Skip to content

feat/CUS-12079-Added class to update the given xml file#377

Merged
akhil-testsigma merged 1 commit intodevfrom
feat/CUS-12079-Added-class-to-update-the-given-xml-file
Apr 15, 2026
Merged

feat/CUS-12079-Added class to update the given xml file#377
akhil-testsigma merged 1 commit intodevfrom
feat/CUS-12079-Added-class-to-update-the-given-xml-file

Conversation

@akhil-testsigma
Copy link
Copy Markdown
Contributor

@akhil-testsigma akhil-testsigma commented Apr 15, 2026

Publish this addon as PUBLIC

Addon Name: UpdateXMLfile
Jarvis Link: https://jarvis.testsigma.com/ui/tenants/2817/addons
Jira : https://testsigma.atlassian.net/browse/CUS-12079
Added class to update the given xml file

Summary by CodeRabbit

Release Notes

  • New Features

    • Added capability to update XML element text content in files
    • Added capability to modify XML element attributes in files
  • Chores

    • Updated project version to 1.0.12 and dependency versions

@coderabbitai
Copy link
Copy Markdown

coderabbitai Bot commented Apr 15, 2026

📝 Walkthrough

Walkthrough

The PR updates the update_xml addon project version from 1.0.11 to 1.0.12 and bumps the testsigma-java-sdk dependency from 1.2.6_cloud to 1.2.24_cloud. Two new WebAction classes are added for XML manipulation: one to update text content by tag name and index, another to set attribute values. Import statements are cleaned up in existing classes.

Changes

Cohort / File(s) Summary
Dependency and Project Version Updates
update_xml/pom.xml
Bumped project version to 1.0.12 and updated testsigma-java-sdk dependency to 1.2.24_cloud.
New XML Text Content Update Action
update_xml/src/main/java/com/testsigma/addons/web/UpdateXmlInGivenFileWithNewData.java
Added WebAction to locate XML elements by tag name and index, then replace matched text content with new value. Includes validation for file existence, DOM parsing, element matching, and atomic file write-back.
New XML Attribute Update Action
update_xml/src/main/java/com/testsigma/addons/web/UpdatexmlInGivenFile.java
Added WebAction to locate XML elements by tag name and index, then update a specified attribute with a new value. Includes file validation, DOM parsing, attribute modification, and atomic file replacement.
Import Cleanup and Refactoring
update_xml/src/main/java/com/testsigma/addons/web/UpdateXmlWithNewData.java, update_xml/src/main/java/com/testsigma/addons/web/Updatexml.java
Removed unused imports and simplified namespace references; reordered import statements for consistency.

Estimated code review effort

🎯 3 (Moderate) | ⏱️ ~22 minutes

Possibly related PRs

Suggested reviewers

  • Ganesh-Testsigma
  • vigneshtestsigma

Poem

🐰 Hop along with XML's dance,
New actions update with a chance,
Tags and attributes, text so bright,
Files rewritten, done just right!
Dependencies bumped, code so neat,
Version changes make it complete! 🌿

🚥 Pre-merge checks | ✅ 2 | ❌ 1

❌ Failed checks (1 warning)

Check name Status Explanation Resolution
Docstring Coverage ⚠️ Warning Docstring coverage is 0.00% which is insufficient. The required threshold is 80.00%. Write docstrings for the functions missing them to satisfy the coverage threshold.
✅ Passed checks (2 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Title check ✅ Passed The title accurately describes the main change: adding a class to update XML files. It directly relates to the core functionality added (UpdatexmlInGivenFile and UpdateXmlInGivenFileWithNewData classes).

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
📝 Generate docstrings
  • Create stacked PR
  • Commit on current branch
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Commit unit tests in branch feat/CUS-12079-Added-class-to-update-the-given-xml-file

Warning

Review ran into problems

🔥 Problems

Git: Failed to clone repository. Please run the @coderabbitai full review command to re-trigger a full review. If the issue persists, set path_filters to include or exclude specific files.


Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

Copy link
Copy Markdown

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 4

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@update_xml/src/main/java/com/testsigma/addons/web/UpdatexmlInGivenFile.java`:
- Line 54: The logger.info call in UpdatexmlInGivenFile (the line that logs
filePath, tagName, index, attributeName, attributeValue) exposes sensitive data;
change it to only log non-sensitive metadata (e.g., tagName and index) and
either omit or mask filePath and attributeValue (for example replace with
"<redacted>" or show only length/hashed form), while keeping attributeName if
non-sensitive; update the message in the logger.info invocation accordingly so
sensitive values are not written to INFO logs.
- Around line 63-65: Harden XML parsing and transformation to prevent XXE: when
creating DocumentBuilderFactory/DocumentBuilder (symbols:
DocumentBuilderFactory, DocumentBuilder, Document) set/disallow DOCTYPE and
external entity features (e.g., disable DOCTYPE,
setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true),
setExpandEntityReferences(false), setXIncludeAware(false)) and install a no-op
EntityResolver on the DocumentBuilder to block external entities before calling
parse; similarly, when creating TransformerFactory/Transformer (symbols:
TransformerFactory, Transformer) enable secure processing and disable external
access to files and DTDs (use FEATURE_SECURE_PROCESSING and provider-specific
attributes for external access) so external entity resolution and external
resource access are prevented.

In
`@update_xml/src/main/java/com/testsigma/addons/web/UpdateXmlInGivenFileWithNewData.java`:
- Line 53: The logger.info in UpdateXmlInGivenFileWithNewData is emitting
sensitive payloads (oldValue/newValue); change the log to omit or mask those
values by logging only non-sensitive context (e.g., filePath, tagName,
targetIndex) and either remove oldValue/newValue from the message or replace
them with a redacted placeholder like "<REDACTED>" or their lengths; update the
invocation of logger.info (referencing logger.info, filePath, tagName, oldValue,
newValue, targetIndex) accordingly so no raw XML content is written at INFO
level.
- Around line 62-64: Update the XML parser and transformer to disable external
entity resolution: configure the DocumentBuilderFactory (used to create
DocumentBuilder and parse in UpdateXmlInGivenFileWithNewData) by setting
XMLConstants.FEATURE_SECURE_PROCESSING to true and setting ACCESS_EXTERNAL_DTD
and ACCESS_EXTERNAL_SCHEMA to empty strings before calling
newDocumentBuilder/parse; likewise configure the TransformerFactory instance
(used later to create Transformer) to enable FEATURE_SECURE_PROCESSING and set
ACCESS_EXTERNAL_DTD and ACCESS_EXTERNAL_SCHEMA to "" before creating the
Transformer so XXE/external resource access is blocked.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: defaults

Review profile: CHILL

Plan: Pro

Run ID: dc3a45d1-9373-4c6f-9778-2df2fec844e7

📥 Commits

Reviewing files that changed from the base of the PR and between 8f36491 and 5a0d83c.

📒 Files selected for processing (5)
  • update_xml/pom.xml
  • update_xml/src/main/java/com/testsigma/addons/web/UpdateXmlInGivenFileWithNewData.java
  • update_xml/src/main/java/com/testsigma/addons/web/UpdateXmlWithNewData.java
  • update_xml/src/main/java/com/testsigma/addons/web/Updatexml.java
  • update_xml/src/main/java/com/testsigma/addons/web/UpdatexmlInGivenFile.java

String attributeName = testData4.getValue().toString();
String attributeValue = testData5.getValue().toString();

logger.info("Parameters - filepath: " + filePath + ", tagname: " + tagName + ", index: " + index + ", attributename: " + attributeName + ", attributevalue: " + attributeValue);
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major

Avoid logging raw XML values and file paths at INFO.

This log line can leak sensitive data (filepath, attributevalue) into centralized logs. Log only non-sensitive metadata (e.g., tag + index) or mask values.

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@update_xml/src/main/java/com/testsigma/addons/web/UpdatexmlInGivenFile.java`
at line 54, The logger.info call in UpdatexmlInGivenFile (the line that logs
filePath, tagName, index, attributeName, attributeValue) exposes sensitive data;
change it to only log non-sensitive metadata (e.g., tagName and index) and
either omit or mask filePath and attributeValue (for example replace with
"<redacted>" or show only length/hashed form), while keeping attributeName if
non-sensitive; update the message in the logger.info invocation accordingly so
sensitive values are not written to INFO logs.

Comment on lines +63 to +65
DocumentBuilderFactory docFactory = DocumentBuilderFactory.newInstance();
DocumentBuilder docBuilder = docFactory.newDocumentBuilder();
Document doc = docBuilder.parse(inputFile);
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🔴 Critical

🧩 Analysis chain

🏁 Script executed:

find . -type f -name "UpdatexmlInGivenFile.java" 2>/dev/null

Repository: testsigmahq/testsigma-addons

Length of output: 1887


🏁 Script executed:

git ls-files | grep -i updatexml

Repository: testsigmahq/testsigma-addons

Length of output: 1887


🌐 Web query:

Java XXE XXE vulnerability DocumentBuilderFactory secure processing best practices OWASP

💡 Result:

To prevent XXE vulnerabilities in Java's DocumentBuilderFactory, follow these OWASP and Oracle-recommended best practices: 1. Enable Feature for Secure Processing (FSP): DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance; factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true); This enforces processing limits, disables external entity resolution, and restricts other risky features. Note: In recent JDKs (e.g., Java 21+), FSP is enabled by default for DOM/SAX parsers, but explicit setting is recommended for external access restrictions. 2. Explicitly restrict external access: factory.setAttribute(XMLConstants.ACCESS_EXTERNAL_DTD, ""); factory.setAttribute(XMLConstants.ACCESS_EXTERNAL_SCHEMA, ""); The empty string "" disallows all external access; use "file" or others for limited local access if needed. 3. Disable DTD processing (primary defense per OWASP): factory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); This prevents most XXE attacks by blocking DOCTYPE declarations entirely. Additional hardening (from OWASP and Oracle): - factory.setFeature("http://xml.org/sax/features/external-general-entities", false); - factory.setFeature("http://xml.org/sax/features/external-parameter-entities", false); - factory.setFeature("http://apache.org/xml/features/nonvalidating/load-external-dtd", false); - factory.setXIncludeAware(false); - factory.setExpandEntityReferences(false); Use DocumentBuilderFactory.newDefaultInstance in Java 9+ for safer defaults. Catch ParserConfigurationException when setting features/attributes. For complete security, combine FSP with external access restrictions and DTD disable. Test for application impact, as disabling DTDs may break validation relying on external schemas. Example full secure factory: DocumentBuilderFactory dbf = DocumentBuilderFactory.newInstance; dbf.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true); dbf.setAttribute(XMLConstants.ACCESS_EXTERNAL_DTD, ""); dbf.setAttribute(XMLConstants.ACCESS_EXTERNAL_SCHEMA, ""); dbf.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); DocumentBuilder db = dbf.newDocumentBuilder;

Citations:


🌐 Web query:

Java XML external entity prevention DocumentBuilderFactory setFeature XMLConstants

💡 Result:

To prevent XML External Entity (XXE) attacks when using DocumentBuilderFactory in Java, configure the factory with specific security features using setFeature from javax.xml.XMLConstants. The primary and most reliable approach is to disable DTD processing and external entities explicitly. Recommended configuration code: import javax.xml.parsers.DocumentBuilderFactory; import javax.xml.parsers.DocumentBuilder; import javax.xml.XMLConstants; import org.xml.sax.SAXException; import org.w3c.dom.Document; import java.io.InputStream; DocumentBuilderFactory dbf = DocumentBuilderFactory.newInstance; try { // PRIMARY defense: Disallow DOCTYPE declarations (prevents most XXE) dbf.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); // Disable external general entities dbf.setFeature("http://xml.org/sax/features/external-general-entities", false); // Disable external parameter entities dbf.setFeature("http://xml.org/sax/features/external-parameter-entities", false); // Additional protections dbf.setFeature("http://apache.org/xml/features/nonvalidating/load-external-dtd", false); dbf.setXIncludeAware(false); dbf.setExpandEntityReferences(false); // Optional: Enable secure processing (FSP) - limits resources but may not fully block XXE alone dbf.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true); DocumentBuilder db = dbf.newDocumentBuilder; // Use db to parse XML from trusted sources only Document doc = db.parse(inputStream); } catch (Exception e) { // Handle configuration or parsing errors } Key features explained: - http://apache.org/xml/features/disallow-doctype-decl: Blocks DOCTYPE entirely, preventing XXE via external DTDs. - http://xml.org/sax/features/external-general-entities and external-parameter-entities: Disable external entity resolution. - XMLConstants.FEATURE_SECURE_PROCESSING: Enables resource limits (e.g., entity expansion limits for XML bombs), but does not reliably block all XXE; use in combination. For Java 9+, prefer DocumentBuilderFactory.newDefaultInstance for secure defaults, then apply the above features. Additionally, restrict external access globally via system properties or jaxp.properties: javax.xml.accessExternalDTD="" javax.xml.accessExternalSchema="" Parse only trusted XML input. If DTDs are required, implement a custom EntityResolver that rejects external URIs. This configuration is endorsed by OWASP and Oracle JAXP documentation as of Java 26 (2026).

Citations:


Disable external entity processing in XML factories to prevent XXE attacks.

The DocumentBuilderFactory and TransformerFactory instances are created without security hardening, leaving them vulnerable to XML External Entity (XXE) attacks, which can enable file disclosure, SSRF, and entity expansion (billion laughs) attacks on untrusted input.

🔒 Required hardening
+import javax.xml.XMLConstants;
...
 DocumentBuilderFactory docFactory = DocumentBuilderFactory.newInstance();
+docFactory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true);
+docFactory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true);
+docFactory.setFeature("http://xml.org/sax/features/external-general-entities", false);
+docFactory.setFeature("http://xml.org/sax/features/external-parameter-entities", false);
+docFactory.setFeature("http://apache.org/xml/features/nonvalidating/load-external-dtd", false);
+docFactory.setAttribute(XMLConstants.ACCESS_EXTERNAL_DTD, "");
+docFactory.setAttribute(XMLConstants.ACCESS_EXTERNAL_SCHEMA, "");
+docFactory.setXIncludeAware(false);
+docFactory.setExpandEntityReferences(false);
 DocumentBuilder docBuilder = docFactory.newDocumentBuilder();
...
 TransformerFactory transformerFactory = TransformerFactory.newInstance();
+transformerFactory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true);
+transformerFactory.setAttribute(XMLConstants.ACCESS_EXTERNAL_DTD, "");
+transformerFactory.setAttribute(XMLConstants.ACCESS_EXTERNAL_STYLESHEET, "");
 Transformer transformer = transformerFactory.newTransformer();

Also applies to: lines 81–87

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@update_xml/src/main/java/com/testsigma/addons/web/UpdatexmlInGivenFile.java`
around lines 63 - 65, Harden XML parsing and transformation to prevent XXE: when
creating DocumentBuilderFactory/DocumentBuilder (symbols:
DocumentBuilderFactory, DocumentBuilder, Document) set/disallow DOCTYPE and
external entity features (e.g., disable DOCTYPE,
setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true),
setExpandEntityReferences(false), setXIncludeAware(false)) and install a no-op
EntityResolver on the DocumentBuilder to block external entities before calling
parse; similarly, when creating TransformerFactory/Transformer (symbols:
TransformerFactory, Transformer) enable secure processing and disable external
access to files and DTDs (use FEATURE_SECURE_PROCESSING and provider-specific
attributes for external access) so external entity resolution and external
resource access are prevented.

String newValue = testData4.getValue().toString();
int targetIndex = Integer.parseInt(testData5.getValue().toString());

logger.info("Parameters - filepath: " + filePath + ", tagname: " + tagName + ", old_value: " + oldValue + ", new_value: " + newValue + ", index: " + targetIndex);
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major

Do not log old_value/new_value at INFO level.

This can expose sensitive XML content. Please mask or omit value payloads in logs.

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In
`@update_xml/src/main/java/com/testsigma/addons/web/UpdateXmlInGivenFileWithNewData.java`
at line 53, The logger.info in UpdateXmlInGivenFileWithNewData is emitting
sensitive payloads (oldValue/newValue); change the log to omit or mask those
values by logging only non-sensitive context (e.g., filePath, tagName,
targetIndex) and either remove oldValue/newValue from the message or replace
them with a redacted placeholder like "<REDACTED>" or their lengths; update the
invocation of logger.info (referencing logger.info, filePath, tagName, oldValue,
newValue, targetIndex) accordingly so no raw XML content is written at INFO
level.

Comment on lines +62 to +64
DocumentBuilderFactory docFactory = DocumentBuilderFactory.newInstance();
DocumentBuilder docBuilder = docFactory.newDocumentBuilder();
Document doc = docBuilder.parse(inputFile);
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🔴 Critical

🧩 Analysis chain

🏁 Script executed:

find . -name "UpdateXmlInGivenFileWithNewData.java" -type f

Repository: testsigmahq/testsigma-addons

Length of output: 1887


🌐 Web query:

Java JAXP DocumentBuilderFactory XXE vulnerability secure configuration

💡 Result:

