added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T02:30:08.638702+00:00 | 1,693,057,534,000 | 157ba488886951ed76b46a4fb431473ceffef4a2 | 3 | {
"blob_id": "157ba488886951ed76b46a4fb431473ceffef4a2",
"branch_name": "refs/heads/master",
"committer_date": 1693057534000,
"content_id": "918657adbdee888bee9386aab50504f4d0e0131c",
"detected_licenses": [
"MIT"
],
"directory_id": "d977427d0cfec5a68334832c5cd241fbc1f512b5",
"extension": "py",
"fi... | 2.859375 | stackv2 | """writer.py: Define class MJScoreWriter.
"""
from itertools import product
#from docutils.writers import UnfilteredWriter
from jinja2 import Environment
from .languages import get_language
from .model import YakuTable
from .stat import (create_player_data,
evaluate_placing,
evalu... | 127 | 30.03 | 71 | 17 | 799 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f870a655cae951de_ea763cb8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
104
] | [
null
] | [
11
] | [
40
] | |
2024-11-19T02:30:38.027949+00:00 | 1,693,584,711,000 | f9b8e4521040d09c05b0449827928d6fc99b7c93 | 3 | {
"blob_id": "f9b8e4521040d09c05b0449827928d6fc99b7c93",
"branch_name": "refs/heads/master",
"committer_date": 1693584711000,
"content_id": "863bf6f2ea53d94ee496ded1f7c94caae94bb4c9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3afe7348e830a0c5139fb7cf393736e18b59ab4a",
"extension": "py"... | 2.6875 | stackv2 | # Copyright 2019 Google LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, ... | 333 | 31.71 | 80 | 22 | 2,438 | python | [{"finding_id": "codeql_py/tarslip_1d3fea2321a36776_50a76f3f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](2).\nThis file extraction depends on a [potentially untrusted source](1).\nThis file extraction depends on a [potentially untrusted source](2)."
] | [
302
] | [
null
] | [
7
] | [
18
] | |
2024-11-19T02:30:39.277637+00:00 | 1,468,810,516,000 | b928778e96678a7e8588af924e1aa936d4519a8c | 2 | {
"blob_id": "b928778e96678a7e8588af924e1aa936d4519a8c",
"branch_name": "refs/heads/master",
"committer_date": 1468810516000,
"content_id": "71459d6bca261002f23f55eadfcf6c252cc03a9b",
"detected_licenses": [
"MIT"
],
"directory_id": "c98016f4de5a78ac53a4383ee4ef566ec8d29cb2",
"extension": "py",
"fi... | 2.484375 | stackv2 | #coding:utf-8
import sys
from django.http import HttpResponse
from django.core.paginator import Paginator
from models import Message,UserMessage
import simplejson
# Create your views here.
def send_msg(request):
response = {}
info = ""
try:
if request.method == 'POST':
req = request.PO... | 106 | 31.74 | 92 | 16 | 747 | python | [{"finding_id": "codeql_py/stack-trace-exposure_a412002232b61ee2_3bc9d4ca", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flo... | [
31,
106
] | [
null,
null
] | [
29,
25
] | [
33,
29
] | |
2024-11-19T02:41:51.632462+00:00 | 1,506,244,945,000 | 75d7db0899dd93eee0a44d8f487ed858c8a3cd9a | 2 | {
"blob_id": "75d7db0899dd93eee0a44d8f487ed858c8a3cd9a",
"branch_name": "refs/heads/master",
"committer_date": 1506244945000,
"content_id": "8ce1ab680ed7bc837c13c3d3cb5d1ab5d4882298",
"detected_licenses": [
"MIT"
],
"directory_id": "104cac88e86c904f68200684336dbd16e30c3813",
"extension": "py",
"fi... | 2.328125 | stackv2 | import json
from flask import Flask, request, abort, Response, make_response, jsonify, render_template
from es_helper import es_search, es_clause_count
from datetime import datetime
from urllib3.exceptions import ReadTimeoutError
from elasticsearch import TransportError
from flask_moment import Moment
MAX_PAGING_DEPTH... | 145 | 32.03 | 92 | 17 | 1,164 | python | [{"finding_id": "codeql_py/flask-debug_8f6b9a61a4eaa31c_f330442f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
145,
103,
109,
115
] | [
null,
null,
null,
null
] | [
5,
26,
26,
26
] | [
42,
29,
29,
29
] | |
2024-11-19T02:41:52.910043+00:00 | 1,600,061,209,000 | db1d3b04132cd422928b0af4be71ea30518d420d | 3 | {
"blob_id": "db1d3b04132cd422928b0af4be71ea30518d420d",
"branch_name": "refs/heads/master",
"committer_date": 1600061209000,
"content_id": "1b0a7aff6de7aa8dfe9683b930c51dde2fdc8b1a",
"detected_licenses": [
"MIT"
],
"directory_id": "f2bb082e3d84558f91e1e7dcc1b85d80686cab52",
"extension": "py",
"fi... | 2.546875 | stackv2 | """
This script downloads all c3d encodings computed on cineca.
"""
import paramiko
import os
import argparse
from tqdm import tqdm
if __name__ == '__main__':
# parse arguments
parser = argparse.ArgumentParser()
parser.add_argument("--host")
parser.add_argument("--user")
parser.add_argument("--... | 64 | 30.23 | 109 | 17 | 461 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_98148b0fcfef3946_435f6278", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation",
"py/paramiko-missing-host-key-validation"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
28,
57
] | [
null,
null
] | [
5,
13
] | [
62,
70
] | |
2024-11-19T02:42:20.522693+00:00 | 1,636,666,556,000 | da9848d5ff69199a2403e1c859ef5e3ab1f67ada | 2 | {
"blob_id": "da9848d5ff69199a2403e1c859ef5e3ab1f67ada",
"branch_name": "refs/heads/master",
"committer_date": 1636666556000,
"content_id": "aa8a8da40d3bb49c33548673e678bdff7db191fc",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "ae5150d07b19fc5c6ef2ea1d3f4fcd967ff7174f",
"extension": "p... | 2.3125 | stackv2 | #!/usr/bin/python -u
import os
import sys
import json
import yaml
import pickle
import tarfile
import argparse
from httplib2 import Http
from urllib import urlencode
URL = ''
AUTH = ''
VERB = False
BATCH = 50 * 1024
def apiPost(fullurl, pdata):
if VERB and ('data' in pdata):
print "table: %s, version... | 158 | 32.34 | 163 | 19 | 1,319 | python | [{"finding_id": "codeql_py/tarslip_72159a4d469b1883_75bf6bc9", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
141
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T19:31:08.737041+00:00 | 1,599,961,780,000 | a0ff6f62454c922fe2d21501a35dbf1f062284d9 | 2 | {
"blob_id": "a0ff6f62454c922fe2d21501a35dbf1f062284d9",
"branch_name": "refs/heads/master",
"committer_date": 1599961780000,
"content_id": "d186196d65950714eaf373050ac582f7386d79d1",
"detected_licenses": [
"MIT"
],
"directory_id": "0d1a9f1768d6b514e183b2829be2ff6bfe2f440b",
"extension": "py",
"fi... | 2.5 | stackv2 | import pathlib
import pkgutil
import typing
from contextlib import contextmanager
import click
from jinja2 import Template
from . import formatutils as fmt
class Templates:
def __init__(self, context: dict):
self.context = context
@staticmethod
def _get(name: str) -> Template:
path = st... | 92 | 29.08 | 76 | 19 | 606 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_305a6fda21d4222a_fa0e95a5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
22
] | [
null
] | [
16
] | [
49
] | |
2024-11-18T19:11:51.944224+00:00 | 1,453,147,829,000 | f18c7aae19a408e38a677e7691222f5932112213 | 3 | {
"blob_id": "f18c7aae19a408e38a677e7691222f5932112213",
"branch_name": "refs/heads/master",
"committer_date": 1453147855000,
"content_id": "f611e5c4a7ff301b6d7958844f2836e283380813",
"detected_licenses": [
"MIT"
],
"directory_id": "464f619021039030b457f1f9ed706f37c036a0c6",
"extension": "py",
"fi... | 2.828125 | stackv2 | '''DEPRECATED'''
from entities import Team, Player
from util.custom_errors import RegistrationError
from google.appengine.ext import ndb
import re
ROLES = set(["sniper", "demo", "medic"])
def register_team(teamname):
''' Store in datastore.'''
teamname_p = re.sub(r'[^a-zA-z\s]', '', teamname)
team = Te... | 78 | 30.94 | 78 | 18 | 547 | python | [{"finding_id": "codeql_py/overly-large-range_eeaa16f51cf2349f_0be1d836", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
14,
24
] | [
null,
null
] | [
32,
28
] | [
35,
31
] | |
2024-11-18T19:23:48.325658+00:00 | 1,693,217,241,000 | f04bfdb81a44060d97b9b5cddf5c75b6e1303e83 | 3 | {
"blob_id": "f04bfdb81a44060d97b9b5cddf5c75b6e1303e83",
"branch_name": "refs/heads/master",
"committer_date": 1693217241000,
"content_id": "aec4503fe1619b94729071631a2a826b35887820",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a7c591e5ec540eeefa51517db060449401bf373f",
"extension": "py"... | 2.546875 | stackv2 | import os
import sys
import fnmatch
import jinja2
import markdown
import importlib
import requests
import json
if (len(sys.argv)!=2):
print ('Please provide required arg <file path of realease note md file>')
sys.exit()
importlib.reload(sys)
#sys.setdefaultencoding('utf8') //for pyhton 2..
TEMPLATE = """<div ... | 40 | 28.2 | 82 | 13 | 272 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3bcbd30d093505b1_05514ade", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
32
] | [
null
] | [
15
] | [
40
] | |
2024-11-18T19:23:48.523557+00:00 | 1,584,607,225,000 | 965b3cf75d1f743ff76195c557b12d34b6a17417 | 2 | {
"blob_id": "965b3cf75d1f743ff76195c557b12d34b6a17417",
"branch_name": "refs/heads/master",
"committer_date": 1584607225000,
"content_id": "eb4893eeedf64489d0a659c8f65b016e9a61237e",
"detected_licenses": [
"MIT"
],
"directory_id": "5ef6ab4c6363681409f0a6173ed8280796a073ef",
"extension": "py",
"fi... | 2.40625 | stackv2 | from werkzeug.security import check_password_hash
from flask_jwt_extended import jwt_required, get_raw_jwt, create_access_token, get_jwt_identity
from flask_restplus import Resource, Namespace, fields
from flask import request, jsonify
from datetime import datetime
import re
from . import blacklist
from application.m... | 134 | 33.72 | 95 | 17 | 1,004 | python | [{"finding_id": "codeql_py/polynomial-redos_000f6a938fc66441_3ee40586", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin... | 1 | true | [
"CWE-1333"
] | [
"py/polynomial-redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with '+@0.' and with many repetitions of '.'."
] | [
19
] | [
null
] | [
81
] | [
86
] | |
2024-11-18T19:23:58.430804+00:00 | 1,574,616,798,000 | 05f45f76fa42a5a8d0ac6b3fe11b64122173ffaf | 3 | {
"blob_id": "05f45f76fa42a5a8d0ac6b3fe11b64122173ffaf",
"branch_name": "refs/heads/master",
"committer_date": 1574616798000,
"content_id": "45b4c83b1b33aff4e2b6a99f0ac559a9e522689e",
"detected_licenses": [
"MIT"
],
"directory_id": "982b7b9727f2c138f21eb3ee13b49912482180d4",
"extension": "py",
"fi... | 2.671875 | stackv2 | #!/usr/bin/env python3
"""Python multi-threaded webserver."""
import argparse
import os
import re
import socket
import sys
import threading
# -------------------------------------------------------------------------------------------------
# HELPER FUNCTIONS
# --------------------------------------------------------... | 371 | 28.82 | 99 | 16 | 2,367 | python | [{"finding_id": "codeql_py/redos_55874592afc14ffe_1ba36e80", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'GET ' and containing many repetit... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'GET ' and containing many repetitions of 'a'."
] | [
115
] | [
null
] | [
62
] | [
64
] | |
2024-11-18T18:39:26.270304+00:00 | 1,483,834,304,000 | bc1f98a2ebfc65a6c325b8857cf9b3bfc95c7356 | 3 | {
"blob_id": "bc1f98a2ebfc65a6c325b8857cf9b3bfc95c7356",
"branch_name": "refs/heads/master",
"committer_date": 1483834304000,
"content_id": "57b2c4e05a3eafda9da5ac3b4ec797f6e83ea707",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2447404dca38eea2b073b0e540b2a7b8bd3aeb5d",
"extension": "py"... | 2.890625 | stackv2 | """views.py creates routes and handles all logic based on user input.
It uses variables generated by forms.py and models.py and renders them to
Jinja2 templates stored in the templates folder.
