Showing 885 of 902 total issues
Probable insecure usage of temp file/directory. Open
Open
if os.path.exists("/var/tmp"):
- Exclude checks
Starting a process with a shell, possible injection detected, security issue. Open
Open
self.pipe = os.popen(paginator, "w")
- Exclude checks
Try, Except, Pass detected. Open
Open
except Exception: # pylint: disable=W0703
- Exclude checks
subprocess call - check for execution of untrusted input. Open
Open
self.process = subprocess.Popen(
args,
stdin=subprocess.PIPE,
stdout=subprocess.PIPE,
stderr=subprocess.PIPE,
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
wwids = process.run(cmd, ignore_status=True, sudo=True, shell=True).stdout_text
- Exclude checks
Probable insecure usage of temp file/directory. Open
Open
os.environ["TMP"] = "/var/tmp"
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
wwids = process.run(cmd, ignore_status=True, sudo=True, shell=True).stdout_text
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
output = process.run(cmd, ignore_status=True, shell=True).stdout_text
- Exclude checks
Standard pseudo-random generators are not suitable for security/cryptographic purposes. Open
Open
return random.choice(choices)
- Exclude checks
Standard pseudo-random generators are not suitable for security/cryptographic purposes. Open
Open
combination_parameters_index = random.randint(0, len(possible_parameters) - 1)
- Exclude checks
Standard pseudo-random generators are not suitable for security/cryptographic purposes. Open
Open
column_index = random.randint(0, len(row) - 1)
- Exclude checks
subprocess call - check for execution of untrusted input. Open
Open
proc = subprocess.Popen(
cmd.split(), stdout=subprocess.PIPE, stderr=subprocess.STDOUT
- Exclude checks
Try, Except, Pass detected. Open
Open
except Exception:
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
interface_type = process.system_output(
cmd, shell=True, ignore_status=True
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
output = process.run(cmd, shell=True, sudo=True, ignore_status=True).stdout_text
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
if process.system(cmd, shell=True, ignore_status=True):
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
process.run(cmd, shell=True, ignore_status=True)
- Exclude checks
Use of insecure MD2, MD4, MD5, or SHA1 hash function. Open
Open
device_hash = hashlib.sha1(self.device.encode("utf-8")).hexdigest()
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
output = process.run(cmd, ignore_status=True, shell=True).stdout_text
- Exclude checks
Use of assert detected. The enclosed code will be removed when compiling to optimised byte code. Open
Open
assert total_time >= 10
# check of timeout enforcement
- Exclude checks