Showing 230 of 230 total issues
TODO found Open
Open
# TODO: translate this and Reservation.__str__()
- Exclude checks
Possible hardcoded password: '1234' Open
Open
password = "1234"
- Exclude checks
TODO found Open
Open
# TODO: rewrite this whole view (and everything that uses it), so that it's more extendable,
- Exclude checks
Use of assert detected. The enclosed code will be removed when compiling to optimised byte code. Open
Open
assert len(result__params__tuples) == 1
- Exclude checks
Possible hardcoded password: '' Open
Open
def register(card_id="0123456789", secret=""): return _card(reverse('admin_register_card'), card_id, secret)
- Exclude checks
TODO found Open
Open
{# TODO: make this template extend web/generic_form.html #}
- Exclude checks
Use of mark_safe() may expose cross-site scripting vulnerabilities and should be reviewed. Open
Open
return mark_safe(tag) + escape(object_collection[0]) + mark_safe("</div>") + everything_except_first
- Exclude checks
TODO found Open
Open
# TODO: reduce code duplication between this and the two methods above
- Exclude checks
TODO found Open
Open
// TODO: check if this is DOM or jQuery object
- Exclude checks
Potential XSS on mark_safe function. Open
Open
return mark_safe(f"{obj.get_full_name()} – {obj.username}")
- Exclude checks
TODO found Open
Open
{# TODO: make this template extend web/generic_form.html #}
- Exclude checks
Use of mark_safe() may expose cross-site scripting vulnerabilities and should be reviewed. Open
Open
return mark_safe(f"{obj.get_full_name()} – {obj.username}")
- Exclude checks
Potential XSS on mark_safe function. Open
Open
mark_safe( f"{time_place.ticket_count}/{time_place.number_of_tickets} " + link_to_admin_change_form(time_place, text=f"({short_datetime_format(time_place.start_time)})")
- Exclude checks
Possible hardcoded password: '' Open
Open
def check(card_id="0123456789", secret=""):
- Exclude checks
TODO found Open
Open
# TODO: move all validation out of the `save()` method and to a form
- Exclude checks
Use of mark_safe() may expose cross-site scripting vulnerabilities and should be reviewed. Open
Open
return mark_safe(f"- <i>({standalone_notice})</i>")
- Exclude checks
Use of mark_safe() may expose cross-site scripting vulnerabilities and should be reviewed. Open
Open
message = mark_safe(trim_whitespace(message))
- Exclude checks
Use of mark_safe() may expose cross-site scripting vulnerabilities and should be reviewed. Open
Open
mark_safe("<br>"), f"{tag}{sep}" + " {}</div>",
- Exclude checks
Use of mark_safe() may expose cross-site scripting vulnerabilities and should be reviewed. Open
Open
return mark_safe(f'{prefix}{tag_start}target="_blank" {rest}')
- Exclude checks
Potential XSS on mark_safe function. Open
Open
return format_html('<a href="{}"{}>{}</a>', href, mark_safe(extra_attrs), text)
- Exclude checks