"""
from flask import render_template, url_for, request, redirect, flash, abort
import utils
from nimble import app
from fo... | 442 | 38.87 | 86 | 21 | 3,639 | python | [{"finding_id": "codeql_py/url-redirection_9cfb7e6050012ee5_889ac67a", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
64
] | [
null
] | [
24
] | [
68
] | |
2024-11-18T18:39:28.675667+00:00 | 1,634,547,993,000 | e1fc957a56ae2be7ea924c5b7b62a42f0e8d4ab6 | 2 | {
"blob_id": "e1fc957a56ae2be7ea924c5b7b62a42f0e8d4ab6",
"branch_name": "refs/heads/master",
"committer_date": 1634547993000,
"content_id": "1647c1d1ea434d2c2b0fb4da5ab65c2ea1d9c74d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "815039439ce27ca788367c7d4e9b3891d4f0975d",
"extension": "py"... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
from flask import Flask, request
from predict import answer
import logging
from logging.handlers import RotatingFileHandler
import os
if not os.path.exists('logs'):
os.mkdir('logs')
logger = logging.getLogger('app')
logger.setLevel(logging.DEBUG)
handler = RotatingFileHandler('./logs/' + 'a... | 33 | 25.58 | 79 | 10 | 227 | python | [{"finding_id": "codeql_py/log-injection_34da0c5c78ae463a_561d382a", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
27
] | [
null
] | [
17
] | [
32
] | |
2024-11-18T18:39:38.611150+00:00 | 1,353,069,273,000 | 688191fb62efa7ceeffc6b7fb5bb38fbd71789d6 | 3 | {
"blob_id": "688191fb62efa7ceeffc6b7fb5bb38fbd71789d6",
"branch_name": "refs/heads/master",
"committer_date": 1353069273000,
"content_id": "3abfec7fbe0984a95c34b52ddab16816cf1dd003",
"detected_licenses": [
"MIT"
],
"directory_id": "f15511254f0a0ce0be55909a271941d241cd9666",
"extension": "py",
"fi... | 2.734375 | stackv2 | from collections import namedtuple
import datetime
import hashlib
import random
import string
from p1tr.plugin import *
from p1tr.helpers import *
from p1tr.logwrap import *
def User(rank, registered_at, authenticated_at, password_hash):
"""Generates a user data structure."""
return {'rank': rank, 'registered_... | 304 | 40.04 | 80 | 17 | 2,718 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d88a11524d07041c_28928212", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
22
] | [
null
] | [
14
] | [
38
] | |
2024-11-18T18:39:54.383951+00:00 | 1,687,418,059,000 | 772a6d182770fb0dc7297dcecb4e143c7a0c7f51 | 4 | {
"blob_id": "772a6d182770fb0dc7297dcecb4e143c7a0c7f51",
"branch_name": "refs/heads/master",
"committer_date": 1687418059000,
"content_id": "fdb574e819364afd5eb23970521ced7ed2514b2f",
"detected_licenses": [
"MIT"
],
"directory_id": "d6d0556076692e8581900c928c899242d753d1dc",
"extension": "py",
"fi... | 3.546875 | stackv2 | import nltk
import sklearn
from nltk import word_tokenize as wt
# --------- optional start ------------ #
f = open('NEWS.txt', encoding='utf-8')
raw = f.read()
# WORD TOKENIZER
tokens = wt(raw)
# CREATE NLTK TEXT
txt = nltk.Text(tokens)
# ----------optional end -------------- #
# CLASSIFIER
from nltk.corpus import... | 90 | 24.18 | 87 | 11 | 551 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_90e913f3a7f70552_53578674", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
50,
51,
81,
82
] | [
null,
null,
null,
null
] | [
7,
7,
7,
7
] | [
33,
28,
34,
29
] | |
2024-11-18T18:40:04.436775+00:00 | 1,506,275,355,000 | d4ad9ff82cdb7524ce2710eb187a083df2d38f34 | 3 | {
"blob_id": "d4ad9ff82cdb7524ce2710eb187a083df2d38f34",
"branch_name": "refs/heads/master",
"committer_date": 1506275355000,
"content_id": "4f679277085dfefe61de8eef09dd214497cc1e03",
"detected_licenses": [
"MIT"
],
"directory_id": "3c207d0934b58d901a764e1babf9db20e064c89c",
"extension": "py",
"fi... | 2.828125 | stackv2 | # -*- coding: utf-8 -*-
import os
import click
from slugify import slugify
from jinja2 import Environment
from jinja2 import FileSystemLoader
from pkg_resources import resource_filename
from sqlalchemy import create_engine
import logging
logger = logging.getLogger('__name__')
def to_dict(engine):
'''
Conve... | 84 | 25.39 | 78 | 17 | 486 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_aa85c781fb42fdbc_2d53b364", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
62
] | [
null
] | [
11
] | [
79
] | |
2024-11-18T18:40:05.976021+00:00 | 1,629,062,026,000 | cb49b56232b5599f83fd11edee3f486d12f20061 | 3 | {
"blob_id": "cb49b56232b5599f83fd11edee3f486d12f20061",
"branch_name": "refs/heads/master",
"committer_date": 1629062026000,
"content_id": "0041c1988cd3380bd8038c0a8670ea91fa4d6e1f",
"detected_licenses": [
"MIT"
],
"directory_id": "56018f0c66e44116c96ecdb900e30206a736c866",
"extension": "py",
"fi... | 3.1875 | stackv2 | import sys
import pandas as pd
import numpy as np
import re
import pickle
import nltk
from nltk.tokenize import word_tokenize, sent_tokenize
from nltk.corpus import stopwords
from nltk.stem.wordnet import WordNetLemmatizer
from sqlalchemy import create_engine
from nltk.tokenize import word_tokenize
from nltk.stem imp... | 158 | 31.2 | 110 | 14 | 1,174 | python | [{"finding_id": "codeql_py/overly-large-range_b455707e9487a60d_c100440e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
55
] | [
null
] | [
48
] | [
51
] | |
2024-11-18T20:58:17.561373+00:00 | 1,588,081,448,000 | b71c89761e977826a728d1de2b40cd45ca1f3346 | 2 | {
"blob_id": "b71c89761e977826a728d1de2b40cd45ca1f3346",
"branch_name": "refs/heads/master",
"committer_date": 1588081448000,
"content_id": "8ac35e87f9b078f9cf6419b8621061648b5c4b7e",
"detected_licenses": [
"MIT"
],
"directory_id": "329c9d685a9bf1520a5360e102d88b1698477cb9",
"extension": "py",
"fi... | 2.40625 | stackv2 | module_array = [ ]
from os import system, name
try:
import re
except ImportError:
module_array.append("request")
pass
try:
import requests
except ImportError:
module_array.append("request")
pass
try:
import lxml.etree as ET
except ImportError:
module_array.append("lxml")
pass
try:
... | 285 | 28.1 | 114 | 17 | 1,904 | python | [{"finding_id": "codeql_py/request-without-cert-validation_07a594769272f672_e687f87c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
92,
127,
273
] | [
null,
null,
null
] | [
9,
9,
13
] | [
55,
57,
76
] | |
2024-11-18T20:15:44.554924+00:00 | 1,555,434,841,000 | f1376097321e3ea3f5ac76f359decba7c66237df | 2 | {
"blob_id": "f1376097321e3ea3f5ac76f359decba7c66237df",
"branch_name": "refs/heads/master",
"committer_date": 1555434841000,
"content_id": "c04f2d2e82d6e40317660126959bd34b607d589b",
"detected_licenses": [
"MIT"
],
"directory_id": "b0a0ba58d8bd93123dce091150220015a9d35125",
"extension": "py",
"fi... | 2.34375 | stackv2 | import logging
import json
from constants import SETTINGS
from urllib.parse import urlparse
from uuid import uuid4
from tornado import ioloop, gen
from tornado.websocket import WebSocketHandler
class WSHandler(WebSocketHandler):
LOGGER = logging.getLogger(__qualname__)
WHITELISTED_DOMAINS = SETTINGS['WHITELI... | 58 | 34.07 | 90 | 14 | 420 | python | [{"finding_id": "codeql_py/log-injection_35277a3b82e6e07f_7196ba34", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
33
] | [
null
] | [
13
] | [
84
] | |
2024-11-18T20:15:46.431309+00:00 | 1,690,910,843,000 | fc9900fd6fe2ad62b2fd4f9ae4c3381efa684288 | 3 | {
"blob_id": "fc9900fd6fe2ad62b2fd4f9ae4c3381efa684288",
"branch_name": "refs/heads/main",
"committer_date": 1690910846000,
"content_id": "c25b8b958486f4aa57a6f18a6da0966371b83a27",
"detected_licenses": [
"MIT"
],
"directory_id": "7fc0d5e751ff4f67eeeea1febc11e4847257f6d7",
"extension": "py",
"file... | 3.03125 | stackv2 | """
This example creates a new user and prints her API key. It is also used to
initialize a Galaxy server in Continuous Integration testing of BioBlend.
Usage: python3 create_user_get_api_key.py <Galaxy_URL> <Galaxy_API_key> <new_username> <new_user_email> <new_password>
"""
import sys
import bioblend.galaxy
if len... | 26 | 31.85 | 128 | 8 | 236 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3ac1a70ec67fa3c4_c92b25d8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
26
] | [
null
] | [
7
] | [
18
] | |
2024-11-18T20:15:58.437186+00:00 | 1,489,279,740,000 | 89dc65a12fa431de8458a47e0df44e2c789c04ce | 3 | {
"blob_id": "89dc65a12fa431de8458a47e0df44e2c789c04ce",
"branch_name": "refs/heads/master",
"committer_date": 1489279740000,
"content_id": "252d10c1d19c35ac4cc1bc11d25d29a363bd3e22",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "a3fe5fcc3f2ea593e24570669028a1d7a0dcf05b",
"extension": "p... | 2.796875 | stackv2 | # Copyright (C) 2016 Benoit Myard <myardbenoit@gmail.com>
# Released under the terms of the BSD license.
import six
from base64 import urlsafe_b64encode
from hashlib import md5, pbkdf2_hmac
from cryptography.fernet import Fernet, InvalidToken
def fernet_encrypt(message, password):
if isinstance(password, six.te... | 66 | 24.29 | 59 | 11 | 398 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_f0931657593447c7_62224747", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
15,
30
] | [
null,
null
] | [
20,
20
] | [
28,
28
] | |
2024-11-18T20:16:01.783296+00:00 | 1,635,105,954,000 | b6d5123d8f8bff08c5031fcaa4ac03be8445a370 | 2 | {
"blob_id": "b6d5123d8f8bff08c5031fcaa4ac03be8445a370",
"branch_name": "refs/heads/main",
"committer_date": 1635105954000,
"content_id": "33fe2a3c88f836f501801fb924f87d39a4c66a81",
"detected_licenses": [
"MIT"
],
"directory_id": "54ce6741366568437a13e7940a2a7b701b0d16d5",
"extension": "py",
"file... | 2.40625 | stackv2 | import json
from flask import Flask, render_template, redirect, request, flash
from flask_bootstrap import Bootstrap
from flask_moment import Moment
from datetime import datetime
import os
import logging
import requests
UPLOAD_FOLDER = './uploaded'
OCR_ADDRESS = r'http://ocr:80/process_image/'
NER_ADDRESS = r'http:/... | 81 | 31.49 | 87 | 14 | 625 | python | [{"finding_id": "codeql_py/flask-debug_be75c07a289729f3_31ba7fee", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 5 | true | [
"CWE-215",
"CWE-601",
"CWE-601",
"CWE-022",
"CWE-918"
] | [
"py/flask-debug",
"py/url-redirection",
"py/url-redirection",
"py/path-injection",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"... | [
81,
51,
56,
60,
62
] | [
null,
null,
null,
null,
null
] | [
5,
29,
29,
19,
15
] | [
51,
40,
40,
28,
51
] | |
2024-11-18T19:38:21.296307+00:00 | 1,555,894,781,000 | 74b3266c203580458e38ffd744141243a38d9b90 | 2 | {
"blob_id": "74b3266c203580458e38ffd744141243a38d9b90",
"branch_name": "refs/heads/master",
"committer_date": 1555894781000,
"content_id": "672c712ad626e647d08d67b11c859feb93ca8c4f",
"detected_licenses": [
"MIT"
],
"directory_id": "f09d1b8caa5d97bdcba22ba48bcf31852f79c960",
"extension": "py",
"fi... | 2.375 | stackv2 | """AWS view module."""
import nexmo
import json
import urllib
import logging
import validatesns
from flask import Blueprint, request, abort
from flask import current_app as app
from notifyme.responses import success_response, error_response
aws_blueprint = Blueprint('aws', __name__)
@aws_blueprint.route('/alert', me... | 44 | 27.11 | 89 | 17 | 284 | python | [{"finding_id": "codeql_py/full-ssrf_be7939b40c756a39_eed2b346", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
36
] | [
null
] | [
9
] | [
53
] | |
2024-11-18T20:10:37.917030+00:00 | 1,318,036,100,000 | ea781b228e09c9e29d16fc9fe27bf42f91ae6ab4 | 2 | {
"blob_id": "ea781b228e09c9e29d16fc9fe27bf42f91ae6ab4",
"branch_name": "refs/heads/master",
"committer_date": 1318036100000,
"content_id": "c7c4c77faf06352325a6a9a3a985770eba3d69fe",
"detected_licenses": [
"MIT"
],
"directory_id": "f50ec6e53ad20d72d565e6b6fbb8ff1daadb4f69",
"extension": "py",
"fi... | 2.484375 | stackv2 | import os
import glob
import re
import json
import multiprocessing
import threading
import Queue
from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer
import cgi
class JSRPC(HTTPServer, threading.Thread):
def __init__(self, **kargs):
self.include_path = os.path.dirname(os.path.realpath(__file__))
self.j... | 197 | 27.17 | 74 | 22 | 1,470 | python | [{"finding_id": "codeql_py/path-injection_3e6143c71ffacbf3_d1ae5364", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)."