To securely configure Java's JAXP DocumentBuilderFactory against XXE (XML External Entity) vulnerabilities, follow these steps based on official Oracle documentation and security best practices. XXE attacks exploit parsers that resolve external entities, potentially leading to data disclosure, SSRF, or DoS. ### Primary Secure Configuration (Recommended for JDK 8+) Use DocumentBuilderFactory.newDefaultInstance or newInstance, then explicitly set security features and attributes. The key is to disable external entity resolution and DTD processing. java import javax.xml.parsers.DocumentBuilderFactory; import javax.xml.parsers.DocumentBuilder; import javax.xml.XMLConstants; DocumentBuilderFactory factory = DocumentBuilderFactory.newDefaultInstance; // Secure defaults in newer JDKs // Enable Feature Secure Processing (FSP) - enforces limits and disables external access factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true); // Restrict external DTD access ("" disables all, "file" allows local files only) factory.setAttribute(XMLConstants.ACCESS_EXTERNAL_DTD, ""); // Optionally restrict external schemas factory.setAttribute(XMLConstants.ACCESS_EXTERNAL_SCHEMA, ""); DocumentBuilder builder = factory.newDocumentBuilder; ### Comprehensive Configuration (OWASP-Compatible, Handles Legacy Parsers) For maximum protection, including against XML bombs and when FSP alone isn't sufficient: java DocumentBuilderFactory factory = DocumentBuilderFactory.newDefaultInstance; try { // Disable DTD declaration factory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true); // Disable external general and parameter entities factory.setFeature("http://xml.org/sax/features/external-general-entities", false); factory.setFeature("http://xml.org/sax/features/external-parameter-entities", false); // Disable external DTD loading factory.setFeature("http://apache.org/xml/features/nonvalidating/load-external-dtd", false); // Additional protections factory.setXIncludeAware(false); factory.setExpandEntityReferences(false); // FSP and access restrictions (JDK 9+ preferred) factory.setFeature(XMLConstants.FEATURE_SECURE_PROCESSING, true); factory.setAttribute(XMLConstants.ACCESS_EXTERNAL_DTD, ""); factory.setAttribute(XMLConstants.ACCESS_EXTERNAL_SCHEMA, ""); } catch (Exception e) { // Log and handle unsupported features (parser-specific) } DocumentBuilder builder = factory.newDocumentBuilder; ### Alternative Global Configuration (No Code Changes) Create a jaxp.properties file in $JAVA_HOME/conf/ (JDK 8u251+ / JDK 11+): javax.xml.parsers.DocumentBuilderFactory.http://apache.org/xml/features/disallow-doctype-decl=true javax.xml.parsers.SAXParserFactory.http://apache.org/xml/features/disallow-doctype-decl=true jdk.xml.entityExpansionLimit=1000 # Limits XML bomb Or set system properties: -Djavax.xml.parsers.DocumentBuilderFactory=org.apache.xerces.jaxp.DocumentBuilderFactoryImpl -Djdk.xml.entityExpansionLimit=1000 ### Key Properties Explained | Property/Feature | Purpose | Value | |------------------|---------|-------| | XMLConstants.FEATURE_SECURE_PROCESSING | Enables secure defaults (entity limits, no external access) | true | | XMLConstants.ACCESS_EXTERNAL_DTD | Restricts DTD fetching | "" (none), "file" (local only) | | disallow-doctype-decl | Blocks DOCTYPE entirely | true | | entityExpansionLimit | Prevents XML bomb (billion laughs) | e.g., 1000 | ### Notes - In JDK 21/24+, FSP is on by default for DOM/SAX but external access still needs explicit restriction. - Always wrap in try-catch for ParserConfigurationException (unsupported features). - Test with XXE payloads; use tools like Semgrep for static analysis. - Avoid processing untrusted XML if possible; prefer JSON. This configuration prevents XXE by blocking external resource resolution while allowing valid XML parsing.

Citations:


Disable external XML entity resolution in DocumentBuilderFactory and TransformerFactory.

Both DocumentBuilderFactory.newInstance() (lines 62–64) and TransformerFactory (lines 95–101) use default settings without XXE protections. Configure them with:

  • XMLConstants.FEATURE_SECURE_PROCESSING set to true
  • XMLConstants.ACCESS_EXTERNAL_DTD set to ""
  • XMLConstants.ACCESS_EXTERNAL_SCHEMA set to ""

This prevents XML External Entity (XXE) injection attacks, which can lead to data disclosure or denial-of-service.

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In
`@update_xml/src/main/java/com/testsigma/addons/web/UpdateXmlInGivenFileWithNewData.java`
around lines 62 - 64, Update the XML parser and transformer to disable external
entity resolution: configure the DocumentBuilderFactory (used to create
DocumentBuilder and parse in UpdateXmlInGivenFileWithNewData) by setting
XMLConstants.FEATURE_SECURE_PROCESSING to true and setting ACCESS_EXTERNAL_DTD
and ACCESS_EXTERNAL_SCHEMA to empty strings before calling
newDocumentBuilder/parse; likewise configure the TransformerFactory instance
(used later to create Transformer) to enable FEATURE_SECURE_PROCESSING and set
ACCESS_EXTERNAL_DTD and ACCESS_EXTERNAL_SCHEMA to "" before creating the
Transformer so XXE/external resource access is blocked.

@akhil-testsigma akhil-testsigma merged commit 54a1d53 into dev Apr 15, 2026
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants