Skip to content

XS⚠️ ◾ [WIP2] Enable Biome Linting#751

Open
muiriswoulfe wants to merge 8 commits intomuiriswoulfe/super-linter-v8from
muiriswoulfe/github-actions-biome
Open

XS⚠️ ◾ [WIP2] Enable Biome Linting#751
muiriswoulfe wants to merge 8 commits intomuiriswoulfe/super-linter-v8from
muiriswoulfe/github-actions-biome

Conversation

@muiriswoulfe
Copy link
Copy Markdown
Member

Summary

Enables Biome linting in the Super-Linter GitHub Actions workflow by removing the VALIDATE_BIOME_LINT: false override and resolving all resulting lint violations across the codebase.

  • Adds a biome.json configuration scoped to TypeScript source files, disabling only the noUselessSwitchCase rule to preserve intentional fall-through patterns
  • Applies Biome auto-fixes for type-only imports, Node.js import protocol prefixes, Number.isNaN()/Number.isFinite() replacements, and other recommended rules
  • Renames the toString export in the converter utility to convertToString to avoid shadowing the global name

Combine the default switch case with DeletedFile to log skipped file
types instead of silently breaking. Remove unnecessary eslint-disable
and c8 ignore comments.

Also add biome.json configuration file for the repository.
@muiriswoulfe muiriswoulfe requested review from a team and Copilot March 30, 2026 13:25
@muiriswoulfe muiriswoulfe added the enhancement New feature or request label Mar 30, 2026
@muiriswoulfe muiriswoulfe self-assigned this Mar 30, 2026
@muiriswoulfe muiriswoulfe changed the title Enable Biome Linting [WIP] Enable Biome Linting Mar 30, 2026
@muiriswoulfe
Copy link
Copy Markdown
Member Author

Super-linter summary

Language Validation result
BIOME_LINT Pass ✅
CHECKOV Pass ✅
EDITORCONFIG Fail ❌
GITHUB_ACTIONS Pass ✅
GITLEAKS Pass ✅
GIT_MERGE_CONFLICT_MARKERS Pass ✅
JSCPD Pass ✅
JSON_PRETTIER Pass ✅
MARKDOWN Pass ✅
MARKDOWN_PRETTIER Pass ✅
NATURAL_LANGUAGE Pass ✅
POWERSHELL Pass ✅
PRE_COMMIT Pass ✅
TRIVY Pass ✅
TYPESCRIPT_PRETTIER Pass ✅
XML Pass ✅
YAML Pass ✅
YAML_PRETTIER Pass ✅

Super-linter detected linting errors

For more information, see the GitHub Actions workflow run

Powered by Super-linter

EDITORCONFIG
�[33;1mbiome.json:�[33;0m
�[31;1m	2-13: Wrong indent style found (tabs instead of spaces)�[33;0m
�[31;1m
1 errors found�[33;0m

@omex-github-bot-external
Copy link
Copy Markdown
Collaborator

omex-github-bot-external commented Mar 30, 2026

PR Metrics

Thanks for keeping your pull request small.
⚠️ Consider adding additional tests.

Lines
Product Code 111
Test Code 98
Subtotal 209
Ignored Code 89
Total 298

Metrics computed by PR Metrics. Add it to your Azure DevOps and GitHub PRs!

@omex-github-bot-external omex-github-bot-external changed the title [WIP] Enable Biome Linting XS⚠️ ◾ [WIP] Enable Biome Linting Mar 30, 2026
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Enables Biome linting in CI by adding a Biome configuration and applying lint-driven refactors/formatting changes across the TypeScript codebase, alongside workflow/runtime updates.

Changes:

  • Add biome.json and update CI lint configuration to enable Biome linting.
  • Apply Biome-driven refactors (type-only imports, node: protocol imports, Number.isNaN/isFinite, converter rename).
  • Update declared/used Node runtimes (Action, workflows, Azure DevOps task metadata, engines).

Reviewed changes

Copilot reviewed 70 out of 72 changed files in this pull request and generated 24 comments.