] | [
67,
114
] | [
null,
null
] | [
13,
13
] | [
61,
22
] | |
2024-11-18T20:10:51.240105+00:00 | 1,683,486,871,000 | 2bfd2cc315f1562e614a5e5d75d057c2e0c61159 | 3 | {
"blob_id": "2bfd2cc315f1562e614a5e5d75d057c2e0c61159",
"branch_name": "refs/heads/master",
"committer_date": 1690286346000,
"content_id": "af015ca99c7111c02e0fea6f747fcd758840c33c",
"detected_licenses": [
"MIT"
],
"directory_id": "126884e6916e9d78201527419681c0369bc61e9a",
"extension": "py",
"fi... | 2.59375 | stackv2 | import string
import random
import webbrowser
import requests
import os
import dotenv
dotenv.load_dotenv()
try:
API_KEY = os.getenv('API_KEY')
random = ''.join(random.choice(string.ascii_uppercase + string.digits) for _ in range(3))
urlData = "https://www.googleapis.com/youtube/v3/search?key={}&maxResults... | 20 | 31.25 | 132 | 15 | 160 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ac014cc589b6a8e2_a2fc72b2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
20
] | [
null
] | [
11
] | [
38
] | |
2024-11-18T20:11:04.455908+00:00 | 1,577,158,396,000 | 3a84bca5471ee3b89f2a401b4846b9321bf95cca | 3 | {
"blob_id": "3a84bca5471ee3b89f2a401b4846b9321bf95cca",
"branch_name": "refs/heads/master",
"committer_date": 1577158396000,
"content_id": "b4128573022c5cd02a5e9932f9f5b37e68531562",
"detected_licenses": [
"MIT"
],
"directory_id": "dccb879bb10cc8da4208c3b61d7958778c536af8",
"extension": "py",
"fi... | 3.4375 | stackv2 | import numpy as np
import sys
day4_in = np.loadtxt('day4_input.txt', dtype=int, delimiter='-')
PART_ONE = False
def has_adjacent_digits(password):
password = str(password)
for i in range(len(str(password))-1):
if (password[i] == password[i+1]):
if PART_ONE:
return True
... | 45 | 27.64 | 73 | 12 | 314 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bf27fc487b71228a_d45b252c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
45
] | [
null
] | [
7
] | [
44
] | |
2024-11-18T20:11:08.229622+00:00 | 1,428,165,824,000 | 85ab682b8d65492f5ae5f0e242f14005558c9506 | 2 | {
"blob_id": "85ab682b8d65492f5ae5f0e242f14005558c9506",
"branch_name": "refs/heads/master",
"committer_date": 1428165824000,
"content_id": "a5c0f01ce0e26ee0b3485175d13f2ae4f1940c45",
"detected_licenses": [
"MIT"
],
"directory_id": "753dd555183067c092ca602a95f8b91039955115",
"extension": "py",
"fi... | 2.34375 | stackv2 | # -*- coding: utf8 -*-
import utils
import settings
import importlib
import tornado.web
import json
from models import Song
class JsonResponse(tornado.web.RequestHandler):
"""
Request handler where requests and responses speak JSON.
From: https://gist.github.com/mminer/5464753
"""
def pr... | 116 | 25.97 | 83 | 17 | 627 | python | [{"finding_id": "codeql_py/path-injection_a9e438c83dc610a3_61c089a1", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
108
] | [
null
] | [
19
] | [
28
] | |
2024-11-18T20:26:05.278138+00:00 | 1,397,092,657,000 | c521291764a6bd8d1fd3319a295038a49b51dce0 | 3 | {
"blob_id": "c521291764a6bd8d1fd3319a295038a49b51dce0",
"branch_name": "refs/heads/master",
"committer_date": 1397092657000,
"content_id": "661ae2ea0cc0fd0e9ef98aefcb41ae69e131bf2e",
"detected_licenses": [
"MIT"
],
"directory_id": "bab9840785859769b3895031b6830965b52e97a4",
"extension": "py",
"fi... | 3.109375 | stackv2 | #!/usr/bin/env python
# -*- coding: UTF-8 -*-
#
# main.py
# v1.0.2
#
DATABASE = 'sample.db'
import sqlite3
import string
import random
from flask import Flask, render_template, request
app = Flask(__name__)
class Word():
def __init__(self, text, key=None, node_list=None):
self.text = text
if not... | 166 | 30.06 | 79 | 19 | 1,137 | python | [{"finding_id": "codeql_py/flask-debug_f650d88251cc332d_2341823f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 5 | true | [
"CWE-215",
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089"
] | [
"py/flask-debug",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query de... | [
166,
67,
85,
124,
149
] | [
null,
null,
null,
null,
null
] | [
5,
25,
21,
33,
33
] | [
24,
30,
26,
38,
38
] | |
2024-11-18T20:26:49.156879+00:00 | 1,517,455,179,000 | 3d5c2896d7476afd196cf6ec35cdf06f942946d6 | 2 | {
"blob_id": "3d5c2896d7476afd196cf6ec35cdf06f942946d6",
"branch_name": "refs/heads/master",
"committer_date": 1517455179000,
"content_id": "5f56d55dc23e623bc17da2fff8793b2a141b1820",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "888d308bfaf8398fff082f1aaf88fd1395b75531",
"extension": "py"... | 2.453125 | stackv2 | # Copyright 2016 Mathew Odden
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing,... | 298 | 27.01 | 76 | 16 | 1,937 | python | [{"finding_id": "codeql_py/insecure-protocol_2979ca2b23e5b6a4_4085c214", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/insecure-protocol",
"py/insecure-default-protocol"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1).",
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."... | [
109,
115
] | [
null,
117
] | [
27,
27
] | [
38,
35
] | |
2024-11-18T20:52:10.289451+00:00 | 1,692,172,347,000 | f606d1cfc2b81891f5a005893a0144c42747b867 | 3 | {
"blob_id": "f606d1cfc2b81891f5a005893a0144c42747b867",
"branch_name": "refs/heads/master",
"committer_date": 1692172347000,
"content_id": "ec8307347b4078a54905cfacf5766775163e57aa",
"detected_licenses": [
"MIT"
],
"directory_id": "34f6ccfad3791c03c6e4c55c56501eb8e5914ec6",
"extension": "py",
"fi... | 2.6875 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
Command line script for downloading KM2 and KM10 Digital Elevation Model dataset via NLS ATOM feed.
Usage: python nls-dem-downloader.py -h
positional arguments:
config_json config.json containing API key and predefined tiles for
different areas... | 203 | 35.22 | 124 | 18 | 1,688 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_283c167478bad931_2624895c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
50,
54
] | [
null,
null
] | [
22,
26
] | [
76,
94
] | |
2024-11-18T20:52:15.583864+00:00 | 1,507,363,986,000 | 38bbab6a9bd233b5a0de7e18317725ae7c32f7e9 | 2 | {
"blob_id": "38bbab6a9bd233b5a0de7e18317725ae7c32f7e9",
"branch_name": "refs/heads/master",
"committer_date": 1507363986000,
"content_id": "6331319ffb7301d87ab55f1e6ad6edd0af74c179",
"detected_licenses": [
"MIT"
],
"directory_id": "e5b1b19e643d8bc371268eef5e9f0012f1376723",
"extension": "py",
"fi... | 2.328125 | stackv2 | import sys
if sys.version_info[0] < 3:
import got
else:
import got3 as got
import train_database
import database
import time
from spider import *
from bson.objectid import ObjectId
def main():
def printTweet(descr, t):
print(descr)
print("Username: %s" % t.username)
print("Retweet... | 120 | 34.27 | 114 | 20 | 1,113 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_151dd216602f8a0d_ae2223ff", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [twitter.com](1) may be at an arbitrary position in the... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [twitter.com](1) may be at an arbitrary position in the sanitized URL."
] | [
58
] | [
null
] | [
12
] | [
33
] | |
2024-11-18T19:02:45.150112+00:00 | 1,559,946,406,000 | 752974eefb5a5f6619c14ce4090c3b1b4c889097 | 2 | {
"blob_id": "752974eefb5a5f6619c14ce4090c3b1b4c889097",
"branch_name": "refs/heads/master",
"committer_date": 1559946406000,
"content_id": "b7305aa4b11b0fb3d57101e54e3edf2bb85ef897",
"detected_licenses": [
"Zlib"
],
"directory_id": "8dcf04af459193e460131a0df457551e9d7056b5",
"extension": "py",
"f... | 2.4375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import os
from os.path import exists, isfile, join, dirname, abspath, relpath
import re
from zipfile import ZipFile
from .elements import ElementError, Image
from .webtools import *
_textmation_dir = abspath(join(dirname(__file__), os.pardir))
_cache_dir = abspath(join(... | 112 | 25.21 | 130 | 15 | 749 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_f07a04db2a8e8d4f_ba281aff", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [fonts.google.com](1) may be at an arbitrary position i... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [fonts.google.com](1) may be at an arbitrary position in the sanitized URL."
] | [
69
] | [
null
] | [
7
] | [
32
] | |
2024-11-18T19:02:50.198702+00:00 | 1,631,086,493,000 | f2a7c24eb633215561208a049b219822dbac6bdb | 2 | {
"blob_id": "f2a7c24eb633215561208a049b219822dbac6bdb",
"branch_name": "refs/heads/master",
"committer_date": 1631086493000,
"content_id": "49f158c2980807727c0116f2bdbd66ecee1178dc",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "7338dee527cd5ba3e44af6e50a55cdc559243094",
"extension": "py",
... | 2.34375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
import logging
import os.path
import sys
import bz2file
import re
from gensim.corpora import WikiCorpus
from xml.etree.cElementTree import iterparse
import pysolr
from tqdm import tqdm
RE_P0 = re.compile('<!--.*?-->', re.DOTALL | re.UNICODE) # comments
RE_P1 = re.compil... | 217 | 40.46 | 124 | 20 | 2,340 | python | [{"finding_id": "codeql_py/redos_e368a44f13884971_d22a1adf", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\\n\\[\\[Image|' and containing m... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '\\n\\[\\[Image|' and containing many repetitions of '|'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '\\n\\[\\[File|' and containing many repetitions of '|'."
] | [
21,
22
] | [
null,
null
] | [
42,
41
] | [
45,
44
] | |
2024-11-18T19:14:29.238300+00:00 | 1,517,314,995,000 | b8b7a114489268c7e2388fbd005e01a4c7bcad57 | 2 | {
"blob_id": "b8b7a114489268c7e2388fbd005e01a4c7bcad57",
"branch_name": "refs/heads/master",
"committer_date": 1517314995000,
"content_id": "309f28445878b810c83eb454bff717438b6f34b6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4fb20e9b94db07659c07a0d712b0842fecd86dcc",
"extension": "py"... | 2.34375 | stackv2 | import sublime, sublime_plugin
import requests
from requests.auth import HTTPBasicAuth
import os
import base64
import json
temp_dir = os.path.abspath(os.path.join(sublime.cache_path(),'Dataiku'))
print("DataikuSublimeText -", "Temp directory:", temp_dir)
settings = None
def plugin_loaded():
global settings
s... | 228 | 34.99 | 173 | 20 | 1,900 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9bd9a9ebb2a04b52_8330612c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
143
] | [
null
] | [
55
] | [
65
] | |
2024-11-18T19:14:53.059661+00:00 | 1,460,552,170,000 | 3b527e543777563fea9760183eb9aeca585d114e | 4 | {
"blob_id": "3b527e543777563fea9760183eb9aeca585d114e",
"branch_name": "refs/heads/master",
"committer_date": 1460552170000,
"content_id": "5ed74a9fadbfea83dc58598b9ca58926f1b1bcfa",
"detected_licenses": [
"MIT"
],
"directory_id": "e2ee3d61126e331f5dc642b2a2344e0cd68d472c",
"extension": "py",
"fi... | 3.53125 | stackv2 | """
Defines Matrix class for representation of molecular distance matrices.
Part of raman package.
Copyright Sean McGrath 2015. Issued under the MIT License.
"""
import re
from math import sqrt
from .util import is_numeric, flatten
class DistanceMatrix:
"""
Represents a matrix of intermolecular distances t... | 205 | 32.39 | 87 | 19 | 1,479 | python | [{"finding_id": "codeql_py/redos_accd028cd9fd3cce_e408dc2e", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '9A9.' and containing many repetit... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '9A9.' and containing many repetitions of '999.'."
] | [
24
] | [
null
] | [
57
] | [
60
] | |
2024-11-18T19:27:39.425852+00:00 | 1,588,990,356,000 | e760a482ac1a46ca3b6ce037e09a1f9e9fb6d323 | 3 | {
"blob_id": "e760a482ac1a46ca3b6ce037e09a1f9e9fb6d323",
"branch_name": "refs/heads/master",
"committer_date": 1588990356000,
"content_id": "b08d3018cba6c756186e9c909eb3ed7cecad8c67",
"detected_licenses": [
"MIT"
],
"directory_id": "63e43880bb1c27e819a14801a512ba2ca914397e",
"extension": "py",
"fi... | 2.90625 | stackv2 | from flask import (Flask,
render_template, request)
import time
import os.path
import datetime
import json
THIS_FILE_PATH = os.path.dirname(os.path.realpath(__file__))
def create_app():
# create and configure the app
app = Flask(__name__)
# a simple page that says hello
# listen for requests on route ... | 84 | 33.76 | 95 | 20 | 679 | python | [{"finding_id": "codeql_py/reflective-xss_6139d56a514f44d1_202d21a8", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-022"
] | [
"py/reflective-xss",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
61,
55
] | [
null,
null
] | [
17,
22
] | [
56,
34
] | |
2024-11-18T19:27:45.482278+00:00 | 1,599,844,988,000 | 6dfd5880e347a65bf46d16b804af77be951c6435 | 4 | {
"blob_id": "6dfd5880e347a65bf46d16b804af77be951c6435",
"branch_name": "refs/heads/master",
"committer_date": 1599844988000,
"content_id": "468e8a41cf7ba6dd62ae36763b576a152d807771",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "727717e739d19fb4006a21b5a4b6958057944f3a",
"extension": "py"... | 3.640625 | stackv2 | # Collaborators (including web sites where you got help: (enter none if you didn't need help)
# none
print("Hello welcome to madlibs! You ready?")
input()
print("Great lets get started!")
adjective = input("type an adjective ")
nationality = input("type a nationality ")
person = input("type a person ")
noun = input ("... | 26 | 50.96 | 124 | 12 | 360 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f753ad51ec8b8c55_70b9c373", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
21
] | [
null
] | [
7
] | [
95
] | |
2024-11-18T19:27:49.027348+00:00 | 1,388,979,058,000 | 3f42458a8166439b3902c76d3546c591ac14ec8a | 3 | {
"blob_id": "3f42458a8166439b3902c76d3546c591ac14ec8a",
"branch_name": "refs/heads/master",
"committer_date": 1388979058000,
"content_id": "38973777975d4500ee4b52849bb1ae8aad84efb0",
"detected_licenses": [
"MIT"
],
"directory_id": "b9b6aedf4756f6c4e68f86a9451a139ddbdbc506",
"extension": "py",
"fi... | 2.578125 | stackv2 | from app import app, db, lm
from flask import render_template, flash, redirect, session, url_for, request, g
from flask import jsonify
from flask.ext.login import login_user, logout_user, current_user, login_required
from models import User, ROLE_USER, ROLE_GUEST, Ingredient, Recipe, RI_Link
from forms import Registrat... | 189 | 38.52 | 84 | 18 | 1,552 | python | [{"finding_id": "codeql_py/url-redirection_330c475b5f2536f2_9905099c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
40
] | [
null
] | [
33
] | [
77
] | |
2024-11-18T19:38:30.747966+00:00 | 1,612,302,409,000 | 5580d874a26b2315752eeb397e2958b1de20e10d | 3 | {
"blob_id": "5580d874a26b2315752eeb397e2958b1de20e10d",
"branch_name": "refs/heads/main",
"committer_date": 1612302409000,
"content_id": "c4a52dcd1ed5fdeaa9cca9d2d7d229b8e9ae8abc",
"detected_licenses": [
"MIT"
],
"directory_id": "f4a5a69658566374bc456513d0efbd54df11099f",
"extension": "py",
"file... | 2.625 | stackv2 | import requests
import json
import datetime
# Suppress HTTPS warnings
from urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning)
# the main function
def restconf_config(username, password):
# Print a stream of bytes as pretty JSON
def prin... | 47 | 36.98 | 102 | 13 | 426 | python | [{"finding_id": "codeql_py/request-without-cert-validation_001be9063981b7ba_14f1763b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
21
] | [
null
] | [
16
] | [
103
] | |
2024-11-18T19:38:35.921793+00:00 | 1,499,482,455,000 | a7c3bba38fa6919d73bb228c135d2c4785c01d96 | 3 | {
"blob_id": "a7c3bba38fa6919d73bb228c135d2c4785c01d96",
"branch_name": "refs/heads/master",
"committer_date": 1499482455000,
"content_id": "3e73a31a9daf1d3d78b75924390f2936f6f6cc5b",
"detected_licenses": [
"MIT"
],
"directory_id": "6cdd631bcd4bc448de09d47fe422a5a19c6e7613",
"extension": "py",
"fi... | 3.125 | stackv2 | #!/usr/bin/env python
"""
Very simple HTTP server in python.
Usage::
./dummy-web-server.py [<port>]
Send a GET request::
curl http://localhost
Send a HEAD request::
curl -I http://localhost
Send a POST request::
curl -d "foo=bar&bin=baz" http://localhost
"""
from BaseHTTPServer import BaseHTTPRequestHan... | 60 | 31.13 | 70 | 17 | 495 | python | [{"finding_id": "codeql_py/polynomial-redos_bf49cccaf1792cf1_949112b8", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin... | 2 | true | [
"CWE-1333",
"CWE-022"
] | [
"py/polynomial-redos",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with 'program=\\[{{' and with many repetitions of 'program=\\[{{'.",
"This path depends on a [user-provided value](1)."
] | [
49,
54
] | [
null,
null
] | [
40,
27
] | [
49,
35
] | |
2024-11-18T19:38:48.513669+00:00 | 1,621,352,491,000 | 002a7beff10e0f43a172e83e3a1ad30773d8828f | 3 | {
"blob_id": "002a7beff10e0f43a172e83e3a1ad30773d8828f",
"branch_name": "refs/heads/main",
"committer_date": 1621352491000,
"content_id": "26a719e7c6a5c2cfd9fde74ab79f7cb392c28ffd",
"detected_licenses": [
"MIT"
],
"directory_id": "56ba14e240574dd123cad8e831273db5b7bcbc6b",
"extension": "py",
"file... | 2.703125 | stackv2 | import psycopg2
import os
from psycopg2.extensions import ISOLATION_LEVEL_AUTOCOMMIT
from sqlalchemy import Column, Integer, String, ForeignKey
from sqlalchemy import create_engine
from sqlalchemy.orm import sessionmaker, relationship
from sqlalchemy.ext.declarative import declarative_base
password = os.environ.get('... | 69 | 27.04 | 88 | 11 | 397 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e837bd2eb2842015_700b7765", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
11
] | [
null
] | [
7
] | [
15
] | |
2024-11-18T19:38:50.989619+00:00 | 1,584,228,929,000 | b56d16fb9e432ba495edbdcd59664f7a71a01da9 | 2 | {
"blob_id": "b56d16fb9e432ba495edbdcd59664f7a71a01da9",
"branch_name": "refs/heads/master",
"committer_date": 1584228929000,
"content_id": "d68034854a5f666a3393b3759b671d10cf2c8b5d",
"detected_licenses": [
"MIT"
],
"directory_id": "ddc65218806461184d5c990567bc9a80feef220e",
"extension": "py",
"fi... | 2.484375 | stackv2 | from os import environ
import logging
from flask import Flask, jsonify, request
from flask_cors import CORS
from daos import dog_dao
from services import dog_service
app = Flask(__name__)
CORS(app)
log = logging.getLogger()
log.setLevel(logging.INFO)
@app.route('/')
def hello_world():
dogs = dog_dao.hello_wor... | 62 | 25.1 | 100 | 13 | 388 | python | [{"finding_id": "codeql_py/log-injection_0c07919d2df81fda_c351d310", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
35,
48
] | [
null,
null
] | [
18,
18
] | [
59,
59
] | |
2024-11-18T19:38:51.806706+00:00 | 1,438,128,176,000 | 117fb68ad58b9715b373ff4e157a173bd1c99b6d | 3 | {
"blob_id": "117fb68ad58b9715b373ff4e157a173bd1c99b6d",
"branch_name": "refs/heads/master",
"committer_date": 1438128176000,
"content_id": "f5f66168774f2ddcfdc600414a13e21d0b9bbb5b",
"detected_licenses": [
"MIT"
],
"directory_id": "f1f6a7434a150e6d5f9a68cb378d1cbb9af9331e",
"extension": "py",
"fi... | 2.84375 | stackv2 | import requests
import json
from requests.auth import HTTPDigestAuth
class SwitchVox:
user = ""
password = ""
server = ""
headers = {'Content-Type': 'application/json', 'Accept': 'text/plain'}
def __init__(self, user, password, server):
self.user = user
self.password = password
... | 61 | 34.48 | 81 | 14 | 400 | python | [{"finding_id": "codeql_py/request-without-cert-validation_eab05ecae5084a51_9d0ff464", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
35,
55
] | [
39,
59
] | [
13,
13
] | [
40,
40
] | |
2024-11-18T20:06:11.622543+00:00 | 1,411,253,222,000 | 8e120e9f74177ae96e919afa730870e76aa27ae7 | 2 | {
"blob_id": "8e120e9f74177ae96e919afa730870e76aa27ae7",
"branch_name": "refs/heads/master",
"committer_date": 1411253222000,
"content_id": "fa108177855a04ac98e4d6a83a5c9952d5f31eb0",
"detected_licenses": [
"MIT"
],
"directory_id": "fb8e88056dfd8da3b7cabac691c8ffb9e81e1efa",
"extension": "py",
"fi... | 2.4375 | stackv2 | from flask import render_template, url_for, redirect, g, request, flash, jsonify
from flask.ext.login import login_user, logout_user, current_user, login_required
from hackathon_project import app, db, lm
from forms import LoginForm, SignupForm
from models import User
import os
#################Message Handling Functi... | 107 | 27.76 | 81 | 17 | 703 | python | [{"finding_id": "codeql_py/url-redirection_f303fe38fa46a303_27036560", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 2 | true | [
"CWE-601",
"CWE-022"
] | [
"py/url-redirection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
66,
40
] | [
null,
null
] | [
20,
13
] | [
62,
46
] | |
2024-11-18T20:06:26.955703+00:00 | 1,676,139,610,000 | 37b6c14d81fdbd225d5d9a6c5e85d7b80daab89a | 3 | {
"blob_id": "37b6c14d81fdbd225d5d9a6c5e85d7b80daab89a",
"branch_name": "refs/heads/master",
"committer_date": 1676139610000,
"content_id": "ea2dbdada0cb1c2fe9d3bb98402830be0b7d8c60",
"detected_licenses": [
"MIT"
],
"directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9",
"extension": "py",
"fi... | 2.9375 | stackv2 | #!/usr/bin/env python
"""
Usage: check_ssl_certificate.py -H <host> -p <port> [-m <method>]
[-c <days>] [-w <days>]
-h show the help
-H <HOST> host/ip to check
-p <port> port number
-m <method> (SSLv2|SSLv3|SSLv23|TLSv1) defaults to SSLv23
-c <days> day threshold for critical
... | 157 | 24.06 | 97 | 13 | 1,114 | python | [{"finding_id": "codeql_py/insecure-protocol_c40de84de8805184_2c20839c", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version SSLv3 specified by [call to SSL.Context](1).", "remediation": "", "locat... | 4 | true | [
"CWE-327",
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/insecure-protocol",
"py/insecure-protocol",
"py/insecure-protocol",
"py/insecure-protocol"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version SSLv3 specified by [call to SSL.Context](1).",
"Insecure SSL/TLS protocol version SSLv2 specified by [call to SSL.Context](1).",
"Insecure SSL/TLS protocol version TLSv1 specified by [call to SSL.Context](1).",
"Insecure SSL/TLS protocol version SSLv3 allowed by [call to SSL... | [
89,
91,
95,
98
] | [
null,
null,
null,
null
] | [
11,
11,
11,
25
] | [
40,
40,
40,
28
] | |
2024-11-18T20:18:17.782672+00:00 | 1,515,000,775,000 | 8e331cafc15c9e7bf6220dc40fdc3ef0677a33f1 | 2 | {
"blob_id": "8e331cafc15c9e7bf6220dc40fdc3ef0677a33f1",
"branch_name": "refs/heads/master",
"committer_date": 1515000775000,
"content_id": "c9f2999831430a5c08f768dce8f5fd6b66d67b44",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e09a470f727476040523cb65de2d628719a8facc",
"extension": "py"... | 2.453125 | stackv2 | """A simple counter with App Engine pull queue."""
import logging
import os
import time
import jinja2
import webapp2
from google.appengine.api import taskqueue
from google.appengine.ext import ndb
from google.appengine.runtime import apiproxy_errors
JINJA_ENV = jinja2.Environment(
loader=jinja2.FileSystemLoade... | 69 | 28.16 | 73 | 18 | 419 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f92ade6e9721b6a6_079182b4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
15
] | [
16
] | [
13
] | [
63
] | |
2024-11-18T20:18:18.337703+00:00 | 1,605,746,625,000 | e7a70d8a30b8bddf42e3fc233c52e4e6808fb65f | 4 | {
"blob_id": "e7a70d8a30b8bddf42e3fc233c52e4e6808fb65f",
"branch_name": "refs/heads/master",
"committer_date": 1605746625000,
"content_id": "944add48e6f48921f8e14dcacefb28decf11d463",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cf17d6dc11a5eb90240033e1aff6212f67bfc596",
"extension": "py"... | 4.09375 | stackv2 | option = input("(C)reate: or (L)ogin: ")
if option.upper() == "C":
email = input("Email: ")
print(f"This is your email, {email}")
print("Email verified")
username = input("Username: ")
if (len(username)) < 5:
print("The username must be at least 5 characters long, try again later.")
else... | 26 | 38.58 | 82 | 12 | 250 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5d9b3e68eeb1c20d_99fedbca", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
15
] | [
null
] | [
15
] | [
51
] | |
2024-11-18T20:31:10.193475+00:00 | 1,537,909,114,000 | 828dba30c9310f2c4b8b68c960a8dadf9bc1af56 | 3 | {
"blob_id": "828dba30c9310f2c4b8b68c960a8dadf9bc1af56",
"branch_name": "refs/heads/master",
"committer_date": 1537909114000,
"content_id": "e215d8f6ac7ac38cc088dd3e278c5cc27ed432fe",
"detected_licenses": [
"MIT"
],
"directory_id": "2965aa6e917489bf4e005102861590a7a4de0273",
"extension": "py",
"fi... | 2.953125 | stackv2 | def five_digits(number):
num_str = "00000" + str(number)
return num_str[-5:]
path1 = "/Volumes/ChenLab3TB1/colorferet/dvd1/data/ground_truths/name_value"
path2 = "/Volumes/ChenLab3TB1/colorferet/dvd2/data/ground_truths/name_value"
allfile = open("/Volumes/ChenLab3TB1/colorferet/myinfo/masterfile.txt", "w")
ma... | 42 | 29.74 | 78 | 18 | 378 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6b4fbb004f009119_1a78a8e1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
26
] | [
null
] | [
23
] | [
78
] | |
2024-11-18T20:31:10.440437+00:00 | 1,626,342,689,000 | f45b842db52a7cb63fe62f0db3f798fe68b38c1f | 3 | {
"blob_id": "f45b842db52a7cb63fe62f0db3f798fe68b38c1f",
"branch_name": "refs/heads/main",
"committer_date": 1626342689000,
"content_id": "edef4cd6dbe611914c03124e599383e859d3ff13",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "8c1b494108ded137ced9edc19d1e10ed280bab21",
"extension": "py"... | 2.765625 | stackv2 | # Author: Wenfan Zhou, Bohua Zhan
"""API for program verification."""
