Running with gitlab-runner 17.6.0 (374d34fd)
  on shared generic run-untagged Nse4-tqot, system ID: s_712e41515b56
section_start:1742891916:prepare_executor
Preparing the "docker" executor
Using Docker executor with image registry.gitlab.com/security-products/semgrep:5 ...
Pulling docker image registry.gitlab.com/security-products/semgrep:5 ...
Using docker image sha256:e39d824f582bff05292aca0a76b3b51cfde6b6f2c8fe4a9bbbe32aababb2bba0 for registry.gitlab.com/security-products/semgrep:5 with digest registry.gitlab.com/security-products/semgrep@sha256:3cbd26a51a4152ebc844d2141ce7e39eb69e8e38b9337f83d8877a0e6b196df5 ...
section_end:1742891928:prepare_executor
section_start:1742891928:prepare_script
Preparing environment
Running on runner-nse4-tqot-project-1011-concurrent-0 via ci05.adullact.lan...
section_end:1742891931:prepare_script
section_start:1742891931:get_sources
Getting source from Git repository
Fetching changes with git depth set to 20...
Reinitialized existing Git repository in /builds/soluris/madis-cyber/.git/
Checking out 4794b3e9 as detached HEAD (ref is develop)...

Skipping Git submodules setup
section_end:1742891932:get_sources
section_start:1742891932:step_script
Executing "step_script" stage of the job script
Using docker image sha256:e39d824f582bff05292aca0a76b3b51cfde6b6f2c8fe4a9bbbe32aababb2bba0 for registry.gitlab.com/security-products/semgrep:5 with digest registry.gitlab.com/security-products/semgrep@sha256:3cbd26a51a4152ebc844d2141ce7e39eb69e8e38b9337f83d8877a0e6b196df5 ...
$ /analyzer run
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶ GitLab Semgrep analyzer v5.29.0
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶ Detecting project
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶ Analyzer will attempt to analyze all projects in the repository
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶ Loading ruleset for /builds/soluris/madis-cyber
[WARN] [Semgrep] [2025-03-25T08:38:52Z] ▶ /builds/soluris/madis-cyber/.gitlab/sast-ruleset.toml not found, ruleset customization will be disabled.
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶ Running analyzer
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶ 21 active rule files detected with 590 active rules
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/bandit.yml': '421db3f70eea6a526be8c7976e992bc869b4bdb3302184e83a315be0828d4f11'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/eslint.yml': '831c55cd994badfe119fe9ef84978782db338c9a8c9d5de50243e8f20c47438c'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/find_sec_bugs.yml': '402d2e2eec335bcca04b52cb3f61d108f4ab15fc2b895044a69737fbdc7f0877'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/find_sec_bugs_scala.yml': '96be1f44e38bb21a1cd37c104ccde813c9856b6575b563b3531f5bc57f27043c'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/flawfinder.yml': '5251a0ba3057fd9bea5f7ca1865d15b312060acaf1a23c4cbf45ab274d7eab1c'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/gitlab/gitlab_ee_java.yml': '76d53d31be4fa305311182f36631436b055f9562312c7a095de6c4bb46fc6dc8'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/gitlab/gitlab_ee_javascript.yml': 'fd90ec31b4998a82b9bfce49847f5d3cf7e89788fa6b30f05a3d9d66f8bc6712'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/gitlab_ce_python.yml': 'c9e64ea32db180e48829ddb2230fc4c0a58953e6fde134671c4365751a895c3c'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/gitlab_ce_scala.yml': '6a0ad81ea5f1a3e552dbd2e53c224b0d2e792f484c75a5ee2e0de0c218859211'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/gosec.yml': 'f4df67ed8f520b6333747b58658ef739c47d4122e50fde999e032615cc2873a2'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/lgpl-cc/brakeman.yml': 'aeff85a2af4a42715b26af80b5f31184e14b88b34b15065b31ebc25d920b617a'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/lgpl-cc/gitlab_lgpl_cc_java.yml': '25ca7519f15f4ff412b4faf5b19060f619a0c49aef679736aaf551f2cd6b3d77'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/lgpl-cc/gitlab_lgpl_cc_javascript.yml': 'e238e9b549c26238892e252185f1c05170db34e02fbec20e43c69cdf9f7c949b'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/lgpl-cc/gitlab_lgpl_cc_properties.yml': 'ec048ed98691ad9416383d7f24fda41fcbd7e17bde22196fc0e08a3fac1ddf64'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/lgpl-cc/gitlab_lgpl_cc_python.yml': 'a9b11baf89caafb05bbf8c755f5bd3174bb8390fb06f6549b025e3972923c120'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/lgpl-cc/gitlab_lgpl_cc_yaml.yml': 'a9964fb6558867ed112ea5cd3a417eacf305bf5d5e5e82b97393a2695ad5e9c9'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/lgpl-cc/phpcs_security_audit.yml': '896049862b2ecb60be45dd3230105a8465e28b2429141c8bcfcf06862827b5f0'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/lgpl/find_sec_bugs_kotlin.yml': 'bdc5646c4dd84fb8d60f96c925f986b6e1bfb0b9df4d5e6f9ca066d12b8f4cb7'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/lgpl/mobsf.yml': '42a9564904aa8432018a5d3de84b55ec292809d303ba1733de9add81202b06e3'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/lgpl/nodejs_scan.yml': '77de49bdef9ab61464e6732fc904c8a2d2797bb70bff13c5cd8f3c859c3c65c2'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶  * rule file '/rules/security_code_scan.yml': '6436b02e4e2d8e82c744475d9ed676b840d9c13f22289f7798fa4c1119d5e70c'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶ Combined rule checksum: 'd2cf7dfee4f20b558b8a3ac9beea7b3360d78b94a5e4e05cbcdf21cc082f6378'
[INFO] [Semgrep] [2025-03-25T08:38:52Z] ▶ Using the GitLab SAST default ruleset
[INFO] [Semgrep] [2025-03-25T08:38:54Z] ▶ METRICS: Using configs from the Registry (like --config=p/ci) reports pseudonymous rule metrics to semgrep.dev.
