Reset quality gate does not work when a tool with custom result id is used #3240
Quality Monitor
Unit Tests (Whole Project): 100.00% successful (92 passed, 2 skipped)
🚀 Integration Tests (Whole Project): 100.00% successful (495 passed, 10 skipped)
⛔ Architecture Tests (Whole Project): 100.00% successful (15 passed)
〰️ Line Coverage (Changed Code): n/a (0 missed lines)
➰ Branch Coverage (Changed Code): n/a (0 missed branches)
〰️ Line Coverage (Whole Project): 80.77% (1167 missed lines)
➰ Branch Coverage (Whole Project): 64.44% (463 missed branches)
CheckStyle (Whole Project): No warnings
PMD (Whole Project): No warnings
SpotBugs (Whole Project): No bugs
🛡️ OWASP Dependency Check (Whole Project): 205 vulnerabilities (error: 16, high: 50, normal: 132, low: 7)
🌀 Cyclomatic Complexity (Whole Project): 2593 (total)
💭 Cognitive Complexity (Whole Project): 824 (total)
➿ N-Path Complexity (Whole Project): 2879 (total)
📏 Lines of Code (Whole Project): 31642 (total)
📝 Non Commenting Source Statements (Whole Project): 10527 (total)
🔗 Class Cohesion (Whole Project): 100.00% (maximum)
⚖️ Weight of Class (Whole Project): 100.00% (maximum)
🚦 Quality Gates
Overall Status: ✅ SUCCESS
✅ Passed Gates
- ✅ Overall Tests Success Rate: 100.00 >= 100.00
- ✅ Line Coverage in New Code: 100.00 >= 90.00
- ✅ Branch Coverage in New Code: 100.00 >= 90.00
- ✅ Potential Bugs in Whole Project: 0.00 <= 0.00
- ✅ Style Violation in Whole Project: 0.00 <= 0.00
Created by Quality Monitor v4.0.0 (#8f591a4)
Details
☀️ Quality Monitor
Tests
Skipped Tests
- io.jenkins.plugins.analysis.warnings.groovy.DynamicLineParserTest#shouldRegisterParser
- io.jenkins.plugins.analysis.warnings.groovy.DynamicDocumentParserTest#shouldRegisterParser
- io.jenkins.plugins.analysis.core.util.AbsolutePathGeneratorITest#shouldMapIssueToAffectedFileIfPathIsInWrongCase
- io.jenkins.plugins.analysis.warnings.steps.DockerContainerITest#shouldBuildMavenProjectOnAgent
- io.jenkins.plugins.analysis.warnings.steps.DockerContainerITest#shouldBuildMakefileOnAgent
- io.jenkins.plugins.analysis.warnings.steps.GitForensicsITest#shouldObtainBlamesAndForensicsInFreestyleJob
- io.jenkins.plugins.analysis.warnings.steps.GitForensicsITest#shouldSkipBlamesAndForensicsWithRecordIssuesStep
- io.jenkins.plugins.analysis.warnings.steps.GitForensicsITest#shouldObtainBlamesAndForensicsWithRecordIssuesStep
- io.jenkins.plugins.analysis.warnings.steps.GitForensicsITest#shouldSkipBlamesAndForensicsWithScanAndPublishIssuesSteps
- io.jenkins.plugins.analysis.warnings.steps.GitForensicsITest#shouldSkipDeltaCalculation
- io.jenkins.plugins.analysis.warnings.steps.GitForensicsITest#shouldObtainBlamesAndForensicsWithScanAndPublishIssuesSteps
- io.jenkins.plugins.analysis.warnings.steps.GitForensicsITest#shouldSkipBlamesAndForensicsInFreestyleJob
⚠️ Style
| Icon | Name | Scope | Warnings |
|---|---|---|---|
| CheckStyle | Whole Project | 0 | |
| PMD | Whole Project | 0 | |
| ➕ | Total | - | 0 |
🐛 Bugs
| Icon | Name | Scope | Warnings |
|---|---|---|---|
| SpotBugs | Whole Project | 0 |
🛡️ Vulnerabilities
| Icon | Name | Scope | Warnings |
|---|---|---|---|
| 🛡️ | OWASP Dependency Check | Whole Project | 205 |
👣 Coverage for New Code
| Icon | Name | Scope | Covered % |
|---|---|---|---|
| 〰️ | Line Coverage | Changed Code | 100 |
| ➰ | Branch Coverage | Changed Code | 100 |
| ➕ | Total Ø | - | 100 |
👣 Coverage for Whole Project
| Icon | Name | Scope | Covered % |
|---|---|---|---|
| 〰️ | Line Coverage | Whole Project | 81 |
| ➰ | Branch Coverage | Whole Project | 64 |
| ➕ | Total Ø | - | 72 |
📐 Software Metrics
| Icon | Name | Scope | Total | Min | Max | Mean | Median |
|---|---|---|---|---|---|---|---|
| 🌀 | Cyclomatic Complexity | Whole Project | 2593 | 1 | 9 | 1.30 | 1 |
| 💭 | Cognitive Complexity | Whole Project | 824 | 0 | 14 | 0.39 | 0 |
| ➿ | N-Path Complexity | Whole Project | 2879 | 1 | 27 | 1.35 | 1 |
| 📏 | Lines of Code | Whole Project | 31642 | 3 | 1012 | 60.39 | 3 |
| 📝 | Non Commenting Source Statements | Whole Project | 10527 | 1 | 311 | 20.09 | 1 |
| 🔗 | Class Cohesion | Whole Project | 100.00% | 0.00% | 100.00% | 7.22% | 0.00% |
| ⚖️ | Weight of Class | Whole Project | 100.00% | 0.00% | 100.00% | 48.79% | 0.00% |
🚦 Quality Gates
Overall Status: ✅ SUCCESS
✅ Passed Gates
- ✅ Overall Tests Success Rate: 100.00 >= 100.00
- ✅ Line Coverage in New Code: 100.00 >= 90.00
- ✅ Branch Coverage in New Code: 100.00 >= 90.00
- ✅ Potential Bugs in Whole Project: 0.00 <= 0.00
- ✅ Style Violation in Whole Project: 0.00 <= 0.00
Annotations
Check warning on line 1 in apache-httpcomponents-client-4-api-4.5.14-269.vfa_2321039a_83.jar
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2025-67640
Jenkins Git client Plugin 6.4.0 and earlier does not not correctly escape the path to the workspace directory as part of an argument in a temporary shell script generated by the plugin, allowing attackers able to control the workspace directory name to inject arbitrary OS commands.
Check warning on line 1 in apache-httpcomponents-client-4-api-4.5.14-269.vfa_2321039a_83.jar
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2025-58458
In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
Check warning on line 1 in apache-httpcomponents-client-5-api-5.5-170.v023de017ccd7.jar
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2025-67640
Jenkins Git client Plugin 6.4.0 and earlier does not not correctly escape the path to the workspace directory as part of an argument in a temporary shell script generated by the plugin, allowing attackers able to control the workspace directory name to inject arbitrary OS commands.
Check warning on line 1 in apache-httpcomponents-client-5-api-5.5-170.v023de017ccd7.jar
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2025-58458
In Jenkins Git client Plugin 6.3.2 and earlier, except 6.1.4 and 6.2.1, Git URL field form validation responses differ based on whether the specified file path exists on the controller when specifying `amazon-s3` protocol for use with JGit, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
Check warning on line 1 in commons-jelly-tags-fmt-1.1-jenkins-20250616.jar
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2018-1000052
fmtlib version prior to version 4.1.0 (before commit 0555cea5fc0bf890afe0071a558e44625a34ba85) contains a Memory corruption (SIGSEGV), CWE-134 vulnerability in fmt::print() library function that can result in Denial of Service. This attack appear to be exploitable via Specifying an invalid format specifier in the fmt::print() function results in a SIGSEGV (memory corruption, invalid write). This vulnerability appears to have been fixed in after commit 8cf30aa2be256eba07bb1cefb998c52326e846e7.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2016-9299
The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2017-1000353
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2018-1000861
A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java that allows attackers to invoke some methods on Java objects by accessing crafted URLs that were not intended to be invoked this way.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2021-21690
Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2021-21691
Creating symbolic links is possible without the 'symlink' agent-to-controller access control permission in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2021-21692
FilePath#renameTo and FilePath#moveAllChildrenTo in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier only check 'read' agent-to-controller access permission on the source path, instead of 'delete'.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2021-21693
When creating temporary files, agent-to-controller access to create those files is only checked after they've been created in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2021-21694
FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2021-21696
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2024-23897
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2021-21685
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create parent directories in FilePath#mkdirs.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2021-21687
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create symbolic links when unarchiving a symbolic link in FilePath#untar.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2021-21689
FilePath#unzip and FilePath#untar were not subject to any agent-to-controller access control in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2021-21697
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allows any agent to read and write the contents of any build directory stored in Jenkins with very few restrictions.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2017-1000354
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to a login command which allowed impersonating any Jenkins user. The `login` command available in the remoting-based CLI stored the encrypted user name of the successfully authenticated user in a cache file used to authenticate further commands. Users with sufficient permission to create secrets in Jenkins, and download their encrypted values (e.g. with Job/Configure permission), were able to impersonate any other Jenkins user on the same instance.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2017-1000356
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an issue in the Jenkins user database authentication realm: create an account if signup is enabled; or create an account if the victim is an administrator, possibly deleting the existing default admin user in the process and allowing a wide variety of impacts.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2017-1000393
Jenkins 2.73.1 and earlier, 2.83 and earlier users with permission to create or configure agents in Jenkins could configure a launch method called 'Launch agent via execution of command on master'. This allowed them to run arbitrary shell commands on the master node whenever the agent was supposed to be launched. Configuration of this launch method now requires the Run Scripts permission typically only granted to administrators.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2017-2608
Jenkins before versions 2.44, 2.32.2 is vulnerable to a remote code execution vulnerability involving the deserialization of various types in javax.imageio in XStream-based APIs (SECURITY-383).
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2018-1999001
A unauthorized modification of configuration vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in User.java that allows attackers to provide crafted login credentials that cause Jenkins to move the config.xml file from the Jenkins home directory. If Jenkins is started without this file present, it will revert to the legacy defaults of granting administrator access to anonymous users.
Check warning on line 1 in jenkins-core-2.516.3.jar: jenkins.exe
github-actions / Quality Monitor
OWASP Dependency Check: CVE-2019-10384
Jenkins 2.191 and earlier, LTS 2.176.2 and earlier allowed users to obtain CSRF tokens without an associated web session ID, resulting in CSRF tokens that did not expire and could be used to bypass CSRF protection for the anonymous user.