Show a summary per file
File Description
src/task/tests/wrappers/execSyncResult.ts Type-only import cleanup (tests)
src/task/tests/wrappers/errorWithStatus.ts Type-only import cleanup (tests)
src/task/tests/utilities/validator.spec.ts Update converter API usage in tests
src/task/tests/utilities/converter.spec.ts Update converter API usage in tests
src/task/tests/utilities/converter.property.spec.ts Update converter API usage in tests
src/task/tests/testUtilities/resolvableInstance.ts Type-only import cleanup (tests)
src/task/tests/testUtilities/createRequestError.ts Type-only import cleanup (tests)
src/task/tests/task.spec.ts node: imports + type-only imports (tests)
src/task/tests/runners/runnerInvoker.spec.ts Type-only import cleanup (tests)
src/task/tests/runners/gitHubRunnerInvoker.spec.ts node: imports + type-only imports (tests)
src/task/tests/runners/azurePipelinesRunnerInvoker.spec.ts node: imports + type-only imports (tests)
src/task/tests/repos/tokenManager.spec.ts Type-only import cleanup (tests)
src/task/tests/repos/reposInvoker.spec.ts Type-only import cleanup (tests)
src/task/tests/repos/gitHubReposInvokerConstants.ts Type-only import cleanup (tests)
src/task/tests/repos/gitHubReposInvoker.spec.ts Type-only import cleanup + converter rename (tests)
src/task/tests/repos/azureReposInvoker.spec.ts Type-only import cleanup + converter rename (tests)
src/task/tests/pullRequests/pullRequestComments.spec.ts Type-only import cleanup + converter rename (tests)
src/task/tests/pullRequests/pullRequest.spec.ts Converter rename (tests)
src/task/tests/metrics/inputs.spec.ts Converter rename (tests)
src/task/tests/git/octokitGitDiffParser.spec.ts Type-only import cleanup (tests)
src/task/tests/git/gitInvoker.spec.ts Type-only import cleanup (tests)
src/task/tests/Strings/resources.resjson.spec.ts node: imports + type-only imports (tests)
src/task/task.loc.json Azure task Node handler + agent min version
src/task/task.json Azure task Node handler + agent min version
src/task/src/wrappers/octokitWrapper.ts Type-only imports (Octokit wrapper)
src/task/src/wrappers/octokitInterfaces/updatePullResponse.ts Type-only import cleanup
src/task/src/wrappers/octokitInterfaces/updateIssueCommentResponse.ts Type-only import cleanup
src/task/src/wrappers/octokitInterfaces/listCommitsResponse.ts Type-only import cleanup
src/task/src/wrappers/octokitInterfaces/getReviewCommentsResponse.ts Type-only import cleanup
src/task/src/wrappers/octokitInterfaces/getPullResponse.ts Type-only import cleanup
src/task/src/wrappers/octokitInterfaces/getIssueCommentsResponse.ts Type-only import cleanup
src/task/src/wrappers/octokitInterfaces/deleteReviewCommentResponse.ts Type-only import cleanup
src/task/src/wrappers/octokitInterfaces/createReviewCommentResponse.ts Type-only import cleanup
src/task/src/wrappers/octokitInterfaces/createIssueCommentResponse.ts Type-only import cleanup
src/task/src/wrappers/azurePipelinesRunnerWrapper.ts Type-only import cleanup
src/task/src/wrappers/azureDevOpsApiWrapper.ts Type-only import cleanup
src/task/src/wrappers/axiosWrapper.ts Inline type-only import cleanup
src/task/src/utilities/validator.ts Converter rename + Number.isNaN change
src/task/src/utilities/logger.ts Type-only import change (DI-sensitive)
src/task/src/utilities/converter.ts Rename toString export to convertToString
src/task/src/runners/runnerInvoker.ts Type-only import change (DI-sensitive)
src/task/src/runners/gitHubRunnerInvoker.ts node: imports + type-only imports (DI-sensitive)
src/task/src/runners/azurePipelinesRunnerInvoker.ts node: imports + type-only imports (DI-sensitive)
src/task/src/repos/tokenManager.ts Type-only imports (DI-sensitive)
src/task/src/repos/reposInvoker.ts Type-only imports (DI-sensitive)
src/task/src/repos/interfaces/fileCommentData.ts Type-only import cleanup
src/task/src/repos/interfaces/commentData.ts Type-only import cleanup
src/task/src/repos/gitHubReposInvoker.ts Type-only imports + converter rename (DI-sensitive)
src/task/src/repos/baseReposInvoker.ts Type-only imports + formatting
src/task/src/repos/azureReposInvoker.ts Type-only imports (DI-sensitive)
src/task/src/pullRequests/pullRequestCommentsData.ts Type-only import cleanup
src/task/src/pullRequests/pullRequestComments.ts Type-only imports (DI-sensitive)
src/task/src/pullRequests/pullRequest.ts Type-only imports (DI-sensitive)
src/task/src/pullRequestMetrics.ts Type-only imports (DI-sensitive)
src/task/src/metrics/inputs.ts Number.isNaN/isFinite changes + type-only imports (DI-sensitive)
src/task/src/metrics/codeMetricsCalculator.ts Type-only imports (DI-sensitive)
src/task/src/metrics/codeMetrics.ts Number.isNaN + type-only imports (DI-sensitive)
src/task/src/git/octokitGitDiffParser.ts Type-only imports (DI-sensitive)
src/task/src/git/gitInvoker.ts Number.isNaN + type-only imports (DI-sensitive)
src/task/index.ts node: imports
package.json Bump Node engine requirement
package-lock.json Bump Node engine requirement
docs/workload-identity-federation.md Markdown lint formatting cleanup
docs/verification.md Markdown lint formatting cleanup
biome.json Add Biome config
action.yml Update GitHub Action runtime to node24
.github/workflows/release-publish.yml Update pinned actions + Node version
.github/workflows/release-initiate.yml Update pinned actions + Node version
.github/workflows/build.yml Update pinned actions + enable Biome linting
.github/azure-devops/template.yml Update Azure pipeline Node tool/task
.github/azure-devops/release.yml Update Azure pipeline Node tool/task

