Skip to content

chore: remove all lint-amnesty annotations

77f213e
Select commit
Loading
Failed to load commit list.
Merged

chore: remove all lint-amnesty annotations #38471

chore: remove all lint-amnesty annotations
77f213e
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / CodeQL failed May 1, 2026 in 3s

159 new alerts including 65 high severity security vulnerabilities

New alerts in code changed by this pull request

Security Alerts:

  • 65 high
  • 94 medium

Alerts not introduced by this pull request might have been detected because the code changes were too large.

See annotations below for details.

View all branch alerts.

Annotations

Check failure on line 160 in lms/djangoapps/courseware/masquerade.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 3324 in lms/djangoapps/instructor/views/api.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 528 in lms/djangoapps/discussion/django_comment_client/base/views.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 615 in lms/djangoapps/discussion/django_comment_client/base/views.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 138 in lms/djangoapps/instructor_task/tests/test_models.py

See this annotation in the file changed.

Code scanning / CodeQL

Incomplete URL substring sanitization High test

The string
edx-financial-reports.s3.amazonaws.com
may be at an arbitrary position in the sanitized URL.

Check failure on line 1073 in lms/djangoapps/discussion/django_comment_client/utils.py

See this annotation in the file changed.

Code scanning / CodeQL

Polynomial regular expression used on uncontrolled data High

This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '<a ' and with many repetitions of '<a '.
This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '<a href="!" ' and with many repetitions of '= href="!" '.
This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '<a href="!" ' and with many repetitions of '= '.
This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '' and with many repetitions of 'a'.
This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '<a ' and with many repetitions of '<a '.
This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '<a href="!" ' and with many repetitions of '= href="!" '.
This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '<a href="!" ' and with many repetitions of '= '.
This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '' and with many repetitions of 'a'.

Check failure on line 1092 in lms/djangoapps/discussion/django_comment_client/utils.py

See this annotation in the file changed.

Code scanning / CodeQL

Polynomial regular expression used on uncontrolled data High

This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '<img ' and with many repetitions of '<img '.
This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '<img src="!" ' and with many repetitions of '= src="!" '.
This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '<img src="!" ' and with many repetitions of '= '.
This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '<img src="!" ' and with many repetitions of '= '.
This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '<img ' and with many repetitions of '<img '.
This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '<img src="!" ' and with many repetitions of '= src="!" '.
This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '<img src="!" ' and with many repetitions of '= '.
This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '<img src="!" ' and with many repetitions of '= '.

Check failure on line 1097 in lms/djangoapps/discussion/django_comment_client/utils.py

See this annotation in the file changed.

Code scanning / CodeQL

Polynomial regular expression used on uncontrolled data High

This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '<p ' and with many repetitions of '<p '.
This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '' and with many repetitions of 'a'.
This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '<p ' and with many repetitions of '<p '.
This
regular expression
that depends on a
user-provided value
may run slow on strings starting with '' and with many repetitions of 'a'.

Check failure on line 266 in lms/djangoapps/discussion/views.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 655 in lms/djangoapps/discussion/views.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 156 in lms/djangoapps/support/views/enrollments.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 1160 in lms/djangoapps/verify_student/views.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 1093 in lms/djangoapps/verify_student/views.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 1054 in lms/djangoapps/verify_student/views.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 1050 in lms/djangoapps/verify_student/views.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 162 in lms/djangoapps/support/views/enrollments.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 1004 in lms/djangoapps/instructor/views/api.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 213 in lms/djangoapps/support/views/enrollments.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 172 in lms/djangoapps/support/views/enrollments.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 1998 in lms/djangoapps/instructor/views/api.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 1207 in lms/djangoapps/certificates/models.py

See this annotation in the file changed.

Code scanning / CodeQL

Uncontrolled data used in path expression High

This path depends on a
user-provided value
.

Check failure on line 1208 in lms/djangoapps/certificates/models.py

See this annotation in the file changed.

Code scanning / CodeQL

Uncontrolled data used in path expression High

This path depends on a
user-provided value
.

Check failure on line 151 in openedx/core/djangoapps/course_groups/views.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 107 in lms/djangoapps/commerce/api/v0/views.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.

Check failure on line 3905 in lms/djangoapps/instructor/views/api.py

See this annotation in the file changed.

Code scanning / CodeQL

Reflected server-side cross-site scripting High

Cross-site scripting vulnerability due to a
user-provided value
.
Cross-site scripting vulnerability due to a
user-provided value
.