import json
from flask import request
from flask.json import jsonify
from logic import basic
from imperative import parser2
from imperative import imp # for the imp methods
from syntax import printer
from prover import z3wrapper
from app.app impo... | 86 | 28.42 | 83 | 17 | 625 | python | [{"finding_id": "codeql_py/path-injection_51d2c494965bc698_ff268107", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 3 | true | [
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
32,
76,
83
] | [
null,
null,
null
] | [
15,
15,
15
] | [
19,
19,
19
] | |
2024-11-18T20:31:20.465173+00:00 | 1,570,048,814,000 | ac9a8d179050b57d1d9edff07a20869d518b9102 | 3 | {
"blob_id": "ac9a8d179050b57d1d9edff07a20869d518b9102",
"branch_name": "refs/heads/master",
"committer_date": 1570048814000,
"content_id": "dea8b8ee23d662ebe0a94a686bce1afc686159ce",
"detected_licenses": [
"MIT"
],
"directory_id": "90c64b683342c2dbcd0b185fd0d099d5ad976605",
"extension": "py",
"fi... | 2.71875 | stackv2 | import argparse
import datetime
import sys
import time
import settings
from output import Output
from tweepy import OAuthHandler
from tweepy import Stream
from tweepy.streaming import StreamListener
from unidecode import unidecode
class MyStreamListener(StreamListener):
def on_status(self, status):
try:
... | 136 | 38.09 | 104 | 17 | 1,143 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_949c11be4f7431cb_68132ae1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.",
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
71,
73
] | [
null,
null
] | [
13,
13
] | [
70,
67
] | |
2024-11-18T20:31:28.013721+00:00 | 1,520,383,862,000 | 6438ff0e26bb22f0b9ecdd866defb7409afb16bb | 2 | {
"blob_id": "6438ff0e26bb22f0b9ecdd866defb7409afb16bb",
"branch_name": "refs/heads/master",
"committer_date": 1520383862000,
"content_id": "b98e239f5315bc4b758e9d0c055ad8635b373a9f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ed19d54707ef48fc81c4bfd8e4bd782baeee680d",
"extension": "py"... | 2.375 | stackv2 | #!/usr/bin/env python
# this script does the following:
# 1. Read in a configuration file.
# 2. Create a kickstart file based on a template
# 3. Create an image from that kickstart file to be used to boot a UCS.
from socket import inet_aton, error as Serror
from jinja2 import Environment, FileSystemLoader
from sub... | 119 | 34.11 | 89 | 16 | 1,180 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_389d418f9aa3e25c_b34c1e93", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
50
] | [
51
] | [
14
] | [
39
] | |
2024-11-18T20:31:28.905948+00:00 | 1,584,647,280,000 | 9172d6f1ef171c58a5457032fe048f1ccf0e169b | 3 | {
"blob_id": "9172d6f1ef171c58a5457032fe048f1ccf0e169b",
"branch_name": "refs/heads/master",
"committer_date": 1584647280000,
"content_id": "0623150a0c6992801333bf1567a00a1f3ad506c2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bbeb2702f3abbe3d90215d351f8aa54ab39a9e8f",
"extension": "py"... | 2.6875 | stackv2 | # Copyright Year(s) program was created VMware, Inc.
# SPDX-License-Identifier: Apache-2.0
from flask import Flask, request
import cp
from constants import DEBUG, SUCCESS
import json
import logging
app = Flask(__name__)
SUCCESS = "100"
@app.route("/api/v1/load/<id>")
def get_load(id):
"""
Get current load
... | 73 | 28.6 | 109 | 15 | 541 | python | [{"finding_id": "codeql_py/reflective-xss_ab3f6b93dd8c9461_79481fcd", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 5 | true | [
"CWE-079",
"CWE-079",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided valu... | [
51,
68,
27,
53,
70
] | [
null,
null,
null,
null,
null
] | [
16,
16,
23,
23,
23
] | [
48,
44,
76,
77,
80
] | |
2024-11-18T20:31:30.769966+00:00 | 1,634,725,322,000 | ac47b7a61deae6d5c1cee36d2cfc2b72328557bc | 2 | {
"blob_id": "ac47b7a61deae6d5c1cee36d2cfc2b72328557bc",
"branch_name": "refs/heads/master",
"committer_date": 1634725322000,
"content_id": "acaf056429fff4f9979200cdaa92404885c30447",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "8be5929368bd987caf744c92f234884bf49d3d42",
"extension": "p... | 2.375 | stackv2 | # ----------------------------------------------------------------------
# Transmute
# ----------------------------------------------------------------------
# Copyright (C) 2007-2020 The NOC Project
# See LICENSE for details
# ----------------------------------------------------------------------
# Typing
from typing... | 90 | 27.83 | 72 | 15 | 581 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_03906fc995abdd5d_ec318c2b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
65
] | [
null
] | [
35
] | [
68
] | |
2024-11-18T20:31:32.307065+00:00 | 1,574,245,176,000 | 177d5ad10ef91e2399a57a23b5af4df6afba88c8 | 3 | {
"blob_id": "177d5ad10ef91e2399a57a23b5af4df6afba88c8",
"branch_name": "refs/heads/master",
"committer_date": 1574245176000,
"content_id": "092253485ef6cbcdb11246ceb74e440bf6285018",
"detected_licenses": [
"MIT"
],
"directory_id": "041301ee20e4a8fdd1a1201efe251ee4ba5e849a",
"extension": "py",
"fi... | 2.59375 | stackv2 | import datetime
from jinja2 import Environment, FileSystemLoader
# TODO: support the following structure if seen better
# def print_to_template(outputFile, inputFile):
def print_to_template_simple(outputFile, presenter):
"""
simplest template example, an extandable function for starting new languages
"""
file_loa... | 44 | 26.18 | 77 | 12 | 276 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3343c471cde6027c_07b178a3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12,
29
] | [
null,
33
] | [
8,
8
] | [
39,
20
] | |
2024-11-18T20:43:23.315891+00:00 | 1,532,372,639,000 | a571ecedf070ca21a9ab5930316689c187128f99 | 2 | {
"blob_id": "a571ecedf070ca21a9ab5930316689c187128f99",
"branch_name": "refs/heads/master",
"committer_date": 1532372639000,
"content_id": "fb2c268c809ef3f1a10f37a831684543083e1695",
"detected_licenses": [
"MIT"
],
"directory_id": "16fa1058a256d76709745d2ba5671a267b1198b3",
"extension": "py",
"fi... | 2.4375 | stackv2 | #/usr/bin/env python
#coding=utf8
import http.client
import hashlib
from hashlib import md5
import urllib.request, urllib.parse, urllib.error
import random
import json
import string
#parameters
appid = '20151113000005349'
secretKey = 'osubCEzlGjzvw8qdQc41'
q = 'Hello World!'
fromLang = 'en'
toLang = 'zh'
salt = rando... | 42 | 25.95 | 143 | 17 | 332 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_ef2d9bb8c405d86d_48b27263", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
21
] | [
null
] | [
11
] | [
15
] | |
2024-11-18T20:43:33.128021+00:00 | 1,502,807,628,000 | a65236705b2093b209f270197331d9906f047406 | 3 | {
"blob_id": "a65236705b2093b209f270197331d9906f047406",
"branch_name": "refs/heads/master",
"committer_date": 1502807628000,
"content_id": "76f96ded028d3f9eed4e1978530c5b51cc4d6f64",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4bcc306e51b17e8e7c96afa2f0aaac73c23e1031",
"extension": "py"... | 2.515625 | stackv2 | #!/usr/bin/env python
"""
This is a simple queue system take shell script as an input and execute them
as a queue.
Requirements:
1. Shell script as an input and execute with proper environmental variables.
2. Take ntasks parameter and launch concurrent jobs.
3. Assigns job ID when a job is submitted and report job st... | 249 | 32.87 | 122 | 21 | 1,829 | python | [{"finding_id": "codeql_py/reflective-xss_d8df693bd5fe28bb_1f48672e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-117"
] | [
"py/reflective-xss",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
94,
72
] | [
null,
null
] | [
20,
21
] | [
28,
54
] | |
2024-11-18T20:44:17.821306+00:00 | 1,490,116,937,000 | f21a7881765dc724d61ce77f22c30caa150de39a | 2 | {
"blob_id": "f21a7881765dc724d61ce77f22c30caa150de39a",
"branch_name": "refs/heads/master",
"committer_date": 1490116937000,
"content_id": "4e9a2884bd6d58cedb9cfa90af1817ea0ed62135",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7f38760d6505fd23d76c559700a625a4dab67034",
"extension": "py"... | 2.34375 | stackv2 | # ----------------------------------------------------------------------------
# Copyright 2016 Nervana Systems Inc.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.o... | 124 | 41.2 | 97 | 20 | 1,280 | python | [{"finding_id": "codeql_py/tarslip_55940d4011a07238_f5052f60", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
58
] | [
null
] | [
17
] | [
18
] | |
2024-11-18T20:57:30.411554+00:00 | 1,518,074,522,000 | 7f7cd78a9b522cba5c0ca9d2285ce58cf9d9dd42 | 4 | {
"blob_id": "7f7cd78a9b522cba5c0ca9d2285ce58cf9d9dd42",
"branch_name": "refs/heads/master",
"committer_date": 1518074522000,
"content_id": "f07eeb92869b8b5f5ea52d0416e924b659787e58",
"detected_licenses": [
"MIT"
],
"directory_id": "3e718c195cad61e91e8c831037b24a4dea829bd4",
"extension": "py",
"fi... | 3.890625 | stackv2 | #!/usr/bin/env python
# coding: utf-8
#copyRight by heibanke
from __future__ import print_function
from __future__ import unicode_literals
from builtins import input
import random
# 1. 随机产生要猜的数字
# Your code1
secret = random.randint(1, 100)
guess = 0
print("你好, 你很幸运, 我是一个路过的神仙, 我有一个秘密!")
print("我的秘密是一个从1到99的数字, 我只会给你... | 34 | 22.76 | 58 | 12 | 330 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3a5044750f52ae64_33d1b1e4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
29
] | [
null
] | [
47
] | [
58
] | |
2024-11-18T20:57:52.932563+00:00 | 1,574,784,093,000 | f689dbcc7b929971749f96cfdce24c584b35fce2 | 2 | {
"blob_id": "f689dbcc7b929971749f96cfdce24c584b35fce2",
"branch_name": "refs/heads/master",
"committer_date": 1574784093000,
"content_id": "e96e5a6a6a606ec609e09f013a2432f4d80f14ef",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c43bbb2f9b7181e362f04ab099c14913236b6d78",
"extension": "py"... | 2.4375 | stackv2 | from flask import Blueprint, request, url_for, render_template, redirect, flash
from flask_login import current_user, login_user, login_required, logout_user
from src.models import *
from src import db
event_blueprint = Blueprint('event', __name__, template_folder='../../templates/event')
@event_blueprint.route('/c... | 142 | 42.39 | 140 | 20 | 1,295 | python | [{"finding_id": "codeql_py/url-redirection_6341c5112c8bc340_b657d44b", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
109
] | [
null
] | [
25
] | [
31
] | |
2024-11-18T20:57:57.818044+00:00 | 1,549,997,308,000 | 81c70db1c49354edc962ee00f3b566d402c4f1b5 | 3 | {
"blob_id": "81c70db1c49354edc962ee00f3b566d402c4f1b5",
"branch_name": "refs/heads/master",
"committer_date": 1549997308000,
"content_id": "a14b8f9a2e9a95f2a5b2c18fa19166e417659d75",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "faded8adf39fc28cf484972fea4689de3ceea6dd",
"extension": "py"... | 2.796875 | stackv2 | #!/usr/bin/env python3
from datetime import datetime
from datetime import datetime, timedelta
from json import loads
from os import environ
from requests import get, post
from sys import argv
from time import sleep
desired_metrics = [
"temperature",
"apparentTemperature",
"precipProbability",
"precipI... | 100 | 31.27 | 104 | 15 | 778 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9462945bb2f98453_6e4dd5ab", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
95
] | [
null
] | [
11
] | [
18
] | |
2024-11-18T20:58:06.098594+00:00 | 1,690,525,334,000 | fce9cc91e06baef908b9cef84a0c8772ae6af7e6 | 2 | {
"blob_id": "fce9cc91e06baef908b9cef84a0c8772ae6af7e6",
"branch_name": "refs/heads/master",
"committer_date": 1690525334000,
"content_id": "6c4a2443d079d9c6c834f6f0697a0b3723edd1c7",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f8a7e3862ef2b70d5ce26c45796787991677b678",
"extension": "py"... | 2.375 | stackv2 | import urllib.request
import urllib.error
import hmac
import datetime
import uuid
import base64
import hashlib
import ssl
import json
import logging
logging.basicConfig(
filename='log_vessel_delay.log',
level=logging.DEBUG,
datefmt='[%Y-%m-%d %H:%M:%S]',
format='%(asctime)s %(levelname)s %(filename)s [... | 99 | 31.07 | 167 | 20 | 807 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d0838b0b68eda53c_a79a4104", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
30
] | [
null
] | [
30
] | [
89
] | |
2024-11-18T20:58:10.542954+00:00 | 1,620,788,482,000 | d6155fc6e622ae831cc23b2c14c4b2a05e81f812 | 4 | {
"blob_id": "d6155fc6e622ae831cc23b2c14c4b2a05e81f812",
"branch_name": "refs/heads/master",
"committer_date": 1620788482000,
"content_id": "78cb0ac63ef887fda7a047005c1f0ace20449f3b",
"detected_licenses": [
"MIT"
],
"directory_id": "8d22e1fd064e7f5972c71db82fad657eea5a9333",
"extension": "py",
"fi... | 4.1875 | stackv2 | """
【面向对象】
1. 类、对象
2. 对象/类的属性、行为
3. 对象/类的关系:关联、继承、依赖
4. 特征:抽象性、封装性、多态性
"""
'''
First I will tell students what is Capsulational Definition of Class.
By the way, what is the enum data type will be introduced.
* Class code.
* Members of Class.
* Private members of Class.
* Public members of Class.
* Construct Method wit... | 51 | 19.96 | 69 | 12 | 305 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7645ffe024d78a49_a8eeb8e6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
42,
51
] | [
null,
null
] | [
7,
7
] | [
54,
54
] | |
2024-11-18T20:58:22.103826+00:00 | 1,635,242,494,000 | 84b1fdc72c639366bc45271584b88db16d731e41 | 3 | {
"blob_id": "84b1fdc72c639366bc45271584b88db16d731e41",
"branch_name": "refs/heads/main",
"committer_date": 1635242494000,
"content_id": "d0edd9b5a690d68dbe696091fe3f50f97800b8cf",
"detected_licenses": [
"MIT"
],
"directory_id": "d7ab4eb58fd7a6aedeef776363d644167a3d61d2",
"extension": "py",
"file... | 3.46875 | stackv2 | from argparse import ArgumentParser, ArgumentTypeError, Namespace
from string import ascii_lowercase, ascii_uppercase
from random import choice
NAME = "pwgen"
VERSION = "1.0.0"
LOWER_ALPHA = ascii_lowercase
UPPER_ALPHA = ascii_uppercase
NUMBERS = "0123456789"
SPECIALS = "!@#$%^&*"
def init_parser() -> ArgumentPars... | 84 | 25.17 | 78 | 11 | 557 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_30d85ddfd26acfd3_ba092c5e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
81
] | [
null
] | [
8
] | [
16
] | |
2024-11-18T20:58:38.186691+00:00 | 1,552,432,870,000 | 4a47b335cb3a68ccedc5bf6bddb8ba7c28bf6bd0 | 2 | {
"blob_id": "4a47b335cb3a68ccedc5bf6bddb8ba7c28bf6bd0",
"branch_name": "refs/heads/master",
"committer_date": 1552432870000,
"content_id": "f968abc5b0983dbdeaafdde3c9ebd7043649aa89",
"detected_licenses": [
"MIT"
],
"directory_id": "8a9c99d1ff042087a3198995e6dad91859f06ecb",
"extension": "py",
"fi... | 2.453125 | stackv2 | from flask import Flask, jsonify, request, make_response, g
import sqlite3
from flask_api import status
import datetime
from http import HTTPStatus
from flask_httpauth import HTTPBasicAuth
from passlib.hash import sha256_crypt
app = Flask(__name__)
auth = HTTPBasicAuth()
DATABASE = 'blogdatabase.db'
def get_db():
... | 217 | 28.11 | 151 | 19 | 1,339 | python | [{"finding_id": "codeql_py/flask-debug_fec27591f1c92db5_29013ce7", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-089"
] | [
"py/flask-debug",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1)."
] | [
217,
139
] | [
null,
null
] | [
5,
27
] | [
24,
30
] | |
2024-11-18T20:58:39.332004+00:00 | 1,419,345,220,000 | a082c0a5b7658d2dde07fa8db12262d7dd7ea0d6 | 3 | {
"blob_id": "a082c0a5b7658d2dde07fa8db12262d7dd7ea0d6",
"branch_name": "refs/heads/master",
"committer_date": 1419345220000,
"content_id": "ee7114670aefb7ec3747e7cb5721b70503b58708",
"detected_licenses": [
"MIT"
],
"directory_id": "c230188b2b055eb34e099920768a604642bc11d7",
"extension": "py",
"fi... | 3.359375 | stackv2 | """Extracting and changing portions of the current line
All functions take cursor offset from the beginning of the line and the line of python code,
and return None, or a tuple of the start index, end index, and the word"""
import re
def current_word(cursor_offset, line):
"""the object.attribute.attribute just b... | 159 | 38.63 | 118 | 14 | 1,742 | python | [{"finding_id": "codeql_py/overly-large-range_db23b64ceedf8a91_fb808d90", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc... | 14 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-ra... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\w in the same character class.",
"Suspicious character range that overlaps with \\w in the same character class.",
"Suspicious character range that overlaps with \\w in the same character class.",
"Suspicious character range that overlaps with \\w in the same c... | [
11,
26,
26,
34,
34,
56,
72,
88,
88,
100,
103,
106,
119,
122
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
42,
44,
57,
45,
59,
43,
43,
43,
70,
38,
30,
44,
30,
44
] | [
45,
47,
60,
48,
62,
46,
46,
46,
73,
41,
33,
47,
33,
47
] | |
2024-11-18T21:10:11.858711+00:00 | 1,520,873,793,000 | a380fc25c6692157c16b2c05b68d063e2456ebc3 | 3 | {
"blob_id": "a380fc25c6692157c16b2c05b68d063e2456ebc3",
"branch_name": "refs/heads/master",
"committer_date": 1520873793000,
"content_id": "c1065f8d89c1bc9d796b251a47e6c93537ded398",
"detected_licenses": [
"MIT"
],
"directory_id": "6e87ad7f75a2eb0443824d8ae76de7fc7ad15666",
"extension": "py",
"fi... | 2.875 | stackv2 | #!/usr/bin/env python2
# -*- coding: utf-8 -*-
"""
Created on Tue Mar 6 15:41:20 2018
@author: dalonlobo
"""
from __future__ import absolute_import, print_function, division, unicode_literals
import sys
import re
from n2w import convert
def process_line(line):
""" Preprocessing of the text data:
:1... | 62 | 25.39 | 85 | 16 | 356 | python | [{"finding_id": "codeql_py/overly-large-range_9d7d7a2361cdbe1b_64f7d854", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
25
] | [
null
] | [
26
] | [
29
] | |
2024-11-18T21:10:19.071144+00:00 | 1,624,511,774,000 | a53c705fb5fea0c1ca2407ff5f17990ac39eeed2 | 2 | {
"blob_id": "a53c705fb5fea0c1ca2407ff5f17990ac39eeed2",
"branch_name": "refs/heads/main",
"committer_date": 1624511774000,
"content_id": "07057ddf166730e64b703c1ea4fa4c42b5ec303f",
"detected_licenses": [
"MIT"
],
"directory_id": "a4cd8592aa4ebc6e2fa257843b944d588090aed9",
"extension": "py",
"file... | 2.390625 | stackv2 | import os
import random
import re
import warnings
import numpy as np
import skimage
import tensorflow as tf
from PIL import ImageDraw, ImageFont
from keras.backend import clear_session
from PIL import Image
from flask import Flask, send_file
from flask import request, jsonify
from flask_cors import CORS, cross_origin
... | 144 | 35.56 | 110 | 23 | 1,245 | python | [{"finding_id": "codeql_py/path-injection_a0a1ab88bdf9637f_1a951cd8", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
58,
117
] | [
null,
null
] | [
23,
34
] | [
32,
42
] | |
2024-11-18T21:10:20.291476+00:00 | 1,604,339,954,000 | 889cd121e09ec23a25b9af939864a96335347089 | 3 | {
"blob_id": "889cd121e09ec23a25b9af939864a96335347089",
"branch_name": "refs/heads/master",
"committer_date": 1604339954000,
"content_id": "93f5271a8122f165f2665360cb027bdb32870405",
"detected_licenses": [
"MIT"
],
"directory_id": "3f070d4d6985778c60ef951ba3fd0a14a9649c87",
"extension": "py",
"fi... | 2.546875 | stackv2 | """This module only contrains the handler class for status requests"""
import logging
from typing import Mapping
from flask import jsonify
from flask_jwt_extended import jwt_required
from flask_restful import Resource
from papi.exceptions import InvalidTaskIdError
from papi.db import DB
from papi.ssh import Ssh
class ... | 84 | 36.31 | 99 | 15 | 651 | python | [{"finding_id": "codeql_py/stack-trace-exposure_0c22948d61355727_45e9dcc9", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
82
] | [
83
] | [
24
] | [
51
] | |
2024-11-18T21:10:20.786400+00:00 | 1,434,625,992,000 | f93c5d1b36b0ee7fcdf377a8ce62ad1c3a2e4b41 | 2 | {
"blob_id": "f93c5d1b36b0ee7fcdf377a8ce62ad1c3a2e4b41",
"branch_name": "refs/heads/master",
"committer_date": 1434625992000,
"content_id": "d75c2f85201d62a7225b033b23abfb41ab608efe",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "33ff244c0a20291719922023d6234bf97f1e78d0",
"extension": "py"... | 2.484375 | stackv2 | # Copyright 2015 Cisco Systems, Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with
# the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writ... | 191 | 31.18 | 117 | 14 | 1,361 | python | [{"finding_id": "codeql_py/request-without-cert-validation_fa867120ddab11f8_16742bbc", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
117
] | [
123
] | [
20
] | [
26
] | |
2024-11-18T21:10:25.969197+00:00 | 1,494,449,071,000 | 550a1c2ed6f9c25d17316e1db0a11feeb545101a | 2 | {
"blob_id": "550a1c2ed6f9c25d17316e1db0a11feeb545101a",
"branch_name": "refs/heads/master",
"committer_date": 1494449071000,
"content_id": "15ede47043af9bacc3cde53375eeb8be7a3a0620",
"detected_licenses": [
"MIT"
],
"directory_id": "c07f5d5d38a2502e1987531c0b3a9258e66ffdd3",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
Created on Tue May 9 15:35:28 2017
@author: woojay
#echo 1 > /sys/class/leds/red_led/brightness
"""
from forecastiopy import *
from datetime import datetime
from subprocess import call
from time import sleep
delaySec = 5
blinkPerMinute = int(60 / (delaySec+1))
chec... | 78 | 35.92 | 138 | 21 | 758 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e7528dfb741447b5_31cef01b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
25
] | [
null
] | [
7
] | [
69
] | |
2024-11-18T21:10:45.013027+00:00 | 1,613,075,950,000 | 491487702a42d0dfea262167ed410f24770fbd49 | 2 | {
"blob_id": "491487702a42d0dfea262167ed410f24770fbd49",
"branch_name": "refs/heads/master",
"committer_date": 1613075950000,
"content_id": "ae417c0b1700fdf1c663119e1af22972a7eb361c",
"detected_licenses": [
"MIT"
],
"directory_id": "2d6b5a6c8f6043551038b9f993433028c7c8c3cb",
"extension": "py",
"fi... | 2.46875 | stackv2 | import sys
from bluepy.btle import UUID, Peripheral, Characteristic, BTLEDisconnectError
import logging
import json
from influxdb import InfluxDBClient
import time
global connections
connections = []
def configure_logger(config):
log_formatter = logging.Formatter('%(asctime)s : %(levelname)s : %(message)s')
... | 156 | 38.64 | 144 | 22 | 1,334 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6bad4a70ee05a3e4_55211526", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
79,
95
] | [
null,
null
] | [
61,
96
] | [
77,
112
] | |
2024-11-18T21:11:00.932018+00:00 | 1,587,974,576,000 | 7d731c8ed92805912447a58252c06125b63b9fa1 | 3 | {
"blob_id": "7d731c8ed92805912447a58252c06125b63b9fa1",
"branch_name": "refs/heads/master",
"committer_date": 1587974576000,
"content_id": "ef6cfee34ec2d870fc14ccd7a6fcde1dbed5e190",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7e4b6e6aa20557091f112673b936a20ed9bce0db",
"extension": "py"... | 2.640625 | stackv2 | #!/usr/bin/python3
import paramiko,time,sys
# using as ssh client
client=paramiko.SSHClient()
# auto adjust host key verification with yes or no
client.set_missing_host_key_policy(paramiko.AutoAddPolicy())
# time for connecting to remote Cisco IOS
addr=input("enter your router IP : ")
u='root'
p='cisco'
... | 25 | 29.36 | 81 | 8 | 196 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_eef77f3632df43ee_f707fc44", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
8
] | [
null
] | [
null
] | [
61
] | |
2024-11-18T21:11:15.454707+00:00 | 1,660,834,681,000 | 61bb168d0ee749299c7577c183e8a3b131b37d1d | 3 | {
"blob_id": "61bb168d0ee749299c7577c183e8a3b131b37d1d",
"branch_name": "refs/heads/master",
"committer_date": 1660834725000,
"content_id": "f56483202df617c2609da783b2a0718a105e32cf",
"detected_licenses": [
"MIT"
],
"directory_id": "683663ff0f6efd733b44609d61d96adf33f88b33",
"extension": "py",
"fi... | 2.796875 | stackv2 | #!/usr/bin/env python
import csv
import sys
from jinja2 import Environment
TABLE_TEMPLATE = '''
<table id="table." class="lighttable">
<caption>構造体 </caption>
<thead>
<tr><th>オフセット</th><th>桁</th><th>属性</th></tr>
</thead>
<tbody>
{%- for row in records %}
<tr><td><literal>{{ row['Offset'] }}</literal><... | 30 | 23.17 | 135 | 12 | 205 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_66e6f2fc198c0bd6_ad5d056a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25
] | [
null
] | [
11
] | [
40
] | |
2024-11-18T19:03:21.634176+00:00 | 1,684,363,415,000 | e5d05c72f44f31bf2d1248b1e4199795e3910d6f | 2 | {
"blob_id": "e5d05c72f44f31bf2d1248b1e4199795e3910d6f",
"branch_name": "refs/heads/master",
"committer_date": 1684363415000,
"content_id": "2608dbc83eea54d86e7b02cabb8954bed1970e12",
"detected_licenses": [
"MIT"
],
"directory_id": "5cd5fc3c4bd5c0a0614ab9c75e96c7b433351f91",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/python
import sys
import requests
import json
import urllib3
# there is a way to only disable InsecurePlatformWarning but I can't find it now
urllib3.disable_warnings()
sw_url = sys.argv[1]
services = sys.argv[2:]
#print (sw_url)
#print (services)
for dynsvc in services:
swdata= {
"id": 47,... | 61 | 25.11 | 156 | 19 | 443 | python | [{"finding_id": "codeql_py/request-without-cert-validation_70715f77596ed0d9_95b0df00", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
29,
44
] | [
null,
null
] | [
11,
17
] | [
59,
71
] | |
2024-11-18T19:03:34.808042+00:00 | 1,617,216,366,000 | a71ed0e11d6a39f98ed33dcfded32a0f85fc12ca | 3 | {
"blob_id": "a71ed0e11d6a39f98ed33dcfded32a0f85fc12ca",
"branch_name": "refs/heads/master",
"committer_date": 1617216366000,
"content_id": "a753ca3cebe1a8f841870df0027b5551fbd2de80",
"detected_licenses": [
"MIT"
],
"directory_id": "4b6c98a5f34c189ca483133b7ca8ad7ab7b4b1f4",
"extension": "py",
"fi... | 2.765625 | stackv2 | import logging
import requests
from furl import furl
log = logging.getLogger(__name__)
class IATACodesClient:
def __init__(self, api_key):
self.__api_key = api_key
def get(self, code=None, name=None, country_code=None):
f = furl('https://iatacodes.org/api/v6/cities?api_key={api_key}'.format... | 60 | 32.12 | 104 | 14 | 501 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_61656434b94219b0_80dd7ae2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
42,
48,
49,
55
] | [
null,
null,
null,
null
] | [
18,
19,
19,
19
] | [
21,
44,
22,
42
] | |
2024-11-18T19:03:37.793994+00:00 | 1,633,612,726,000 | a99a640b8b48f1b0c8d93c9abb35885d9b884033 | 2 | {
"blob_id": "a99a640b8b48f1b0c8d93c9abb35885d9b884033",
"branch_name": "refs/heads/main",
"committer_date": 1633612726000,
"content_id": "6ae6f3d7ca97174c9e3fca9e279897d2718d2c01",
"detected_licenses": [
"MIT"
],
"directory_id": "66025066f697e9708a1038eeb611a20b2685a1d0",
"extension": "py",
"file... | 2.328125 | stackv2 | from flask import Flask, render_template, request, redirect,url_for
import os
#custom packages import
from data_ingestion.data_import_and_preprocessing import DataImport,Preprocessing
from image_api_functions.api_functions import API_Functions
app=Flask(__name__)
#initializing objects
data_import = DataImport()
prep... | 81 | 30.3 | 118 | 15 | 574 | python | [{"finding_id": "codeql_py/path-injection_4645cf61c4ae20cd_4d5db874", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 4 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2).\nThis path depends on a [user-provided value](3).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
41,
54,
67,
69
] | [
null,
null,
null,
null
] | [
16,
15,
24,
23
] | [
20,
19,
28,
27
] | |
2024-11-18T19:28:38.325204+00:00 | 1,570,794,323,000 | f659a9867aee711a2372ba7e92643506059e36bc | 3 | {
"blob_id": "f659a9867aee711a2372ba7e92643506059e36bc",
"branch_name": "refs/heads/master",
"committer_date": 1570794323000,
"content_id": "c46cfcc188a1dfb919a1f17c6ebd6baa83fa902c",
"detected_licenses": [
"MIT"
],
"directory_id": "b6841cfa4f69161e76b3551b39e117a0a57c1275",
"extension": "py",
"fi... | 2.828125 | stackv2 | #!/usr/bin/python3
import requests
##customize
ZONE_ID=
API_KEY=
AUTH_EMAIL=
DOMAIN_NAME=
##
CF_API_URL="https://api.cloudflare.com/client/v4/"
AUTH_HEADERS = { 'X-Auth-Email': AUTH_EMAIL, 'X-Auth-Key': API_KEY, 'Content-Type': 'application/json' }
def check_http_error_code(resp):
if resp.status_code != requests.... | 65 | 32.02 | 133 | 13 | 594 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6bd9c298286917e1_2a88d80e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
16,
47
] | [
null,
null
] | [
15,
11
] | [
24,
100
] | |
2024-11-18T19:28:54.080758+00:00 | 1,580,895,963,000 | cf2412acc904fdf73d23b378133ae66af1667fb0 | 2 | {
"blob_id": "cf2412acc904fdf73d23b378133ae66af1667fb0",
"branch_name": "refs/heads/master",
"committer_date": 1580895963000,
"content_id": "9d5b05caeb50e91fa860c4b8eb21399faa06b956",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7abc013b680e492bca0c7fba914de726e1181029",
"extension": "py"... | 2.4375 | stackv2 | import os
import uuid
from aiohttp import web
from app.utility.base_service import BaseService
from app.utility.payload_encoder import xor_file
class FileSvc(BaseService):
def __init__(self, exfil_dir):
self.exfil_dir = exfil_dir
self.log = self.add_service('file_svc', self)
self.data_s... | 145 | 36.29 | 117 | 19 | 1,132 | python | [{"finding_id": "codeql_py/stack-trace-exposure_be7e7176e7e49ac7_7f9a16be", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
35
] | [
null
] | [
42
] | [
43
] | |
2024-11-18T19:39:45.977773+00:00 | 1,544,025,841,000 | ba88d001860d10a1c51743a9e5633e5097de3fc8 | 3 | {
"blob_id": "ba88d001860d10a1c51743a9e5633e5097de3fc8",
"branch_name": "refs/heads/master",
"committer_date": 1544058577000,
"content_id": "461150023566b7135f8cae83eb7e0dfc1301069e",
"detected_licenses": [
"MIT"
],
"directory_id": "225766f60e4e22544bf67e7cab7c0646dbd51abd",
"extension": "py",
"fi... | 2.875 | stackv2 | #! /usr/bin/env python3
# coding: utf-8
import os
import wget
import tarfile
from bs4 import BeautifulSoup
from definitions import ROOT_DIR, word_tokenize, stopwords, ps
class Reuters:
def __init__(self, number_of_files=22, docs_per_block=500,
remove_stopwords=False, stem=False, case_folding=F... | 147 | 40.06 | 131 | 20 | 1,281 | python | [{"finding_id": "codeql_py/tarslip_007c22c9f8757a27_d307b2e7", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
59
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T19:39:50.823410+00:00 | 1,393,535,785,000 | a21a752d595e1d239d36910e55ea3bad44bdec31 | 2 | {
"blob_id": "a21a752d595e1d239d36910e55ea3bad44bdec31",
"branch_name": "refs/heads/master",
"committer_date": 1393535785000,
"content_id": "25c61981c9f39a4249debc246b1fd1b40fce99ee",
"detected_licenses": [
"MIT"
],
"directory_id": "b9489618b38b7c7d6e30d40a0219c9fa462aaa2c",
"extension": "py",
"fi... | 2.484375 | stackv2 | import json
import urllib
from requests_toolbelt import MultipartEncoder
import requests
from bitcasa.filesystem import BitcasaFile, BitcasaFolder
from bitcasa.exception import BitcasaException
BASEURL = 'https://developer.api.bitcasa.com/v1/'
class BitcasaClient(object):
def __init__(self, id, secret, redirect_... | 159 | 39.59 | 115 | 15 | 1,476 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ca9db4d4a61a76c3_a0f94ec0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
94
] | [
null
] | [
20
] | [
116
] | |
2024-11-18T19:40:01.318585+00:00 | 1,586,103,224,000 | d08f88a6c3c9d75686f3c8251a74ed88572a915d | 3 | {
"blob_id": "d08f88a6c3c9d75686f3c8251a74ed88572a915d",
"branch_name": "refs/heads/master",
"committer_date": 1586103224000,
"content_id": "432d20d855473b601e019b403b5dd4aa760966ed",
"detected_licenses": [
"MIT"
],
"directory_id": "352d994e052bf670f9b99c5b795c6aab22ad613a",
"extension": "py",
"fi... | 2.875 | stackv2 | from flask import Flask
from flask import request
from ShoppingList import *
import json
app = Flask(__name__)
list = ShoppingList()
list.addElement("patate", 5)
list.addElement("patate", 3)
list.addElement("fogli", 18)
list.addElement("mela", 5)
@app.route('/test')
def hello_world():
return {'name': 'gian', 'su... | 48 | 28 | 69 | 15 | 335 | python | [{"finding_id": "codeql_py/flask-debug_ab0bea34ee8bbf88_ea6f751b", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
48,
42
] | [
null,
44
] | [
null,
16
] | [
47,
51
] | |
2024-11-18T20:18:05.509719+00:00 | 1,556,693,296,000 | d2a70510f5c591fd2e599eb82c34f7a09e196bc4 | 3 | {
"blob_id": "d2a70510f5c591fd2e599eb82c34f7a09e196bc4",
"branch_name": "refs/heads/master",
"committer_date": 1556693296000,
"content_id": "d654f94fec616223da7e1d598f6953bcf83ece1b",
"detected_licenses": [
"MIT",
"Apache-2.0"
],
"directory_id": "df04c111195126abe84143cceb2f3599b6301106",
"exten... | 2.671875 | stackv2 | import re
try:
from .vulnerabilities import definitions
except:
from vulnerabilities import definitions
import hashlib
import requests
def is_defined(o):
return o is not None
def scan(data, extractor, matcher=None, definitions=definitions):
matcher = matcher or _simple_match
detected = []
f... | 180 | 27.52 | 88 | 19 | 1,206 | python | [{"finding_id": "codeql_py/request-without-cert-validation_1a039b5545aaeb91_93098aa3", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
176
] | [
null
] | [
19
] | [
50
] | |
2024-11-18T20:18:50.478414+00:00 | 1,595,209,600,000 | 09ba11e0ebe9ed80483729cb1219a0c96a5088f7 | 3 | {
"blob_id": "09ba11e0ebe9ed80483729cb1219a0c96a5088f7",
"branch_name": "refs/heads/master",
"committer_date": 1595209600000,
"content_id": "1f7080baef86739872aa6036430dc7ee17d50753",
"detected_licenses": [
"MIT"
],
"directory_id": "29f8ba19f3b11451cdd3da35f6611996a1def622",
"extension": "py",
"fi... | 3.125 | stackv2 |
import zipfile
import time
import threading
startTime = time.time()
# 判断线程是否需要终止
flag = True
def extract(password, file):
try:
password = str(password)
file.extractall(path='.', pwd=password.encode('utf-8'))
print("The Passwd is: {}".format(password))
nowTime = time.time()
... | 36 | 20.97 | 70 | 14 | 222 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8dac74499a5c44c6_4d703c43", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
14
] | [
null
] | [
15
] | [
51
] | |
2024-11-18T20:18:50.694241+00:00 | 1,368,355,644,000 | b277caeefb062ef62728c697bebbce088fa51a48 | 3 | {
"blob_id": "b277caeefb062ef62728c697bebbce088fa51a48",
"branch_name": "refs/heads/master",
"committer_date": 1368355644000,
"content_id": "860b974fc7e59700e03b4a262abea4bd7a074188",
"detected_licenses": [
"MIT"
],
"directory_id": "38216d2f3d51a39e12c79b03506be2f7676628bd",
"extension": "py",
"fi... | 2.59375 | stackv2 | # This file should go in ~/Library/Application Support/SublimeText2/Packages/User/
# Additionally, lines like this:
# { "keys": ["ctrl+alt+a"], "command": "record_audio" },
# { "keys": ["ctrl+alt+l"], "command": "add_vo_line_numbers" }
# should be added to the keymap file (accessible from the preferences menu)
imp... | 119 | 26.47 | 84 | 19 | 863 | python | [{"finding_id": "codeql_py/overly-large-range_8b17fa4b237f7866_0892676f", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:\\].", "remediation": "", "location": {... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:\\]."
] | [
77
] | [
null
] | [
25
] | [
28
] | |
2024-11-18T20:29:31.957025+00:00 | 1,415,845,130,000 | 18bc65d6877cd55391d8801839f4bb02addc9ecf | 3 | {
"blob_id": "18bc65d6877cd55391d8801839f4bb02addc9ecf",
"branch_name": "refs/heads/master",
"committer_date": 1415845130000,
"content_id": "741252e057d2528df827e5866521149e6fabebd0",
"detected_licenses": [
"MIT"
],
"directory_id": "19869ed70b66a5cead6a58315b85c26368816188",
"extension": "py",
"fi... | 2.78125 | stackv2 | # mailstat.reporting.base
# Code for the creation of Reports
#
# Author: Benjamin Bengfort <benjamin@bengfort.com>
# Created: Sun Dec 29 21:45:46 2013 -0600
#
# Copyright (C) 2013 Bengfort.com
# For license information, see LICENSE.txt
#
# ID: base.py [] benjamin@bengfort.com $
"""
Code for the creation of Reports
... | 84 | 30.62 | 75 | 14 | 521 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f158d62d5e6d8cb5_aaf75d38", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
52
] | [
null
] | [
33
] | [
59
] | |
2024-11-18T20:29:58.689075+00:00 | 1,570,885,633,000 | 9c7b9de71bd9fe70c318eb7b05dd71488634bfb8 | 4 | {
"blob_id": "9c7b9de71bd9fe70c318eb7b05dd71488634bfb8",
"branch_name": "refs/heads/master",
"committer_date": 1570885633000,
"content_id": "9608ecaa14c49c16f377ddb57f9770bc72de128b",
"detected_licenses": [
"MIT"
],
"directory_id": "ff955556c7b1bf6ba96c66da218b4c6d20bebe31",
"extension": "py",
"fi... | 3.96875 | stackv2 | '''Finite State Machine nad Rule'''
class Rule:
"""Rule implementation"""
def __init__(self, from_state: int, to_state: int, condition, action):
# State in which this rule applies
self.from_state = from_state
# State to which this rule sends the state machine
self.to_state = to... | 103 | 27.03 | 83 | 14 | 636 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8a1e7ca9f7b97d96_27718492", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
102
] | [
null
] | [
43
] | [
69
] | |
2024-11-18T20:30:01.306379+00:00 | 1,628,346,675,000 | 58a8b51764cd72ddedfed36e73e623016183cb89 | 3 | {
"blob_id": "58a8b51764cd72ddedfed36e73e623016183cb89",
"branch_name": "refs/heads/main",
"committer_date": 1628346675000,
"content_id": "b77868f0db0ea018618c9c85c01028e5c3f7e955",
"detected_licenses": [
"MIT"
],
"directory_id": "5c52e64424a57b1ddf8b3d09dc98ada658739e58",
"extension": "py",
"file... | 3.46875 | stackv2 | #!/usr/bin/env python
"""
2a. Using the Python requests library, perform an HTTP GET on the base URL of the NetBox server
(https://netbox.lasthop.io/api/). Ensure that you are not verifying the SSL certificate.
Print the HTTP status code, the response text, the JSON response, and the HTTP response headers.
These it... | 46 | 25.96 | 106 | 9 | 302 | python | [{"finding_id": "codeql_py/request-without-cert-validation_db58d68a19cde147_bb43a01f", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
26
] | [
null
] | [
16
] | [
47
] | |
2024-11-18T20:51:20.071611+00:00 | 1,690,553,201,000 | 1fb8dea6c83228fd3b47cc09f755a7f2d6320c11 | 2 | {
"blob_id": "1fb8dea6c83228fd3b47cc09f755a7f2d6320c11",
"branch_name": "refs/heads/master",
"committer_date": 1690553201000,
"content_id": "5a93f0d7f9721c148753b2cb1201ca9933ae2779",
"detected_licenses": [
"MIT"
],
"directory_id": "c7644a122dfdfd4522aa4e678dbae0a78c3b50ed",
"extension": "py",
"fi... | 2.359375 | stackv2 | import logging
import json
from urllib.parse import parse_qs
#from urllib3.response import HTTPResponse
import os
from twilio_app.call import call_handler
from twilio_app.sms import message_handler
from twilio_app.fax import fax_handler
twilio_account_sid = os.environ["AccountSid"]
twilio_phone_number = os.environ["Ph... | 148 | 40.29 | 130 | 15 | 1,309 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c8cf5705f680c5b1_86012769", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text."
] | [
125
] | [
128
] | [
21
] | [
14
] | |
2024-11-18T19:07:07.373527+00:00 | 1,633,276,052,000 | 8a402f79469f9b66c1784683cdc5b44e10f58fc9 | 2 | {
"blob_id": "8a402f79469f9b66c1784683cdc5b44e10f58fc9",
"branch_name": "refs/heads/master",
"committer_date": 1633276052000,
"content_id": "60c7e4cf6e223f489462f73e1c817dcfe5d0eb27",
"detected_licenses": [
"MIT"
],
"directory_id": "98cf090b15e8b7100c466d80b0c485d40711a4de",
"extension": "py",
"fi... | 2.390625 | stackv2 | import boto3
import config
import yaml
import os
import sys
import logging
import hashlib
import json
logger = logging.getLogger('certman')
def create_aws_client(service):
aws_client = boto3.client(service, aws_access_key_id=config.c['aws_access_key'], aws_secret_access_key=config.c['aws_secret_key'])
return... | 107 | 42.04 | 146 | 19 | 907 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d325cb60036880bb_275394bb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (certificate)](1) is used in a hashing algorithm (MD5) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (certificate)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
31
] | [
null
] | [
37
] | [
57
] | |
2024-11-18T19:07:25.120818+00:00 | 1,549,034,435,000 | ade8b0f369ebe7437041b1c770bb29e34db950b6 | 3 | {
"blob_id": "ade8b0f369ebe7437041b1c770bb29e34db950b6",
"branch_name": "refs/heads/master",
"committer_date": 1549034435000,
"content_id": "dd7ac47a65021d8478bae0c7a3c35bbf29eb58ee",
"detected_licenses": [
"MIT"
],
"directory_id": "e62e7ba552486e66685b2a84f983eadc7aa0d37c",
"extension": "py",
"fi... | 2.53125 | stackv2 | from distutils.dir_util import copy_tree
from glob import glob
from jinja2 import Template
import janus
import mlflow
import os
def to_camel(s):
return ''.join(x.capitalize() or '_' for x in s.split())
def create_new_experiment(s: str):
exps = sorted(glob('../experiments/*'))
if len(exps) == 0:
... | 37 | 27.57 | 106 | 19 | 300 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_6d556dad91e59d8f_86e3ec6a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
25
] | [
null
] | [
9
] | [
34
] | |
2024-11-18T19:07:49.287463+00:00 | 1,535,115,115,000 | 9556e3db4513c02b911be7ba1bf20912dc249c13 | 2 | {
"blob_id": "9556e3db4513c02b911be7ba1bf20912dc249c13",
"branch_name": "refs/heads/master",
"committer_date": 1535115115000,
"content_id": "f72aed9d327e72295b43763c2797eac876625233",
"detected_licenses": [
"MIT"
],
"directory_id": "11d3f0fcf4a968a6b612f2b85d242cbbbabc7e07",
"extension": "py",
"fi... | 2.3125 | stackv2 | import re
import logging
from aleph import settings
from aleph.analyze.analyzer import EntityAnalyzer
from aleph.model import DocumentTag
log = logging.getLogger(__name__)
class RegexAnalyzer(EntityAnalyzer):
def extract_match(self, document, match):
return match.group(0)
def extract(self, collect... | 62 | 26.71 | 102 | 16 | 519 | python | [{"finding_id": "codeql_py/overly-large-range_6aa1cc4b39e709ea_1a2b804e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-f\\].", "remediation": "", "lo... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-1333",
"CWE-1333"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-f\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-f\\].",
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '0:'.",
"This part of the regu... | [
46,
46,
46,
46
] | [
null,
null,
null,
null
] | [
69,
83,
68,
78
] | [
72,
86,
78,
80
] | |
2024-11-18T19:08:00.579973+00:00 | 1,622,819,357,000 | 7d11b9a2d85b67b047ea7c8109fdee92c27729f6 | 5 | {
"blob_id": "7d11b9a2d85b67b047ea7c8109fdee92c27729f6",
"branch_name": "refs/heads/main",
"committer_date": 1622819357000,
"content_id": "6f4e1812baf65f1c846c7214d9ac8cfe71bfc869",
"detected_licenses": [
"MIT"
],
"directory_id": "00ccb576a4e631382a2a2d9d308048d52f18b91f",
"extension": "py",
"file... | 5.25 | stackv2 | #Hundredth Birthday Year:
#For this execrcise I had to create a program that asks the user to enter their name and their age.
#Print out a message addressed to them that tells them the year that they will turn 100 years old.
#I imported date object from the python datetime library.
#Used the built-in python method "... | 24 | 55.29 | 139 | 9 | 338 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eb43e7fa8a2028e5_45534890", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
24
] | [
null
] | [
7
] | [
102
] | |
2024-11-18T19:08:01.284924+00:00 | 1,612,924,185,000 | b8a6963f04361ee311be3ac4ccae313968428947 | 3 | {
"blob_id": "b8a6963f04361ee311be3ac4ccae313968428947",
"branch_name": "refs/heads/master",
"committer_date": 1612924185000,
"content_id": "6e39a61d55c031cbf7d59fe105cf22cd6d6503ae",
"detected_licenses": [
"MIT"
],
"directory_id": "77f30500024d989db874fbc219af973841b950ae",
"extension": "py",
"fi... | 2.546875 | stackv2 | #!/usr/bin/env python3
import click
import yaml
from jinja2 import Environment, FileSystemLoader
@click.command()
@click.option('-v', '--varsfile', type=click.File('r'), multiple=True,
help='vars file path for jinja2')
@click.argument('template', type=click.Path(exists=True))
def cmd(template, varsfile... | 28 | 21.07 | 70 | 14 | 144 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_0fd1f9e11b1a1999_64e79308", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
null
] | [
11
] | [
70
] | |
2024-11-18T19:18:34.603193+00:00 | 1,616,087,824,000 | 83305249aea81bffb7e52820f573b287e2de4267 | 3 | {
"blob_id": "83305249aea81bffb7e52820f573b287e2de4267",
"branch_name": "refs/heads/master",
"committer_date": 1616087824000,
"content_id": "e0058d76eb0792011778038a14c4a059d682b0d8",
"detected_licenses": [
"MIT"
],
"directory_id": "722b0d6f4610640062e061e679e01a66ece8e81b",
"extension": "py",
"fi... | 3.234375 | stackv2 | import requests
import json
import time
class GooglePlaces(object):
def __init__(self, apiKey):
super(GooglePlaces, self).__init__()
self.apiKey = apiKey
# Text search URL
# url = "https://maps.googleapis.com/maps/api/place/textsearch/json?"
# Nearby search URL Example
# https://... | 109 | 34.22 | 131 | 13 | 860 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eede86be30995566_8f90ee04", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
96
] | [
null
] | [
31
] | [
43
] | |
2024-11-18T19:18:45.477652+00:00 | 1,600,587,360,000 | bee40ae18bf023ab041c06505c272c76fa0d7d63 | 4 | {
"blob_id": "bee40ae18bf023ab041c06505c272c76fa0d7d63",
"branch_name": "refs/heads/master",
"committer_date": 1600587360000,
"content_id": "c624ad655d0ad4f6966d2bbedc530a9212c840fb",
"detected_licenses": [
"MIT"
],
"directory_id": "6175a78a5c4b4320dab30bc5de21dcc8de474756",
"extension": "py",
"fi... | 3.765625 | stackv2 | def shout(fn):
def wrapper(*args, **kwargs):
return fn(*args, **kwargs).upper()
return wrapper
@shout
def greet(name):
return f"Hi, I'm {name}"
@shout
def order(name, dish):
return f"Hi! I'm {name} and I would like to order {dish}."
@shout
def user(name, address, phone, gender):
return... | 24 | 18.88 | 62 | 12 | 153 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_af71d5aba089f358_670fb1cb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
24
] | [
null
] | [
7
] | [
49
] | |
2024-11-18T19:29:45.813294+00:00 | 1,553,620,184,000 | 0894fadd8b951f0c8f8bd8f68ca73b2f991d4d1c | 3 | {
"blob_id": "0894fadd8b951f0c8f8bd8f68ca73b2f991d4d1c",
"branch_name": "refs/heads/master",
"committer_date": 1553620184000,
"content_id": "494cc47e9e3bba0e16b4b04a71b66c450af1b979",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "f087bf63027a5d760a0eec4c671e7f571e72fbc8",
"extension": "p... | 2.953125 | stackv2 | import time
import sys
from Hasher import md5_hasher, sha_1_hasher, sha_224_hasher, sha_256_hasher, sha_384_hasher, sha_512_hasher
from AdditionalComponents import spacereplace
from ReportCreate import createcrackingreport
def dictionary_attack(hash, dict_location, algorithm, output, start_time):
print("\tStartin... | 47 | 33.57 | 122 | 15 | 425 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6f161f4daf2f3aa5_89dae76f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
45
] | [
null
] | [
73
] | [
81
] | |
2024-11-18T19:44:29.474119+00:00 | 1,479,168,861,000 | d08b99bf74d57241f896bbb85f1e4a9cdb7710e0 | 2 | {
"blob_id": "d08b99bf74d57241f896bbb85f1e4a9cdb7710e0",
"branch_name": "refs/heads/master",
"committer_date": 1479168861000,
"content_id": "589843ea2b58ce5179576f770dbd1da373aefd63",
"detected_licenses": [
"MIT"
],
"directory_id": "8593ffabd126b0d06e9d2dc6094c60fb1fb9bf9b",
"extension": "py",
"fi... | 2.359375 | stackv2 | #! /usr/bin/env python
import boto3
import sys
import jinja2
if len(sys.argv) < 4:
print "usage: python render-manifest.py stack-id us-west-1 ./file"
exit(1)
stack_id = sys.argv[1]
region = sys.argv[2]
file_source = sys.argv[3]
client = boto3.client('ec2', region_name=region)
reservations = client.describ... | 31 | 23.87 | 96 | 13 | 193 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_989d30dcecc75b17_2c670c64", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
30
] | [
null
] | [
11
] | [
36
] | |
2024-11-18T19:57:58.582642+00:00 | 1,510,729,801,000 | cc224b765a3cb96ff187b206a7fd3523fb6c29bb | 3 | {
"blob_id": "cc224b765a3cb96ff187b206a7fd3523fb6c29bb",
"branch_name": "refs/heads/master",
"committer_date": 1510729801000,
"content_id": "0fe0c2227a511963f9834697f29662f3abad1162",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "58807951d4f5cec144be3c0893b4f73300227996",
"extension": "py"... | 2.5625 | stackv2 | """
Libraries for making archives.
"""
from __future__ import print_function
__author__ = 'jlevy'
import sys
import os
import tarfile
import tempfile
import itertools
import logging as log
from collections import namedtuple
from functools32 import lru_cache # functools32 pip
# The subprocess module has known thre... | 160 | 32.19 | 112 | 20 | 1,395 | python | [{"finding_id": "codeql_py/insecure-temporary-file_d0abaa9679cdd8aa_54184ea4", "tool_name": "codeql", "rule_id": "py/insecure-temporary-file", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated function tempfile.mktemp may be insecure.", "remediation": "", "location": ... | 2 | true | [
"CWE-377",
"CWE-022"
] | [
"py/insecure-temporary-file",
"py/tarslip"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Call to deprecated function tempfile.mktemp may be insecure.",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
132,
91
] | [
null,
null
] | [
58,
5
] | [
75,
7
] | |
2024-11-18T19:58:02.912204+00:00 | 1,609,642,871,000 | fbef5e79fa208836275795141db90a63a20577d1 | 3 | {
"blob_id": "fbef5e79fa208836275795141db90a63a20577d1",
"branch_name": "refs/heads/main",
"committer_date": 1609642871000,
"content_id": "b99640751c4e27a2b6e0ed151b7b35a2bf3b8130",
"detected_licenses": [
"MIT"
],
"directory_id": "d024c97ea155bbe2a4060217f4aa2c6f98fc57ef",
"extension": "py",
"file... | 3.359375 | stackv2 |
# This is a server
import blowfish
import random
import ecdsa
class Server():
def __init__(self, ec):
"""
This function is a constructor that initializes
simulated variables username and hashed password.
"""
self.ec = ec
self.simulation_username = "dima"
s... | 106 | 35.9 | 108 | 13 | 861 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a0963c5bb14242af_077cef25", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
50
] | [
null
] | [
48
] | [
56
] | |
2024-11-18T19:58:13.090585+00:00 | 1,555,769,974,000 | cd6362c4d6337c067e7d5305752da089226bf636 | 2 | {
"blob_id": "cd6362c4d6337c067e7d5305752da089226bf636",
"branch_name": "refs/heads/master",
"committer_date": 1555769974000,
"content_id": "57a1b64b0a0c5a7c8821351aa97e68a38e44bb7c",
"detected_licenses": [
"MIT"
],
"directory_id": "dcd4dd4024e7f0c9542a4d7620e83e07dbb9de2b",
"extension": "py",
"fi... | 2.46875 | stackv2 | """
Generate docs
"""
from jinja2 import Template
import subprocess
def generate(host, port, database):
# read config template
with open("bin/schemaspy-template.properties", "r") as inpfile:
template = Template(inpfile.read())
rendered_config = template.render(
host=host, port=po... | 22 | 30.68 | 84 | 13 | 159 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_ae93d4a3a9af8257_a7deec4b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12
] | [
null
] | [
20
] | [
44
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.