@muiriswoulfe
Copy link
Copy Markdown
Member Author

Super-linter summary

Language Validation result
BIOME_LINT Pass ✅
CHECKOV Pass ✅
EDITORCONFIG Pass ✅
GITHUB_ACTIONS Pass ✅
GITLEAKS Pass ✅
GIT_MERGE_CONFLICT_MARKERS Pass ✅
JSCPD Pass ✅
JSON_PRETTIER Pass ✅
MARKDOWN Pass ✅
MARKDOWN_PRETTIER Pass ✅
NATURAL_LANGUAGE Pass ✅
POWERSHELL Pass ✅
PRE_COMMIT Pass ✅
TRIVY Fail ❌
TYPESCRIPT_PRETTIER Pass ✅
XML Pass ✅
YAML Pass ✅
YAML_PRETTIER Pass ✅

Super-linter detected linting errors

For more information, see the GitHub Actions workflow run

Powered by Super-linter

TRIVY

Report Summary

┌───────────────────┬──────┬─────────────────┬───────────────────┬─────────┐
│      Target       │ Type │ Vulnerabilities │ Misconfigurations │ Secrets │
├───────────────────┼──────┼─────────────────┼───────────────────┼─────────┤
│ package-lock.json │ npm  │        1        │         -         │    -    │
└───────────────────┴──────┴─────────────────┴───────────────────┴─────────┘
Legend:
- '-': Not scanned
- '0': Clean (no security findings detected)


For OSS Maintainers: VEX Notice
--------------------------------
If you're an OSS maintainer and Trivy has detected vulnerabilities in your project that you believe are not actually exploitable, consider issuing a VEX (Vulnerability Exploitability eXchange) statement.
VEX allows you to communicate the actual status of vulnerabilities in your project, improving security transparency and reducing false positives for your users.
Learn more and start using VEX: https://trivy.dev/docs/v0.69/guide/supply-chain/vex/repo#publishing-vex-documents

To disable this notice, set the TRIVY_DISABLE_VEX_NOTICE environment variable.


package-lock.json (npm)
=======================
Total: 1 (UNKNOWN: 0, LOW: 0, MEDIUM: 1, HIGH: 0, CRITICAL: 0)

┌─────────────────┬────────────────┬──────────┬────────┬───────────────────┬─────────────────────────────┬─────────────────────────────────────────────────────────┐
│     Library     │ Vulnerability  │ Severity │ Status │ Installed Version │        Fixed Version        │                          Title                          │
├─────────────────┼────────────────┼──────────┼────────┼───────────────────┼─────────────────────────────┼─────────────────────────────────────────────────────────┤
│ brace-expansion │ CVE-2026-33750 │ MEDIUM   │ fixed  │ 1.1.12            │ 5.0.5, 3.0.2, 2.0.3, 1.1.13 │ The brace-expansion library generates arbitrary strings │
│                 │                │          │        │                   │                             │ containing a c ...                                      │
│                 │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-33750              │
└─────────────────┴────────────────┴──────────┴────────┴───────────────────┴─────────────────────────────┴─────────────────────────────────────────────────────────┘

With emitDecoratorMetadata enabled, tsyringe needs runtime type
references for constructor-injected dependencies. Reverts import
type back to value imports for all DI-injected classes. Also fixes
Number.isNaN/isFinite line breaks and disables useImportType in
biome.json to prevent conflicts with tsyringe.
Copilot AI review requested due to automatic review settings March 30, 2026 14:29
@muiriswoulfe
Copy link
Copy Markdown
Member Author

Super-linter summary

Language Validation result
BIOME_LINT Pass ✅
CHECKOV Pass ✅
EDITORCONFIG Pass ✅
GITHUB_ACTIONS Pass ✅
GITLEAKS Pass ✅
GIT_MERGE_CONFLICT_MARKERS Pass ✅
JSCPD Pass ✅
JSON_PRETTIER Pass ✅
MARKDOWN Pass ✅
MARKDOWN_PRETTIER Pass ✅
NATURAL_LANGUAGE Pass ✅
POWERSHELL Pass ✅
PRE_COMMIT Pass ✅
TRIVY Fail ❌
TYPESCRIPT_PRETTIER Pass ✅
XML Pass ✅
YAML Pass ✅
YAML_PRETTIER Pass ✅

Super-linter detected linting errors

For more information, see the GitHub Actions workflow run

Powered by Super-linter

TRIVY

Report Summary

┌───────────────────┬──────┬─────────────────┬───────────────────┬─────────┐
│      Target       │ Type │ Vulnerabilities │ Misconfigurations │ Secrets │
├───────────────────┼──────┼─────────────────┼───────────────────┼─────────┤
│ package-lock.json │ npm  │        1        │         -         │    -    │
└───────────────────┴──────┴─────────────────┴───────────────────┴─────────┘
Legend:
- '-': Not scanned
- '0': Clean (no security findings detected)


For OSS Maintainers: VEX Notice
--------------------------------
If you're an OSS maintainer and Trivy has detected vulnerabilities in your project that you believe are not actually exploitable, consider issuing a VEX (Vulnerability Exploitability eXchange) statement.
VEX allows you to communicate the actual status of vulnerabilities in your project, improving security transparency and reducing false positives for your users.
Learn more and start using VEX: https://trivy.dev/docs/v0.69/guide/supply-chain/vex/repo#publishing-vex-documents

To disable this notice, set the TRIVY_DISABLE_VEX_NOTICE environment variable.


package-lock.json (npm)
=======================
Total: 1 (UNKNOWN: 0, LOW: 0, MEDIUM: 1, HIGH: 0, CRITICAL: 0)

