added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T00:40:24.141331+00:00 | 1,624,197,584,000 | 7cbd1f8331c37425e899f74eaefa861bee2ccb05 | 2 | {
"blob_id": "7cbd1f8331c37425e899f74eaefa861bee2ccb05",
"branch_name": "refs/heads/master",
"committer_date": 1624197584000,
"content_id": "24b3ae01076d80c41ac15233ace817dfc695795d",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "85b9e9c978a97ef6db97de67c40412069e9957b5",
"extension": "p... | 2.5 | stackv2 | from flask import Flask, request, render_template_string, render_template
app = Flask(__name__)
@app.route('/hello-template-injection')
def hello_ssti():
person = {'name':"world", 'secret':"UGhldmJoZj8gYWl2ZnZoei5wYnovcG5lcnJlZg=="}
if request.args.get('name'):
person['name'] = request.args.get('name')
template ... | 23 | 29.57 | 91 | 12 | 194 | python | [{"finding_id": "codeql_py/template-injection_d9adfacc3f5b96ff_ad90bc2d", "tool_name": "codeql", "rule_id": "py/template-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This template construction depends on a [user-provided value](1).", "remediation": "", "location": ... | 2 | true | [
"CWE-074",
"CWE-079"
] | [
"py/template-injection",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This template construction depends on a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
11,
11
] | [
null,
null
] | [
32,
9
] | [
40,
56
] | |
2024-11-19T01:06:05.806185+00:00 | 1,557,239,737,000 | 43b2c67301d397846d2d8cc29822c7c7d5be0e9b | 3 | {
"blob_id": "43b2c67301d397846d2d8cc29822c7c7d5be0e9b",
"branch_name": "refs/heads/master",
"committer_date": 1557239737000,
"content_id": "a04c5eeb89e68b299260432d77f732fd9f852d4e",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "74b9ddf9f9bef8b1e0a22a4727515b0885b22229",
"extension": "p... | 2.890625 | stackv2 | """
Contains all the serializers.
"""
from sys import exc_info
from tempfile import NamedTemporaryFile
from io import BytesIO
from flask import jsonify, send_file
from PIL.Image import open as image_opener
from screamshot import generate_bytes_img_wrap
from screamshot.errors import BadUrl, BadSelector
AUTHORIZED_W... | 156 | 35.01 | 100 | 17 | 1,184 | python | [{"finding_id": "codeql_py/stack-trace-exposure_446f292ef079906c_bd22dcde", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
156
] | [
null
] | [
24
] | [
47
] | |
2024-11-19T01:17:10.841732+00:00 | 1,626,053,915,000 | 89525e5e9f59fa448deaab3f9b997bb8f6b5d505 | 3 | {
"blob_id": "89525e5e9f59fa448deaab3f9b997bb8f6b5d505",
"branch_name": "refs/heads/main",
"committer_date": 1626053915000,
"content_id": "93fccf7c6847ef991b3033ccd30800628b0bdb79",
"detected_licenses": [
"MIT"
],
"directory_id": "aa4e2021276b13bdacbcb4a1f173c71911ade72d",
"extension": "py",
"file... | 3.09375 | stackv2 | import streamlit as st
import time
from apps.classifier import Classifier
from sklearn.preprocessing import LabelEncoder
def format_data(data):
en = LabelEncoder()
with st.empty():
st.info("⏳ Compiling data...")
temp = []
result = []
for item in data.values():
if(... | 113 | 30.97 | 119 | 17 | 795 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5442a0fd1d4052c8_42d8a49a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
23,
96
] | [
null,
null
] | [
15,
19
] | [
21,
23
] | |
2024-11-19T01:17:16.618557+00:00 | 1,613,761,586,000 | f8b4ffc6682875814362875f0911fecd5478cfb2 | 3 | {
"blob_id": "f8b4ffc6682875814362875f0911fecd5478cfb2",
"branch_name": "refs/heads/main",
"committer_date": 1613761586000,
"content_id": "eeaef1994d75f7ec5b712cacc882b1cfaa4816d3",
"detected_licenses": [
"Unlicense"
],
"directory_id": "25a5a2d08b05bf703b7c486ba36d4369f7310a9f",
"extension": "py",
... | 3.125 | stackv2 | from typing import Optional, List
import random
import click
LETTERS = 'abcdefghijklmnopqrstuvwxyz'
SPEC_CHARS = '~!@#$%^&*()_+;:?-=.<>'
def random_digit(exclude_similar=False):
if exclude_similar:
return str(random.randint(2, 9))
else:
return str(random.randint(0, 9))
def random_letter(ex... | 149 | 29.09 | 109 | 15 | 994 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e3e2066005ae37c7_610ddfe0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (p... | [
114,
138
] | [
null,
145
] | [
19,
15
] | [
68,
10
] | |
2024-11-19T01:17:26.415034+00:00 | 1,598,219,782,000 | 3d0f9c143661704963e7f35150a08e64bd3d342c | 2 | {
"blob_id": "3d0f9c143661704963e7f35150a08e64bd3d342c",
"branch_name": "refs/heads/master",
"committer_date": 1598219782000,
"content_id": "e9b9330ad232b071ed08083555bcc3d743c48590",
"detected_licenses": [
"MIT-0"
],
"directory_id": "3f132f3af3b89bdefea6bdeb8512b55895febb47",
"extension": "py",
"... | 2.34375 | stackv2 | # Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
# SPDX-License-Identifier: MIT-0
from diskcache import Cache
cache_location ="../db"
with Cache(cache_location) as cache:
cache[b'speed'] = 0
cache[b'prevspdrevcount'] = 0
cache[b'prevspdevttime'] = 0
cache[b'prevcadrevcount'] = 0
... | 28 | 35.89 | 87 | 12 | 300 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_70c3f762a660c8b5_44e37cd4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
23
] | [
null
] | [
11
] | [
64
] | |
2024-11-19T01:17:30.107155+00:00 | 1,606,919,474,000 | 63aba49daeda8f269be417bca30160be85a75c52 | 2 | {
"blob_id": "63aba49daeda8f269be417bca30160be85a75c52",
"branch_name": "refs/heads/master",
"committer_date": 1606921212000,
"content_id": "776ffcda71c396efc1e5d9673d2e43169a3bf966",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3ad732b23fdbaeb7bec1f33f6787c010508811da",
"extension": "py"... | 2.484375 | stackv2 | import logging
from config import Config
from flask import Flask, request
from tasks import add_to_blacklist
app = Flask(__name__)
# Get config
config = Config()
config.load()
# Disable Flask logs
log = logging.getLogger('werkzeug')
log.disabled = True
app.logger.disabled = True
@app.route('/')
@app.route('/api/',... | 48 | 19.62 | 82 | 12 | 216 | python | [{"finding_id": "codeql_py/log-injection_38796a7c729503be_f91b7035", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
23
] | [
null
] | [
18
] | [
82
] | |
2024-11-19T01:17:55.541891+00:00 | 1,693,010,949,000 | a20fcb0b0bfb61661e42d108f0f45eb57114e384 | 3 | {
"blob_id": "a20fcb0b0bfb61661e42d108f0f45eb57114e384",
"branch_name": "refs/heads/master",
"committer_date": 1693010949000,
"content_id": "9f296e1f179832c0ffe5f138553c0cc6d4a6984d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "38da42ce358b623da629dd087d847db0456528de",
"extension": "py"... | 2.765625 | stackv2 | #! /usr/bin/python3
#
# Copyright (c) 2017 Intel Corporation
#
# SPDX-License-Identifier: Apache-2.0
#
import hashlib
import logging
import ttbl
class authenticator_localdb_c(ttbl.authenticator_c):
"""Use a simple DB to authenticate users
**THIS MODULE IS DEPRECATED:** use :class:`ttbl.auth_userdb.driver`.
... | 105 | 32.09 | 78 | 18 | 785 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_9474c3cf2d9f4424_fe085cab", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
95
] | [
null
] | [
42
] | [
66
] | |
2024-11-19T00:03:19.367490+00:00 | 1,625,427,483,000 | 497ca40ea0b09e0383768594fc4e4d9995847541 | 3 | {
"blob_id": "497ca40ea0b09e0383768594fc4e4d9995847541",
"branch_name": "refs/heads/main",
"committer_date": 1625427483000,
"content_id": "3d70746b4daf4aeeccb6f146290ddddd1556d21a",
"detected_licenses": [
"MIT"
],
"directory_id": "5348045d91a5f00010c13f8cdd23af1df446317c",
"extension": "py",
"file... | 2.625 | stackv2 | import os
from flask import flash, request, redirect
from flask_jwt_extended import jwt_required, get_jwt_identity
from flask_restful import Resource, reqparse
from werkzeug.utils import secure_filename
import pandas as pd
from resource.models import CompanyModel, CompanyDailyModel, CompanyHourlyModel
from datetime im... | 166 | 42.7 | 126 | 24 | 1,416 | python | [{"finding_id": "codeql_py/url-redirection_442868cfabca1d94_62663f94", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
78
] | [
null
] | [
33
] | [
44
] | |
2024-11-19T01:03:40.931969+00:00 | 1,515,340,032,000 | 0ca1d8eeb6529d44c81db8fbaeedc2b8ff75ff3f | 3 | {
"blob_id": "0ca1d8eeb6529d44c81db8fbaeedc2b8ff75ff3f",
"branch_name": "refs/heads/master",
"committer_date": 1515340032000,
"content_id": "1d080b5e461dd9bc381369b07350863a6bd704e6",
"detected_licenses": [
"MIT"
],
"directory_id": "2d2a0e37c2904fdefe4a9607d0abef3f0bea10d9",
"extension": "py",
"fi... | 2.984375 | stackv2 | """
Logging support.
Sets up logging environment for use by ``gluetool`` and modules. Based
on standard library's :py:mod:`logging` module, augmented a bit to
support features loke colorized messages and stackable context information.
Example usage:
.. code-block:: python
# initialize logger as soon as possible
... | 479 | 34.19 | 116 | 19 | 3,766 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_bbfa3e4a8a0329cb_01dd24d6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
306
] | [
null
] | [
16
] | [
52
] | |
2024-11-19T01:15:20.790769+00:00 | 1,646,446,094,000 | 0dfb4b8153406386b153b4ae4442ec70329aa319 | 2 | {
"blob_id": "0dfb4b8153406386b153b4ae4442ec70329aa319",
"branch_name": "refs/heads/master",
"committer_date": 1646446094000,
"content_id": "da75f10d546b41fb486fcd1f49a093be78622283",
"detected_licenses": [
"MIT"
],
"directory_id": "7b5526cf675ae37ec60405b539bd82cf80109cac",
"extension": "py",
"fi... | 2.375 | stackv2 | #! /usr/bin/env python
# Standard library imports.
import sys, os, re, cgi, socket, errno
import BaseHTTPServer
import shutil
from SocketServer import ThreadingMixIn
from BaseHTTPServer import BaseHTTPRequestHandler
from urllib import quote, unquote
from posixpath import normpath
from cStringIO import StringIO
from m... | 262 | 36.32 | 106 | 17 | 2,278 | python | [{"finding_id": "codeql_py/polynomial-redos_e98e50088b7ab765_d419005f", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings startin... | 4 | true | [
"CWE-1333",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/polynomial-redos",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings starting with 'Content-Disposition' and with many repetitions of 'Content-Disposition'.\nThis [regular expression](1) that depends on a [user-provided value](3) may run slow on strings starting with 'Content-Disposition... | [
68,
73,
74,
80
] | [
null,
null,
null,
null
] | [
79,
30,
23,
24
] | [
83,
32,
25,
26
] | |
2024-11-19T00:43:41.490255+00:00 | 1,684,415,466,000 | e0567488197dc64a86c46488da942c86d2a80695 | 3 | {
"blob_id": "e0567488197dc64a86c46488da942c86d2a80695",
"branch_name": "refs/heads/master",
"committer_date": 1684415466000,
"content_id": "a036afe2e3820155992045c968719d85042bc7d4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9af4d1ffe568ad8994451c5a19d0ce7be9871763",
"extension": "py"... | 2.515625 | stackv2 | import json
import os
from dotenv import load_dotenv
from .config import Config
def get_config_file_path(key):
for env in os.environ.get('CONFIG_PATH', '').split(os.pathsep):
path = os.path.join(env, key)
if os.path.exists(path):
return path
def get_merged_config(key, default=None, ... | 163 | 30.78 | 92 | 19 | 1,110 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_169f6be18f35cad2_b0f4a622", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec... | [
157
] | [
null
] | [
28
] | [
51
] | |
2024-11-19T01:32:03.119796+00:00 | 1,666,652,028,000 | 514e99d5b49a61f5ce4903e43cc9b1239e4c7cfe | 3 | {
"blob_id": "514e99d5b49a61f5ce4903e43cc9b1239e4c7cfe",
"branch_name": "refs/heads/master",
"committer_date": 1666652028000,
"content_id": "4d1a93f88f656bb283b62a48b5d7e7c893e8bab8",
"detected_licenses": [
"MIT"
],
"directory_id": "4935f8f8c75165cc0191d4bdb261872f38115789",
"extension": "py",
"fi... | 2.5625 | stackv2 | #!/usr/bin/env python
"""
DBMooringSummary.py
Input: MooringID (eg. 14bsm2a or 14BSM-2A)
Output: text file with...
