Showing 885 of 902 total issues
Starting a process with a partial executable path Open
Open
return os.system("perl -e 'use TAP::Parser;'") != 0
- Exclude checks
Using minidom to parse untrusted XML data is known to be vulnerable to XML attacks. Replace minidom with the equivalent defusedxml package, or make sure defusedxml.defuse_stdlib() is called. Open
Open
from xml.dom import minidom
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
p = process.run(cmd="ls -l", sudo=True, shell=True, ignore_status=True)
- Exclude checks
Probable insecure usage of temp file/directory. Open
Open
output_podman_path = "/tmp/.avocado_task_output_dir"
- Exclude checks
Consider possible security implications associated with subprocess module. Open
Open
import subprocess
- Exclude checks
Use of assert detected. The enclosed code will be removed when compiling to optimised byte code. Open
Open
assert sym is not None
#
# Compute \epsilon-kernel state's core and see if
# it exists already.
#
- Exclude checks
subprocess call - check for execution of untrusted input. Open
Open
self.process = subprocess.Popen(
args,
stdin=subprocess.PIPE,
stdout=self.stdout,
stderr=self.stderr,
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
mpaths = process.run(cmd, ignore_status=True, sudo=True, shell=True).stdout_text
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
wwids = process.run(cmd, ignore_status=True, sudo=True, shell=True).stdout_text
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
data = process.run(cmd, ignore_status=True, sudo=True, shell=True).stdout_text
- Exclude checks
Use of assert detected. The enclosed code will be removed when compiling to optimised byte code. Open
Open
assert maximum > minimum
- Exclude checks
Standard pseudo-random generators are not suitable for security/cryptographic purposes. Open
Open
row[index] = random.randint(0, self.data[index] - 1)
- Exclude checks
subprocess call - check for execution of untrusted input. Open
Open
proc = subprocess.Popen(
cmd.split(), stdout=subprocess.PIPE, stderr=subprocess.STDOUT
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
result = process.run(cmd_line, ignore_status=True, shell=True)
- Exclude checks
Using xml.dom.minidom.parseString to parse untrusted XML data is known to be vulnerable to XML attacks. Replace xml.dom.minidom.parseString with its defusedxml equivalent function or make sure defusedxml.defuse_stdlib() is called Open
Open
dom = minidom.parseString(xml)
- Exclude checks
subprocess call - check for execution of untrusted input. Open
Open
run([sys.executable, "setup.py"] + action, cwd=parent_dir, check=True)
- Exclude checks
Audit url open for permitted schemes. Allowing use of file:/ or custom schemes is often unexpected. Open
Open
result = urlopen(url, data=data, timeout=timeout)
- Exclude checks
Audit url open for permitted schemes. Allowing use of file:/ or custom schemes is often unexpected. Open
Open
input_file = urlopen(url)
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
out = process.run(cmd, ignore_status=True, sudo=True, shell=True).stdout_text
- Exclude checks
Function call with shell=True parameter identified, possible security issue. Open
Open
output = process.run(cmd, ignore_status=True, shell=True).stdout_text
- Exclude checks