Code,JetBrains IDEs,Visual Studio, andEclipse. |
| } | ||
| } | ||
| const response = await fetch(url, fetchOptions) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others.Learn more.
Server-Side Request Forgery (SSRF)
Unsanitized input fromthe request URL flows intofetch, where it is used as an URL to perform a request. This may result in a Server-Side Request Forgery vulnerability.
Line 60 |CWE-918 |Priority score 784 |Learn more about this vulnerability
🎭 Playwright Test ResultsDetails
|
wip