Skip to content

feat: Utility for extracting elaboration conversations from DB for cr…

16cd6a9
Select commit
Loading
Failed to load commit list.
Open

Concept elaborations #159

feat: Utility for extracting elaboration conversations from DB for cr…
16cd6a9
Select commit
Loading
Failed to load commit list.
SonarQubeCloud / SonarCloud Code Analysis succeeded May 11, 2026 in 43s

Annotations

Check warning on line 59 in src/BuildingBlocks/Tutor.BuildingBlocks.Tests/BaseTestFactory.cs

See this annotation in the file changed.

@sonarqubecloud sonarqubecloud / SonarCloud Code Analysis

Method 'ExecuteSqlRaw' inserts interpolated strings directly into the SQL, without any protection against SQL injection. Consider using 'ExecuteSql' instead, which protects against SQL injection, or make sure that the value is sanitized and suppress the warning.

See more on https://sonarcloud.io/project/issues?id=Clean-CaDET_tutor&issues=AZ4B4nELXFWz1ArcvmNt&open=AZ4B4nELXFWz1ArcvmNt&pullRequest=159

Check warning on line 100 in src/Modules/Elaborations/Tutor.Elaborations.Core/Domain/Conversations/ConversationAttempt.cs

See this annotation in the file changed.

@sonarqubecloud sonarqubecloud / SonarCloud Code Analysis

Loops should be simplified using the "Where" LINQ method

See more on https://sonarcloud.io/project/issues?id=Clean-CaDET_tutor&issues=AZ4B70AkeegJNfWMQRp9&open=AZ4B70AkeegJNfWMQRp9&pullRequest=159

Check warning on line 128 in src/Modules/Elaborations/Tutor.Elaborations.Core/Domain/Conversations/ConversationAttempt.cs

See this annotation in the file changed.

@sonarqubecloud sonarqubecloud / SonarCloud Code Analysis

Loops should be simplified using the "Where" LINQ method

See more on https://sonarcloud.io/project/issues?id=Clean-CaDET_tutor&issues=AZ4B70AkeegJNfWMQRp-&open=AZ4B70AkeegJNfWMQRp-&pullRequest=159

Check warning on line 8 in utils/fetch_elaborations.py

See this annotation in the file changed.

@sonarqubecloud sonarqubecloud / SonarCloud Code Analysis

"password" detected here, review this potentially hard-coded credential.

See more on https://sonarcloud.io/project/issues?id=Clean-CaDET_tutor&issues=AZ4WxJ4lKnBbPCDEWRbM&open=AZ4WxJ4lKnBbPCDEWRbM&pullRequest=159

Check failure on line 25 in utils/fetch_elaborations.py

See this annotation in the file changed.

@sonarqubecloud sonarqubecloud / SonarCloud Code Analysis

Change this code to not construct SQL queries directly from user-controlled data.

See more on https://sonarcloud.io/project/issues?id=Clean-CaDET_tutor&issues=AZ4WxJ4lKnBbPCDEWRbN&open=AZ4WxJ4lKnBbPCDEWRbN&pullRequest=159

Check warning on line 166 in src/BuildingBlocks/Tutor.BuildingBlocks.AI.Core/Agents/LlmCaller.cs

See this annotation in the file changed.

@sonarqubecloud sonarqubecloud / SonarCloud Code Analysis

Evaluation of this argument may be expensive and unnecessary if logging is disabled

See more on https://sonarcloud.io/project/issues?id=Clean-CaDET_tutor&issues=AZ3O1apMhSlndr8j-Z9j&open=AZ3O1apMhSlndr8j-Z9j&pullRequest=159

Check warning on line 88 in src/BuildingBlocks/Tutor.BuildingBlocks.AI.Core/Agents/LlmCaller.cs

See this annotation in the file changed.

@sonarqubecloud sonarqubecloud / SonarCloud Code Analysis

Evaluation of this argument may be expensive and unnecessary if logging is disabled

See more on https://sonarcloud.io/project/issues?id=Clean-CaDET_tutor&issues=AZ3O1apMhSlndr8j-Z9k&open=AZ3O1apMhSlndr8j-Z9k&pullRequest=159