Mitigate potential RCE from SnakeYaml (CVE-2022-1471)
Some checks failed
continuous-integration/drone/push Build is failing

This vulnerability is very unlikely to ever happen, since the only way to modify the YAML file is to edit it yourself, and it would be useless for a bot owner to RCE their own bot. No other person can edit the configuration file remotely (eg. with bot commands), so realistically, this could not happen.
This commit is contained in:
2022-12-24 14:42:01 +01:00
parent cd1a50a6d1
commit e65ec54fd7
2 changed files with 2 additions and 6 deletions

View File

@@ -50,11 +50,6 @@
<artifactId>commons-text</artifactId>
<version>1.10.0</version>
</dependency>
<dependency>
<groupId>com.vdurmont</groupId>
<artifactId>emoji-java</artifactId>
<version>5.1.1</version>
</dependency>
</dependencies>