mooring charactersistcs
instruments deployed, depths, serial numbers
History:
=======
2021-3-25: add yaml output for moorings
2020-12-2: python3 only
Compatibility:
==============
python ... | 258 | 40.7 | 152 | 15 | 2,725 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a3331c077f933492_47173fd8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
105,
106,
198,
199
] | [
null,
null,
null,
null
] | [
11,
11,
11,
11
] | [
84,
86,
82,
84
] | |
2024-11-19T01:32:05.678058+00:00 | 1,575,402,931,000 | 494bd3a07c9873f2f6120a4ddac454fc64ca238c | 3 | {
"blob_id": "494bd3a07c9873f2f6120a4ddac454fc64ca238c",
"branch_name": "refs/heads/master",
"committer_date": 1575402931000,
"content_id": "e1fb71efad0c28e947c0d30e76be5b1a4b809cab",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "77776dc5c02d97dc76fc4461524dca1475ee9970",
"extension": "py"... | 3.046875 | stackv2 | #!/usr/bin/env python
"""
First, we need to import the appropriate libraries and create a login session with the vCenter server
"""
import requests
import json
# Here we are disabling the warning about Insecure Requests as we are using a self-signed certificate so we will be disabling the SSL Verification
impor... | 111 | 34.54 | 146 | 11 | 818 | python | [{"finding_id": "codeql_py/request-without-cert-validation_1ea61ebc112328fd_c9c55e8b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2).",
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
39,
100
] | [
44,
105
] | [
16,
16
] | [
59,
59
] | |
2024-11-19T01:32:16.396607+00:00 | 1,421,770,585,000 | 3853a878e81b03dc0125474b63e91e62acd10508 | 2 | {
"blob_id": "3853a878e81b03dc0125474b63e91e62acd10508",
"branch_name": "refs/heads/master",
"committer_date": 1421770585000,
"content_id": "22c466b0312f7f899ae23799eb24c8ab993f5ddc",
"detected_licenses": [
"MIT"
],
"directory_id": "bce31cc1f6d64a9a564d6466ba1a603bf6895a6b",
"extension": "py",
"fi... | 2.484375 | stackv2 | from time import time
import os
import tornado.ioloop
import tornado.web
import json
class Tree:
def __init__(self, id, data):
self.id = id
self.p = data[0]
self.d = data[1]
self.w = data[2]
def __repr__(self):
return str(self.id)
#return "(p=%s, d=%s, w=%s)" % (self.p, self.d, self.w)
def countTWT(tre... | 139 | 19.96 | 124 | 18 | 936 | python | [{"finding_id": "codeql_py/path-injection_68e6b081c038e185_de634b47", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
99
] | [
null
] | [
60
] | [
86
] | |
2024-11-19T01:43:47.927772+00:00 | 1,543,922,303,000 | 18bb65d05104813fb271801e1f38aecfb5e77282 | 4 | {
"blob_id": "18bb65d05104813fb271801e1f38aecfb5e77282",
"branch_name": "refs/heads/master",
"committer_date": 1543922303000,
"content_id": "cde5c831d2ef5b2283a0baedd5c48ed9f6c7b357",
"detected_licenses": [
"MIT"
],
"directory_id": "ef2dbd468280dc8f755355b4a2279e3884a83093",
"extension": "py",
"fi... | 3.9375 | stackv2 | def is_it_included(string, type_of_data):
for i in string:
if i.lower() in type_of_data:
return True
return False
def password_validator(password):
numbers = {"0", "1", "2", "3", "4", "5", "6", "7", "8", "9"}
alphabets = {
"a",
"b",
"c",
"d",
... | 101 | 16.1 | 85 | 13 | 452 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_707c56ed6fd80cf1_8210c3af", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
98
] | [
null
] | [
11
] | [
18
] | |
2024-11-19T01:44:08.514258+00:00 | 1,571,482,655,000 | 3890cba832589db5e72b4133ef3e4ae2df28a8fc | 3 | {
"blob_id": "3890cba832589db5e72b4133ef3e4ae2df28a8fc",
"branch_name": "refs/heads/master",
"committer_date": 1571482655000,
"content_id": "f24d068c3d31899827dc1fc872df253ffd134c7c",
"detected_licenses": [
"MIT"
],
"directory_id": "0c8012f62f9226531c2a179e2ac204ce905ddeb7",
"extension": "py",
"fi... | 2.921875 | stackv2 |
from flask import Flask, render_template, request
import requests
# import json to load JSON data to a python dictionary
# urllib.request to make a request to api
import urllib.request
app= Flask(__name__)
@app.route('/', methods =['POST', 'GET'])
def weather():
if request.method == 'POST':
... | 48 | 28.33 | 124 | 15 | 368 | python | [{"finding_id": "codeql_py/flask-debug_6f57ab33ba7e82ae_1d86d0d7", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
46,
28
] | [
null,
null
] | [
null,
16
] | [
22,
36
] | |
2024-11-19T01:44:11.823967+00:00 | 1,636,272,337,000 | 67c7ee7fc9f22acd3640062ffa61941acd0f64c9 | 2 | {
"blob_id": "67c7ee7fc9f22acd3640062ffa61941acd0f64c9",
"branch_name": "refs/heads/master",
"committer_date": 1636272337000,
"content_id": "073d6bc788869a905186404713da1b2cb92a0586",
"detected_licenses": [
"MIT"
],
"directory_id": "1c5c12c79d57b7288db2199c93e9738c3681307a",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python3.7
import argparse
import logging
import pyperclip
import getpass
from crd.storage import MODELS, NAME_TO_MODEL, init_storage
from crd.config import ConfigurationManager
def configure_logger(logger_name=None, level='INFO'):
# get logger
logger = logging.getLogger(logger_name)
# c... | 184 | 29.82 | 135 | 18 | 1,373 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e8f5489b401dd8cd_7042de72", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
89
] | [
null
] | [
12
] | [
32
] | |
2024-11-19T00:59:31.835426+00:00 | 1,608,191,466,000 | 35d940991fca4722d81ef2298c97af40ea82164c | 3 | {
"blob_id": "35d940991fca4722d81ef2298c97af40ea82164c",
"branch_name": "refs/heads/master",
"committer_date": 1608191466000,
"content_id": "c94a4c4dde915c2aba6e6f621257e80eacca1aec",
"detected_licenses": [
"MIT"
],
"directory_id": "4006be0f212f35399d217dd41defb8b56d90e38f",
"extension": "py",
"fi... | 2.890625 | stackv2 | #!/usr/bin/env python
"""
Generate the contents (documents, code)
"""
import os
import json
from jinja2 import Template
#
# Constants
#
_TEMPLATES_DIR = "template"
_MAIN_TEMPLATE_FILE = "main.html"
_INDEX_FILE = "index.html"
_EXPERIMENTS_TEMPLATE_FILE = "experiment.html"
_EXPERIMENTS_DIR = "experiments"
_EXPERIMEN... | 124 | 27.21 | 99 | 14 | 765 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8f977abfc269f8da_afed37ad", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
60
] | [
null
] | [
20
] | [
41
] | |
2024-11-19T01:00:08.483293+00:00 | 1,582,257,859,000 | 3e952dccc615975e7b296631bbdd68e72d0c1ba3 | 2 | {
"blob_id": "3e952dccc615975e7b296631bbdd68e72d0c1ba3",
"branch_name": "refs/heads/master",
"committer_date": 1582257859000,
"content_id": "1bac7dd63339bbb1ab9ec984fbf8fd8110fc0506",
"detected_licenses": [
"MIT"
],
"directory_id": "f263ef09bd67d2323d44c96efc44e5cda60b2ace",
"extension": "py",
"fi... | 2.4375 | stackv2 | import os
import pathlib
import random
import subprocess
import sys
import click
import pinboard
def get_config_path():
configdir = pathlib.Path(click.get_app_dir('randpin'))
configdir.mkdir(parents=True, exist_ok=True)
return configdir / 'apikey.txt'
@click.command()
@click.option('--save/--no-save',... | 66 | 20.32 | 88 | 15 | 342 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8f9be0809c9bd5a6_1438ff89", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw... | [
48
] | [
null
] | [
19
] | [
25
] | |
2024-11-19T01:00:12.447855+00:00 | 1,520,085,680,000 | d53d1ca20fe9ebdcc86698e73e9a08cecf3e3f06 | 3 | {
"blob_id": "d53d1ca20fe9ebdcc86698e73e9a08cecf3e3f06",
"branch_name": "refs/heads/master",
"committer_date": 1520085680000,
"content_id": "75cb1bdea724c5a66bc73def0b9bf3f5dc6698d2",
"detected_licenses": [
"MIT"
],
"directory_id": "fd6f1b969cd99e1850ca2a88ee8b67a6e0661d9c",
"extension": "py",
"fi... | 2.6875 | stackv2 | from django.shortcuts import render
from django.http import JsonResponse
from django.views.generic import View
from goods.models import GoodsSKU
from django_redis import get_redis_connection
import json
# Create your views here.
class CartInfoView(View):
"""获取购物车数据"""
def get(self,request):
"""提供购物车页... | 134 | 28.99 | 92 | 17 | 1,110 | python | [{"finding_id": "codeql_py/cookie-injection_8cb368ecd1b8151a_b0cbcfcc", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-020"
] | [
"py/cookie-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1)."
] | [
132
] | [
null
] | [
41
] | [
49
] | |
2024-11-19T01:11:50.844077+00:00 | 1,556,055,155,000 | f0de6ade5d2726d6e3389ccc7bc103e19827bfde | 2 | {
"blob_id": "f0de6ade5d2726d6e3389ccc7bc103e19827bfde",
"branch_name": "refs/heads/master",
"committer_date": 1556055155000,
"content_id": "99dbb981778c26f6c333f5cdfaece7ab48a2be3f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "643ecf15975376427bc85b10c379691f06bd46ec",
"extension": "py"... | 2.359375 | stackv2 | import json
import logging
from functools import wraps
import sqlalchemy.orm.exc
from tornado.web import HTTPError, RequestHandler
from tornado.websocket import WebSocketClosedError, WebSocketHandler
from .models import Session, Story, Task
logger = logging.getLogger(__file__)
class SocketHandler(WebSocketHandler)... | 188 | 27.91 | 89 | 17 | 1,188 | python | [{"finding_id": "codeql_py/log-injection_ef9b475681414518_65f8fbbd", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).\nThis log entry depends on a [user-provided value](3)."
] | [
68
] | [
null
] | [
55
] | [
72
] | |
2024-11-19T01:11:57.250872+00:00 | 1,617,533,606,000 | c85c59efdea37c60b4b0f172f14cf7d136a95bed | 3 | {
"blob_id": "c85c59efdea37c60b4b0f172f14cf7d136a95bed",
"branch_name": "refs/heads/master",
"committer_date": 1617533606000,
"content_id": "fc73ab9511b81d4182aa7a238001beebf73ef211",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "48ec3e51d2e5243a1d3c174837e5361a47e9253f",
"extension": "p... | 2.59375 | stackv2 |
import os
import logging
import functools
import configparser
from solaredge_interface import __env_api_key__ as ENV_API_KEY
from solaredge_interface import __env_site_id__ as ENV_SITE_ID
from solaredge_interface import __env_output_format__ as ENV_OUTPUT_FORMAT
from solaredge_interface import __config_file_user__ as... | 109 | 33.83 | 114 | 20 | 723 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_15d27fc311dcaaeb_8bd3bc67", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
49
] | [
null
] | [
30
] | [
98
] | |
2024-11-19T01:33:46.426105+00:00 | 1,467,990,754,000 | d8d75ea3a5793a73584877eb02fb67e83bcd204a | 3 | {
"blob_id": "d8d75ea3a5793a73584877eb02fb67e83bcd204a",
"branch_name": "refs/heads/master",
"committer_date": 1467990754000,
"content_id": "ef20ceb818b85ce6435e368652afe3a94184f77c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "46d8618bffd00edc5e49e2a4eed59acb5ee5f159",
"extension": "py"... | 2.828125 | stackv2 | #!/usr/bin/env python3
import sys
import os
from jinja2 import Template
DIR = os.path.dirname(os.path.join(os.getcwd(), sys.argv[0]))
ROOT_DIR = os.path.dirname(DIR)
TEMPLATE = """<span class="NameHighlights" onMouseOver="javascript:this.className='NameHighlightsHover'" """ +\
"""onMouseOut="javascript:thi... | 39 | 30.64 | 113 | 15 | 295 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8d0b1b70766d86e2_b7f3fbe0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
27
] | [
null
] | [
16
] | [
87
] | |
2024-11-19T01:56:45.690227+00:00 | 1,525,296,015,000 | 49744c8fc2c18ce2d9b266b52777eb07cfee3d3b | 3 | {
"blob_id": "49744c8fc2c18ce2d9b266b52777eb07cfee3d3b",
"branch_name": "refs/heads/master",
"committer_date": 1525296015000,
"content_id": "4f4b3a0595c8f0f9df3ac7c7148704dc5b80e381",
"detected_licenses": [
"MIT"
],
"directory_id": "a20c843e320b38c55464c3370d2aab5c434d28ab",
"extension": "py",
"fi... | 2.625 | stackv2 | # swampchurn
# by slipperyslope
#
# TODO:
# - Chat monitoring
# - Connect monitoring
# - Keyword detection
#
import re
import datetime
import os.path
import sys
from urllib.parse import unquote
from operator import itemgetter
# log file name (optional)
rawLogs = ""
# take input of filename, return list of all log en... | 136 | 32.33 | 149 | 18 | 1,212 | python | [{"finding_id": "codeql_py/redos_d8a5908f833082c2_eba2f21e", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\\[' and containing many repetiti... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '\\[' and containing many repetitions of '99'."
] | [
25
] | [
null
] | [
38
] | [
42
] | |
2024-11-19T01:56:51.756541+00:00 | 1,539,178,321,000 | c28cfbae3447dc9b9c4ec57d2b9e3e6d317e9178 | 2 | {
"blob_id": "c28cfbae3447dc9b9c4ec57d2b9e3e6d317e9178",
"branch_name": "refs/heads/master",
"committer_date": 1539178321000,
"content_id": "04563eed51bfcb963ff764db756944feee87cd9d",
"detected_licenses": [
"MIT"
],
"directory_id": "bb6ba22c1eb5cf9e25af1619c37be8146216ed65",
"extension": "py",
"fi... | 2.34375 | stackv2 | from urllib.parse import unquote, quote
import uuid
import hashlib
import logging
from sanic import Sanic
from sanic.response import json
from sanic_jwt.decorators import protected
from sanic_jwt import exceptions
from sanic_jwt import initialize
SALT = b'q9890as89dfh'
PAGE_SIZE = 10
MAX_PAGES = 100
logger = None
ap... | 253 | 28.31 | 78 | 18 | 1,644 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_478a11bbe54e37f3_c0a5defb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
37
] | [
null
] | [
9
] | [
40
] | |
2024-11-19T02:45:20.260900+00:00 | 1,602,499,533,000 | 3e3d1aadb24f070c2842fc0085e166d631ae234f | 3 | {
"blob_id": "3e3d1aadb24f070c2842fc0085e166d631ae234f",
"branch_name": "refs/heads/master",
"committer_date": 1602499533000,
"content_id": "f1d1a415531755d1fb1fcfe2a90bb91309debc5d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f946d146d9b487ab1edeaad10bf6b3a17cd549f0",
"extension": "py"... | 2.65625 | stackv2 | """
SYNOPSIS:
Script to perform power control on device managed by OM Enterprise
DESCRIPTION:
This script exercises the OME REST API to perform power control operations.
For authentication X-Auth is used over Basic Authentication.
Note that the credentials entered are not stored to disk.
EXAMPLE:
python... | 279 | 37.55 | 85 | 19 | 2,505 | python | [{"finding_id": "codeql_py/request-without-cert-validation_a1ede061fe38b6a6_d0473fa4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 7 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
46,
144,
161,
177,
191,
212,
266
] | [
48,
null,
null,
179,
null,
null,
268
] | [
17,
14,
21,
22,
21,
20,
20
] | [
47,
66,
78,
48,
79,
68,
53
] | |
2024-11-19T02:45:26.172966+00:00 | 1,427,909,822,000 | 81b0daabb41c709d73458ba25dbd8d2686a85f44 | 2 | {
"blob_id": "81b0daabb41c709d73458ba25dbd8d2686a85f44",
"branch_name": "refs/heads/master",
"committer_date": 1427909822000,
"content_id": "68269629d22b2302a1a870199840096a9c97540c",
"detected_licenses": [
"MIT"
],
"directory_id": "9a4dcb467d452973ec462e41e7e354944c0e581e",
"extension": "py",
"fi... | 2.484375 | stackv2 |
import pymongo
import tornado
from tornado import web, ioloop, httpserver
from tornado.options import define, options
PORT = 8000
DB_CONFIG = {
'HOST':'localhost',
'PORT':27017,
'DB':'example',
'USERNAME':'',
'PASSWORD':''
}
define("port",default=PORT,help='tornado run at %s' % PORT,type=int)
class Applicati... | 58 | 22.67 | 68 | 15 | 374 | python | [{"finding_id": "codeql_py/reflective-xss_1269e9397ab09a5e_d429748c", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2)."
] | [
53
] | [
null
] | [
14
] | [
22
] | |
2024-11-19T02:45:27.343605+00:00 | 1,514,716,428,000 | f7bd668cf8946fe13da753ba25af55cbe8b103ba | 3 | {
"blob_id": "f7bd668cf8946fe13da753ba25af55cbe8b103ba",
"branch_name": "refs/heads/master",
"committer_date": 1514716428000,
"content_id": "8f627ec46b9ccccb2cc38e3e4fe5abda321d3a68",
"detected_licenses": [
"MIT"
],
"directory_id": "7c28640e152dad3843423d04c96a3a37015bd9ba",
"extension": "py",
"fi... | 2.546875 | stackv2 | # coding: utf-8
"""
OpenSSH client for stash.
ssh attempts to login with user provided password or looks for a valid key generated
buy ssh-keygen in ~/.ssh/
You can open an interactive shell by not passing a command. If a command is passed,
the single command is ran with output then ssh exits.
usage: ssh [-h] [--pass... | 303 | 32.78 | 99 | 19 | 2,286 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_d9b29c7ed24e9f78_e8986332", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
71
] | [
null
] | [
9
] | [
74
] | |
2024-11-19T02:45:45.982613+00:00 | 1,493,280,026,000 | a38ee49c4952a7ecafc4962d81aedd8f58d97d75 | 3 | {
"blob_id": "a38ee49c4952a7ecafc4962d81aedd8f58d97d75",
"branch_name": "refs/heads/master",
"committer_date": 1493280026000,
"content_id": "a1c923ae48330dd23535dbb61d0b599654095557",
"detected_licenses": [
"MIT"
],
"directory_id": "22651c96a57a53b37bf757be8f0fa8d1cf6cfdad",
"extension": "py",
"fi... | 2.765625 | stackv2 | #!/usr/bin/env python
import re
import base64
import argparse
import bcrypt
from hashlib import sha256
from Crypto.Cipher import AES
from lxml import etree
from enum import Enum
MAGIC = b'::::MAGIC::::'
OUTPUT_WIDTH = 80
DEBUG = False
class DecryptType(Enum):
unknown = 1
hudson_secret_key = 2
passwor... | 279 | 29.69 | 112 | 17 | 1,770 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4fe7b9022561c3e4_f1bcfff4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 3 | true | [
"CWE-312",
"CWE-327",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
276,
68,
162
] | [
null,
null,
null
] | [
15,
9,
9
] | [
31,
37,
21
] | |
2024-11-19T02:45:49.597421+00:00 | 1,532,361,887,000 | 5f97a42ef941c80e297ef4efa9112a672952e488 | 3 | {
"blob_id": "5f97a42ef941c80e297ef4efa9112a672952e488",
"branch_name": "refs/heads/master",
"committer_date": 1532361887000,
"content_id": "fd09289144e1f9604afc90ba09d6efc85eda7f96",
"detected_licenses": [
"MIT"
],
"directory_id": "7f7ef1f47cead0466ccdfe4655f61a7016e1a5e3",
"extension": "py",
"fi... | 2.546875 | stackv2 | import numpy as np
import os
import pickle
import re
import skimage.io
from mrcnn import config, utils
from os.path import join, isfile, exists
from sklearn.model_selection import train_test_split
__all__ = ['class_names', 'classes_to_index', 'index_to_classes', 'index_to_class_names', 'WADConfig', 'WADDataset']
##... | 323 | 34.41 | 116 | 21 | 2,573 | python | [{"finding_id": "codeql_py/overly-large-range_7eb819057c73652f_17995d0a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
118
] | [
null
] | [
47
] | [
50
] | |
2024-11-19T02:57:07.300340+00:00 | 1,409,394,127,000 | 6b17f4f4803074371f9a613ff613b91db63b8791 | 3 | {
"blob_id": "6b17f4f4803074371f9a613ff613b91db63b8791",
"branch_name": "refs/heads/master",
"committer_date": 1409394127000,
"content_id": "5afcba5ff145aec1bcb351363ae94094078332a7",
"detected_licenses": [
"Unlicense"
],
"directory_id": "8feee8c96a8e03ce90e30c6690bff5325ad2dead",
"extension": "py",... | 2.65625 | stackv2 | #!/usr/bin/python
# coding: utf-8
import requests
from bs4 import BeautifulSoup
import itertools
# from time import sleep
# from random import randrange
headers = {"User-Agent": "Mozilla/5.0 (iPad; U; CPU OS 3_2_1 like Mac OS X; en-us) AppleWebKit/531.21.10 (KHTML, like Gecko) Mobile/7B405", "Referer": "www.wowhead.com... | 27 | 30.04 | 170 | 11 | 267 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f7819f3f19b46018_565476f0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
12
] | [
null
] | [
14
] | [
95
] | |
2024-11-19T02:57:18.315900+00:00 | 1,688,454,663,000 | 22b937c011afaa2fe4063a2cbfd931ef4cd47c79 | 2 | {
"blob_id": "22b937c011afaa2fe4063a2cbfd931ef4cd47c79",
"branch_name": "refs/heads/master",
"committer_date": 1688454663000,
"content_id": "753382ce416b8922d6042037c7eca5317c905594",
"detected_licenses": [
"MIT",
"ISC"
],
"directory_id": "1194fe679b552cf1c8b63282cf59ffefa3923288",
"extension": ... | 2.5 | stackv2 | import os
import oss2
from flask import jsonify, request
from lin import Failed, ParameterError, Redprint, Success, db, get_random_str, lin_config
from .model import OSS
api = Redprint("oss")
@api.route("/upload_to_local", methods=["POST"])
def upload():
image = request.files.get("image", None)
if not imag... | 88 | 32.19 | 112 | 22 | 655 | python | [{"finding_id": "codeql_py/path-injection_e49cd883d68f99f5_280d4b7e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
19
] | [
null
] | [
20
] | [
24
] | |
2024-11-19T02:57:22.911375+00:00 | 1,576,557,321,000 | 092aabbcda2376ebcce66ae03d2473999bcb66ad | 2 | {
"blob_id": "092aabbcda2376ebcce66ae03d2473999bcb66ad",
"branch_name": "refs/heads/master",
"committer_date": 1576557321000,
"content_id": "027df2252b93ad536d9af0733853ba0e25c4a84b",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "710b0bc052d33cfc22b3c5905143e4c19322896a",
"extension": "p... | 2.484375 | stackv2 | #!/usr/bin/env python
import datetime
import json
import os
import random
import time
import click
import paho.mqtt.client as mqtt
import yaml
DEFAULT_CONFIG_FILE_PATH = os.path.join(os.path.dirname(__file__),
'config.yml')
MQTT_BROKER_HOST = 'mqtt.eclipse.org'
MQTT_BROKER_PO... | 80 | 29.8 | 75 | 16 | 536 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2009a7613bac4d89_873d2de4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
52
] | [
null
] | [
15
] | [
54
] | |
2024-11-19T03:12:15.189154+00:00 | 1,537,727,186,000 | 2c6935ac659a0feaffb09a608b9e4d38429d20b9 | 3 | {
"blob_id": "2c6935ac659a0feaffb09a608b9e4d38429d20b9",
"branch_name": "refs/heads/master",
"committer_date": 1537727186000,
"content_id": "37c5f0e58bb6f888cfec600d2df83f54fdd1827b",
"detected_licenses": [
"MIT"
],
"directory_id": "ca5e6bd4dee7d76fc8f835eab483e6cc7db502ef",
"extension": "py",
"fi... | 2.84375 | stackv2 | from credentials import data as creds
import json
import urllib
from errors import NoResultException
class GeocodingService(object):
""" This class abstracts a geo-coding service that can resolve lat-long given an address.
Multiple locations could be found by a given search text from external services, along... | 89 | 33.1 | 128 | 18 | 657 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e8b917fffaf1a8aa_9cabc9ed", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
28
] | [
null
] | [
15
] | [
18
] | |
2024-11-19T03:12:20.128513+00:00 | 1,613,720,467,000 | f9f52de0b11d8b95babe3cf8f21c18509cf045e9 | 3 | {
"blob_id": "f9f52de0b11d8b95babe3cf8f21c18509cf045e9",
"branch_name": "refs/heads/master",
"committer_date": 1613720467000,
"content_id": "ef3ca910fe172c3022b2e28efd6074e4b9195573",
"detected_licenses": [
"MIT"
],
"directory_id": "1c1ccda1ec99b2d14dc559b7f34eb1bff94804e8",
"extension": "py",
"fi... | 3.34375 | stackv2 | #!/usr/bin/env python3.8
import random
from user import User
from user import Credentials
def save_credentials(user):
user.save_created_credential()
def create_credentials(username, password):
new_credential = User(username, password)
return new_credential
def save_existing_credential(user):
user.sav... | 167 | 28.95 | 111 | 19 | 931 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9dbe6b496257121c_9432c438", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
54,
121,
142
] | [
null,
null,
null
] | [
19,
31,
19
] | [
111,
65,
80
] | |
2024-11-19T01:33:53.858347+00:00 | 1,607,526,330,000 | f25e59e5fe70eb70086996f35a4bb7d828e1bbda | 3 | {
"blob_id": "f25e59e5fe70eb70086996f35a4bb7d828e1bbda",
"branch_name": "refs/heads/main",
"committer_date": 1607526330000,
"content_id": "3893a5ec0fea11cf146c12bb0e8f98974ead6b66",
"detected_licenses": [
"MIT"
],
"directory_id": "339321660e4d4e0fbb82e1833c8c93d10b85eb94",
"extension": "py",
"file... | 2.671875 | stackv2 | import pandas as pd
from sklearn.experimental import enable_iterative_imputer
from sklearn import datasets, impute
from sklearn.feature_selection import SelectKBest, chi2
from sklearn.model_selection import train_test_split
from sklearn.preprocessing import LabelEncoder, StandardScaler, MinMaxScaler
from sklearn.ensemb... | 287 | 46.32 | 120 | 13 | 3,513 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9de1a6c2cda49c94_0c401d54", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
101
] | [
null
] | [
11
] | [
34
] | |
2024-11-19T01:57:17.958537+00:00 | 1,556,187,390,000 | 47f808c4b5e7c86ff63fa02a7b612ae578771d9c | 3 | {
"blob_id": "47f808c4b5e7c86ff63fa02a7b612ae578771d9c",
"branch_name": "refs/heads/master",
"committer_date": 1556187390000,
"content_id": "4c183f41e356e88071d29e9b375d3108f94ceaeb",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "66bacb0f67d6fa46159f33597b93d5a6eda48bd0",
"extension": "py"... | 3.390625 | stackv2 | import re
def insert_inform():
validation = False
print('=====고객 정보 입력=====')
# while validation != True:
name = input("이름 : ")
# if not re.match(r'[a-zA-Zㄱ-ㅎ]', name):
# print("올바른 이름입력이 아닙니다. 다시 시도해주세요")
# else:
# vlaidation = True
validation = False
while validation !... | 141 | 31.47 | 117 | 20 | 1,282 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_97557879fe3007fc_a1e7ee42", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
74
] | [
null
] | [
23
] | [
66
] | |
2024-11-19T02:10:57.172792+00:00 | 1,602,587,969,000 | b37411d749ceab306757f737c5acc8abacf1beb7 | 2 | {
"blob_id": "b37411d749ceab306757f737c5acc8abacf1beb7",
"branch_name": "refs/heads/main",
"committer_date": 1602587969000,
"content_id": "225a7f3ebf1b4ff045dab33030f0d1da691cd5db",
"detected_licenses": [
"MIT"
],
"directory_id": "09e67967dac6fdae5b5e969520db878f883a0640",
"extension": "py",
"file... | 2.46875 | stackv2 | __all__ = ["download", "create_cache", "get_file", "ShellUtils"]
import os
import pathlib
import logging
import shutil
import tarfile
import zipfile
from dataclasses import dataclass, field
from typing import Union, Sequence
import tqdm
import requests
from . import gdrive
def download(url, path, progress=False, b... | 252 | 38.64 | 80 | 20 | 2,103 | python | [{"finding_id": "codeql_py/tarslip_c1b58fec699b92ce_298aaa64", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
197
] | [
null
] | [
13
] | [
14
] | |
2024-11-19T02:11:18.005124+00:00 | 1,628,431,039,000 | d812695ed55f338b6c4fdd404a034f638b286b75 | 3 | {
"blob_id": "d812695ed55f338b6c4fdd404a034f638b286b75",
"branch_name": "refs/heads/main",
"committer_date": 1628431039000,
"content_id": "f802b3f37508fd92834b3843d2d3e3077443ee92",
"detected_licenses": [
"MIT"
],
"directory_id": "be199c876160d343bd33547b3f83864f5219dddd",
"extension": "py",
"file... | 2.703125 | stackv2 | # See: http://docs.aws.amazon.com/general/latest/gr/sigv4_signing.html
'''This program creates a presigned url of the Api Gateway endpoint.'''
import os
import base64
import datetime
import hashlib
import hmac
import urllib
import boto3
import json
from botocore.exceptions import ClientError
def generate_presigned_ur... | 164 | 40.71 | 112 | 20 | 1,617 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6ac62f86c668425a_977ce332", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.\nThis expression logs [sensitive data (secret)](5) a... | [
90,
114
] | [
null,
null
] | [
15,
15
] | [
55,
47
] | |
2024-11-19T02:11:50.493059+00:00 | 1,623,902,976,000 | d419e1217a0e1c6b17a1b8be4d7a79394b673a16 | 2 | {
"blob_id": "d419e1217a0e1c6b17a1b8be4d7a79394b673a16",
"branch_name": "refs/heads/main",
"committer_date": 1623902976000,
"content_id": "b20e7d89663f601544fafeed508ca7d167871fc4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "945fb818bac19868716d9823d1a4cc15a252d367",
"extension": "py",
... | 2.3125 | stackv2 | import hashlib
import importlib
import os
import os.path as osp
import pkg_resources
import re
import subprocess
import tarfile
import typing
from collections import defaultdict
from distutils.version import LooseVersion
from pkg_resources import parse_version
from typing import Any, List, Optional, Tuple, Union
impor... | 530 | 27.62 | 77 | 18 | 3,678 | python | [{"finding_id": "codeql_py/tarslip_bace2e47ed210b4c_72844830", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
508
] | [
null
] | [
9
] | [
17
] | |
2024-11-19T02:32:42.519943+00:00 | 1,635,407,723,000 | 68d961e190c2d2a0396418ad01ba03c85eb7feee | 3 | {
"blob_id": "68d961e190c2d2a0396418ad01ba03c85eb7feee",
"branch_name": "refs/heads/main",
"committer_date": 1635407723000,
"content_id": "99a9cb7b14bf2814dc2c6bf9535c4521d5a9b831",
"detected_licenses": [
"MIT"
],
"directory_id": "08ef8eb91e25e18a038152c28093f334a7066913",
"extension": "py",
"file... | 2.703125 | stackv2 | import json
import random
import hashlib
from urllib import parse
import http.client
class BaiduTranslate:
def __init__(self,fromLang,toLang):
self.url = "/api/trans/vip/translate"
self.appid="20191123000359756" #申请的账号
self.secretKey = 'QW58Hvcvuhso9X3VEMk4'#账号密码
self.fromLang = fro... | 41 | 34.56 | 74 | 21 | 390 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_85e4319ece0761d4_76dd1d1c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
19
] | [
null
] | [
19
] | [
48
] | |
2024-11-19T02:33:27.428244+00:00 | 1,627,940,653,000 | 1e7adc18e8401835fcad23dd83662d1a0c088b98 | 3 | {
"blob_id": "1e7adc18e8401835fcad23dd83662d1a0c088b98",
"branch_name": "refs/heads/master",
"committer_date": 1627940653000,
"content_id": "ac8fbaf04fb523edc37531dec7331b3e40956c6a",
"detected_licenses": [
"MIT"
],
"directory_id": "5ff4a3151b0f4b6becbcc492d67fd0eb0f99c7bb",
"extension": "py",
"fi... | 3.125 | stackv2 | """A wrapper for various shell based functions found in the os & shutil modules."""
import os
import shutil
import platform
import tarfile
import hashlib
import sys
__author__ = 'PencilShavings'
__version__ = '0.0.9'
def envar_parser(path):
"""Parses environment variables from strings."""
if str(path).star... | 407 | 22.9 | 112 | 23 | 2,300 | python | [{"finding_id": "codeql_py/tarslip_8cdfa76d4c9509e6_e7d404f1", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
400
] | [
null
] | [
13
] | [
16
] | |
2024-11-19T02:33:34.713163+00:00 | 1,588,599,237,000 | 8f1754c1cde5a502574f02540aedb42528834818 | 2 | {
"blob_id": "8f1754c1cde5a502574f02540aedb42528834818",
"branch_name": "refs/heads/master",
"committer_date": 1588599237000,
"content_id": "3f9bc0e53ad0234c61dcc1049bc6024a105e7758",
"detected_licenses": [
"MIT"
],
"directory_id": "97d43ddd6ecae189f231a87488e071e61f9d828e",
"extension": "py",
"fi... | 2.3125 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Mon, March 23 13:13:13 2020
@author: Ahmad H. Mirza
scriptVersion = 1.0..0
"""
from flask import current_app as app
from flask import Blueprint, render_template,url_for
from flask import request,redirect,make_response,send_from_directory
from werkzeug.utils import secure_filename
... | 170 | 36.06 | 116 | 18 | 1,244 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5e750cb8a2e47b33_84ed9d1e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
132
] | [
null
] | [
25
] | [
55
] | |
2024-11-19T02:46:18.839415+00:00 | 1,567,728,704,000 | 63cbc8840c9950c6bab635fcc9447650c1b485ca | 3 | {
"blob_id": "63cbc8840c9950c6bab635fcc9447650c1b485ca",
"branch_name": "refs/heads/master",
"committer_date": 1567728704000,
"content_id": "2ee22de3c1c78d2e2ce832e8ce552cc6ef4399ba",
"detected_licenses": [
"MIT"
],
"directory_id": "dac2ddfbe770829312292a4e057d88532590d393",
"extension": "py",
"fi... | 2.765625 | stackv2 | import os
import uuid
from logging.config import dictConfig
from flask import Flask, jsonify, request, abort
from flask_sqlalchemy import SQLAlchemy
from sqlalchemy.dialects.postgresql import UUID
dictConfig({
'version': 1,
'formatters': {'default': {
'format': '[%(asctime)s] %(levelname)s in %(module... | 77 | 29.17 | 115 | 15 | 549 | python | [{"finding_id": "codeql_py/log-injection_959b358b3ec57502_35c40150", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 4 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
45,
45,
47,
51
] | [
null,
null,
null,
null
] | [
76,
92,
62,
89
] | [
90,
100,
70,
97
] | |
2024-11-19T02:46:21.098248+00:00 | 1,622,650,768,000 | dcc450b6170007fca7d3724e0cbecd1ed376d4c1 | 3 | {
"blob_id": "dcc450b6170007fca7d3724e0cbecd1ed376d4c1",
"branch_name": "refs/heads/master",
"committer_date": 1622650768000,
"content_id": "6722e6bddba162951935a8dd13fbe6fad6db336c",
"detected_licenses": [
"MIT"
],
"directory_id": "fdbd4b7743833c2f82b95c8c9732a9cea1ac6937",
"extension": "py",
"fi... | 2.71875 | stackv2 | from __future__ import absolute_import, division, print_function, unicode_literals
import logging
import os
import re
import sys
import traceback
import jinja2
from pathlib import Path
from datetime import datetime
from subprocess import Popen, PIPE
def print_line(line, ignore_text=False, newline=True, status='ok')... | 274 | 28.99 | 94 | 16 | 2,017 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8e4017af0d039cbd_31e3afed", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
215
] | [
null
] | [
15
] | [
48
] | |
2024-11-19T02:59:16.268083+00:00 | 1,615,219,504,000 | dc7f44c22ae69432c578c4b8b636dd22a652ac9f | 4 | {
"blob_id": "dc7f44c22ae69432c578c4b8b636dd22a652ac9f",
"branch_name": "refs/heads/main",
"committer_date": 1615219504000,
"content_id": "72b1d6dad54ca9e0d306af3dfbe983a64f2ca49f",
"detected_licenses": [
"MIT"
],
"directory_id": "513c5880752eb1617a466f3e233b62868c4bea14",
"extension": "py",
"file... | 3.53125 | stackv2 | import requests
import os
import json
import seaborn as sns
import matplotlib.pyplot as plt
import pandas as pd
from datetime import datetime
from pandas import DataFrame
from dotenv import load_dotenv
def to_usd(my_price):
"""
Converts a numeric value to usd-formatted string, for printing and display purposes... | 116 | 32.08 | 131 | 13 | 995 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ce25da12801b91ad_a06a0fc7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 7 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensi... | [
87,
90,
92,
93,
94,
95,
104
] | [
null,
null,
null,
null,
null,
null,
null
] | [
7,
7,
7,
7,
7,
7,
7
] | [
43,
39,
31,
43,
40,
39,
118
] | |
2024-11-19T02:59:18.858973+00:00 | 1,632,371,565,000 | fed75ee3c9d0ab55f42bd14c108f6413d064b773 | 2 | {
"blob_id": "fed75ee3c9d0ab55f42bd14c108f6413d064b773",
"branch_name": "refs/heads/master",
"committer_date": 1632371565000,
"content_id": "b276462429dd6b888eeeb7f4c64bbd1568d0534b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ad7eed12964a9ec93ac791e0c64e4fbd62f2b0b0",
"extension": "py"... | 2.421875 | stackv2 | #!/usr/bin/env python3
# chmod +x login.py make the file executable
import cgi, cgitb
from cookie import set_cookie
import secret
from templates import after_login_incorrect, secret_page
form = cgi.FieldStorage()
username = form.getvalue("username")
password = form.getvalue("password")
if (username == secret.usern... | 28 | 25.32 | 79 | 8 | 177 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2a65a373830db380_c58bab38", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
26
] | [
null
] | [
7
] | [
79
] | |
2024-11-19T02:59:22.265340+00:00 | 1,688,449,912,000 | 63f2ed4e15a3567b3ca711ac7fc44bc7c4c4b138 | 3 | {
"blob_id": "63f2ed4e15a3567b3ca711ac7fc44bc7c4c4b138",
"branch_name": "refs/heads/master",
"committer_date": 1688453376000,
"content_id": "3e157c962b2bf7d11f20e8a77998a9ba4b9fcf73",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3d7dece5254e42059e8a2cb1e72b295460284983",
"extension": "py"... | 2.515625 | stackv2 | import lvgl as lv
import wifi_module
import _thread
import font_Alibaba_PuHuiTi
RESOURCES_ROOT = "S:/data/pyamp/images/"
wifiSSID = ""
wifiPassword = ""
def wifi_connect():
global wifiSSID
global wifiPassword
result = False
result = wifi_module.wifi_connect(wifiSSID, wifiPassword)
if (result ==... | 66 | 23.65 | 63 | 11 | 479 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ab1f3b09d68902e2_a258dbe4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
37
] | [
null
] | [
31
] | [
43
] | |
2024-11-19T02:59:49.359243+00:00 | 1,616,255,456,000 | b1ce36078af5957e98d4694689832b5b7887a247 | 3 | {
"blob_id": "b1ce36078af5957e98d4694689832b5b7887a247",
"branch_name": "refs/heads/master",
"committer_date": 1616255456000,
"content_id": "ecfed87facd4b38a56b3a446868929ca1f463c21",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f22b3ff6df693cd6df712a196951aea8025b1dec",
"extension": "py"... | 2.625 | stackv2 | """
Copyright 2021 Ext-Creators
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to i... | 155 | 29.67 | 124 | 15 | 984 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_459606f64fbda1aa_60101dd5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
85,
130
] | [
null,
null
] | [
48,
34
] | [
55,
41
] | |
2024-11-19T02:59:50.498933+00:00 | 1,595,288,737,000 | 190ee5f3c8b2a443fc977e16eb60406fdb28fcda | 3 | {
"blob_id": "190ee5f3c8b2a443fc977e16eb60406fdb28fcda",
"branch_name": "refs/heads/master",
"committer_date": 1595288737000,
"content_id": "85e0355e9d05bfbd3a82626169adbb80d08bb74c",
"detected_licenses": [
"MIT"
],
"directory_id": "98652dd19d0b63c0e00bc41a88118077855a0547",
"extension": "py",
"fi... | 2.8125 | stackv2 | import os
import shutil
import tarfile
import urllib.request
import h5py
import numpy as np
import scipy.io
DATA_URL = ('http://deepsea.princeton.edu/media/code/'
'deepsea_train_bundle.v0.9.tar.gz')
DIR_PATH = './deepsea_train'
NUM_TRAIN_SETS = 10
def download():
print(f'Downloading deepsea train bu... | 98 | 24.59 | 78 | 13 | 675 | python | [{"finding_id": "codeql_py/tarslip_34fd1fbafdbe6370_d54dcec6", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
27
] | [
null
] | [
9
] | [
10
] | |
2024-11-19T03:24:55.701664+00:00 | 1,490,543,601,000 | bd6d99eba5326b20637549c99bae7481d79b7b7b | 2 | {
"blob_id": "bd6d99eba5326b20637549c99bae7481d79b7b7b",
"branch_name": "refs/heads/master",
"committer_date": 1490543601000,
"content_id": "016db4ffc12d358eee66647f0a88d2f8603df98c",
"detected_licenses": [
"MIT"
],
"directory_id": "f3fa81b4beb80307bc9a6340498d4d69966d032f",
"extension": "py",
"fi... | 2.46875 | stackv2 | from flask import Flask, request
from PIL import Image
# from twilio import twiml
import auth
import requests
from io import BytesIO
app = Flask(__name__)
client = auth.client
details = {
"Size": "",
"Topping1": "",
"Topping2": ""
}
def get_size_type(imgurl):
response = requests.get(imgurl)
img ... | 85 | 23.87 | 79 | 13 | 607 | python | [{"finding_id": "codeql_py/flask-debug_1138d24d7f950217_edf2191f", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-918",
"CWE-918"
] | [
"py/flask-debug",
"py/full-ssrf",
"py/full-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depends on a [user-provided value](1).",
"The full URL of this request depends on a [user-provided value](1)."
] | [
85,
19,
32
] | [
null,
null,
null
] | [
5,
16,
16
] | [
24,
36,
36
] | |
2024-11-19T03:35:14.191026+00:00 | 1,610,142,773,000 | 6499bc9a7aba74e3adf2eb854aa187fbf173dc28 | 3 | {
"blob_id": "6499bc9a7aba74e3adf2eb854aa187fbf173dc28",
"branch_name": "refs/heads/main",
"committer_date": 1610142773000,
"content_id": "d2c1aa9e46f241cf5241cefa450fdbfe77b3417a",
"detected_licenses": [
"MIT"
],
"directory_id": "ba3e7850b87a59311f4acc6e4567a5671448682c",
"extension": "py",
"file... | 3.203125 | stackv2 | # -*- coding: utf-8 -*-
#!/usr/bin/env python3
# Filename: plf_requests.py
"""PLF is a simple password leak checker that checks if your password has ever been leaked."""
__version__ = '0.1'
__author__ = 'Adrian Gąsior'
import requests
import hashlib
import sys
def req_api_data(query_char):
url = 'https://api.... | 45 | 27.33 | 94 | 15 | 325 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_2d1c19be2e24493f_9cab981c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
34
] | [
null
] | [
9
] | [
33
] | |
2024-11-19T01:26:53.017425+00:00 | 1,634,842,004,000 | 7e6795e99234f6a56e04e92977ff0fbd3573e914 | 3 | {
"blob_id": "7e6795e99234f6a56e04e92977ff0fbd3573e914",
"branch_name": "refs/heads/main",
"committer_date": 1634842004000,
"content_id": "bba5a4176bb9e7601bbbc77c38e407a5a340eb97",
"detected_licenses": [
"MIT"
],
"directory_id": "c934e5208ead7f05ff903c947d5335587a7db3a4",
"extension": "py",
"file... | 3.171875 | stackv2 | import functools
user = {'name': 'Jose', 'access_level': 'guest'}
def make_secure(func):
@ functools.wraps(func)
def secure_function():
if user['access_level'] == 'admin':
return func()
else:
return f"{user['name']} does not have admin permisison"
return secure_function
@make_secure
def get_admin_pass... | 24 | 18.38 | 58 | 15 | 112 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_35a8922933d012ee_a0a54916", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
21
] | [
null
] | [
7
] | [
27
] | |
2024-11-19T01:37:39.489895+00:00 | 1,527,864,164,000 | 217b48e0db04b506bff4b17e9dc8f38eef2c37fb | 2 | {
"blob_id": "217b48e0db04b506bff4b17e9dc8f38eef2c37fb",
"branch_name": "refs/heads/master",
"committer_date": 1527864164000,
"content_id": "203fa0c7f50f95b2129d70125dd379a04afcd743",
"detected_licenses": [
"MIT"
],
"directory_id": "149834c00994e5e61f05cb7805ce12e808c29b7b",
"extension": "py",
"fi... | 2.359375 | stackv2 | # -*- coding: utf-8 -*-
from __future__ import unicode_literals
import re
from django.utils.translation import ugettext as _
from django.shortcuts import render
from django.views.decorators.cache import never_cache
# from .forms import NamingForm, Suri81Form, Suri81ResultForm
from .forms import NamingForm, Suri81Form... | 155 | 30.41 | 90 | 18 | 1,252 | python | [{"finding_id": "codeql_py/overly-large-range_2ffb4f168aaaed7b_1b888149", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
74
] | [
null
] | [
22
] | [
25
] | |
2024-11-19T01:38:28.908360+00:00 | 1,418,472,054,000 | aeb089254284011d41c2146a49d3451a4f386bdd | 3 | {
"blob_id": "aeb089254284011d41c2146a49d3451a4f386bdd",
"branch_name": "refs/heads/master",
"committer_date": 1418472275000,
"content_id": "38ad90b4b8bf5f54160ff6ea5b8bc3198f94a05a",
"detected_licenses": [
"MIT"
],
"directory_id": "ffa95a407fa6ac01e4c1fa45ba16b90d69af9be6",
"extension": "py",
"fi... | 2.53125 | stackv2 | import urllib
import webapp2
import jinja2
import os
import datetime
from google.appengine.ext import db
import cgi
jinja_environment = jinja2.Environment(
loader=jinja2.FileSystemLoader(os.path.dirname(__file__)))
class MainPage(webapp2.RequestHandler):
def get(self):
"""Handle GET requests to the root... | 70 | 26.06 | 77 | 14 | 435 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_800a6a360dc61851_324e5f3f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12
] | [
13
] | [
21
] | [
63
] | |
2024-11-19T01:38:36.607983+00:00 | 1,557,674,486,000 | a3c9e9cc1f73fba00fe12ae512cafadc3fefaa24 | 4 | {
"blob_id": "a3c9e9cc1f73fba00fe12ae512cafadc3fefaa24",
"branch_name": "refs/heads/master",
"committer_date": 1557674486000,
"content_id": "9d54050e7d029bba8a3155db5b548ce8e3d43355",
"detected_licenses": [
"MIT"
],
"directory_id": "6c9f320d2e7cb6f9daeda4c431b3ee10ef062035",
"extension": "py",
"fi... | 3.828125 | stackv2 | """
Read file into texts and calls.
It's ok if you don't understand how to read files
"""
import csv
with open('texts.csv', 'r') as f:
reader = csv.reader(f)
texts = list(reader)
with open('calls.csv', 'r') as f:
reader = csv.reader(f)
calls = list(reader)
"""
TASK 2: Which telephone number spent the ... | 124 | 31.23 | 120 | 14 | 1,498 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e52318a5327bd152_0e585db8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (private)](4) as clear text."
] | [
57
] | [
null
] | [
11
] | [
120
] | |
2024-11-19T01:38:48.160282+00:00 | 1,610,955,921,000 | 3de732f23b44a98c183b5caeb1f8d2c6c9609f2c | 3 | {
"blob_id": "3de732f23b44a98c183b5caeb1f8d2c6c9609f2c",
"branch_name": "refs/heads/master",
"committer_date": 1610955921000,
"content_id": "a6cddec7d1894dc697f683254c16591660d808cb",
"detected_licenses": [
"MIT"
],
"directory_id": "0542a4488c98a62dd01ea5430566f6108941aa01",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/bin/env python3
import getpass
import paramiko
HOSTNAME = 'ssh_server'
PORT = 22
def run_ssh_cmd(username, password, command, hostname=HOSTNAME,port=PORT):
ssh_client = paramiko.SSHClient()
ssh_client.set_missing_host_key_policy(paramiko.AutoAddPolicy())
ssh_client.load_system_host_keys()
ssh_client.conne... | 24 | 28.5 | 74 | 10 | 169 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e5fa665b7e512277_543807d0", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
11
] | [
null
] | [
2
] | [
66
] | |
2024-11-19T01:38:51.566632+00:00 | 1,582,027,424,000 | 2def74da42e2b39fe07c5bffcd4ea12994201df6 | 2 | {
"blob_id": "2def74da42e2b39fe07c5bffcd4ea12994201df6",
"branch_name": "refs/heads/master",
"committer_date": 1582027424000,
"content_id": "9116702d6dd0f128e3624c225955b3e043274165",
"detected_licenses": [
"MIT"
],
"directory_id": "793e8c0c38a833dca1b6714db86ad5884bccc637",
"extension": "py",
"fi... | 2.359375 | stackv2 | import redis
from django.http import HttpResponse, HttpResponseServerError
from django.db import connection
from django.conf import settings
class HealthCheckMiddleware(object):
def __init__(self, get_response):
self.get_response = get_response
def __call__(self, request):
if request.method =... | 45 | 33.91 | 89 | 14 | 274 | python | [{"finding_id": "codeql_py/stack-trace-exposure_40b572474eb22e9e_c96ced99", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
28
] | [
null
] | [
44
] | [
77
] | |
2024-11-19T01:52:10.405088+00:00 | 1,602,122,087,000 | b0c81cd317c3f11f110d1ee6d2f1dd646f334d2e | 2 | {
"blob_id": "b0c81cd317c3f11f110d1ee6d2f1dd646f334d2e",
"branch_name": "refs/heads/main",
"committer_date": 1602122087000,
"content_id": "e7644fdab0c4a9b50eee5d91aea28e8217d777e4",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "d539953aeab6fdc71a6d4b27fa968047af619a59",
"extension": "py"... | 2.5 | stackv2 | import asyncio
import logging
from enum import Enum
import zmq
import zmq.asyncio
from fastapi import FastAPI, HTTPException
logger = logging.getLogger(__name__)
class ZMQComm:
def __init__(self, zmq_host="localhost", zmq_port="5555"):
self._loop = asyncio.get_event_loop()
# ZeroMQ communicatio... | 397 | 28.67 | 97 | 20 | 2,588 | python | [{"finding_id": "codeql_py/stack-trace-exposure_cbb62223a543b922_4354c91a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 24 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
168,
177,
186,
195,
205,
216,
230,
240,
249,
258,
267,
276,
285,
295,
305,
324,
333,
342,
351,
360,
369,
378,
387,
397
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12,
12
] | [
15,
15,
15,
15,
15,
15,
15,
15,
15,
15,
15,
15,
15,
15,
15,
15,
15,
15,
15,
15,
15,
15,
15,
15
] | |
2024-11-19T01:52:22.645290+00:00 | 1,535,512,650,000 | e4c655762974fe46c6363a2465bdafc2ab5befdb | 2 | {
"blob_id": "e4c655762974fe46c6363a2465bdafc2ab5befdb",
"branch_name": "refs/heads/master",
"committer_date": 1535512650000,
"content_id": "cec712586beca3968206647437e5cacf8e4b1d80",
"detected_licenses": [
"MIT"
],
"directory_id": "a1c34bb63533f79abc845d1869503185fa26a54e",
"extension": "py",
"fi... | 2.4375 | stackv2 | import csv
import json
import logging
import os
import time
import webbrowser
from optparse import OptionParser
import markdown2
from jinja2 import Template
from livereload import Server
from watchdog.events import LoggingEventHandler, FileSystemEventHandler
from watchdog.observers import Observer
VERSION = '0.2.0'
... | 226 | 32.71 | 107 | 23 | 1,469 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3817eea73ea4dbe7_118c3d22", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 3 | true | [
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
58,
102,
122
] | [
null,
null,
null
] | [
24,
24,
28
] | [
54,
60,
64
] | |
2024-11-19T02:04:24.330004+00:00 | 1,585,925,031,000 | 46f4875d032b6f64eadd39780d799fc9fc6493f2 | 3 | {
"blob_id": "46f4875d032b6f64eadd39780d799fc9fc6493f2",
"branch_name": "refs/heads/master",
"committer_date": 1585925031000,
"content_id": "f7c307658c3455c313677d269a8648f6697b4a82",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b2fee3b968cecc138f17bf31751024e13b557d85",
"extension": "py"... | 2.8125 | stackv2 | #
# Page Cache maintains a collection of cached files on disk
#
# It has a concept of 'version'. If provided, it will store
# the data in a subdirectory.
#
# It is extracted from my scanner so it has functionality that
# doesn't apply in a web content.
#
import os
import shutil
import re
import datetime
impor... | 235 | 30.07 | 98 | 15 | 1,758 | python | [{"finding_id": "codeql_py/request-without-cert-validation_7d1a119dfc6fdd82_b1478413", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
90
] | [
null
] | [
20
] | [
52
] | |
2024-11-19T02:04:51.654167+00:00 | 1,632,843,990,000 | 7d030ca4255fc9e0d49b02a41931cc27a45299fc | 2 | {
"blob_id": "7d030ca4255fc9e0d49b02a41931cc27a45299fc",
"branch_name": "refs/heads/main",
"committer_date": 1632843990000,
"content_id": "3718c3c2c83ac89e842c9bc566f566735a161293",
"detected_licenses": [
"MIT"
],
"directory_id": "109fd207c59b774c551f2261ddb821369c77691a",
"extension": "py",
"file... | 2.484375 | stackv2 | import discord, re, os, json, asyncio #, requests
from discord.ext import commands, tasks
from discord_slash import cog_ext, SlashCommandOptionType, SlashContext
from discord_slash.client import SlashCommand
import youtube_dl
from discord_slash.utils.manage_commands import create_option
class yt(commands.Cog):
UR... | 193 | 37.9 | 127 | 23 | 1,737 | python | [{"finding_id": "codeql_py/overly-large-range_556fe7cf8962b4e0_cedc8bd7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
10
] | [
null
] | [
60
] | [
63
] | |
2024-11-19T02:28:42.607024+00:00 | 1,617,265,826,000 | 569133139cee0b68c90b1848083260bb91b8ae24 | 3 | {
"blob_id": "569133139cee0b68c90b1848083260bb91b8ae24",
"branch_name": "refs/heads/main",
"committer_date": 1617265826000,
"content_id": "caa866423de0e13bc23a7f14d2bd59bea9ece53d",
"detected_licenses": [
"MIT"
],
"directory_id": "d18abd71a7867eb40c5227e96295059ef14a78b2",
"extension": "py",
"file... | 2.578125 | stackv2 | # coding: utf-8
import os
import time
import signal
import random
import logging
import argparse
import requests
import threading
from flask import Flask, request, jsonify
logging.basicConfig(level=logging.INFO)
werkzeug = logging.getLogger('werkzeug')
werkzeug.setLevel(logging.WARNING)
logger = logging.getLogger('... | 238 | 29.58 | 101 | 17 | 1,694 | python | [{"finding_id": "codeql_py/log-injection_062486f24eb4c62d_8853cd16", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
187,
190
] | [
null,
null
] | [
56,
57
] | [
73,
64
] | |
2024-11-19T02:28:44.858695+00:00 | 1,692,970,818,000 | dba23b39ac8b3a3a979e6e8695776b078d09a79b | 2 | {
"blob_id": "dba23b39ac8b3a3a979e6e8695776b078d09a79b",
"branch_name": "refs/heads/master",
"committer_date": 1692970818000,
"content_id": "7960bd38375bcb26637c6adc0161b4932ee6f85b",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "29e127a0299534f39da21bfdc3db6e716c73a341",
"extension": "p... | 2.359375 | stackv2 | #!/usr/bin/env python3
import os
import sys
import argparse
parser = argparse.ArgumentParser()
parser.add_argument("--vault-id", type=str)
args = parser.parse_args()
if args.vault_id is None or args.vault_id == "None" or args.vault_id == "default":
if os.environ.get('VAULT_PASSWORD_ALL') is not None and os.enviro... | 24 | 33.58 | 103 | 11 | 220 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf48eef4753ef0f4_fbf11b0b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
21
] | [
null
] | [
11
] | [
40
] | |
2024-11-19T02:28:54.579182+00:00 | 1,527,093,716,000 | 47de62124b4469208c118395936572719f6f126c | 3 | {
"blob_id": "47de62124b4469208c118395936572719f6f126c",
"branch_name": "refs/heads/master",
"committer_date": 1527093716000,
"content_id": "02eb7459f8f61f0d9f9c85d67260c633a271df27",
"detected_licenses": [
"MIT"
],
"directory_id": "de0c9564f4cd407ec4846565067021bae4b0fb5a",
"extension": "py",
"fi... | 2.75 | stackv2 | from flask import Flask, jsonify, request
from nltk.tokenize import word_tokenize
import os
app = Flask(__name__)
@app.route('/')
def index():
return "hello world"
@app.route('/addToCart', methods = ["POST"])
def addToCart():
req_json = request.json
table_id = req_json['TABLE_ID']
dish_name = req_jso... | 29 | 23.9 | 83 | 15 | 197 | python | [{"finding_id": "codeql_py/flask-debug_6b9fee8d01d2c7ca_8b42de07", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
29,
19
] | [
null,
null
] | [
2,
14
] | [
55,
42
] | |
2024-11-19T02:36:44.239169+00:00 | 1,607,812,102,000 | 0b409d77f8ca465730fe7e6fe730378165968540 | 2 | {
"blob_id": "0b409d77f8ca465730fe7e6fe730378165968540",
"branch_name": "refs/heads/main",
"committer_date": 1607812102000,
"content_id": "ebf31195dc60296b35f89e693b954cba0e2ed116",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f50f48c8b4787378bf6720fd47a26d0d5e838a8f",
"extension": "py",
... | 2.421875 | stackv2 | from flask import Flask,redirect,url_for,render_template,request
from pytube import YouTube
import requests as req
# Github @hammerinformation
app=Flask(__name__)
def download_video(url):
YouTube(url).streams.filter(file_extension='mp4',progressive=True).first().download()
@app.route('/',methods=['GET'])
def ho... | 41 | 24.29 | 89 | 16 | 219 | python | [{"finding_id": "codeql_py/flask-debug_a80442acf2b89bbc_438409dd", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depends on a [user-provided value](1)."
] | [
41,
20
] | [
null,
null
] | [
5,
21
] | [
34,
33
] | |
2024-11-19T02:37:25.770153+00:00 | 1,566,895,816,000 | 7851bee9f6eb5e4458c6d4caa1a45df7e5b35827 | 3 | {
"blob_id": "7851bee9f6eb5e4458c6d4caa1a45df7e5b35827",
"branch_name": "refs/heads/master",
"committer_date": 1566895816000,
"content_id": "7a3bafcfeed276513670810954eefb2b36901378",
"detected_licenses": [
"MIT"
],
"directory_id": "ddd5dcd63be7237b44d2befc3574cd433f0404fe",
"extension": "py",
"fi... | 3.0625 | stackv2 | from tkinter import *
from tkinter import Text
import tkinter as tk
import random
import string
import sys
window = Tk()
window.geometry("400x430")
stringLenght = 6
def randomStringDigits(stringLength=6):
zevergay = e2.get()
stringLength2 = int(zevergay)
var1IF = var1.get()
var2IF = var2.get()
... | 92 | 26.92 | 86 | 14 | 696 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c33b341d25460659_5adda964", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
49
] | [
null
] | [
11
] | [
29
] | |
2024-11-19T02:49:10.847081+00:00 | 1,515,813,616,000 | 0f3398914fe9c578a97b9856f84daa124d7b38c8 | 2 | {
"blob_id": "0f3398914fe9c578a97b9856f84daa124d7b38c8",
"branch_name": "refs/heads/master",
"committer_date": 1515813616000,
"content_id": "93019cce57b9eadc39fd342c0898acb68de2f68b",
"detected_licenses": [
"MIT"
],
"directory_id": "b383e3f618c1452ece35c1bc050d2dd18f3999d6",
"extension": "py",
"fi... | 2.421875 | stackv2 | import cv2
import numpy as np
import pytesseract
import re
import imutils
import pkg_resources
from PIL import Image
from details import Alliance, OngoingMatchDetails
class Livescore:
def __init__(self, options={}):
local_path = pkg_resources.resource_filename(__name__, 'tessdata')
template_path ... | 158 | 39.78 | 108 | 17 | 1,466 | python | [{"finding_id": "codeql_py/overly-large-range_3d2d47b2fe89418e_9ecc27bf", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
138
] | [
null
] | [
29
] | [
32
] | |
2024-11-19T03:00:26.636657+00:00 | 1,562,587,137,000 | 1d18349d775d57cea7e0cd020f138650f38aa014 | 3 | {
"blob_id": "1d18349d775d57cea7e0cd020f138650f38aa014",
"branch_name": "refs/heads/master",
"committer_date": 1562587137000,
"content_id": "64324ea6ad44d1de69200bb80685444d43181a20",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "22d66628728a40c96abefd618378c6d82918b1c5",
"extension": "p... | 2.71875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from werkzeug.routing import BaseConverter
from flask import Flask
'''
DEFAULT_CONVERTERS = {
'default': UnicodeConverter,
'string': UnicodeConverter,
'any': AnyConverter,
'path': PathConverter,
'int': ... | 42 | 20.81 | 50 | 10 | 245 | python | [{"finding_id": "codeql_py/reflective-xss_aba8463549d4926a_caab0799", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
24,
38
] | [
null,
null
] | [
12,
12
] | [
43,
49
] | |
2024-11-19T03:00:26.797099+00:00 | 1,523,901,429,000 | 84feb465b956cabe6641f0cb32b2e5f46816eba1 | 2 | {
"blob_id": "84feb465b956cabe6641f0cb32b2e5f46816eba1",
"branch_name": "refs/heads/master",
"committer_date": 1523901429000,
"content_id": "46d0c6b23b5e9f55074933410b12058acd16806d",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "d48b6ffeb1efbad3e766abccde907d97c9348098",
"extension": "p... | 2.390625 | stackv2 | #!/usr/bin/python
"""Provides configuration management/handling for managing freeradius."""
import argparse
import os
import shutil
import hashlib
import json
import subprocess
import random
import string
import filecmp
import pwd
import urllib.parse
import urllib.request
import datetime
import ssl
import hashlib
# us... | 77 | 22.73 | 74 | 15 | 430 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_26238812720691f0_f4f24209", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
58
] | [
null
] | [
17
] | [
40
] | |
2024-11-19T03:11:33.290114+00:00 | 1,618,863,044,000 | 300f6a9e11fbcbbcad629797dda70a0de4241f82 | 2 | {
"blob_id": "300f6a9e11fbcbbcad629797dda70a0de4241f82",
"branch_name": "refs/heads/main",
"committer_date": 1618863044000,
"content_id": "3fb9c0e207dbdd6715fac72456ba099c09fca278",
"detected_licenses": [
"MIT"
],
"directory_id": "7e93f09d9ec4cd333fc53ff6a0e01ee946199bba",
"extension": "py",
"file... | 2.453125 | stackv2 | from loadimagesfrombytes import LoadImagesFromBytes
import detect_custom as dc
import base64
import os
import flask
from flask import Flask, request
import requests
import json
#print(os.listdir())
#with open('3700214610015.jpg', "rb") as imageFile:
#img = base64.b64encode(imageFile.read())
#dataset = LoadImagesF... | 50 | 28.02 | 96 | 12 | 422 | python | [{"finding_id": "codeql_py/full-ssrf_d2675aede0eea86d_93b3f4af", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 2 | true | [
"CWE-918",
"CWE-079"
] | [
"py/full-ssrf",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
35,
47
] | [
null,
null
] | [
25,
12
] | [
42,
25
] | |
2024-11-19T03:11:52.736287+00:00 | 1,547,309,583,000 | 95f4dacc09469f6f10070be04decf23da39a2a9e | 3 | {
"blob_id": "95f4dacc09469f6f10070be04decf23da39a2a9e",
"branch_name": "refs/heads/master",
"committer_date": 1547309583000,
"content_id": "780b91018e298341c7888dfc18c576425353694b",
"detected_licenses": [
"MIT"
],
"directory_id": "83b6cacc603ff7a7eb4fba2691d77d60c40145b2",
"extension": "py",
"fi... | 2.953125 | stackv2 | import uuid
import time
import hashlib
import requests
import webbrowser
from fake_useragent import UserAgent
class ImageBam:
def __init__(self, key, secret):
"""
:param key: API key provided by ImageBam
:type key: string
:param secret: API secret provided by ImageBam
:typ... | 198 | 33.47 | 79 | 15 | 1,455 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_306975b96165fc26_f7028bfb", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
42
] | [
null
] | [
28
] | [
44
] | |
2024-11-19T03:11:56.840593+00:00 | 1,577,087,309,000 | 0e9f83b9d92ea31942e464047a6f6bc840f6659a | 3 | {
"blob_id": "0e9f83b9d92ea31942e464047a6f6bc840f6659a",
"branch_name": "refs/heads/master",
"committer_date": 1577087309000,
"content_id": "0a16532358c8908af6f429cd7c206d382a2dc305",
"detected_licenses": [
"MIT"
],
"directory_id": "0afb5671b1d433695b7ed4053181b4172bf59288",
"extension": "py",
"fi... | 2.765625 | stackv2 | users = []
posts = []
reciver_list = []
Email = input("Email - ")
Password = input("Password - ")
if Email == 'benchuk2004@gmail.com':
print("Hey Benchuk2004")
if Password == 'roonaldinio12':
print("You logged in!")
class User(object):
def __init__(self,name,email,password,friend_list):
friend_list = []
posts ... | 111 | 28 | 171 | 21 | 871 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3364bb6929f22372_441e0526", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
34
] | [
null
] | [
9
] | [
171
] | |
2024-11-19T03:11:58.190891+00:00 | 1,398,018,772,000 | caca57a14c5d31f4b3747a332fce508f46d43cc5 | 2 | {
"blob_id": "caca57a14c5d31f4b3747a332fce508f46d43cc5",
"branch_name": "refs/heads/master",
"committer_date": 1398018772000,
"content_id": "fcfba966af6621f876439110edfa45236d1ea650",
"detected_licenses": [
"MIT"
],
"directory_id": "21d909f79772130a9e2fbaade2233504d5ba2ef4",
"extension": "py",
"fi... | 2.3125 | stackv2 | from sqlobject import *
from sqlobject.inheritance import InheritableSQLObject
from webmux.ssh import SSH
from webmux.web_terminal import WebTerminal
from twisted.python import log
import hashlib
sqlhub.processConnection = connectionForURI('sqlite:webmux.db')
factory = None
MAX_TERM_HISTORY = 10000
class User(S... | 376 | 26.07 | 115 | 19 | 2,277 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_83b748037c15490a_85f36f98", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp... | [
26,
42
] | [
null,
null
] | [
65,
34
] | [
73,
42
] | |
2024-11-19T03:11:58.955225+00:00 | 1,613,103,724,000 | c2123654adda349865b4caa78e53f4d806121731 | 4 | {
"blob_id": "c2123654adda349865b4caa78e53f4d806121731",
"branch_name": "refs/heads/main",
"committer_date": 1613103724000,
"content_id": "679517259b5eb56be8527fae52b0333c8a10c4e3",
"detected_licenses": [
"MIT"
],
"directory_id": "02833306a04a01579ace024df6c70bf8babd1f42",
"extension": "py",
"file... | 3.515625 | stackv2 | #!/usr/bin/env python
"""
File to common methods exposed as static under Common class.
"""
import logging
logger = logging.getLogger(__name__)
class Common(object):
"""
Class handle the common utility methods.
********
Methods:
--------
get_secret: Method to get the se... | 111 | 36.99 | 90 | 16 | 724 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c586756ab76e3332_3dc7663e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
74
] | [
null
] | [
17
] | [
90
] | |
2024-11-19T03:11:59.126924+00:00 | 1,627,211,922,000 | ba1417e45d4df19a0cb42d8d1f825d78c012dcf4 | 2 | {
"blob_id": "ba1417e45d4df19a0cb42d8d1f825d78c012dcf4",
"branch_name": "refs/heads/main",
"committer_date": 1627211922000,
"content_id": "140dee4a296dfa4e1b6355f41e4d8ed82887c29c",
"detected_licenses": [
"MIT"
],
"directory_id": "ff8ece7b16cd2207f749df600e9ef076063d0a7a",
"extension": "py",
"file... | 2.421875 | stackv2 | import logging
from fastapi import FastAPI, HTTPException, status
from fastapi.responses import JSONResponse
from celery.result import AsyncResult
from celery.exceptions import SoftTimeLimitExceeded
from .celery_server import app as cel_app, add, is_prime, check_task_in_queue
app = FastAPI()
# This is the default ... | 96 | 32.58 | 122 | 15 | 709 | python | [{"finding_id": "codeql_py/log-injection_b4908b744b2996b6_15667a31", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2)... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](2).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [use... | [
67,
75,
93
] | [
null,
null,
null
] | [
42,
43,
66
] | [
49,
50,
73
] | |
2024-11-19T03:12:21.286432+00:00 | 1,547,388,659,000 | bf164a638d6df250a85949b7771c270d51695f63 | 3 | {
"blob_id": "bf164a638d6df250a85949b7771c270d51695f63",
"branch_name": "refs/heads/master",
"committer_date": 1547388659000,
"content_id": "7fe325ccd160cee07ab42338ce64ff62e9890f32",
"detected_licenses": [
"MIT"
],
"directory_id": "6a7ab3807bfba7c2e4601c16c67669da1d5a68be",
"extension": "py",
"fi... | 2.65625 | stackv2 | '''
A simple REST datastore API.
Once running, go to the root URL to explore the API using
[swaggerui](http://swagger.io/swagger-ui/).
'''
import logging
import sys
import argparse
from flask import Flask, request
from flask_restplus import Resource, Api, fields
log = logging.getLogger(__name__)
app = Flask(__name_... | 160 | 30.06 | 79 | 15 | 1,106 | python | [{"finding_id": "codeql_py/log-injection_5f97944f25ea0b4e_3dcaaba5", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
96,
123,
132
] | [
null,
null,
null
] | [
38,
39,
39
] | [
43,
44,
44
] | |
2024-11-19T03:12:40.720520+00:00 | 1,562,188,147,000 | b4fc9803049e55e96dd3e5a6a74b13d9259a79d8 | 2 | {
"blob_id": "b4fc9803049e55e96dd3e5a6a74b13d9259a79d8",
"branch_name": "refs/heads/master",
"committer_date": 1562188147000,
"content_id": "8b2411949afb0a5a0c431f284f93b7eca727e14c",
"detected_licenses": [
"MIT"
],
"directory_id": "d6259bfa86381e887ea47e9431bb065035925b15",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/bin/python3
import math
import urllib.request
import http.server
import json
import codecs
import shlex
import argparse
import datetime
import collections
import pickle
import os
import threading
import contextlib
date = datetime.date
from _secret_birthbot import HOOK, TOKEN
def to_slack(msg : str):
req = url... | 307 | 27.21 | 147 | 20 | 2,048 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ffe11222cc1129c2_0d9deede", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
195
] | [
null
] | [
43
] | [
46
] | |
2024-11-19T03:25:40.709211+00:00 | 1,605,613,817,000 | 2da1401d32b20802ca4e05be624fc83e4c249fe2 | 2 | {
"blob_id": "2da1401d32b20802ca4e05be624fc83e4c249fe2",
"branch_name": "refs/heads/master",
"committer_date": 1605613817000,
"content_id": "3a8ce65ff67160f7fa8741fc8d50f9800a0efe36",
"detected_licenses": [
"MIT"
],
"directory_id": "4347c8d8b792bfa478defbb54cf3110d4364d126",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
""" Simple scripts to interact with Polylogyx's Api.
:copyright: (c) 2019 by PolyLogyx.
:license: MIT, see LICENSE for more details.
"""
import argparse
import ast
import os
import tarfile
import time
import glob
import sys
sys.path.insert(0, os.path.dirname(os.path.dirnam... | 167 | 42.86 | 179 | 21 | 1,449 | python | [{"finding_id": "codeql_py/tarslip_abe3df24049a2065_87777ebc", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
39
] | [
null
] | [
5
] | [
8
] | |
2024-11-19T03:35:58.862693+00:00 | 1,585,610,014,000 | df458214cc63f00cfaa79fbe0d3e0959bbfd6837 | 2 | {
"blob_id": "df458214cc63f00cfaa79fbe0d3e0959bbfd6837",
"branch_name": "refs/heads/master",
"committer_date": 1585610014000,
"content_id": "6b64d91de6dcc184ae7eb1d008a70111543fafc2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "43dea3ac2f12cad95c2b94a5f037c4edd2ac3679",
"extension": "py"... | 2.421875 | stackv2 | # pylint: disable=too-many-instance-attributes, no-self-use
"""Update Role"""
from flask import request
from library.common import Common
from library.postgresql_queries import PostgreSQL
class UpdateVesselINIFiles(Common):
"""Class for Update Vessel INI Files"""
# INITIALIZE
def __init__(self):
... | 101 | 28.62 | 91 | 21 | 702 | python | [{"finding_id": "codeql_py/path-injection_fe078e6ed1d4fc1d_6b5949a2", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
95
] | [
null
] | [
27
] | [
31
] | |
2024-11-19T01:28:43.240545+00:00 | 1,560,989,144,000 | 314ffcd645d8e2175b24a6cc61d217b3210b7b7e | 3 | {
"blob_id": "314ffcd645d8e2175b24a6cc61d217b3210b7b7e",
"branch_name": "refs/heads/master",
"committer_date": 1560989144000,
"content_id": "0b6d72025957637c2816348dca928de9dfd5b0ff",
"detected_licenses": [
"MIT"
],
"directory_id": "664038873fb73c13505241f487adeaf88f3b57fa",
"extension": "py",
"fi... | 3.1875 | stackv2 | # app/robo_advisor.py
import csv
import json
import os
import datetime
import requests
from dotenv import load_dotenv
load_dotenv()
def to_usd(my_price):
return "${0:.2f}".format(my_price)
ALPHAVANTAGE_API_KEY = os.environ.get("ALPHAVANTAGE_API_KEY", "OOPS, please set env var called 'ALPHAVANTAGE_API_KEY'")
d... | 108 | 30.94 | 136 | 13 | 858 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_57ca9bddc5c9f382_0c4e69ca", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
89
] | [
null
] | [
7
] | [
47
] | |
2024-11-19T01:29:00.703278+00:00 | 1,591,538,947,000 | 44b24f6120b0adc10feafb9f289d88d036ff8bf3 | 3 | {
"blob_id": "44b24f6120b0adc10feafb9f289d88d036ff8bf3",
"branch_name": "refs/heads/master",
"committer_date": 1591538947000,
"content_id": "6415f2f565319cde7eb17dac534a5292c802da38",
"detected_licenses": [
"MIT"
],
"directory_id": "1aace1f1391ea95ec44af0b6f9239e976bcf9690",
"extension": "py",
"fi... | 2.96875 | stackv2 | from flask import Flask, jsonify
from flask import request
app = Flask(__name__)
@app.route('/')
def hello():
return "Hello World!"
'''
This method expects a json content.
Use header: 'Content-Type: application/json'
'''
@app.route('/post', methods=['POST'])
def post_method():
req = request.get_json()
... | 29 | 17.66 | 49 | 11 | 138 | python | [{"finding_id": "codeql_py/reflective-xss_f56e49f04a91f3ba_606fa2a2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
25
] | [
null
] | [
12
] | [
36
] | |
2024-11-19T01:29:22.741533+00:00 | 1,473,385,875,000 | f078e5ca3bf7ef3d8e52d17fe826cc425fb18a70 | 2 | {
"blob_id": "f078e5ca3bf7ef3d8e52d17fe826cc425fb18a70",
"branch_name": "refs/heads/master",
"committer_date": 1473385875000,
"content_id": "c0a1cbfc3eefd4ecdab68e2f25fba4f1997e81fc",
"detected_licenses": [
"MIT"
],
"directory_id": "2cf101fe7ca9ae4e0368b8144adfeaf2ca3f2972",
"extension": "py",
"fi... | 2.4375 | stackv2 | import re
from django import forms
from django.contrib.auth import get_user_model
from django.conf import settings
class SignUpForm(forms.ModelForm):
def __init__(self, *args, **kwargs):
super(SignUpForm, self).__init__(*args, **kwargs)
self.fields['email'].required = True
class Meta:
... | 41 | 30.9 | 89 | 13 | 289 | python | [{"finding_id": "codeql_py/polynomial-redos_8c3ea3e366fc0b8e_e6e0c7cc", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 1 | true | [
"CWE-1333"
] | [
"py/polynomial-redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '?'."
] | [
38
] | [
null
] | [
44
] | [
51
] | |
2024-11-19T01:29:37.131743+00:00 | 1,625,474,858,000 | 535e349b151125aafc5c5e2f8e5fc81be96fc679 | 2 | {
"blob_id": "535e349b151125aafc5c5e2f8e5fc81be96fc679",
"branch_name": "refs/heads/master",
"committer_date": 1625474858000,
"content_id": "1459092d03b08403c2683cced6f1e85b9bf0a86e",
"detected_licenses": [
"MIT"
],
"directory_id": "b39874c65dc5da92d85daee33a9e1bd1139dba78",
"extension": "py",
"fi... | 2.3125 | stackv2 | # !/usr/bin/env python3
# Copyright 2020 Florian Pigorsch, Kevin Eifinger & Contributors. All rights reserved.
#
# Use of this source code is governed by a MIT-style
# license that can be found in the LICENSE file.
"""A (Python) script to remotely set device profiles of an AVM Fritz!Box"""
import argparse
import hash... | 324 | 34.11 | 88 | 17 | 2,531 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_5c8003f24c4c7843_70e054cc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
40
] | [
null
] | [
24
] | [
51
] | |
2024-11-19T01:29:58.083500+00:00 | 1,403,676,312,000 | aff4d3014d031eedb819c346416a9cc7a78d1408 | 2 | {
"blob_id": "aff4d3014d031eedb819c346416a9cc7a78d1408",
"branch_name": "refs/heads/master",
"committer_date": 1403676312000,
"content_id": "b0fd2d13385101dd1a216247be410788c5b51f70",
"detected_licenses": [
"MIT"
],
"directory_id": "828d1987257419caacbb709db182e5e02ead0666",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python3
import argparse
import os
import requests
import multiprocessing
import sys
from gigacluster import CACHE
def build_readability_url(url, token):
return 'http://www.readability.com/api/content/v1/parser?url={}&token={}'.format(url, token)
def fetch(job):
url, path = job
#print('Fet... | 51 | 28.27 | 103 | 21 | 356 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_564a50bb3240746d_22d6ac72", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
18
] | [
null
] | [
17
] | [
39
] | |
2024-11-19T01:30:15.807768+00:00 | 1,501,906,383,000 | 91b9cf6e1b083c22fc437248a94cfb49abab72ec | 3 | {
"blob_id": "91b9cf6e1b083c22fc437248a94cfb49abab72ec",
"branch_name": "refs/heads/master",
"committer_date": 1501906383000,
"content_id": "7f57afd604215cbba7ea269f12e45bb8263a9933",
"detected_licenses": [
"MIT"
],
"directory_id": "4ef875f428ead5244edaa3588f05a8b0c5138562",
"extension": "py",
"fi... | 3.21875 | stackv2 | #!/usr/bin/python
# local imports
from session import session
from settings import settings
# python modules
import struct
from geopy.geocoders import GoogleV3
from geopy.exc import GeocoderTimedOut, GeocoderServiceError
'''
Note: This module serves as a handler of 'locations'. A location is something
with a GPS lat... | 108 | 23.07 | 89 | 18 | 698 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7abe2a4027acd135_b15a9de4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
94
] | [
null
] | [
11
] | [
89
] | |
2024-11-19T01:30:28.669078+00:00 | 1,515,392,749,000 | 30a694e292f5c6522c653f7c44095a7792802a1e | 2 | {
"blob_id": "30a694e292f5c6522c653f7c44095a7792802a1e",
"branch_name": "refs/heads/master",
"committer_date": 1515392749000,
"content_id": "c22db28b08729c51ac5033b7c6b0742b76e524d2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c09d0f8c5a3d81e1a78acc910cc59317a3c9ae71",
"extension": "py"... | 2.34375 | stackv2 | import json
import os
from flask import Flask
from flask import request
from flask import make_response
app = Flask(__name__)
@app.route('/webhook', methods=['POST'])
def webhook():
req = request.get_json(silent=True, force=True)
print("Request: ")
print(json.dumps(req, indent=4))
res = MakeWebReque... | 46 | 23.98 | 98 | 11 | 307 | python | [{"finding_id": "codeql_py/flask-debug_9be189d6e63e66d3_4886e0d2", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
44,
19
] | [
null,
null
] | [
5,
23
] | [
51,
26
] | |
2024-11-19T01:54:57.645407+00:00 | 1,463,405,548,000 | 2a47c8e21fdb1142687d36be3e3c673048c2fcb7 | 3 | {
"blob_id": "2a47c8e21fdb1142687d36be3e3c673048c2fcb7",
"branch_name": "refs/heads/master",
"committer_date": 1463405548000,
"content_id": "481541cabd54266c0e7a758fe4519195f01dce08",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fec39a990b6324531a42e8211bec6f28f8944a4e",
"extension": "py"... | 3.390625 | stackv2 | #!/usr/bin/env python
"""
This script will randomly generate a cluster.txt in the appropriate format
for testing purposes (so that scripts that work with it can be validated
without needing to be tested on actual cluster.txt files that may contain
privileged information).