┌─────────────────┬────────────────┬──────────┬────────┬───────────────────┬─────────────────────────────┬─────────────────────────────────────────────────────────┐
│     Library     │ Vulnerability  │ Severity │ Status │ Installed Version │        Fixed Version        │                          Title                          │
├─────────────────┼────────────────┼──────────┼────────┼───────────────────┼─────────────────────────────┼─────────────────────────────────────────────────────────┤
│ brace-expansion │ CVE-2026-33750 │ MEDIUM   │ fixed  │ 1.1.12            │ 5.0.5, 3.0.2, 2.0.3, 1.1.13 │ The brace-expansion library generates arbitrary strings │
│                 │                │          │        │                   │                             │ containing a c ...                                      │
│                 │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-33750              │
└─────────────────┴────────────────┴──────────┴────────┴───────────────────┴─────────────────────────────┴─────────────────────────────────────────────────────────┘

@muiriswoulfe
Copy link
Copy Markdown
Member Author

Super-linter summary

Language Validation result
BIOME_LINT Pass ✅
CHECKOV Pass ✅
EDITORCONFIG Pass ✅
GITHUB_ACTIONS Pass ✅
GITLEAKS Pass ✅
GIT_MERGE_CONFLICT_MARKERS Pass ✅
JSCPD Pass ✅
JSON_PRETTIER Pass ✅
MARKDOWN Pass ✅
MARKDOWN_PRETTIER Pass ✅
NATURAL_LANGUAGE Pass ✅
POWERSHELL Pass ✅
PRE_COMMIT Pass ✅
TRIVY Fail ❌
TYPESCRIPT_PRETTIER Pass ✅
XML Pass ✅
YAML Pass ✅
YAML_PRETTIER Pass ✅

Super-linter detected linting errors

For more information, see the GitHub Actions workflow run

Powered by Super-linter

TRIVY

Report Summary

┌───────────────────┬──────┬─────────────────┬───────────────────┬─────────┐
│      Target       │ Type │ Vulnerabilities │ Misconfigurations │ Secrets │
├───────────────────┼──────┼─────────────────┼───────────────────┼─────────┤
│ package-lock.json │ npm  │        1        │         -         │    -    │
└───────────────────┴──────┴─────────────────┴───────────────────┴─────────┘
Legend:
- '-': Not scanned
- '0': Clean (no security findings detected)


For OSS Maintainers: VEX Notice
--------------------------------
If you're an OSS maintainer and Trivy has detected vulnerabilities in your project that you believe are not actually exploitable, consider issuing a VEX (Vulnerability Exploitability eXchange) statement.
VEX allows you to communicate the actual status of vulnerabilities in your project, improving security transparency and reducing false positives for your users.
Learn more and start using VEX: https://trivy.dev/docs/v0.69/guide/supply-chain/vex/repo#publishing-vex-documents

To disable this notice, set the TRIVY_DISABLE_VEX_NOTICE environment variable.


package-lock.json (npm)
=======================
Total: 1 (UNKNOWN: 0, LOW: 0, MEDIUM: 1, HIGH: 0, CRITICAL: 0)

┌─────────────────┬────────────────┬──────────┬────────┬───────────────────┬─────────────────────────────┬─────────────────────────────────────────────────────────┐
│     Library     │ Vulnerability  │ Severity │ Status │ Installed Version │        Fixed Version        │                          Title                          │
├─────────────────┼────────────────┼──────────┼────────┼───────────────────┼─────────────────────────────┼─────────────────────────────────────────────────────────┤
│ brace-expansion │ CVE-2026-33750 │ MEDIUM   │ fixed  │ 1.1.12            │ 5.0.5, 3.0.2, 2.0.3, 1.1.13 │ The brace-expansion library generates arbitrary strings │
│                 │                │          │        │                   │                             │ containing a c ...                                      │
│                 │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-33750              │
└─────────────────┴────────────────┴──────────┴────────┴───────────────────┴─────────────────────────────┴─────────────────────────────────────────────────────────┘

Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Copilot reviewed 67 out of 69 changed files in this pull request and generated 2 comments.

@muiriswoulfe
Copy link
Copy Markdown
Member Author

Super-linter summary

Language Validation result
BIOME_LINT Pass ✅
CHECKOV Pass ✅
EDITORCONFIG Pass ✅
GITHUB_ACTIONS Pass ✅
GITLEAKS Pass ✅
GIT_MERGE_CONFLICT_MARKERS Pass ✅
JSCPD Pass ✅
JSON_PRETTIER Pass ✅
MARKDOWN Pass ✅
MARKDOWN_PRETTIER Pass ✅
NATURAL_LANGUAGE Pass ✅
POWERSHELL Pass ✅
PRE_COMMIT Pass ✅
TRIVY Fail ❌
TYPESCRIPT_PRETTIER Pass ✅
XML Pass ✅
YAML Pass ✅
YAML_PRETTIER Pass ✅

Super-linter detected linting errors

For more information, see the GitHub Actions workflow run

Powered by Super-linter

TRIVY

Report Summary

┌───────────────────┬──────┬─────────────────┬───────────────────┬─────────┐
│      Target       │ Type │ Vulnerabilities │ Misconfigurations │ Secrets │
├───────────────────┼──────┼─────────────────┼───────────────────┼─────────┤
│ package-lock.json │ npm  │        1        │         -         │    -    │
└───────────────────┴──────┴─────────────────┴───────────────────┴─────────┘
Legend:
- '-': Not scanned
- '0': Clean (no security findings detected)


For OSS Maintainers: VEX Notice
--------------------------------
If you're an OSS maintainer and Trivy has detected vulnerabilities in your project that you believe are not actually exploitable, consider issuing a VEX (Vulnerability Exploitability eXchange) statement.
VEX allows you to communicate the actual status of vulnerabilities in your project, improving security transparency and reducing false positives for your users.
Learn more and start using VEX: https://trivy.dev/docs/v0.69/guide/supply-chain/vex/repo#publishing-vex-documents

To disable this notice, set the TRIVY_DISABLE_VEX_NOTICE environment variable.


package-lock.json (npm)
=======================
Total: 1 (UNKNOWN: 0, LOW: 0, MEDIUM: 1, HIGH: 0, CRITICAL: 0)

┌─────────────────┬────────────────┬──────────┬────────┬───────────────────┬─────────────────────────────┬─────────────────────────────────────────────────────────┐
│     Library     │ Vulnerability  │ Severity │ Status │ Installed Version │        Fixed Version        │                          Title                          │
├─────────────────┼────────────────┼──────────┼────────┼───────────────────┼─────────────────────────────┼─────────────────────────────────────────────────────────┤
│ brace-expansion │ CVE-2026-33750 │ MEDIUM   │ fixed  │ 1.1.12            │ 5.0.5, 3.0.2, 2.0.3, 1.1.13 │ The brace-expansion library generates arbitrary strings │
│                 │                │          │        │                   │                             │ containing a c ...                                      │
│                 │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-33750              │
└─────────────────┴────────────────┴──────────┴────────┴───────────────────┴─────────────────────────────┴─────────────────────────────────────────────────────────┘

Re-enables the useImportType rule globally and uses overrides to
disable it only for the 17 tsyringe DI-decorated files that need
runtime imports. Also makes the schema URL version-agnostic.
Copilot AI review requested due to automatic review settings March 30, 2026 15:49
@muiriswoulfe
Copy link
Copy Markdown
Member Author

Super-linter summary

Language Validation result
BIOME_LINT Pass ✅
CHECKOV Pass ✅
EDITORCONFIG Pass ✅
GITHUB_ACTIONS Pass ✅
GITLEAKS Pass ✅
GIT_MERGE_CONFLICT_MARKERS Pass ✅
JSCPD Pass ✅
JSON_PRETTIER Pass ✅
MARKDOWN Pass ✅
MARKDOWN_PRETTIER Pass ✅
NATURAL_LANGUAGE Pass ✅
POWERSHELL Pass ✅
PRE_COMMIT Pass ✅
TRIVY Fail ❌
TYPESCRIPT_PRETTIER Pass ✅
XML Pass ✅
YAML Pass ✅
YAML_PRETTIER Pass ✅