[INFO] [Semgrep] [2025-03-25T08:38:54Z] ▶ To disable Registry rule metrics, use "--metrics=off".
[INFO] [Semgrep] [2025-03-25T08:38:54Z] ▶ Using configs only from local files (like --config=xyz.yml) does not enable metrics.
[INFO] [Semgrep] [2025-03-25T08:38:54Z] ▶ 
[INFO] [Semgrep] [2025-03-25T08:38:54Z] ▶ More information: https://semgrep.dev/docs/metrics
[INFO] [Semgrep] [2025-03-25T08:38:54Z] ▶ 
[INFO] [Semgrep] [2025-03-25T08:39:02Z] ▶                
[INFO] [Semgrep] [2025-03-25T08:39:02Z] ▶                
[INFO] [Semgrep] [2025-03-25T08:39:02Z] ▶ ┌─────────────┐
[INFO] [Semgrep] [2025-03-25T08:39:02Z] ▶ │ Scan Status │
[INFO] [Semgrep] [2025-03-25T08:39:02Z] ▶ └─────────────┘
[INFO] [Semgrep] [2025-03-25T08:39:02Z] ▶   Scanning 486 files with 590 Code rules:
[INFO] [Semgrep] [2025-03-25T08:39:02Z] ▶                                                                                                                         
[INFO] [Semgrep] [2025-03-25T08:39:02Z] ▶   Language   Rules   Files          Origin   Rules                                                                      
[INFO] [Semgrep] [2025-03-25T08:39:02Z] ▶  ──────────────────────────        ────────────────                                                                     
[INFO] [Semgrep] [2025-03-25T08:39:02Z] ▶   php            9     178          Custom     590                                                                      
[INFO] [Semgrep] [2025-03-25T08:39:02Z] ▶   js            96      20                                                                                              
[INFO] [Semgrep] [2025-03-25T08:39:02Z] ▶   yaml           1       4                                                                                              
[INFO] [Semgrep] [2025-03-25T08:39:02Z] ▶   python        79       1                                                                                              
[INFO] [Semgrep] [2025-03-25T08:39:02Z] ▶                                                                                                                         
[INFO] [Semgrep] [2025-03-25T08:39:05Z] ▶                 
[INFO] [Semgrep] [2025-03-25T08:39:05Z] ▶                 
[INFO] [Semgrep] [2025-03-25T08:39:05Z] ▶ ┌──────────────┐
[INFO] [Semgrep] [2025-03-25T08:39:05Z] ▶ │ Scan Summary │
[INFO] [Semgrep] [2025-03-25T08:39:05Z] ▶ └──────────────┘
[INFO] [Semgrep] [2025-03-25T08:39:05Z] ▶ Some files were skipped or only partially analyzed.
[INFO] [Semgrep] [2025-03-25T08:39:05Z] ▶   Partially scanned: 3 files only partially analyzed due to parsing or internal Semgrep errors
[INFO] [Semgrep] [2025-03-25T08:39:05Z] ▶   Scan skipped: 16 files matching --exclude patterns, 44 files larger than 1.0 MB, 12 files matching .semgrepignore patterns
[INFO] [Semgrep] [2025-03-25T08:39:05Z] ▶   For a full list of skipped files, run semgrep with the --verbose flag.
[INFO] [Semgrep] [2025-03-25T08:39:05Z] ▶ 
[INFO] [Semgrep] [2025-03-25T08:39:05Z] ▶ Ran 185 rules on 203 files: 1 finding.
[INFO] [Semgrep] [2025-03-25T08:39:06Z] ▶ Creating report
[WARN] [Semgrep] [2025-03-25T08:39:06Z] ▶ tool notification warning: Syntax error Syntax error at line resources/views/pdf/dossierCyberSecurite/toc.blade.php:1:
 `xml version="1.0" encoding=` was unexpected
[WARN] [Semgrep] [2025-03-25T08:39:06Z] ▶ tool notification warning: Syntax error Syntax error at line resources/views/pdf/planAction/toc.blade.php:1:
 `xml version="1.0" encoding=` was unexpected
[WARN] [Semgrep] [2025-03-25T08:39:06Z] ▶ tool notification warning: Syntax error Syntax error at line resources/views/pdf/politiqueSecurite/toc.blade.php:1:
 `xml version="1.0" encoding=` was unexpected
section_end:1742891947:step_script
section_start:1742891947:upload_artifacts_on_success
Uploading artifacts for successful job
Uploading artifacts...
gl-sast-report.json: found 1 matching artifact files and directories 
Uploading artifacts as "sast" to coordinator... 201 Created  id=281046 responseStatus=201 Created token=glcbt-64
section_end:1742891948:upload_artifacts_on_success
section_start:1742891948:cleanup_file_variables
Cleaning up project directory and file based variables
section_end:1742891948:cleanup_file_variables
Job succeeded