dnstats/dnstatsio

View on GitHub

Showing 232 of 232 total issues

Possible SQL injection vector through string-based query construction.
Open

    spf_reports_query = "select count(*), sp.display_name, sp.color from site_runs sr " \
Severity: Minor
Found in dnstats/charts/__init__.py by bandit

Possible SQL injection vector through string-based query construction.
Open

    caa_adoption_query = 'select count(*) from site_runs ' \
Severity: Minor
Found in dnstats/charts/__init__.py by bandit

Possible SQL injection vector through string-based query construction.
Open

    email_providers = "select count(*), display_name from site_runs sr " \
Severity: Minor
Found in dnstats/charts/__init__.py by bandit

Possible SQL injection vector through string-based query construction.
Open

    dns_providers = "select count(*), display_name from site_runs sr " \
Severity: Minor
Found in dnstats/charts/__init__.py by bandit

Possible SQL injection vector through string-based query construction.
Open

                """.format(run_id)
Severity: Minor
Found in dnstats/charts/__init__.py by bandit

Starting a process with a shell, possible injection detected, security issue.
Open

    os.system('scp {filename}.js dnstatsio@www.dnstats.io:/home/dnstatsio/public_html/{folder_name}/{filename}.js'.format(filename=js_filename, folder_name=folder_name))
Severity: Major
Found in dnstats/celery.py by bandit

Possible SQL injection vector through string-based query construction.
Open

    spf_adoption_query = "select count(*) from site_runs sr " \
Severity: Minor
Found in dnstats/charts/__init__.py by bandit

Possible SQL injection vector through string-based query construction.
Open

    caa_reporting = "select count(*) from site_runs " \
Severity: Minor
Found in dnstats/charts/__init__.py by bandit

Possible SQL injection vector through string-based query construction.
Open

    mx_query = 'select count(*) from site_runs ' \
Severity: Minor
Found in dnstats/charts/__init__.py by bandit

Starting a process with a partial executable path
Open

    os.system("ssh dnstatsio@www.dnstats.io 'rm /home/dnstatsio/public_html/index.html'")
Severity: Info
Found in dnstats/celery.py by bandit

Starting a process with a shell, possible injection detected, security issue.
Open

    os.system("ssh dnstatsio@www.dnstats.io 'ln -s /home/dnstatsio/public_html/{folder_name}/{filename}.js /home/dnstatsio/public_html/'".format(folder_name=folder_name, filename=js_filename))
Severity: Major
Found in dnstats/celery.py by bandit

Possible SQL injection vector through string-based query construction.
Open

    dmarc_sub_policy_adoption = 'select count(*) from site_runs sr ' \
Severity: Minor
Found in dnstats/charts/__init__.py by bandit

Possible SQL injection vector through string-based query construction.
Open

    caa_grade_distribution = "select caa_grade, count(*) from site_runs where run_id={} group by caa_grade order by caa_grade".format(
Severity: Minor
Found in dnstats/charts/__init__.py by bandit

Possible SQL injection vector through string-based query construction.
Open

     """.format(run_id)
Severity: Minor
Found in dnstats/charts/__init__.py by bandit

Possible SQL injection vector through string-based query construction.
Open

    dmarc_policy_query = "select count(*), dp.display_name, dp.color from site_runs sr " \
Severity: Minor
Found in dnstats/charts/__init__.py by bandit

Possible SQL injection vector through string-based query construction.
Open

    dnssec_adoption = "select count(*) from site_runs " \
Severity: Minor
Found in dnstats/charts/__init__.py by bandit

Possible SQL injection vector through string-based query construction.
Open

    dmarc_grade_distribution = "select dmarc_grade, count(*) from site_runs where run_id={}  group by dmarc_grade order by dmarc_grade".format(
Severity: Minor
Found in dnstats/charts/__init__.py by bandit

Possible SQL injection vector through string-based query construction.
Open

                """.format(run_id)
Severity: Minor
Found in dnstats/charts/__init__.py by bandit

Refactor this function to reduce its Cognitive Complexity from 26 to the 15 allowed.
Open

    def _validate(self) -> {}:
Severity: Critical
Found in dnstats/dnsvalidate/ns.py by sonar-python

Cognitive Complexity is a measure of how hard the control flow of a function is to understand. Functions with high Cognitive Complexity will be difficult to maintain.

See

Refactor this function to reduce its Cognitive Complexity from 20 to the 15 allowed.
Open

    def _validate(self) -> dict:
Severity: Critical
Found in dnstats/dnsvalidate/mx.py by sonar-python

Cognitive Complexity is a measure of how hard the control flow of a function is to understand. Functions with high Cognitive Complexity will be difficult to maintain.

See

Severity
Category
Status
Source
Language