Showing 885 of 902 total issues
Starting a process with a shell: Seems safe, but may be changed in the future, consider rewriting without shell Open
Open
return os.system("perl -e 'use TAP::Parser;'") != 0
- Exclude checks
Try, Except, Pass detected. Open
Open
except Exception: # pylint: disable=W0703
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
out = process.system_output(cmd, shell=True, ignore_status=True).decode("utf-8")
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
output = process.run(cmd, ignore_status=True, shell=True).stdout_text
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
if process.system(
f"{self.ndctl} destroy-namespace {args}", shell=True, ignore_status=True
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
process.system(up_cmd, shell=True, sudo=True)
- Exclude checks
Audit url open for permitted schemes. Allowing use of file:/ or custom schemes is often unexpected. Open
Open
data = urlopen(url).read()
- Exclude checks
Consider possible security implications associated with subprocess module. Open
Open
import subprocess
- Exclude checks
Probable insecure usage of temp file/directory. Open
Open
output_lxc_path = "/tmp/.avocado_task_output_dir"
- Exclude checks
Standard pseudo-random generators are not suitable for security/cryptographic purposes. Open
Open
column_index = random.randint(0, len(row) - 1)
- Exclude checks
Try, Except, Pass detected. Open
Open
except Exception:
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
p = process.SubProcess(cmd="ls -l", sudo=True, shell=True)
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
p = process.run(cmd="ls -l", sudo=True, shell=True, ignore_status=True)
- Exclude checks
Consider possible security implications associated with subprocess module. Open
Open
import subprocess
- Exclude checks
subprocess call - check for execution of untrusted input. Open
Open
self.process = subprocess.Popen(
args,
stdin=subprocess.PIPE,
stdout=subprocess.PIPE,
stderr=subprocess.PIPE,
- Exclude checks
Try, Except, Pass detected. Open
Open
except Exception: # pylint: disable=W0703
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
if process.system(cmd, ignore_status=True, sudo=True, shell=True):
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
output = process.run(cmd, shell=True, sudo=True, ignore_status=True).stdout_text
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
output = process.run(cmd, ignore_status=True, shell=True).stdout_text
- Exclude checks
Consider possible security implications associated with pickle module. Open
Open
import pickle
- Exclude checks