Showing 899 of 899 total issues
Use of assert detected. The enclosed code will be removed when compiling to optimised byte code. Open
Open
assert not isinstance(A, Mv)
- Exclude checks
subprocess call - check for execution of untrusted input. Open
Open
subprocess.call(['pdfcrop', pdf_filename])
- Exclude checks
subprocess call - check for execution of untrusted input. Open
Open
subprocess.call(['mv', rootfilename+'-crop.pdf', pdf_filename])
- Exclude checks
Starting a process with a shell, possible injection detected, security issue. Open
Open
os.system(pdfprog + ' ' + filename[:-4])
- Exclude checks
subprocess call - check for execution of untrusted input. Open
Open
subprocess.call([sys_cmd['rm'], rootfilename+'.aux ', rootfilename+'.log ', rootfilename+'.tex'])
- Exclude checks
subprocess call - check for execution of untrusted input. Open
Open
subprocess.call(['Pdf2Png', rootfilename])
- Exclude checks
Use of possibly insecure function - consider using safer ast.literal_eval. Open
Open
return eval(seval, _eval_global_dict)
- Exclude checks
subprocess call - check for execution of untrusted input. Open
Open
subprocess.call(['rm', pdf_filename])
- Exclude checks
Starting a process with a shell, possible injection detected, security issue. Open
Open
os.system(sys_cmd['rm'] + ' ' + filename[:-4] + '.aux ' + filename[:-4] + '.log ' + filename[:-4] + '.tex')
- Exclude checks
subprocess call - check for execution of untrusted input. Open
Open
subprocess.call([pdfprog, tex_filename, sys_cmd['null']])
- Exclude checks
Use of assert detected. The enclosed code will be removed when compiling to optimised byte code. Open
Open
assert not isinstance(A, Mv)
- Exclude checks
subprocess call - check for execution of untrusted input. Open
Open
subprocess.call([sys_cmd['evince'], pdf_filename])
- Exclude checks
Starting a process with a shell, possible injection detected, security issue. Open
Open
os.system('Pdf2Png ' + filename[:-4])
- Exclude checks
Use of possibly insecure function - consider using safer ast.literal_eval. Open
Open
kwargs[name] = eval(value)
- Exclude checks
Consider possible security implications associated with subprocess module. Open
Open
import subprocess
- Exclude checks
subprocess call - check for execution of untrusted input. Open
Open
subprocess.call([sys_cmd['rm'], rootfilename+'.aux ', rootfilename+'.log'])
- Exclude checks
Starting a process with a partial executable path Open
Open
subprocess.call(['rm', pdf_filename])
- Exclude checks
Use of possibly insecure function - consider using safer ast.literal_eval. Open
Open
simps = eval(set_lst[2])
- Exclude checks
The input method in Python 2 will read from standard input, evaluate and run the resulting string as python source code. This is similar, though in many ways worse, then using eval. On Python 2, use raw_input instead, input is safe in Python 3. Open
Open
eval(input('!!!!Return to continue!!!!\n'))
- Exclude checks
Starting a process with a shell, possible injection detected, security issue. Open
Open
os.system('pdfcrop ' + filename[:-4] + '.pdf')
- Exclude checks