Conversation
Add review requirements for tool handlers that accept user input, fetch external URLs, or access the filesystem (cdn.ts, library.ts), shared security utilities (error-handling.ts, git.ts), and the configuration module (config.ts). Uses @himerus consistent with existing CODEOWNERS entries. Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
|
Warning Rate limit exceeded
Your organization is not enrolled in usage-based pricing. Contact your admin to enable usage-based pricing to continue reviews beyond the rate limit, or try again in 22 minutes and 57 seconds. ⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. ℹ️ Review info⚙️ Run configurationConfiguration used: Path: .coderabbit.yaml Review profile: ASSERTIVE Plan: Pro Run ID: 📒 Files selected for processing (1)
✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
Summary
Expand CODEOWNERS for Security-Sensitive Code Paths
Current CODEOWNERS only protects
.env*,.gitleaks.toml,.github/workflows/,package.json, andCODEOWNERSitself. Tool handlers that accept user input, fetch external URLs, or access the filesystem are not covered.Implementation
Add these paths to CODEOWNERS with the project owner as reviewer: