-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weβll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerabilities Dashboard - Code #1
Comments
New code security updates for commits 402b736...45a1857
See DetailsNew Findings
|
New code security updates for commits be374b9...c5a447b
See DetailsNew Findings
New Fixed Findings
|
New code security updates for commits f0e6b8d...43baed2
See DetailsNew Findings
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
None yet
0 participants
Severity Threshold: π΅ MEDIUM
16 Potential vulnerability sources found within this repo
π΄ CRITICAL
π‘ HIGH
π΅ MEDIUM
βͺ LOW
ID: 01J4R31H3PD992RG02MG66WPYS
Language: Python
Severity: π΅ MEDIUM
CWE-78
Improper Neutralization of Special Elements used in an OS Command
Python possesses many mechanisms to invoke an external executable. However,
doing so may present a security issue if appropriate care is not taken to
sanitize any user provided or variable input. This plugin test is part of a
family of tests built to check for process spawning and warn appropriately.
Specifically, this test looks for the spawning of a subprocess without the
use of a command shell. This type of subprocess invocation is not
vulnerable to shell injection attacks, but care should still be taken to
ensure validity of input.
Read more:
https://cwe.mitre.org/data/definitions/78.html
ai-git-commit/app/make_pull_request.py
Line 7 in 591c70a
ID: 01J57ESRTXPK3BFDKVC6XQP6BZ
Language: Python
Severity: π΅ MEDIUM
CWE-78
Improper Neutralization of Special Elements used in an OS Command
Python possesses many mechanisms to invoke an external executable. However,
doing so may present a security issue if appropriate care is not taken to
sanitize any user provided or variable input. This plugin test is part of a
family of tests built to check for process spawning and warn appropriately.
Specifically, this test looks for the spawning of a subprocess without the
use of a command shell. This type of subprocess invocation is not
vulnerable to shell injection attacks, but care should still be taken to
ensure validity of input.
Read more:
https://cwe.mitre.org/data/definitions/78.html
ai-git-commit/app/pull_request_review.py
Line 8 in 591c70a
ID: 01J4R22S839VFHMXJK60P10R52
Language: Python
Severity: π΅ MEDIUM
CWE-78
Improper Neutralization of Special Elements used in an OS Command
Python possesses many mechanisms to invoke an external executable. However,
doing so may present a security issue if appropriate care is not taken to
sanitize any user provided or variable input. This plugin test is part of a
family of tests built to check for process spawning and warn appropriately.
Specifically, this test looks for the spawning of a subprocess without the
use of a command shell. This type of subprocess invocation is not
vulnerable to shell injection attacks, but care should still be taken to
ensure validity of input.
Read more:
https://cwe.mitre.org/data/definitions/78.html
ai-git-commit/app/cli.py
Line 11 in 591c70a
ID: 01J57ESRTXPK3BFDKVC9XQPM0S
Language: Python
Severity: π΅ MEDIUM
CWE-78
Improper Neutralization of Special Elements used in an OS Command
Python possesses many mechanisms to invoke an external executable. However,
doing so may present a security issue if appropriate care is not taken to
sanitize any user provided or variable input. This plugin test is part of a
family of tests built to check for process spawning and warn appropriately.
Specifically, this test looks for the spawning of a subprocess without the
use of a command shell. This type of subprocess invocation is not
vulnerable to shell injection attacks, but care should still be taken to
ensure validity of input.
Read more:
https://cwe.mitre.org/data/definitions/78.html
ai-git-commit/app/pull_request_review.py
Line 12 in 591c70a
ID: 01J4R22S839VFHMXJK62YANTNB
Language: Python
Severity: π΅ MEDIUM
CWE-78
Improper Neutralization of Special Elements used in an OS Command
Python possesses many mechanisms to invoke an external executable. However,
doing so may present a security issue if appropriate care is not taken to
sanitize any user provided or variable input. This plugin test is part of a
family of tests built to check for process spawning and warn appropriately.
Specifically, this test looks for the spawning of a subprocess without the
use of a command shell. This type of subprocess invocation is not
vulnerable to shell injection attacks, but care should still be taken to
ensure validity of input.
Read more:
https://cwe.mitre.org/data/definitions/78.html
ai-git-commit/app/commit.py
Line 13 in 591c70a
ID: 01J4R31H3PD992RG02MH8VEVNK
Language: Python
Severity: π΅ MEDIUM
CWE-78
Improper Neutralization of Special Elements used in an OS Command
Python possesses many mechanisms to invoke an external executable. However,
doing so may present a security issue if appropriate care is not taken to
sanitize any user provided or variable input. This plugin test is part of a
family of tests built to check for process spawning and warn appropriately.
Specifically, this test looks for the spawning of a subprocess without the
use of a command shell. This type of subprocess invocation is not
vulnerable to shell injection attacks, but care should still be taken to
ensure validity of input.
Read more:
https://cwe.mitre.org/data/definitions/78.html
ai-git-commit/app/make_pull_request.py
Line 16 in 591c70a
ID: 01J4R31H3PD992RG02MM3FGBPY
Language: Python
Severity: π΅ MEDIUM
CWE-78
Improper Neutralization of Special Elements used in an OS Command
Python possesses many mechanisms to invoke an external executable. However,
doing so may present a security issue if appropriate care is not taken to
sanitize any user provided or variable input. This plugin test is part of a
family of tests built to check for process spawning and warn appropriately.
Specifically, this test looks for the spawning of a subprocess without the
use of a command shell. This type of subprocess invocation is not
vulnerable to shell injection attacks, but care should still be taken to
ensure validity of input.
Read more:
https://cwe.mitre.org/data/definitions/78.html
ai-git-commit/app/make_pull_request.py
Line 19 in 591c70a
ID: 01J57ESRTXPK3BFDKVCABAKVC4
Language: Python
Severity: π΅ MEDIUM
CWE-78
Improper Neutralization of Special Elements used in an OS Command
Python possesses many mechanisms to invoke an external executable. However,
doing so may present a security issue if appropriate care is not taken to
sanitize any user provided or variable input. This plugin test is part of a
family of tests built to check for process spawning and warn appropriately.
Specifically, this test looks for the spawning of a subprocess without the
use of a command shell. This type of subprocess invocation is not
vulnerable to shell injection attacks, but care should still be taken to
ensure validity of input.
Read more:
https://cwe.mitre.org/data/definitions/78.html
ai-git-commit/app/pull_request_review.py
Line 19 in 591c70a
ID: 01J4R22S839VFHMXJK60V88Q5W
Language: Python
Severity: π΅ MEDIUM
CWE-78
Improper Neutralization of Special Elements used in an OS Command
Found
subprocess
function$FUNC
withshell=True
. This is dangerous because this call willspawn the command using a shell process. Doing so propagates current shell settings and
variables,
which makes it much easier for a malicious actor to execute commands. Use
shell=False
instead.
Read more:
https://cwe.mitre.org/data/definitions/78.html
ai-git-commit/app/cli.py
Line 30 in 591c70a
ID: 01J4R22S839VFHMXJK6435KKTB
Language: Python
Severity: π΅ MEDIUM
CWE-78
Improper Neutralization of Special Elements used in an OS Command
Python possesses many mechanisms to invoke an external executable. However,
doing so may present a security issue if appropriate care is not taken to
sanitize any user provided or variable input. This plugin test is part of a
family of tests built to check for process spawning and warn appropriately.
Specifically, this test looks for the spawning of a subprocess without the
use of a command shell. This type of subprocess invocation is not
vulnerable to shell injection attacks, but care should still be taken to
ensure validity of input.
Read more:
https://cwe.mitre.org/data/definitions/78.html
ai-git-commit/app/commit.py
Line 59 in 591c70a
ID: 01J57ESRTXPK3BFDKVBYMQ6ESC
Language: Python
Severity: π΅ MEDIUM
CWE-78
Improper Neutralization of Special Elements used in an OS Command
Python possesses many mechanisms to invoke an external executable. However,
doing so may present a security issue if appropriate care is not taken to
sanitize any user provided or variable input. This plugin test is part of a
family of tests built to check for process spawning and warn appropriately.
Specifically, this test looks for the spawning of a subprocess without the
use of a command shell. This type of subprocess invocation is not
vulnerable to shell injection attacks, but care should still be taken to
ensure validity of input.
Read more:
https://cwe.mitre.org/data/definitions/78.html
ai-git-commit/app/make_pull_request.py
Lines 66 to 68 in 591c70a
ID: 01J57ESRTXPK3BFDKVCACSM2QX
Language: Python
Severity: π΅ MEDIUM
CWE-78
Improper Neutralization of Special Elements used in an OS Command
Python possesses many mechanisms to invoke an external executable. However,
doing so may present a security issue if appropriate care is not taken to
sanitize any user provided or variable input. This plugin test is part of a
family of tests built to check for process spawning and warn appropriately.
Specifically, this test looks for the spawning of a subprocess without the
use of a command shell. This type of subprocess invocation is not
vulnerable to shell injection attacks, but care should still be taken to
ensure validity of input.
Read more:
https://cwe.mitre.org/data/definitions/78.html
ai-git-commit/app/pull_request_review.py
Lines 68 to 72 in 591c70a
ID: 01J57ESRTXPK3BFDKVBZ5PY7K1
Language: Python
Severity: π΅ MEDIUM
CWE-78
Improper Neutralization of Special Elements used in an OS Command
Python possesses many mechanisms to invoke an external executable. However,
doing so may present a security issue if appropriate care is not taken to
sanitize any user provided or variable input. This plugin test is part of a
family of tests built to check for process spawning and warn appropriately.
Specifically, this test looks for the spawning of a subprocess without the
use of a command shell. This type of subprocess invocation is not
vulnerable to shell injection attacks, but care should still be taken to
ensure validity of input.
Read more:
https://cwe.mitre.org/data/definitions/78.html
ai-git-commit/app/make_pull_request.py
Lines 70 to 72 in 591c70a
ID: 01J4R31H3PD992RG02MPJVHQM1
Language: Python
Severity: π΅ MEDIUM
CWE-78
Improper Neutralization of Special Elements used in an OS Command
Python possesses many mechanisms to invoke an external executable. However,
doing so may present a security issue if appropriate care is not taken to
sanitize any user provided or variable input. This plugin test is part of a
family of tests built to check for process spawning and warn appropriately.
Specifically, this test looks for the spawning of a subprocess without the
use of a command shell. This type of subprocess invocation is not
vulnerable to shell injection attacks, but care should still be taken to
ensure validity of input.
Read more:
https://cwe.mitre.org/data/definitions/78.html
ai-git-commit/app/make_pull_request.py
Line 90 in 591c70a
ID: 01J4R31H3PD992RG02MRZJJGBE
Language: Python
Severity: π΅ MEDIUM
CWE-78
Improper Neutralization of Special Elements used in an OS Command
Python possesses many mechanisms to invoke an external executable. However,
doing so may present a security issue if appropriate care is not taken to
sanitize any user provided or variable input. This plugin test is part of a
family of tests built to check for process spawning and warn appropriately.
Specifically, this test looks for the spawning of a subprocess without the
use of a command shell. This type of subprocess invocation is not
vulnerable to shell injection attacks, but care should still be taken to
ensure validity of input.
Read more:
https://cwe.mitre.org/data/definitions/78.html
ai-git-commit/app/make_pull_request.py
Line 92 in 591c70a
ID: 01J57ESRTXPK3BFDKVCAV1ZCWJ
Language: Python
Severity: π΅ MEDIUM
CWE-78
Improper Neutralization of Special Elements used in an OS Command
Python possesses many mechanisms to invoke an external executable. However,
doing so may present a security issue if appropriate care is not taken to
sanitize any user provided or variable input. This plugin test is part of a
family of tests built to check for process spawning and warn appropriately.
Specifically, this test looks for the spawning of a subprocess without the
use of a command shell. This type of subprocess invocation is not
vulnerable to shell injection attacks, but care should still be taken to
ensure validity of input.
Read more:
https://cwe.mitre.org/data/definitions/78.html
ai-git-commit/app/pull_request_review.py
Line 97 in 591c70a
Reply with
/nullify
to interact with me like another developerThe text was updated successfully, but these errors were encountered: