From 8890884167d4130bb354f6c851dde4755cf6b624 Mon Sep 17 00:00:00 2001 From: Timofey-Makhankov Date: Mon, 19 May 2025 10:36:17 +0200 Subject: [PATCH] created exploitable user test data --- doc/Task.md | 1 - src/db/seed.ts | 12 ++++++++++++ 2 files changed, 12 insertions(+), 1 deletion(-) diff --git a/doc/Task.md b/doc/Task.md index 752f8d0..9072dc7 100644 --- a/doc/Task.md +++ b/doc/Task.md @@ -108,4 +108,3 @@ Here is also a list of tools from OWASP, which check your applications for vulne - https://owasp.org/www-project-top-ten/ - https://top10proactive.owasp.org/ - https://www.youtube.com/watch?v=eVPAq1nvSm0 -- diff --git a/src/db/seed.ts b/src/db/seed.ts index 7877a02..39e0227 100644 --- a/src/db/seed.ts +++ b/src/db/seed.ts @@ -33,6 +33,12 @@ const users: InsertUser[] = faker.helpers.multiple(() => ({ email: faker.internet.email() }), {count: 10}) +const exploitedUsers: InsertUser[] = faker.helpers.multiple(() => ({ + name: faker.person.fullName(), + password: createHash('md5').update("P@ssword1").digest('hex'), + email: faker.internet.email() +}), { count: 5 }) + const userRole: UserRoleInsert[] = [ {userId: 1, roleId: 1}, {userId: 2, roleId: 1}, @@ -44,6 +50,11 @@ const userRole: UserRoleInsert[] = [ {userId: 8, roleId: 3}, {userId: 9, roleId: 3}, {userId: 10, roleId: 3}, + {userId: 11, roleId: 1}, + {userId: 12, roleId: 2}, + {userId: 13, roleId: 3}, + {userId: 14, roleId: 3}, + {userId: 15, roleId: 3}, ] async function seedDB(){ @@ -51,6 +62,7 @@ async function seedDB(){ await db.insert(rolesTable).values(roles) await db.insert(rolesPermissionsTable).values(rolePermission) await db.insert(usersTable).values(users) + await db.insert(usersTable).values(exploitedUsers) await db.insert(usersRolesTable).values(userRole) }