cluster.txt layout:
column 1: node name
colu... | 85 | 28.34 | 77 | 17 | 590 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf50af56981445a0_43415ece", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
81
] | [
null
] | [
15
] | [
29
] | |
2024-11-19T01:55:07.865160+00:00 | 1,528,805,618,000 | 529744a82d8bfec4bdeb9e3f736a6b7f86da7c52 | 2 | {
"blob_id": "529744a82d8bfec4bdeb9e3f736a6b7f86da7c52",
"branch_name": "refs/heads/master",
"committer_date": 1528805618000,
"content_id": "5a9d419a4eb8451198891cca6f916fea25d76824",
"detected_licenses": [
"MIT"
],
"directory_id": "de75adc1056d30bd3998cf74268ab454a96b0e1f",
"extension": "py",
"fi... | 2.390625 | stackv2 | # secret_wallet.py
# create blockchain.info wallet without exposing your IP
#
# HingOn Miu
# https://blockchain.info/api/blockchain_wallet_api
import io
import pycurl
import random
import string
import json
import stem.process
from stem.util import term
# https://blog.blockchain.com/2014/12/03/improved-security-for... | 119 | 26.82 | 100 | 13 | 856 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_888ab0b3a8852901_fa8ade7c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
81,
109
] | [
null,
null
] | [
9,
9
] | [
47,
47
] | |
2024-11-19T01:55:08.794582+00:00 | 1,541,426,046,000 | 6bde635940a77398c094413be95f7ae0e0b8eddb | 3 | {
"blob_id": "6bde635940a77398c094413be95f7ae0e0b8eddb",
"branch_name": "refs/heads/master",
"committer_date": 1541426046000,
"content_id": "31382dacf837729ece54a888c0c52358ba3c4e8b",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "4cf78f428d143bfab578f85ce181ee5bf748045c",
"extension": "p... | 3 | stackv2 | #!/usr/bin/env python
#Use flot JavaScript plotting library to visualize a single order plot
import numpy as np
import json
import jinja2
def np_to_json(arr0, arr1):
'''
Take two numpy arrays, as in a plot, and return the JSON serialization for flot.
'''
data = np.array([arr0, arr1]).T #Transpose the... | 127 | 32.18 | 118 | 13 | 1,046 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_fb3b9d4324032fe5_56fbd5ef", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
38
] | [
null
] | [
19
] | [
60
] | |
2024-11-19T01:55:21.681684+00:00 | 1,364,325,946,000 | 8651e537ca3ad866436bebb8c2b89af1c9678ce3 | 3 | {
"blob_id": "8651e537ca3ad866436bebb8c2b89af1c9678ce3",
"branch_name": "refs/heads/master",
"committer_date": 1364325946000,
"content_id": "6de2792217e4c3365b38ead9deac1105e50f53e0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "befd7618c77b178d000b701a52809195b2d1f620",
"extension": "py"... | 2.609375 | stackv2 | #!/usr/bin/env python
# encoding: utf-8
"""
decorators.py
Created by Jason Elbourne on 2012-07-02.
Copyright (c) 2012 Jason Elbourne. All rights reserved.
"""
from models.oauth_models import OAuth_Token
import logging
def oauth_required(scope=None, realm='portal'):
""" This is a decorator to be used with RequestHan... | 55 | 34.58 | 137 | 20 | 482 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4dfb965b72cbef67_aaf18ccf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
28
] | [
null
] | [
19
] | [
42
] | |
2024-11-19T01:55:21.855184+00:00 | 1,475,391,735,000 | 06e5018b12fb96fcc3402c5bb2d3fc564c4a6dcf | 3 | {
"blob_id": "06e5018b12fb96fcc3402c5bb2d3fc564c4a6dcf",
"branch_name": "refs/heads/master",
"committer_date": 1475391735000,
"content_id": "af57d7e9df3ecae9fa08745b721a8385838102a7",
"detected_licenses": [
"MIT"
],
"directory_id": "86ac3b2904003f9e58948cb732c3c13cef50b30b",
"extension": "py",
"fi... | 2.78125 | stackv2 | #!/usr/bin/env python
from jinja2 import Environment, FileSystemLoader
import os, sys
if __name__ == '__main__' :
if len(sys.argv) <= 1:
print "usage: renderConfigFile.py $filename $args"
sys.exit(-1)
THIS_DIR = os.path.dirname(os.path.abspath(__file__))
j2_env = Environment(loader=FileSy... | 39 | 24.05 | 77 | 13 | 250 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_59d2df9965758967_19cf1ebb", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12
] | [
null
] | [
14
] | [
78
] | |
2024-11-19T02:06:40.751657+00:00 | 1,626,112,679,000 | 2198488f2264fa8d42be5c3d609815b4539630fc | 3 | {
"blob_id": "2198488f2264fa8d42be5c3d609815b4539630fc",
"branch_name": "refs/heads/master",
"committer_date": 1626112679000,
"content_id": "30c7fed4376e9cb74b1f7f51c407ef703d07c874",
"detected_licenses": [
"MIT"
],
"directory_id": "448f565c5b146ed2abe9b50853f6c0934cc7079a",
"extension": "py",
"fi... | 2.578125 | stackv2 | import binascii
import json
from collections import OrderedDict
from uuid import uuid4
import Crypto
from Crypto.Hash import SHA
from Crypto.PublicKey import RSA
from Crypto.Signature import PKCS1_v1_5
from django.http import JsonResponse
from rest_framework.response import Response
from rest_framework import status,... | 134 | 29.59 | 119 | 18 | 819 | python | [{"finding_id": "codeql_py/weak-crypto-key_58bc10b6be18e4d5_cb9ca27d", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
112
] | [
null
] | [
23
] | [
53
] | |
2024-11-19T02:06:44.226013+00:00 | 1,612,861,188,000 | c30ea664a69427b6bcdd5e49ec33fb4af2c35812 | 2 | {
"blob_id": "c30ea664a69427b6bcdd5e49ec33fb4af2c35812",
"branch_name": "refs/heads/master",
"committer_date": 1612861188000,
"content_id": "92ea4c9cfeae01593a9284bed520b7ac0317c852",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1b7f3ab42639ef4993cddb5c767b8ab86aeeeb88",
"extension": "py"... | 2.359375 | stackv2 | #!/usr/bin/env python
"""
Very simple HTTP server in python (Updated for Python 3.7)
Usage:
./dummy-web-server.py -h
./dummy-web-server.py -l localhost -p 8000
Send a GET request:
curl http://localhost:8000
Send a HEAD request:
curl -I http://localhost:8000
Send a POST request:
curl -d "foo=... | 127 | 33.71 | 118 | 20 | 1,062 | python | [{"finding_id": "codeql_py/command-line-injection_9c15c74d7c513a79_0fbd7b7e", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 2 | true | [
"CWE-078",
"CWE-022"
] | [
"py/command-line-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
90,
59
] | [
null,
null
] | [
38,
19
] | [
41,
27
] | |
2024-11-19T02:06:46.323641+00:00 | 1,546,496,614,000 | 679389627e76e03761cccae86b5a19cf2243dd77 | 2 | {
"blob_id": "679389627e76e03761cccae86b5a19cf2243dd77",
"branch_name": "refs/heads/master",
"committer_date": 1546496614000,
"content_id": "9f68163210426916ce50023b739048a2c24fda32",
"detected_licenses": [
"MIT"
],
"directory_id": "a303929774cc1fd9ddf726ff340d298896de599b",
"extension": "py",
"fi... | 2.4375 | stackv2 | # -*- coding: utf-8 -*-
"""A simple bot script, built on Pyramid using Cornice.
This sample script leverages the Pyramid web framework https://trypyramid.com/
with Cornice https://cornice.readthedocs.io. By default the web server will be
reachable at port 6543 you can change this default if desired
(see `pyramidWebe... | 160 | 31.29 | 79 | 16 | 1,217 | python | [{"finding_id": "codeql_py/request-without-cert-validation_867502fef1753b4e_97381afd", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
94
] | [
null
] | [
16
] | [
57
] | |
2024-11-19T02:06:54.784871+00:00 | 1,611,745,369,000 | 20d791a1902c72c767071db0952c1349350c33d8 | 3 | {
"blob_id": "20d791a1902c72c767071db0952c1349350c33d8",
"branch_name": "refs/heads/main",
"committer_date": 1611745369000,
"content_id": "220025e5007b0111d840f0dc06b94338ff4ddb33",
"detected_licenses": [
"MIT"
],
"directory_id": "abd2397c0b2f99b0d1232e0385b9af00ab3399f4",
"extension": "py",
"file... | 2.59375 | stackv2 | import omegaml as om
import json # No need to specify in the setup file (NNtS)
import dash # (NNtS)
import dash_bootstrap_components as dbc # Specify in the setup file ?
import dash_core_components as dcc # (NNtS)
import dash_html_components as html # (NNtS)
import numpy as np # (NNtS)
import omegaml as om # (NNt... | 406 | 38.15 | 175 | 21 | 2,906 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_19c5e95340a92d94_7086cdea", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
294
] | [
null
] | [
15
] | [
33
] | |
2024-11-19T02:07:35.456183+00:00 | 1,595,164,173,000 | ef80b160e0e4a1b624f96ef6cfc15c58e5b79142 | 2 | {
"blob_id": "ef80b160e0e4a1b624f96ef6cfc15c58e5b79142",
"branch_name": "refs/heads/master",
"committer_date": 1595164173000,
"content_id": "3a925f4134698648da6fa8a483ebfa3948fbc283",
"detected_licenses": [
"MIT"
],
"directory_id": "81007ab5618d9395f0bf1563c18bd9c7823b90fc",
"extension": "py",
"fi... | 2.46875 | stackv2 | from zoodb import *
from debug import *
import hashlib
import random
import pbkdf2
def newtoken(db, person):
hashinput = "%s%.10f" % (person.password, random.random())
person.token = hashlib.md5(hashinput).hexdigest()
db.commit()
return person.token
def login(username, password):
db_person = perso... | 64 | 25.47 | 62 | 11 | 433 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_585bb00008854a5a_0d032859", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
9
] | [
null
] | [
32
] | [
41
] | |
2024-11-19T02:31:16.915915+00:00 | 1,576,752,026,000 | f8b875595f336a2d7ad29db2b2f6051f5340f82d | 4 | {
"blob_id": "f8b875595f336a2d7ad29db2b2f6051f5340f82d",
"branch_name": "refs/heads/master",
"committer_date": 1576752026000,
"content_id": "578ec0799405244f0be8571bb8a479aefb71f6a1",
"detected_licenses": [
"Unlicense"
],
"directory_id": "084976caf539439a4a552093a76934eec9eb8128",
"extension": "py",... | 3.609375 | stackv2 | birthdays = {'rachel':'26th Sept 2006', 'ryan':'9th Jan 2003', 'chris':'28th Jan 1973', 'medha':'8th Sep 1973', 'rita':'14th July 1940'}
while True:
print('enter a name: (blank to quit]')
name = input()
if name == '':
break
if name in birthdays:
print(birthdays[name] + ' is the birthda... | 17 | 31.65 | 136 | 12 | 168 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_981e4c77db719204_f411728b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
10
] | [
null
] | [
15
] | [
62
] | |
2024-11-19T02:31:42.970897+00:00 | 1,612,575,126,000 | bd79b9e7c5a5cd9462bd1dfcc1841c2198275992 | 3 | {
"blob_id": "bd79b9e7c5a5cd9462bd1dfcc1841c2198275992",
"branch_name": "refs/heads/main",
"committer_date": 1612575126000,
"content_id": "df7835adfa42b2ced3f45603558418c71b4ef850",
"detected_licenses": [
"MIT"
],
"directory_id": "89cbd6a4bb6e010328aab4d5ed113ee079aa6711",
"extension": "py",
"file... | 2.65625 | stackv2 | import re
import numpy as np # linear algebra
import pandas as pd # data processing, CSV file I/O (e.g. pd.read_csv)
df_train = pd.read_csv('./uncased_processed_train.csv', index_col='id')
df_testa = pd.read_csv('./uncased_processed_testa.csv', index_col='id')
df_testb = pd.read_csv('./uncased_processed_testb.csv', i... | 79 | 30.25 | 78 | 13 | 759 | python | [{"finding_id": "codeql_py/overly-large-range_8b74f61a7412b149_ce5acceb", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range ... | [
14,
14,
14,
14
] | [
null,
null,
null,
null
] | [
30,
33,
36,
45
] | [
34,
37,
40,
49
] | |
2024-11-19T02:31:48.284143+00:00 | 1,518,059,189,000 | 6f1c5c3ddeaa8037dea16f03632f4b2c7642e453 | 3 | {
"blob_id": "6f1c5c3ddeaa8037dea16f03632f4b2c7642e453",
"branch_name": "refs/heads/master",
"committer_date": 1518059189000,
"content_id": "7ecdcf5bd794d831e01b3b35782a873ac2ac337d",
"detected_licenses": [
"MIT"
],
"directory_id": "244cbb74069b8201e83fb9b593ee0f9ad8332a83",
"extension": "py",
"fi... | 2.71875 | stackv2 | """Wrappers for GPG/Keybase functionality we need"""
from __future__ import print_function
import collections
import itertools as IT
import sys
import atexit
import os
import re
from shutil import rmtree
from base64 import b64encode, b64decode
import logging
import json
from tempfile import mkstemp, mkdtemp
import subp... | 460 | 29.85 | 78 | 18 | 3,422 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_74a8b4cd2308f9af_15cf1367", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text.\nThis expression stores [sensitive d... | [
146
] | [
null
] | [
24
] | [
34
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.