diff --git a/src/security/audit-config-symlink.test.ts b/src/security/audit-config-symlink.test.ts index e922b87ce85..3f377cc9acb 100644 --- a/src/security/audit-config-symlink.test.ts +++ b/src/security/audit-config-symlink.test.ts @@ -41,12 +41,12 @@ describe("security audit config symlink findings", () => { expect(findings).toEqual( expect.arrayContaining([expect.objectContaining({ checkId: "fs.config.symlink" })]), ); - expect(findings.some((finding) => finding.checkId === "fs.config.perms_writable")).toBe(false); - expect(findings.some((finding) => finding.checkId === "fs.config.perms_world_readable")).toBe( - false, - ); - expect(findings.some((finding) => finding.checkId === "fs.config.perms_group_readable")).toBe( - false, + expect(findings.map((finding) => finding.checkId)).not.toEqual( + expect.arrayContaining([ + "fs.config.perms_writable", + "fs.config.perms_world_readable", + "fs.config.perms_group_readable", + ]), ); }); }); diff --git a/src/security/audit-gateway-http-auth.test.ts b/src/security/audit-gateway-http-auth.test.ts index d4de3ec18b6..9b502cd4e54 100644 --- a/src/security/audit-gateway-http-auth.test.ts +++ b/src/security/audit-gateway-http-auth.test.ts @@ -82,7 +82,7 @@ describe("security audit gateway HTTP auth findings", () => { } } if (expectedNoFinding) { - expect(findings.some((entry) => entry.checkId === expectedNoFinding)).toBe(false); + expect(findings.map((entry) => entry.checkId)).not.toContain(expectedNoFinding); } }); }); diff --git a/src/security/audit-model-hygiene.test.ts b/src/security/audit-model-hygiene.test.ts index 6ceb7f31ddf..fc67db3d768 100644 --- a/src/security/audit-model-hygiene.test.ts +++ b/src/security/audit-model-hygiene.test.ts @@ -70,6 +70,6 @@ describe("security audit model hygiene findings", () => { }, } satisfies OpenClawConfig); - expect(findings.some((finding) => finding.checkId === "models.weak_tier")).toBe(false); + expect(findings.map((finding) => finding.checkId)).not.toContain("models.weak_tier"); }); });