Skip to content

[GHSA-gcjf-29m9-888q] PaddlePaddle vulnerable to Code Injection #4752

[GHSA-gcjf-29m9-888q] PaddlePaddle vulnerable to Code Injection

[GHSA-gcjf-29m9-888q] PaddlePaddle vulnerable to Code Injection #4752

Triggered via pull request November 1, 2024 20:08
@mattberry3mattberry3
opened #4973
Status Success
Total duration 59s
Artifacts

create_staging_branch.yaml

on: pull_request_target
ensure-base-is-staging
51s
ensure-base-is-staging
Fit to window
Zoom out
Zoom in

Annotations

2 warnings
ensure-base-is-staging
The following actions uses node12 which is deprecated and will be forced to run on node16: actions/checkout@v2. For more info: https://github.blog/changelog/2023-06-13-github-actions-all-actions-will-run-on-node16-instead-of-node12-by-default/
ensure-base-is-staging
The following actions use a deprecated Node.js version and will be forced to run on node20: actions/checkout@v2. For more info: https://github.blog/changelog/2024-03-07-github-actions-all-actions-will-run-on-node20-instead-of-node16-by-default/