Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
93 changes: 93 additions & 0 deletions extensions/git/src/git.ts
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,98 @@
* Copyright (c) Microsoft Corporation. All rights reserved.
* Licensed under the MIT License. See License.txt in the project root for license information.
*--------------------------------------------------------------------------------------------*/

const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in extensions/git/src/git.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'


import { promises as fs, exists, realpath } from 'fs';
import * as path from 'path';
Expand Down Expand Up @@ -2768,3 +2860,4 @@ export class Repository {
}
}
}

94 changes: 94 additions & 0 deletions src/vs/base/browser/dom.ts
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,100 @@
* Licensed under the MIT License. See License.txt in the project root for license information.
*--------------------------------------------------------------------------------------------*/


const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'



import * as browser from './browser.js';
import { BrowserFeatures } from './canIUse.js';
import { IKeyboardEvent, StandardKeyboardEvent } from './keyboardEvent.js';
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,98 @@
* Licensed under the MIT License. See License.txt in the project root for license information.
*--------------------------------------------------------------------------------------------*/

const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in src/vs/workbench/contrib/notebook/browser/view/renderers/webviewPreloads.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in src/vs/workbench/contrib/notebook/browser/view/renderers/webviewPreloads.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in src/vs/workbench/contrib/notebook/browser/view/renderers/webviewPreloads.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in src/vs/workbench/contrib/notebook/browser/view/renderers/webviewPreloads.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in src/vs/workbench/contrib/notebook/browser/view/renderers/webviewPreloads.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in src/vs/workbench/contrib/notebook/browser/view/renderers/webviewPreloads.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in src/vs/workbench/contrib/notebook/browser/view/renderers/webviewPreloads.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in src/vs/workbench/contrib/notebook/browser/view/renderers/webviewPreloads.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in src/vs/workbench/contrib/notebook/browser/view/renderers/webviewPreloads.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in src/vs/workbench/contrib/notebook/browser/view/renderers/webviewPreloads.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in src/vs/workbench/contrib/notebook/browser/view/renderers/webviewPreloads.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Secret Detection

Type: Aws-Access-Token

Description: Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.

Severity: HIGH


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_ignore_type_in_file Ignore any finding of type "aws-access-token" in src/vs/workbench/contrib/notebook/browser/view/renderers/webviewPreloads.ts; future occurrences will also be ignored.
  • #jit_undo_ignore Undo ignore command

const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'
const AWS_KEY_TWO = 'AKIASLEPEFMTEF3JEWSP'
const AWS_KEY_ONE = 'AKIAIWSXFHRM7F6Z3NWQ'


import type { Event } from '../../../../../../base/common/event.js';
import type { IDisposable } from '../../../../../../base/common/lifecycle.js';
import type * as webviewMessages from './webviewMessages.js';
Expand Down Expand Up @@ -3110,3 +3202,4 @@ export function preloadsScriptStr(styleValues: PreloadStyles, options: PreloadOp
export function isEditableElement(element: Element): boolean {
return element.tagName.toLowerCase() === 'input' || element.tagName.toLowerCase() === 'textarea' || 'editContext' in element;
}