θΏ™ζ˜―indexlocζδΎ›ηš„ζœεŠ‘οΌŒδΈθ¦θΎ“ε…₯任何密码
Skip to content

Conversation

@shatfield4
Copy link
Collaborator

@shatfield4 shatfield4 commented Jul 16, 2024

Pull Request Type

  • ✨ feat
  • πŸ› fix
  • ♻️ refactor
  • πŸ’„ style
  • πŸ”¨ chore
  • πŸ“ docs

Relevant Issues

resolves #xxx

What is in this change?

  • Check all server models to ensure anytime there is user input, we do not spread the input values to prevent prisma/sql injection
  • user model was updated to ensure we validate the role and enforce only valid roles

Checked server models for prisma injection:

  • apiKeys
  • cacheData
  • documents
  • documentSyncQueue
  • documentSyncRun
  • embedChats
  • embedConfig
  • eventLogs
  • invite
  • passwordRecovery
  • slashCommandsPresets
  • systemSettings
  • user
  • vectors
  • welcomeMessages
  • workspace
  • workspaceAgentInvocation
  • workspaceChats
  • workspaceSuggestedMessages
  • workspaceThread
  • workspaceUsers

Additional Information

Developer Validations

  • I ran yarn lint from the root of the repo & committed changes
  • Relevant documentation has been updated
  • I have tested my code functionality
  • Docker build succeeds locally

@timothycarambat timothycarambat merged commit e909b25 into master Jul 16, 2024
@timothycarambat timothycarambat deleted the prisma-injection-validation branch July 16, 2024 23:40
CrackerCat pushed a commit to CrackerCat/anything-llm that referenced this pull request Jul 31, 2024
check all prisma models/model usage and patch any potential sql injection vulns
CrackerCat pushed a commit to CrackerCat/anything-llm that referenced this pull request Aug 1, 2024
check all prisma models/model usage and patch any potential sql injection vulns
CrackerCat pushed a commit to CrackerCat/anything-llm that referenced this pull request Aug 2, 2024
check all prisma models/model usage and patch any potential sql injection vulns
CrackerCat pushed a commit to CrackerCat/anything-llm that referenced this pull request Aug 3, 2024
check all prisma models/model usage and patch any potential sql injection vulns
cabwds pushed a commit to cabwds/anything-llm that referenced this pull request Jul 3, 2025
check all prisma models/model usage and patch any potential sql injection vulns
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants