rjdbcm/Aspidites

View on GitHub

Showing 46 of 50 total issues

Starting a process with a shell, possible injection detected, security issue.
Open

        with os.popen(setup_runner) as p:
Severity: Major
Found in Aspidites/api/compiler.py by bandit

Standard pseudo-random generators are not suitable for security/cryptographic purposes.
Open

                        num = randint(1, 10000000000000000000)
Severity: Info
Found in Aspidites/api/repl.py by bandit

The input method in Python 2 will read from standard input, evaluate and run the resulting string as python source code. This is similar, though in many ways worse, then using eval. On Python 2, use raw_input instead, input is safe in Python 3.
Open

                line2 = input(CONTINUE_PROMPT)
Severity: Major
Found in Aspidites/api/repl.py by bandit

Use of exec detected.
Open

            out = exec(code, self.__locals__, self.__locals__)
Severity: Minor
Found in Aspidites/api/repl.py by bandit

Starting a process with a shell, possible injection detected, security issue.
Open

         os.popen(
             f'git log --abbrev-commit --pretty=oneline v{last_version}...HEAD'
Severity: Major
Found in dev/scripts/bumpversion_hook.py by bandit

Try, Except, Pass detected.
Open

                except Exception:
Severity: Info
Found in Aspidites/woma/fileutils.py by bandit
Severity
Category
Status
Source
Language