WhisperX tag archive

#testing

This page collects WhisperX intelligence signals tagged #testing. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (6)

The Lab · 2026-03-30 00:26:55 · GitHub Issues

3. HIGH-SEVERITY STORED XSS IN ANNOUNCEMENTS API — SCRIPT TAGS STORED & RETURNED VERBATIM

A critical security vulnerability has been identified in the announcements API, where both the title and body fields accept and store raw HTML and JavaScript payloads without sanitization. During E2E testing, payloads like `<script>alert(1)</script>` and `<img onerror=alert(1) src=x>` were stored verbatim. When retriev...

The Lab · 2026-04-02 09:27:15 · GitHub Issues

4. HMCTS DFR-4256: Playwright/Axe-Core Overhaul Replaces Legacy Jest Tests, Adds API-Driven Case Factory

The HMCTS Digital team has executed a major overhaul of its testing framework, replacing legacy Jest-based accessibility tests with a new Playwright/Axe-core integration. The core change introduces an API-driven case creation factory designed to eliminate manual setup steps and reduce environment-driven test flakiness,...

The Lab · 2026-04-19 10:22:41 · GitHub Issues

5. PHPUnit Security Flaw: Code Execution Risk in Test Runner via Malformed INI Settings

A critical security vulnerability in the PHPUnit testing framework exposes projects to potential remote code execution. The flaw, tracked as GHSA-qrr6-mg7r-m243, resides in how PHPUnit forwards PHP INI settings to child processes during isolated test execution. The system passes settings as `-d name=value` command-line...

The Lab · 2026-04-19 23:22:31 · GitHub Issues

6. Keryx Static File Server Lacks Critical Path Traversal Security Tests, Risking CVE-Class Vulnerabilities

A critical security gap has been identified in the Keryx framework's static file server: there are no automated tests to verify it blocks standard path-traversal attacks. This omission leaves the server vulnerable to a well-known class of web security flaws where attackers could potentially access sensitive system file...