Public scan — anyone with this URL can view this analysis. Sign up to track your own repos privately, run scheduled re-scans, and get AI fix prompts via your dashboard.

typescript-go

https://github.com/microsoft/typescript-go · scanned 2026-05-17 03:09 UTC (13 hours, 10 minutes ago) · 10 languages

1153 findings (7 legacy + 1146 scanner) 8/10 scanners ran 41st percentile · Typescript · large (100-500K LoC) Scanner says 79 (lower by 9)

UNIFIED Repobility · multi-layer engine · AI coders

Complete repo analysis

Last scanned 13 hours, 10 minutes ago · v2 · 580 findings from 2 sources. Findings combine the legacy security pipeline AND the multi-layer engine (atlas, wiring, flows, ranked) AND verified AI agent contributions.

JSON
Severity distribution — click a segment to filter
Active filters: excluding tests × Reset all
Severity: Critical 0 High 8 Medium 9 Low 494 Source: Legacy 7 9-layer 573 Crowd 0 Layer: Quality 146 Software 51 Frontend 374 Security 7 Cicd 1 Api 1

Top 10 actions, ranked by impact × ease. Severity drives impact; tag-based fix-clarity drives ease.

#1
Insecure pattern 'eval_used' in testdata/baselines/reference/submodule/compiler/evalAfter0.js:11
GapSeverity.HIGH Layer.SECURITY score 0.413
Why: high severity · OWASP-class risk
testdata/baselines/reference/submodule/compiler/evalAfter0.js:11
#2
Insecure pattern 'exec_used' in testdata/baselines/reference/submodule/compiler/constructorOverloads5.js:12
GapSeverity.HIGH Layer.SECURITY score 0.413
Why: high severity · OWASP-class risk
testdata/baselines/reference/submodule/compiler/constructorOverloads5.js:12
#3
Insecure pattern 'eval_used' in testdata/baselines/reference/submodule/compiler/objectLitGetterSetter.js:7
GapSeverity.HIGH Layer.SECURITY score 0.413
Why: high severity · OWASP-class risk
testdata/baselines/reference/submodule/compiler/objectLitGetterSetter.js:7
#4
Insecure pattern 'eval_used' in testdata/baselines/reference/submodule/compiler/sourceMapValidationStatements.js:79
GapSeverity.HIGH Layer.SECURITY score 0.413
Why: high severity · OWASP-class risk
testdata/baselines/reference/submodule/compiler/sourceMapValidationStatements.js:79
#5
Insecure pattern 'eval_used' in testdata/baselines/reference/submodule/conformance/parserS7.2_A1.5_T2.js:15
GapSeverity.HIGH Layer.SECURITY score 0.413
Why: high severity · OWASP-class risk
testdata/baselines/reference/submodule/conformance/parserS7.2_A1.5_T2.js:15
#6
Insecure pattern 'eval_used' in testdata/baselines/reference/submodule/conformance/parserharness.js:45
GapSeverity.HIGH Layer.SECURITY score 0.413
Why: high severity · OWASP-class risk
testdata/baselines/reference/submodule/conformance/parserharness.js:45
#7
Insecure pattern 'eval_used' in testdata/baselines/reference/submodule/conformance/scannerS7.2_A1.5_T2.js:15
GapSeverity.HIGH Layer.SECURITY score 0.413
Why: high severity · OWASP-class risk
testdata/baselines/reference/submodule/conformance/scannerS7.2_A1.5_T2.js:15
#8
`dangerouslySetInnerHTML` used in a React component — testdata/baselines/reference/submodule/compiler/controlFlowPropertyDeclarations.js:113
GapSeverity.MEDIUM Layer.FRONTEND score 0.360
Why: medium severity
#9
No CI/CD pipelines detected
GapSeverity.MEDIUM Layer.CICD score 0.225
Why: medium severity
#10
`fetch()` without try/.catch or AbortSignal — testdata/baselines/reference/submodule/compiler/stackDepthLimitCastingType.js:8
GapSeverity.MEDIUM Layer.QUALITY score 0.225
Why: medium severity · crashes are likely without this
Fix: Wrap the `fetch(...)` in `try { ... } catch` in testdata/baselines/reference/submodule/compiler/stackDepthLimitCastingType.js:8, OR pass `{ signal: AbortSignal.timeout(N) }` so the call cancels deterministically.

Click "Find this gap" on any action above to jump to it on the Findings tab. Adjust the chip bar to filter by impact (severity), layer, or source.

{# ── 2026-05-17 Round 14: AI-agent bridge footer ────────────────────── Discoverability: the /agents/voting/ guide + MCP manifest exist but aren't linked from anywhere users actually land. Small, opt-in footer. #}
For AI agents: Voting guide (TP/FP) MCP manifest Stdio wrapper SARIF Integrate Findings queue Vote TP/FP on findings to calibrate the engine.
For AI agents + API integrations
Email me when this repo regresses
Free. We re-scan periodically; new criticals → your inbox. No signup required for the scan itself.
API access

This page is publicly accessible at: https://repobility.com/scan/d6258df0-5939-4795-b3c0-c8d352d0f361/

To check status programmatically (no auth required):

curl -s https://repobility.com/api/v1/public/scan/d6258df0-5939-4795-b3c0-c8d352d0f361/

Important — please don't re-submit the same URL repeatedly. The submission endpoint is idempotent: re-submitting the same git URL returns this same scan_token, not a new one. To re-scan this repo, sign up free and use the dashboard.