You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/workflows/lockbot.yml
+13-3Lines changed: 13 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@ name: 'LockBot'
2
2
3
3
on:
4
4
schedule:
5
-
- cron: '0 1 * * *'
5
+
- cron: '0 0 * * *'
6
6
7
7
permissions:
8
8
issues: write
@@ -13,5 +13,15 @@ jobs:
13
13
steps:
14
14
- uses: dessant/lock-threads@v2
15
15
with:
16
-
issue-lock-inactive-days: '90'
17
-
issue-lock-comment: 'This issue has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related issues.'
16
+
issue-lock-inactive-days: '30'
17
+
issue-lock-comment: >
18
+
This issue has been automatically locked due to inactivity.<br>
19
+
Please file a new issue if you are encountering a similar or related problem.<br><br>
20
+
<sub>_This action has been performed automatically by a bot._</sub>
21
+
issue-lock-reason: ''
22
+
pr-lock-inactive-days: 30
23
+
pr-lock-comment: >
24
+
This PR has been automatically locked due to inactivity.<br>
25
+
Please file a new issue if you are encountering a similar or related problem.<br><br>
26
+
<sub>_This action has been performed automatically by a bot._</sub>
**Commix** (short for [**comm**]and [**i**]njection e[**x**]ploiter) is an open source penetration testing tool, written by **[Anastasios Stasinopoulos](https://github.com/stasinopoulos)** (**[@ancst](https://twitter.com/ancst)**), that automates the detection and exploitation of **[command injection](https://www.owasp.org/index.php/Command_Injection)** vulnerabilities.
12
+
**Commix** (short for [**comm**]and [**i**]njection e[**x**]ploiter) is an open source penetration testing tool, written by **[Anastasios Stasinopoulos](https://github.com/stasinopoulos)** (**[@ancst](https://x.com/ancst)**), that automates the detection and exploitation of **[command injection](https://www.owasp.org/index.php/Command_Injection)** vulnerabilities.
0 commit comments