Skip to content

Conversation

@anasabbdelrahman
Copy link
Owner

Create pull request from vulnerabilities branch to main branch

command = ['echo', str(aws_access_token)]
subprocess.Popen(command)
# os.subprocess.Popen('echo ${}'.format(aws_access_token), shell=True)
aws_access_token = "AKIALALEMEL33243OLIB"

Check notice

Code scanning / Bandit

Possible hardcoded password: 'AKIALALEMEL33243OLIB'

Possible hardcoded password: 'AKIALALEMEL33243OLIB'
subprocess.Popen(command)
# os.subprocess.Popen('echo ${}'.format(aws_access_token), shell=True)
aws_access_token = "AKIALALEMEL33243OLIB"
os.subprocess.Popen('echo ${}'.format(aws_access_token), shell=True)

Check warning

Code scanning / Bandit

Function call with shell=True parameter identified, possible security issue.

Function call with shell=True parameter identified, possible security issue.
print("Request timed out. Please handle this situation accordingly.")
except requests.RequestException as e:
print(f"An error occurred: {e}")
workflow_runs = requests.get(workflow_runs_url.format(repo)).json()['workflow_runs']

Check warning

Code scanning / Bandit

Requests call without timeout

Requests call without timeout

def main():
app.run(debug=False)
app.run(debug=True)

Check failure

Code scanning / Bandit

A Flask app appears to be run with debug=True, which exposes the Werkzeug debugger and allows the execution of arbitrary code.

A Flask app appears to be run with debug=True, which exposes the Werkzeug debugger and allows the execution of arbitrary code.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants