pygae/galgebra

View on GitHub

Showing 899 of 899 total issues

Use of assert detected. The enclosed code will be removed when compiling to optimised byte code.
Open

        assert not isinstance(A, Mv)
Severity: Info
Found in galgebra/mv.py by bandit

subprocess call - check for execution of untrusted input.
Open

            subprocess.call(['pdfcrop', pdf_filename])
Severity: Info
Found in galgebra/gprinter.py by bandit

subprocess call - check for execution of untrusted input.
Open

            subprocess.call(['mv', rootfilename+'-crop.pdf', pdf_filename])
Severity: Info
Found in galgebra/gprinter.py by bandit

Starting a process with a shell, possible injection detected, security issue.
Open

            os.system(pdfprog + ' ' + filename[:-4])
Severity: Major
Found in galgebra/printer.py by bandit

subprocess call - check for execution of untrusted input.
Open

                subprocess.call([sys_cmd['rm'], rootfilename+'.aux ', rootfilename+'.log ', rootfilename+'.tex'])
Severity: Info
Found in galgebra/gprinter.py by bandit

subprocess call - check for execution of untrusted input.
Open

            subprocess.call(['Pdf2Png', rootfilename])
Severity: Info
Found in galgebra/gprinter.py by bandit

Use of possibly insecure function - consider using safer ast.literal_eval.
Open

    return eval(seval, _eval_global_dict)
Severity: Minor
Found in galgebra/printer.py by bandit

subprocess call - check for execution of untrusted input.
Open

            subprocess.call(['rm', pdf_filename])
Severity: Info
Found in galgebra/gprinter.py by bandit

Starting a process with a shell, possible injection detected, security issue.
Open

            os.system(sys_cmd['rm'] + ' ' + filename[:-4] + '.aux ' + filename[:-4] + '.log ' + filename[:-4] + '.tex')
Severity: Major
Found in galgebra/printer.py by bandit

subprocess call - check for execution of untrusted input.
Open

                subprocess.call([pdfprog, tex_filename, sys_cmd['null']])
Severity: Info
Found in galgebra/gprinter.py by bandit

Use of assert detected. The enclosed code will be removed when compiling to optimised byte code.
Open

        assert not isinstance(A, Mv)
Severity: Info
Found in galgebra/mv.py by bandit

subprocess call - check for execution of untrusted input.
Open

            subprocess.call([sys_cmd['evince'], pdf_filename])
Severity: Info
Found in galgebra/gprinter.py by bandit

Starting a process with a shell, possible injection detected, security issue.
Open

            os.system('Pdf2Png ' + filename[:-4])
Severity: Major
Found in galgebra/printer.py by bandit

Use of possibly insecure function - consider using safer ast.literal_eval.
Open

                kwargs[name] = eval(value)
Severity: Minor
Found in galgebra/ga.py by bandit

Consider possible security implications associated with subprocess module.
Open

import subprocess
Severity: Info
Found in galgebra/gprinter.py by bandit

subprocess call - check for execution of untrusted input.
Open

                subprocess.call([sys_cmd['rm'], rootfilename+'.aux ', rootfilename+'.log'])
Severity: Info
Found in galgebra/gprinter.py by bandit

Starting a process with a partial executable path
Open

            subprocess.call(['rm', pdf_filename])
Severity: Info
Found in galgebra/gprinter.py by bandit

Use of possibly insecure function - consider using safer ast.literal_eval.
Open

        simps = eval(set_lst[2])
Severity: Minor
Found in galgebra/ga.py by bandit

The input method in Python 2 will read from standard input, evaluate and run the resulting string as python source code. This is similar, though in many ways worse, then using eval. On Python 2, use raw_input instead, input is safe in Python 3.
Open

        eval(input('!!!!Return to continue!!!!\n'))
Severity: Major
Found in galgebra/printer.py by bandit

Starting a process with a shell, possible injection detected, security issue.
Open

            os.system('pdfcrop ' + filename[:-4] + '.pdf')
Severity: Major
Found in galgebra/printer.py by bandit
Severity
Category
Status
Source
Language