Showing 105 of 113 total issues
Using html to parse untrusted XML data is known to be vulnerable to XML attacks. Replace html with the equivalent defusedxml package. Open
Open
from lxml import html
- Exclude checks
Use of assert detected. The enclosed code will be removed when compiling to optimised byte code. Open
Open
assert sports_hall is not None
- Exclude checks
By default, jinja2 sets autoescape to False. Consider using autoescape=True or use the select_autoescape function to mitigate XSS vulnerabilities. Open
Open
env = Environment(trim_blocks=True, lstrip_blocks=True, **options)
- Exclude checks
Using _Element to parse untrusted XML data is known to be vulnerable to XML attacks. Replace _Element with the equivalent defusedxml package. Open
Open
from lxml.etree import _Element
- Exclude checks
Refactor this function to reduce its Cognitive Complexity from 16 to the 15 allowed. Open
Open
def scrape_league(league_link, district, season, options): # pylint: disable=too-many-branches
- Read upRead up
- Exclude checks