Showing 885 of 902 total issues
Standard pseudo-random generators are not suitable for security/cryptographic purposes. Open
Open
value_choice = random.choice(possible_values)
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
return process.run(cmd, shell=True).stdout_text
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
result = process.run(cmd, env=env, shell=True)
- Exclude checks
Consider possible security implications associated with CalledProcessError module. Open
Open
from subprocess import CalledProcessError, run
- Exclude checks
Consider possible security implications associated with subprocess module. Open
Open
import subprocess
- Exclude checks
Starting a process with a shell, possible injection detected, security issue. Open
Open
self.pipe = os.popen(paginator, "w")
- Exclude checks
subprocess call - check for execution of untrusted input. Open
Open
process = subprocess.Popen(
cmd,
stdin=subprocess.DEVNULL,
stdout=subprocess.PIPE,
stderr=subprocess.DEVNULL,
- Exclude checks
Consider possible security implications associated with subprocess module. Open
Open
import subprocess
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
interface_type = process.system_output(
cmd, shell=True, ignore_status=True
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
output = process.run(cmd, shell=True, sudo=True, ignore_status=True).stdout_text
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
data = process.run(cmd, ignore_status=True, sudo=True, shell=True).stdout_text
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
output = process.run(cmd, ignore_status=True, shell=True).stdout_text
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
device_property = process.run(cmd, shell=True, ignore_status=True)
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
if process.system(write_cmd, shell=True, ignore_status=True):
- Exclude checks
Consider possible security implications associated with subprocess module. Open
Open
import subprocess
- Exclude checks
subprocess call - check for execution of untrusted input. Open
Open
master = subprocess.Popen(
cmd,
stdin=subprocess.DEVNULL,
stdout=subprocess.DEVNULL,
stderr=subprocess.DEVNULL,
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
interface_type = process.system_output(
cmd, shell=True, ignore_status=True
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
out = process.run(cmd, ignore_status=True, sudo=True, shell=True).stdout_text
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
result = process.run(
self.cmd,
timeout=self.timeout,
verbose=False,
ignore_status=True,
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
process.system_output(f"yes | {mkfs_cmd}", shell=True)
- Exclude checks