Super-linter detected linting errors

For more information, see the GitHub Actions workflow run

Powered by Super-linter

TRIVY

Report Summary

┌───────────────────┬──────┬─────────────────┬───────────────────┬─────────┐
│      Target       │ Type │ Vulnerabilities │ Misconfigurations │ Secrets │
├───────────────────┼──────┼─────────────────┼───────────────────┼─────────┤
│ package-lock.json │ npm  │        1        │         -         │    -    │
└───────────────────┴──────┴─────────────────┴───────────────────┴─────────┘
Legend:
- '-': Not scanned
- '0': Clean (no security findings detected)


For OSS Maintainers: VEX Notice
--------------------------------
If you're an OSS maintainer and Trivy has detected vulnerabilities in your project that you believe are not actually exploitable, consider issuing a VEX (Vulnerability Exploitability eXchange) statement.
VEX allows you to communicate the actual status of vulnerabilities in your project, improving security transparency and reducing false positives for your users.
Learn more and start using VEX: https://trivy.dev/docs/v0.69/guide/supply-chain/vex/repo#publishing-vex-documents

To disable this notice, set the TRIVY_DISABLE_VEX_NOTICE environment variable.


package-lock.json (npm)
=======================
Total: 1 (UNKNOWN: 0, LOW: 0, MEDIUM: 1, HIGH: 0, CRITICAL: 0)

┌─────────────────┬────────────────┬──────────┬────────┬───────────────────┬─────────────────────────────┬─────────────────────────────────────────────────────────┐
│     Library     │ Vulnerability  │ Severity │ Status │ Installed Version │        Fixed Version        │                          Title                          │
├─────────────────┼────────────────┼──────────┼────────┼───────────────────┼─────────────────────────────┼─────────────────────────────────────────────────────────┤
│ brace-expansion │ CVE-2026-33750 │ MEDIUM   │ fixed  │ 1.1.12            │ 5.0.5, 3.0.2, 2.0.3, 1.1.13 │ The brace-expansion library generates arbitrary strings │
│                 │                │          │        │                   │                             │ containing a c ...                                      │
│                 │                │          │        │                   │                             │ https://avd.aquasec.com/nvd/cve-2026-33750              │
└─────────────────┴────────────────┴──────────┴────────┴───────────────────┴─────────────────────────────┴─────────────────────────────────────────────────────────┘

Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Copilot reviewed 67 out of 69 changed files in this pull request and generated no new comments.

@muiriswoulfe
Copy link
Copy Markdown
Member Author

Super-linter summary

Language Validation result
BIOME_LINT Pass ✅
CHECKOV Pass ✅
EDITORCONFIG Pass ✅
GITHUB_ACTIONS Pass ✅
GITLEAKS Pass ✅
GIT_MERGE_CONFLICT_MARKERS Pass ✅
JSCPD Pass ✅
JSON_PRETTIER Pass ✅
MARKDOWN Pass ✅
MARKDOWN_PRETTIER Pass ✅
NATURAL_LANGUAGE Pass ✅
POWERSHELL Pass ✅
PRE_COMMIT Pass ✅
TRIVY Pass ✅
TYPESCRIPT_PRETTIER Pass ✅
XML Pass ✅
YAML Pass ✅
YAML_PRETTIER Pass ✅

All files and directories linted successfully

For more information, see the GitHub Actions workflow run

Powered by Super-linter

@muiriswoulfe muiriswoulfe changed the base branch from main to muiriswoulfe/super-linter-v8 March 30, 2026 17:08
@muiriswoulfe muiriswoulfe changed the title XS⚠️ ◾ [WIP] Enable Biome Linting XS⚠️ ◾ [WIP2] Enable Biome Linting Apr 1, 2026
@muiriswoulfe
Copy link
Copy Markdown
Member Author

TODO: Remove suppressions after merging #755

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

enhancement New feature or request

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants