Showing 105 of 105 total issues
Pickle and modules that wrap it can be unsafe when used to deserialize untrusted data, possible security issue. Open
Open
o = pkl.load(f)
- Exclude checks
TODO found Open
Open
// TODO Better fail if not ready (popup?)
- Exclude checks
Consider possible security implications associated with pickle module. Open
Open
import pickle as pkl
- Exclude checks
Consider possible security implications associated with pickle module. Open
Open
import pickle as pkl
- Exclude checks
TODO found Open
Open
# TODO fill this section
- Exclude checks
TODO found Open
Open
# TODO all interpolations types are not implemented yet,
- Exclude checks
TODO found Open
Open
// TODO
- Exclude checks
TODO found Open
Open
# TODO: Move the rest of this into files in ephemeral. See
- Exclude checks
TODO found Open
Open
// TODO Manage when there is more than 3 columns (scrolling?)
- Exclude checks
Use of assert detected. The enclosed code will be removed when compiling to optimised byte code. Open
Open
assert self.penalty_type == "CUSTOM", "This function should only be called for custom penalty"
- Exclude checks
TODO found Open
Open
// onSelected: (value) Alexandre: TODO implement this in the backend,
- Exclude checks
TODO found Open
Open
// TODO GridView does not work well for unknown nbCol... This should be done using an actual for loop
- Exclude checks
Consider possible security implications associated with pickle module. Open
Open
import pickle as pkl
- Exclude checks
Pickle and modules that wrap it can be unsafe when used to deserialize untrusted data, possible security issue. Open
Open
o = pkl.load(f)
- Exclude checks
TODO found Open
Open
// ), // TODO implement chooser to edit generic ocp bounds
- Exclude checks
Use of assert detected. The enclosed code will be removed when compiling to optimised byte code. Open
Open
assert function_name is not None, "The function argument is missing"
- Exclude checks
Use of assert detected. The enclosed code will be removed when compiling to optimised byte code. Open
Open
assert len(pkl_paths) != 0
- Exclude checks
Pickle and modules that wrap it can be unsafe when used to deserialize untrusted data, possible security issue. Open
Open
o = pkl.load(f)
- Exclude checks
TODO found Open
Open
# TODO all constraints types are not implemented yet,
- Exclude checks
Either merge this branch with the identical one on line "294" or change one of the implementations. Open
Open
x_bounds[-1]["min"][cls.Zrot, 1] = np.pi * half_twist_till_now - 0.2
x_bounds[-1]["max"][cls.Zrot, 1] = np.pi * sum(half_twists[: i + 1]) + 0.2
x_bounds[-1]["min"][cls.Zrot, 2] = np.pi * sum(half_twists[: i + 1]) - 0.2 - np.pi / 4
x_bounds[-1]["max"][cls.Zrot, 2] = np.pi * sum(half_twists[: i + 1]) + 0.2
- Read upRead up
- Exclude checks
Having two branches in the same if
structure with the same implementation is at best duplicate code, and at worst a coding error. If
the same logic is truly needed for both instances, then they should be combined.
Noncompliant Code Example
if 0 <= a < 10: do_the_thing() elif 10 <= a < 20: do_the_other_thing() elif 20 <= a < 50: do_the_thing() # Noncompliant; duplicates first condition else: do_the_rest() b = 4 if a > 12 else 4
Compliant Solution
if (0 <= a < 10) or (20 <= a < 50): do_the_thing() elif 10 <= a < 20: do_the_other_thing() else: do_the_rest() b = 4
or
if 0 <= a < 10: do_the_thing() elif 10 <= a < 20: do_the_other_thing() elif 20 <= a < 50: do_the_third_thing() else: do_the_rest() b = 8 if a > 12 else 4