Showing 232 of 232 total issues
Possible SQL injection vector through string-based query construction. Open
Open
spf_reports_query = "select count(*), sp.display_name, sp.color from site_runs sr " \
- Exclude checks
Possible SQL injection vector through string-based query construction. Open
Open
caa_adoption_query = 'select count(*) from site_runs ' \
- Exclude checks
Possible SQL injection vector through string-based query construction. Open
Open
email_providers = "select count(*), display_name from site_runs sr " \
- Exclude checks
Possible SQL injection vector through string-based query construction. Open
Open
dns_providers = "select count(*), display_name from site_runs sr " \
- Exclude checks
Possible SQL injection vector through string-based query construction. Open
Open
""".format(run_id)
- Exclude checks
Starting a process with a shell, possible injection detected, security issue. Open
Open
os.system('scp {filename}.js dnstatsio@www.dnstats.io:/home/dnstatsio/public_html/{folder_name}/{filename}.js'.format(filename=js_filename, folder_name=folder_name))
- Exclude checks
Possible SQL injection vector through string-based query construction. Open
Open
spf_adoption_query = "select count(*) from site_runs sr " \
- Exclude checks
Possible SQL injection vector through string-based query construction. Open
Open
caa_reporting = "select count(*) from site_runs " \
- Exclude checks
Possible SQL injection vector through string-based query construction. Open
Open
mx_query = 'select count(*) from site_runs ' \
- Exclude checks
Starting a process with a partial executable path Open
Open
os.system("ssh dnstatsio@www.dnstats.io 'rm /home/dnstatsio/public_html/index.html'")
- Exclude checks
Starting a process with a shell, possible injection detected, security issue. Open
Open
os.system("ssh dnstatsio@www.dnstats.io 'ln -s /home/dnstatsio/public_html/{folder_name}/{filename}.js /home/dnstatsio/public_html/'".format(folder_name=folder_name, filename=js_filename))
- Exclude checks
Possible SQL injection vector through string-based query construction. Open
Open
dmarc_sub_policy_adoption = 'select count(*) from site_runs sr ' \
- Exclude checks
Possible SQL injection vector through string-based query construction. Open
Open
caa_grade_distribution = "select caa_grade, count(*) from site_runs where run_id={} group by caa_grade order by caa_grade".format(
- Exclude checks
Possible SQL injection vector through string-based query construction. Open
Open
""".format(run_id)
- Exclude checks
Possible SQL injection vector through string-based query construction. Open
Open
dmarc_policy_query = "select count(*), dp.display_name, dp.color from site_runs sr " \
- Exclude checks
Possible SQL injection vector through string-based query construction. Open
Open
dnssec_adoption = "select count(*) from site_runs " \
- Exclude checks
Possible SQL injection vector through string-based query construction. Open
Open
dmarc_grade_distribution = "select dmarc_grade, count(*) from site_runs where run_id={} group by dmarc_grade order by dmarc_grade".format(
- Exclude checks
Possible SQL injection vector through string-based query construction. Open
Open
""".format(run_id)
- Exclude checks
Refactor this function to reduce its Cognitive Complexity from 26 to the 15 allowed. Open
Open
def _validate(self) -> {}:
- Read upRead up
- Exclude checks
Cognitive Complexity is a measure of how hard the control flow of a function is to understand. Functions with high Cognitive Complexity will be difficult to maintain.
See
Refactor this function to reduce its Cognitive Complexity from 20 to the 15 allowed. Open
Open
def _validate(self) -> dict:
- Read upRead up
- Exclude checks
Cognitive Complexity is a measure of how hard the control flow of a function is to understand. Functions with high Cognitive Complexity will be difficult to maintain.