Skip to content

feat(core): WDA-direct iOS regions — 3 fixes for Node 14 + WDA sid + …

e7b9938
Select commit
Loading
Failed to load commit list.
Closed

feat(core): iOS element regions via WDA-direct (Plan A — gated for deletion in Phase 4) #2201

feat(core): WDA-direct iOS regions — 3 fixes for Node 14 + WDA sid + …
e7b9938
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / Semgrep OSS succeeded Apr 29, 2026 in 8s

13 new alerts

New alerts in code changed by this pull request

  • 13 warnings

See annotations below for details.

View all branch alerts.

Annotations

Check warning on line 394 in packages/core/src/api.js

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 394 in packages/core/src/api.js

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 407 in packages/core/src/api.js

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.express.security.audit.express-path-join-resolve-traversal.express-path-join-resolve-traversal Warning

Possible writing outside of the destination, make sure that the target path is nested in the intended destination

Check warning on line 407 in packages/core/src/api.js

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 407 in packages/core/src/api.js

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.express.security.audit.express-path-join-resolve-traversal.express-path-join-resolve-traversal Warning

Possible writing outside of the destination, make sure that the target path is nested in the intended destination

Check warning on line 407 in packages/core/src/api.js

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 407 in packages/core/src/api.js

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.express.security.audit.express-path-join-resolve-traversal.express-path-join-resolve-traversal Warning

Possible writing outside of the destination, make sure that the target path is nested in the intended destination

Check warning on line 407 in packages/core/src/api.js

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 55 in packages/core/src/wda-session-resolver.js

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 8 in packages/core/test/unit/adb-hierarchy.test.js

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning test

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 18 in packages/core/test/unit/wda-session-resolver.test.js

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning test

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 18 in packages/core/test/unit/wda-session-resolver.test.js

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning test

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.

Check warning on line 21 in packages/core/test/unit/wda-session-resolver.test.js

See this annotation in the file changed.

Code scanning / Semgrep OSS

Semgrep Finding: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal Warning test

Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.