added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T03:44:27.101216+00:00 | 1,596,234,293,000 | 7c7033fd84b5b4bd389784222a90cdb16e57cbf5 | 3 | {
"blob_id": "7c7033fd84b5b4bd389784222a90cdb16e57cbf5",
"branch_name": "refs/heads/master",
"committer_date": 1596234293000,
"content_id": "5d92f1e69210f05e9bc03d6fa7677f1f7563833a",
"detected_licenses": [
"MIT"
],
"directory_id": "53b2703e78adc3f16f3b20abfc03dc603a329afd",
"extension": "py",
"fi... | 2.953125 | stackv2 | #!/usr/env/bin/python
import sys
import socket
import paramiko
def getStatus():
ip=''
port=
username=''
password=''
cmd='ls'
ssh=paramiko.SSHClient()
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
ssh.connect(ip,port,username,password)
stdin,stdout,stderr=ssh.exec_command(... | 44 | 23.36 | 61 | 10 | 262 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_5635b04158570b69_52175b60", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
12
] | [
null
] | [
5
] | [
62
] | |
2024-11-19T02:08:37.974509+00:00 | 1,573,156,043,000 | 006211e72517ce9172770e0e6eed59e532b2f4a3 | 4 | {
"blob_id": "006211e72517ce9172770e0e6eed59e532b2f4a3",
"branch_name": "refs/heads/master",
"committer_date": 1573156043000,
"content_id": "fe6a93b88a3d340f7113d39c97b2218f3f8afefe",
"detected_licenses": [
"MIT"
],
"directory_id": "d8d55793c7b2ab75c9d57147fcfb4610d2e25f67",
"extension": "py",
"fi... | 3.890625 | stackv2 | #! /usr/bin/python
#-*- coding:utf-8 -*-
#
# Jose Carlos Muñoz Ramirez.
# al15211330.AT.ite.DOT.edu.DOT.mx
# Libraries.
from decimal import *
import random
import os
# Generates pseudo-random numbers using "Multiplicative congruential method".
def CardGenerator(seed, a, m):
# xn it's a changing value of new seeds t... | 137 | 19.48 | 88 | 16 | 836 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e26e9ac7be668cbc_4dc9ee87", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
106
] | [
null
] | [
9
] | [
32
] | |
2024-11-19T02:58:04.540055+00:00 | 1,460,934,086,000 | 9b30c9b085626d1778e3faf186c9c115076dd831 | 3 | {
"blob_id": "9b30c9b085626d1778e3faf186c9c115076dd831",
"branch_name": "refs/heads/master",
"committer_date": 1460934086000,
"content_id": "5e572841a6241cc6dd4563471f2fe2ecaacea21f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2540eb81f1cd615611e2a5a9d7ba069df822b56a",
"extension": "py"... | 2.796875 | stackv2 | """
Copyright 2015 Zalando SE
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the
License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distrib... | 60 | 38.05 | 120 | 15 | 498 | python | [{"finding_id": "codeql_py/log-injection_d4bb87f83baf5bbc_6f496ea4", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
34,
44
] | [
null,
46
] | [
60,
74
] | [
111,
86
] | |
2024-11-19T02:58:16.982598+00:00 | 1,622,265,727,000 | 0ecf402fb48de5143d08e6af6bf3de958fb7cee4 | 3 | {
"blob_id": "0ecf402fb48de5143d08e6af6bf3de958fb7cee4",
"branch_name": "refs/heads/main",
"committer_date": 1622265727000,
"content_id": "4d2f6f386a30ba62e37959a8e9b95c903ef51dbb",
"detected_licenses": [
"MIT"
],
"directory_id": "6bf0a8d3f915b21d0afa24f928d1543dc2a7574d",
"extension": "py",
"file... | 3.34375 | stackv2 | # update the fucntions to count number of number(whole, decimal and fractions)
# in article.txt
# use regex to match numbers and fractions
import re
frac_pattern = r'(-?\d+\\tinyfrac{\d+}{\d+}[^A-Za-z]|-?\\frac{\d+}{\d+}[^A-Za-z])'
number_pattern = r"([^\na-zA-Z{./\\}]\d+ |\d+\.\d+|\d+[^\n/:\\)-}])"
numbers = []
fract... | 50 | 25.42 | 82 | 11 | 348 | python | [{"finding_id": "codeql_py/overly-large-range_2bb83fa4b6c15ae7_e297b9f4", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[)*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-z{{|}}\\]... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[)*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-z{{|}}\\]."
] | [
6
] | [
null
] | [
63
] | [
66
] | |
2024-11-19T03:10:03.570603+00:00 | 1,591,559,992,000 | dc691a52e333f9a4f2257bd8e9c3b26c08781460 | 3 | {
"blob_id": "dc691a52e333f9a4f2257bd8e9c3b26c08781460",
"branch_name": "refs/heads/master",
"committer_date": 1591559992000,
"content_id": "230ca6e0df053c519998819182a9382daaf6298f",
"detected_licenses": [
"MIT"
],
"directory_id": "9473d3f1c6ad6ab97c63fd28f32ab38a6714fe16",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
"""
Downloads MRI data and mask for CorpusCallosum and prepares it.
Data is located in the IntroToDeepLearning repository by Robert Brown
https://github.com/robb-brown/IntroToDeepLearning
"""
import os
import glob
import urllib.request
import nilearn as nilearn
import ta... | 84 | 23.69 | 115 | 13 | 616 | python | [{"finding_id": "codeql_py/tarslip_ea77268b6ea2230e_748ebb49", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
33
] | [
null
] | [
null
] | [
4
] | |
2024-11-19T03:10:03.619949+00:00 | 1,602,580,708,000 | cdf4fb722ca59d4434c90fc648a8752c6ede7f65 | 4 | {
"blob_id": "cdf4fb722ca59d4434c90fc648a8752c6ede7f65",
"branch_name": "refs/heads/main",
"committer_date": 1602580708000,
"content_id": "959f836ffab0a7f716abf6a9d0ce25f88fb1799d",
"detected_licenses": [
"MIT"
],
"directory_id": "3ef7c1abab57d5b92cd39284a30f9468a3e1098a",
"extension": "py",
"file... | 3.5625 | stackv2 | import random
import string
user = []
details = []
class Credentials:
"""
Class that generates new instances of user credentials.
"""
def __init__ (self, site_name, user_name, password):
self.site_name = site_name
self.user_name = user_name
self.password = password
d... | 151 | 27.46 | 141 | 20 | 902 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d47d626c75873993_2ba96624", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
116
] | [
null
] | [
53
] | [
65
] | |
2024-11-19T03:10:28.302241+00:00 | 1,525,272,384,000 | f572b4cbad5aa68016fddd2c1249dbb20c6ffcc6 | 4 | {
"blob_id": "f572b4cbad5aa68016fddd2c1249dbb20c6ffcc6",
"branch_name": "refs/heads/master",
"committer_date": 1525272384000,
"content_id": "fddc56c691ca1fb20ea035bdde4ba560df7773c8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e6d36d0763b9fc5771de6238db05cc1f080c0ca4",
"extension": "py"... | 3.53125 | stackv2 | # gogetit.py
# Given a filename that point to a excelfile on disk. Try to get the password for the Excel file.
# Use either a wordlist or generate a sequence of letters / numbers
from zipfile import ZipFile
def scan_zip_passwords(filename='evil.zip', wordlist='dictionary.txt', verbose=False):
with ZipFile(filena... | 30 | 28.4 | 97 | 19 | 186 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6d8d86d4814ca444_27b0371f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
15
] | [
null
] | [
27
] | [
55
] | |
2024-11-19T03:10:35.020220+00:00 | 1,617,821,656,000 | 499d956e3b130b9d6f15baa451c048f41cd5640c | 2 | {
"blob_id": "499d956e3b130b9d6f15baa451c048f41cd5640c",
"branch_name": "refs/heads/master",
"committer_date": 1617821656000,
"content_id": "2d3ceaee5f83654ccc8430a901f92abf19b92362",
"detected_licenses": [
"MIT"
],
"directory_id": "fa42591d173e80eddc78b093a630ebffa58a6574",
"extension": "py",
"fi... | 2.40625 | stackv2 | import inspect
import os
from jinja2 import Environment, FileSystemLoader
from parse import parse
from requests import Session as RequestsSession
from webob import Request
from whitenoise import WhiteNoise
from wsgiadapter import WSGIAdapter as RequestsWSGIAdapter
from .middleware import Middleware
from .response imp... | 115 | 31.9 | 84 | 19 | 723 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_78cb131666b6ca6e_fc572fd3", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
19
] | [
21
] | [
30
] | [
10
] | |
2024-11-19T03:22:33.255536+00:00 | 1,487,422,114,000 | 876bfec4023df67d6da0971651e72d1559491c95 | 3 | {
"blob_id": "876bfec4023df67d6da0971651e72d1559491c95",
"branch_name": "refs/heads/master",
"committer_date": 1487422114000,
"content_id": "39a91305a9ebc7132fd667c7380cbd03a74b7cb3",
"detected_licenses": [
"MIT"
],
"directory_id": "e493939778661ebef10141a6bad1670c86498e29",
"extension": "py",
"fi... | 2.78125 | stackv2 | import re
import os
from os.path import join
from urlparse import urlparse
from pyquery import PyQuery as q
import tinycss
def ruleset_as_dict(ruleset):
out = {}
for decl in ruleset.declarations:
value = decl.value.as_css() # eg '5px 2px' or 'url(foo.git) no-repeat top right'
out[decl.name] = ... | 191 | 30.65 | 96 | 17 | 1,398 | python | [{"finding_id": "codeql_py/overly-large-range_459fd7ece75dc984_b504e864", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\w in the same character class."
] | [
70
] | [
null
] | [
43
] | [
46
] | |
2024-11-19T03:22:41.744595+00:00 | 1,576,950,085,000 | 98568b1af656177ed084c8689ef36dfb74de3fc1 | 4 | {
"blob_id": "98568b1af656177ed084c8689ef36dfb74de3fc1",
"branch_name": "refs/heads/master",
"committer_date": 1576950085000,
"content_id": "015fe6da84593b1de26843c662bef6176277ecbf",
"detected_licenses": [
"MIT"
],
"directory_id": "3331fe3bf3e1d8e62dcbb38874bbafd26cc0931b",
"extension": "py",
"fi... | 3.921875 | stackv2 | '''
--- Part Two ---
An Elf just remembered one more important detail: the two adjacent matching digits are not part of a larger group of matching digits.
Given this additional criterion, but still ignoring the range rule, the following are now true:
112233 meets these criteria because the digits never decrease and a... | 70 | 32.39 | 133 | 13 | 572 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_22d441138d18046c_67c09419", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
66
] | [
null
] | [
11
] | [
91
] | |
2024-11-19T03:22:46.263943+00:00 | 1,526,723,543,000 | 875d4d7aa8b14bc6b107872aab8a47f2f4bf215e | 3 | {
"blob_id": "875d4d7aa8b14bc6b107872aab8a47f2f4bf215e",
"branch_name": "refs/heads/master",
"committer_date": 1526723543000,
"content_id": "8eee01b6c720b2ec9aec73f7eed9fa0190fb469c",
"detected_licenses": [
"MIT"
],
"directory_id": "541ec83ef9a5804c9bd83546ad849b54483a8c1b",
"extension": "py",
"fi... | 2.671875 | stackv2 | from flask import Flask, redirect, url_for, render_template, request, send_from_directory, send_file
app = Flask(__name__)
app.config['DEBUG'] = True
@app.route("/users")
def index():
return "Users Content"
#@app.route("/users/<string:username>")
#exclude forward slashes
@app.route("/users/<username>")
def show_... | 34 | 24.44 | 100 | 10 | 223 | python | [{"finding_id": "codeql_py/reflective-xss_2f6439f924cbaf64_00ecfcdf", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scriptin... | [
14,
18,
27,
31
] | [
null,
null,
null,
null
] | [
12,
12,
12,
12
] | [
35,
45,
39,
39
] | |
2024-11-19T03:23:01.547821+00:00 | 1,474,472,072,000 | cd77b81b9ed1713eb799642fd0edbeacc5159955 | 3 | {
"blob_id": "cd77b81b9ed1713eb799642fd0edbeacc5159955",
"branch_name": "refs/heads/master",
"committer_date": 1474472072000,
"content_id": "28bed17e2a1b5765c9823b3eab183bd3385a3067",
"detected_licenses": [
"MIT"
],
"directory_id": "44ba172a2f67741c3894ed0be2f4df167c08ff1c",
"extension": "py",
"fi... | 2.65625 | stackv2 | import datetime
import os
import random
import requests
import subprocess
import time
import traceback
import twitter
RATE = 60 * 30
FLICKR_API_KEY = None
TWITTER_CONSUMER_KEY = None
TWITTER_CONSUMER_SECRET = None
TWITTER_ACCESS_TOKEN_KEY = None
TWITTER_ACCESS_TOKEN_SECRET = None
MODE_NAMES = [
'primitives',
... | 133 | 25.37 | 73 | 12 | 968 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_fa8f4d1964c44bcf_74ae7677", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text."
] | [
63
] | [
null
] | [
18
] | [
27
] | |
2024-11-19T03:43:58.858655+00:00 | 1,585,424,906,000 | 6c7ad3de86c7b2e43d4adef194f637e463c53779 | 3 | {
"blob_id": "6c7ad3de86c7b2e43d4adef194f637e463c53779",
"branch_name": "refs/heads/master",
"committer_date": 1585424906000,
"content_id": "e959a60e377e0f03bea050857530c07b511c506a",
"detected_licenses": [
"MIT"
],
"directory_id": "d5415355135264f940c9fe48793e604de2f60636",
"extension": "py",
"fi... | 2.515625 | stackv2 | """To use this script, install the provided requirements.txt file and
supply a secrets.py file with the required parameters listed below.
JSON records will be written into the specified file and HTML reports
will be written into an outputs filter under the provided directory.
"""
from datetime import datetime, timed... | 301 | 31.33 | 109 | 18 | 2,308 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_b17a8926eaef0fa3_f908201c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
207
] | [
null
] | [
16
] | [
34
] | |
2024-11-19T03:44:11.626770+00:00 | 1,601,497,926,000 | 4dff5a5e0445ee9560036cc0a1dbed7b5d831d00 | 3 | {
"blob_id": "4dff5a5e0445ee9560036cc0a1dbed7b5d831d00",
"branch_name": "refs/heads/master",
"committer_date": 1601497926000,
"content_id": "6bf191844933521032b0746d3f0d085473ed924d",
"detected_licenses": [
"MIT"
],
"directory_id": "fb6b2fa4a88798563afd25b6cd97019bce2228db",
"extension": "py",
"fi... | 2.515625 | stackv2 | import http.server
import os
import urllib.request
import contextlib
import socket
import sys
import webbrowser
class DualStackServer(http.server.ThreadingHTTPServer):
def server_bind(self):
# suppress exception when protocol is IPv4
with contextlib.suppress(Exception):
self.socket.set... | 70 | 29.46 | 80 | 17 | 490 | python | [{"finding_id": "codeql_py/partial-ssrf_0d67ee053916f23a_8b647ebf", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).\nPart of the URL of this request depends on a [user-provided value](3)."
] | [
31
] | [
null
] | [
23
] | [
50
] | |
2024-11-19T01:34:58.053422+00:00 | 1,555,674,627,000 | 16f07d78048f01ebd4183820be63b65caeb9eee5 | 3 | {
"blob_id": "16f07d78048f01ebd4183820be63b65caeb9eee5",
"branch_name": "refs/heads/master",
"committer_date": 1555674627000,
"content_id": "b9d455e756d7676c992f9a2faca808039cbfcb8e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c4d573ac2fd26a4fffcdb38c353a8265ebfb080d",
"extension": "py"... | 2.515625 | stackv2 | #!/usr/bin/python3
"""
Python interface to Apache PDFBox.
"""
import hashlib
import html.parser
import os
import pathlib
import re
import shutil
import urllib.request
import appdirs
import pkg_resources
import sarge
from sarge import run, Capture
pdfbox_archive_url = 'https://archive.apache.org/dist/pdfbox/'
class... | 272 | 42.28 | 132 | 22 | 2,325 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a96e50d315e5bdd9_0ee427b2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (p... | [
179,
270
] | [
null,
null
] | [
15,
15
] | [
18,
18
] | |
2024-11-19T01:55:41.854148+00:00 | 1,560,693,382,000 | 9bdb10c3d2d9c45829f99bcd09f66e675edb0440 | 2 | {
"blob_id": "9bdb10c3d2d9c45829f99bcd09f66e675edb0440",
"branch_name": "refs/heads/master",
"committer_date": 1560693382000,
"content_id": "857943761d50061c99ebfa75c3459971a7ede4db",
"detected_licenses": [
"MIT"
],
"directory_id": "1346a973aa44fc65086b98358629bfb491d4f71a",
"extension": "py",
"fi... | 2.3125 | stackv2 |
import json
import logging
logger = logging.getLogger('django')
from django import http
from django.contrib.auth import login, authenticate, logout
from django.db import DatabaseError
from django.shortcuts import render, redirect
import re
# Create your views here.
from django.urls import reverse
from django.views im... | 309 | 25.9 | 96 | 16 | 2,107 | python | [{"finding_id": "codeql_py/url-redirection_1bbaeaffdd37e3e9_58e2e15e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
176
] | [
null
] | [
33
] | [
37
] | |
2024-11-19T02:08:03.595503+00:00 | 1,656,826,851,000 | cce76ce0610332325ba462ceddc19e946f88c9db | 3 | {
"blob_id": "cce76ce0610332325ba462ceddc19e946f88c9db",
"branch_name": "refs/heads/master",
"committer_date": 1656827117000,
"content_id": "226f8290984a696a0ba1af23bbb11b4a96b572e1",
"detected_licenses": [
"MIT"
],
"directory_id": "ab9a0585ebdb37a8dbc3f6d5d5cbdae8db517b17",
"extension": "py",
"fi... | 2.546875 | stackv2 | #!/usr/bin/python3
import argparse
import re
import sys
debug = False
# debug = True
endingBlockRegex = re.compile(r"^\s*([\[\]\{\},;]|</|-->|\*/)+\s*")
startingBlockRegex = re.compile(r'^\s*(\n|#|/\*|//|/\*|<!--|@|template).*')
modifiersRegex = re.compile(r"(public|static|abstract|private|final|const)\s*")
continua... | 169 | 32.15 | 109 | 22 | 1,257 | python | [{"finding_id": "codeql_py/bad-tag-filter_d8301a3dd6d844d9_6962a12a", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression only parses --> and not --!> as a HTML comment end tag.", "remediation": "", "location":... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression only parses --> and not --!> as a HTML comment end tag."
] | [
9
] | [
null
] | [
33
] | [
66
] | |
2024-11-19T02:17:16.876718+00:00 | 1,447,966,338,000 | 64a38713acb34868c0c3dddfc1f1f6e93880b5a8 | 4 | {
"blob_id": "64a38713acb34868c0c3dddfc1f1f6e93880b5a8",
"branch_name": "refs/heads/master",
"committer_date": 1447966338000,
"content_id": "ec4b2bd8684a5bf00ff4c0e40d37b75ba7248c74",
"detected_licenses": [
"MIT"
],
"directory_id": "f7f4f273405d5f7c3dda1a996cf1f7b8b06806b2",
"extension": "py",
"fi... | 3.609375 | stackv2 | # Fallout password terminal challenge
# intro message
print('''
Welcome to the Fallout Terminal Management System.
Details about the services offered by this Terminal are listed below.
Have a nuclear day!
Mushroom Corp. Security Systems.
==========================================... | 112 | 33.34 | 122 | 17 | 971 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a2cbd7976253793d_7737957f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (pas... | [
70,
96
] | [
null,
null
] | [
15,
15
] | [
95,
16
] | |
2024-11-19T02:17:26.797135+00:00 | 1,439,144,945,000 | ecf06f4a90829f8e6b5b486c50126922398db717 | 2 | {
"blob_id": "ecf06f4a90829f8e6b5b486c50126922398db717",
"branch_name": "refs/heads/master",
"committer_date": 1439144945000,
"content_id": "31366e3b12b29228b852c42455d8aa477e1f3470",
"detected_licenses": [
"MIT"
],
"directory_id": "a392e8642663ece07dd818ca3ec3ad7b31583efc",
"extension": "py",
"fi... | 2.484375 | stackv2 | import requests
import Image
import StringIO
from flask import Flask, jsonify, render_template, request,Blueprint
index = Blueprint(__name__, __name__,template_folder='templates',static_folder='static')
def getimage(isbn):
import requests
import Image
import StringIO
outfile=StringIO.StringIO()
x=requests.ge... | 25 | 26.4 | 95 | 12 | 200 | python | [{"finding_id": "codeql_py/partial-ssrf_a42771dd5873c23f_3e8bc210", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
12
] | [
null
] | [
5
] | [
88
] | |
2024-11-19T02:18:12.612728+00:00 | 1,542,152,988,000 | 97d4c9335ed1c7e35711fd41edb4095b40cc6926 | 3 | {
"blob_id": "97d4c9335ed1c7e35711fd41edb4095b40cc6926",
"branch_name": "refs/heads/master",
"committer_date": 1542152988000,
"content_id": "4c914c128885717809af23815b2240bb13cbcadf",
"detected_licenses": [
"MIT"
],
"directory_id": "0e3bab212a2e993a0bc8b5182efc6df888cb660b",
"extension": "py",
"fi... | 2.90625 | stackv2 | '''ssh client
use with, or finally close
See
https://daanlenaerts.com/blog/2016/07/01/python-and-ssh-paramiko-shell/
https://stackoverflow.com/questions/39606573/unable-to-kill-python-script
'''
import threading
import paramiko
class Ssh:
'''communicate with miner through ssh'''
shell = None
client = None
... | 85 | 33.67 | 106 | 17 | 642 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_9cb75ae514f59dc4_9989bfc8", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
23
] | [
null
] | [
9
] | [
81
] | |
2024-11-19T02:18:13.516522+00:00 | 1,591,940,438,000 | 42b4c22aa6473c18e0e59421efbf27d957e62683 | 3 | {
"blob_id": "42b4c22aa6473c18e0e59421efbf27d957e62683",
"branch_name": "refs/heads/master",
"committer_date": 1591940438000,
"content_id": "812d6ddfcc2deebbe1da343cca625f7472510340",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "28e171e27c3d7cc4ababbb2672c223ce3a9728c0",
"extension": "py"... | 2.640625 | stackv2 | # encoding=utf8
# 文件上传,上传文件在同一目录中
import requests
files = {"file": open("time.jpg", "rb")}
r = requests.post("http://httpbin.org/post", files=files)
print(r.text)
# cookies
import requests
r = requests.get("https://www.baidu.com")
print(r.cookies)
for key,value in r.cookies.items():
print(key + "=" + value)
# ... | 129 | 21.09 | 90 | 10 | 914 | python | [{"finding_id": "codeql_py/request-without-cert-validation_71ccb80f25b28235_307d80b1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
52
] | [
null
] | [
12
] | [
62
] | |
2024-11-19T02:18:14.303872+00:00 | 1,604,595,164,000 | fc49b76f46ff586d78e7a150f0af1c8d48ad171a | 4 | {
"blob_id": "fc49b76f46ff586d78e7a150f0af1c8d48ad171a",
"branch_name": "refs/heads/master",
"committer_date": 1604595164000,
"content_id": "3aa9d1bfb407272cbf145db8ea5e408320367fb2",
"detected_licenses": [
"MIT"
],
"directory_id": "e32ab58be95da77c4974cfa816496ce4760c7706",
"extension": "py",
"fi... | 3.921875 | stackv2 | """
Demonstrator appplication for GPS API
"""
import sys
import gps_api
# global variables
name = ""
port = ""
GPS = None
destination = ()
def welcome():
"""
welcome message and prompt the user to enter the user name and
the port name to which the GPS module is attached on the computer
"""
global... | 125 | 28.74 | 97 | 16 | 813 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7b0670dade6e539d_f21df5f7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
57,
72
] | [
null,
null
] | [
16,
20
] | [
96,
92
] | |
2024-11-19T02:29:52.367764+00:00 | 1,622,855,206,000 | e92c51bc5dacf2004922231dcf5192b25bcedb8f | 3 | {
"blob_id": "e92c51bc5dacf2004922231dcf5192b25bcedb8f",
"branch_name": "refs/heads/master",
"committer_date": 1622855206000,
"content_id": "c7cbb7900ddc3d3075d12e3fedfe222f7cbc5b65",
"detected_licenses": [
"MIT"
],
"directory_id": "85b6330745d730fb9c80f697ba828111f1dba984",
"extension": "py",
"fi... | 3.15625 | stackv2 | import sqlite3
import hashing
from cryptography.fernet import Fernet
import sys
class Database:
def __init__(self):
self.conn = sqlite3.connect('database.db')
self.cursor = self.conn.cursor()
def createTable(self):
try:
self.cursor.execute('''CREATE TABLE passwords... | 86 | 32.53 | 132 | 15 | 558 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cf4e8a6fa36be5f9_d1a184ff", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
79
] | [
null
] | [
19
] | [
97
] | |
2024-11-19T02:29:53.906315+00:00 | 1,621,982,265,000 | 129bd078ab64283f43cbbd90ce6f0620355c6ee8 | 3 | {
"blob_id": "129bd078ab64283f43cbbd90ce6f0620355c6ee8",
"branch_name": "refs/heads/master",
"committer_date": 1621982265000,
"content_id": "35fee1ebd10addf2764c7811a972f16b71b444b6",
"detected_licenses": [
"MIT"
],
"directory_id": "638c7d7c45ba8d5f7f37aa6aec8ca3a5f8e43b92",
"extension": "py",
"fi... | 2.984375 | stackv2 | import re
import requests as requests
from bs4 import BeautifulSoup
from requests.exceptions import SSLError, ConnectionError
class VesselFinderScraper:
def get_page(self, url, counter=10, dynamic_verification=True):
"""
Content retriever
:param dynamic_verification: try without SSL verif... | 78 | 34.32 | 148 | 19 | 687 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2e2c20e3ba227158_6d095a6c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
25
] | [
null
] | [
28
] | [
89
] | |
2024-11-19T02:30:09.849498+00:00 | 1,605,179,077,000 | b9d9d9daf0e9741fe6a179c33fe08933b67703a4 | 3 | {
"blob_id": "b9d9d9daf0e9741fe6a179c33fe08933b67703a4",
"branch_name": "refs/heads/main",
"committer_date": 1605179077000,
"content_id": "3cb30c4823dca5d6ab3997c6edc25d76538bfda0",
"detected_licenses": [
"MIT"
],
"directory_id": "8ee14b8fcbb8468469682fb6a1cbc818b3902c7a",
"extension": "py",
"file... | 3.234375 | stackv2 | import streamlit as st
import requests, io
import matplotlib.pyplot as plt
from PIL import Image
import numpy as np
CHOICES = {1: "Upload an image.", 2: "Enter a Image url"}
def format_func(option):
return CHOICES[option]
def file_uploader():
st.markdown("**How do you want to upload the image ?**")
... | 44 | 30.8 | 101 | 16 | 322 | python | [{"finding_id": "codeql_py/full-ssrf_57202cdafded58c2_29b652d9", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
38
] | [
null
] | [
28
] | [
45
] | |
2024-11-19T02:30:11.293621+00:00 | 1,590,095,391,000 | 5e13db9adec4ff6cb5119f1a40207cbc0f362bb8 | 2 | {
"blob_id": "5e13db9adec4ff6cb5119f1a40207cbc0f362bb8",
"branch_name": "refs/heads/master",
"committer_date": 1590095391000,
"content_id": "43e9e81340cf2fa33732f905a5b275179b1ed378",
"detected_licenses": [
"MIT"
],
"directory_id": "af5e8c163bd1683fc2a52869feb37a183d885e0e",
"extension": "py",
"fi... | 2.40625 | stackv2 | from flask import Blueprint, request
from vvs.libs import folders_setup, image_capture, image_compare
from vvs.libs.storage import GoogleClient
import os
from datetime import datetime
# need to config this
BASE_DIR = 'base'
DIFFERENCES_DIR = 'differences'
TARGETS_DIR = 'targets'
DEFAULT_RESOLUTION = (1024, 768)
SCR... | 215 | 35.82 | 98 | 17 | 1,563 | python | [{"finding_id": "codeql_py/reflective-xss_c30bb37841ecc4e2_665b95c2", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
115,
211
] | [
null,
null
] | [
16,
16
] | [
41,
41
] | |
2024-11-19T02:30:18.052727+00:00 | 1,558,016,124,000 | 8250d8d04888fca5c1eb523ab5901672fbcd313b | 4 | {
"blob_id": "8250d8d04888fca5c1eb523ab5901672fbcd313b",
"branch_name": "refs/heads/master",
"committer_date": 1558016124000,
"content_id": "688761aa98c2c05f9c0051faa30e8195a4f407c4",
"detected_licenses": [
"MIT"
],
"directory_id": "1d7be9d6cf8fbe8b56f384e4d9596e1ada2aab9a",
"extension": "py",
"fi... | 3.546875 | stackv2 | import json
import urllib
import urllib2
def read_api_key(key_file_name):
"""
Reads the API key from a file called key_file_name.
Returns either None (no key found), or a string representing the key.
Remember: put *.key in your .gitignore file to avoid committing it!
"""
# See Python Anti-Patte... | 85 | 30.41 | 109 | 16 | 606 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7ac9fb7b9bb1d44e_cdf86bb4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
53
] | [
null
] | [
15
] | [
25
] | |
2024-11-19T02:41:50.416413+00:00 | 1,540,004,197,000 | a91861d4353253d4b9439992a132edf10fbe64af | 3 | {
"blob_id": "a91861d4353253d4b9439992a132edf10fbe64af",
"branch_name": "refs/heads/master",
"committer_date": 1540004197000,
"content_id": "a67affd5d6c3b9130b36f34371cb347810e0c812",
"detected_licenses": [
"MIT"
],
"directory_id": "19f0913c565bfc2141fe8b2d46473d1c289da1c0",
"extension": "py",
"fi... | 2.671875 | stackv2 | #!/usr/local/bin/python
# -*- coding: utf-8 -*-
from flask import Flask, jsonify, request
from influxdb import InfluxDBClient
from apscheduler.schedulers.background import BackgroundScheduler
from pytz import timezone
from datetime import datetime
import json
import numpy as np
from sklearn import datasets,svm
from sk... | 136 | 25.96 | 89 | 15 | 1,046 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a637ecaf9c1f17ae_f1ef9b04", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-215",
"CWE-079"
] | [
"py/clear-text-logging-sensitive-data",
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
124,
136,
131
] | [
null,
null,
null
] | [
44,
5,
12
] | [
52,
51,
21
] | |
2024-11-19T02:41:57.000134+00:00 | 1,693,300,805,000 | a385b808cc0562304294aeb51341da15341992cc | 3 | {
"blob_id": "a385b808cc0562304294aeb51341da15341992cc",
"branch_name": "refs/heads/master",
"committer_date": 1693300805000,
"content_id": "601422ee4766ddfbdefc0870b3e57e57efbd0d48",
"detected_licenses": [
"MIT"
],
"directory_id": "97884252481ff208519194ecd63dc3a79c250220",
"extension": "py",
"fi... | 3.046875 | stackv2 | """
TODO: write doc
"""
__title__ = "FITS utilities"
import logging
import re
from typing import Union, Any, cast, Optional, List, Callable, Dict
import numpy as np
from astropy.io import fits
from numpy.typing import NDArray
from pyobs.utils.time import Time
log = logging.getLogger(__name__)
def fitssec(hdu: Any... | 288 | 27.88 | 113 | 20 | 1,927 | python | [{"finding_id": "codeql_py/redos_e3cb2b61394b4ae4_57408ef2", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '{{-|-' and containing many repeti... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '{{-|-' and containing many repetitions of '-'."
] | [
113
] | [
null
] | [
75
] | [
84
] | |
2024-11-19T02:50:45.816526+00:00 | 1,500,875,372,000 | ec3c5219086bc9934b4624a2d839b9492e85e8c4 | 4 | {
"blob_id": "ec3c5219086bc9934b4624a2d839b9492e85e8c4",
"branch_name": "refs/heads/master",
"committer_date": 1500875372000,
"content_id": "9215d36d88b9933307f50a65b3dc1bcdc51baf60",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "913409d550fd5341dc0241c2a46d8965ead69cca",
"extension": "py"... | 4.375 | stackv2 | '''
Created on 2017. 4. 7.
@author: Byoungho Kang
'''
def sayHello(name):
greeting = "Hello " + name + "."
return greeting
def noReturn():
print("This function doesn't have return.")
def keywordArgs(name, age):
print("Hello! I'm", name + ",", age, "years old.")
def defaultArgs(name, age, nation... | 45 | 27.2 | 80 | 15 | 359 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4206293ac01af57c_91aea36c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
18
] | [
null
] | [
62
] | [
73
] | |
2024-11-18T18:05:55.779824+00:00 | 1,584,427,146,000 | 5c75bea7b7013b47e2f77e92e247f5dd6277c29b | 3 | {
"blob_id": "5c75bea7b7013b47e2f77e92e247f5dd6277c29b",
"branch_name": "refs/heads/master",
"committer_date": 1584427146000,
"content_id": "76fff056c9623d343dd7ccc86ef917c7a5a85aa2",
"detected_licenses": [
"MIT"
],
"directory_id": "b16440e1a6ad52d7bb7c88fb2a90df376be63f0b",
"extension": "py",
"fi... | 2.546875 | stackv2 | """
Preprocess PubMed abstracts or MIMIC-III reports
"""
import re
import pandas as pd
import os
df = pd.read_csv('../mimic3/NOTEEVENTS.csv')
df.CHARTDATE = pd.to_datetime(df.CHARTDATE)
df.CHARTTIME = pd.to_datetime(df.CHARTTIME)
df.STORETIME = pd.to_datetime(df.STORETIME)
df2 = df[df.SUBJECT_ID.notnull()]
df2 = df2[... | 57 | 26.12 | 75 | 13 | 445 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f5ded786a107b357_f40c3823", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
41
] | [
null
] | [
19
] | [
62
] | |
2024-11-18T18:05:55.885917+00:00 | 1,611,272,904,000 | f429d0365daaebad625ea1dfae184af730a21371 | 2 | {
"blob_id": "f429d0365daaebad625ea1dfae184af730a21371",
"branch_name": "refs/heads/master",
"committer_date": 1611272904000,
"content_id": "b797a969916e91f98698a456aff32874d683c2b6",
"detected_licenses": [
"MIT"
],
"directory_id": "f73bf3b6c63327a573dd421c3ed55621409489b6",
"extension": "py",
"fi... | 2.375 | stackv2 | # Create your tasks here
from __future__ import absolute_import, unicode_literals
from .models import *
from celery import shared_task
from celery.task import periodic_task
from datetime import datetime, timedelta
import requests
import re
import json
#@periodic_task(run_every=(timedelta(seconds=30)), name='hello_wor... | 100 | 33.33 | 116 | 17 | 649 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2c3b7d987f247f7d_91c26674", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
54,
62
] | [
null,
null
] | [
17,
17
] | [
76,
88
] | |
2024-11-18T18:06:02.852282+00:00 | 1,515,119,651,000 | edadb47d1fe7b48801a19ee61076cf1ba949424e | 2 | {
"blob_id": "edadb47d1fe7b48801a19ee61076cf1ba949424e",
"branch_name": "refs/heads/master",
"committer_date": 1515120136000,
"content_id": "3bab99574507ff510dd6aa31bfab68a926b0783a",
"detected_licenses": [
"MIT"
],
"directory_id": "a9c11e10e9388978e3127c52013562c2e6a088a6",
"extension": "py",
"fi... | 2.328125 | stackv2 |
import logging
import httplib
import requests
from werkzeug.exceptions import Unauthorized
from flask import request, escape
from flask_restful import abort
from drift.auth import get_provider_config
from base64 import urlsafe_b64encode
from drift.core.extensions.schemachecker import check_schema
log = logging.getL... | 168 | 29.73 | 110 | 15 | 1,247 | python | [{"finding_id": "codeql_py/log-injection_f0022da9c2dfbb9b_28c895c1", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
85,
157
] | [
null,
null
] | [
78,
81
] | [
84,
88
] | |
2024-11-18T18:16:04.272968+00:00 | 1,430,423,954,000 | 6f4af6760ca24e78dca26ea0ca4888329f72bf99 | 3 | {
"blob_id": "6f4af6760ca24e78dca26ea0ca4888329f72bf99",
"branch_name": "refs/heads/master",
"committer_date": 1430423954000,
"content_id": "c756e803070cb04bcd142909d6c143b8be08399e",
"detected_licenses": [
"MIT"
],
"directory_id": "39acccb413d099975dc46e724ac3bfa0b6b66bc7",
"extension": "py",
"fi... | 2.734375 | stackv2 | import os, errno, sqlite3
from uuid import uuid4
from cPickle import dumps, loads
from collections import MutableMapping
from flask.sessions import SessionInterface, SessionMixin
class SqliteSession(MutableMapping, SessionMixin):
_create_sql = (
'CREATE TABLE IF NOT EXISTS session '
'('
... | 140 | 32.51 | 65 | 17 | 1,047 | python | [{"finding_id": "codeql_py/path-injection_b2124486609215e9_4132856c", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
28
] | [
null
] | [
31
] | [
40
] | |
2024-11-18T18:16:10.107591+00:00 | 1,635,992,483,000 | c800d05c646bcd4c1485f14a75d7ac135cd08a22 | 2 | {
"blob_id": "c800d05c646bcd4c1485f14a75d7ac135cd08a22",
"branch_name": "refs/heads/main",
"committer_date": 1635992483000,
"content_id": "1e1fa44f9d038a2b7d8eab97e50f935542ec0c68",
"detected_licenses": [
"MIT"
],
"directory_id": "19beefabc166ebbd4344078373b4b65a4d337014",
"extension": "py",
"file... | 2.375 | stackv2 | import json
import requests
from loguru import logger
class CVE_2021_22214():
@logger.catch(level='ERROR')
def __init__(self):
self.headers = {"Content-Type": "application/json"}
self.api = '/api/v4/ci/lint'
@logger.catch(level='ERROR')
def poc(self, url: str, dnshost: str = ''):
... | 29 | 32.86 | 111 | 16 | 285 | python | [{"finding_id": "codeql_py/request-without-cert-validation_72699753934911f6_3e21bdda", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
18
] | [
null
] | [
16
] | [
112
] | |
2024-11-18T19:31:06.919118+00:00 | 1,555,364,142,000 | 1334663fb54a53e9d398c2be2ae3f122da02d059 | 3 | {
"blob_id": "1334663fb54a53e9d398c2be2ae3f122da02d059",
"branch_name": "refs/heads/master",
"committer_date": 1555364142000,
"content_id": "154f2959391d1b0841c0149834719ff502a271a9",
"detected_licenses": [
"MIT"
],
"directory_id": "54d770236feef3df5615f5a9c1679a30056207c6",
"extension": "py",
"fi... | 3.1875 | stackv2 | #!/usr/bin/env python
import numpy as np
from datetime import datetime, timedelta
from math import sqrt, atan, asin, acos, sin, cos, radians
from collections import namedtuple
class TideModel():
def __init__(self):
self.name = 'Model'
self.results = namedtuple("results", ["model_time", "gravity_... | 166 | 47.93 | 141 | 19 | 2,664 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_55e8cc8ae28f6145_6ab6a3e7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text."
] | [
154,
155
] | [
null,
null
] | [
17,
17
] | [
57,
59
] | |
2024-11-18T19:31:08.543216+00:00 | 1,499,991,443,000 | 5e9014bd4edcd7a5106ec223d535bd7a357dbffd | 3 | {
"blob_id": "5e9014bd4edcd7a5106ec223d535bd7a357dbffd",
"branch_name": "refs/heads/master",
"committer_date": 1499991443000,
"content_id": "4adfb953e92aed7567dc30df77766af239a4f24d",
"detected_licenses": [
"MIT"
],
"directory_id": "31504d163163b26c8583fac9e95f23cb7e8efbcd",
"extension": "py",
"fi... | 3.109375 | stackv2 | import database_handler
import re
import getpass
import random
import string
import hashlib
import binascii
def is_md5(uuid):
return re.match(r"^[0-9a-f]{32}$", uuid) is not None
def get_admin_credentials():
while True:
result = raw_input("Would you like to register a new administrator? [y/n]: ").lo... | 71 | 28.92 | 120 | 13 | 513 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1e2930d9299d8cf0_8ba3e1e2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
59
] | [
null
] | [
29
] | [
44
] | |
2024-11-18T19:24:03.626700+00:00 | 1,607,170,831,000 | 797d6cc4f8b5eeaf54456c8173f6db4b09507fb3 | 3 | {
"blob_id": "797d6cc4f8b5eeaf54456c8173f6db4b09507fb3",
"branch_name": "refs/heads/main",
"committer_date": 1607170831000,
"content_id": "2f16c5e40e31149cd90634f9bcd1dd00891bad67",
"detected_licenses": [
"MIT"
],
"directory_id": "06fbda66288ab130f2ef3b899787bb0b89d5b24c",
"extension": "py",
"file... | 3.375 | stackv2 | import pymysql
import openpyxl
'''
엑셀의 데이터가 무조건 A에서 맞닿아 있어야 합니다.
'''
def sqlexec(sqlrun, connect, cursor):
cursor.execute(sqlrun)
result = cursor.fetchall()
connect.commit()
return result
def sqlrunmake(opened_excel, sqlTN, row, column):
exceldata = []
for i in range(column):
temp = o... | 123 | 26.63 | 92 | 18 | 1,034 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e5bc4753cd4b7131_35d3b02c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
85
] | [
null
] | [
15
] | [
36
] | |
2024-11-18T19:58:23.238781+00:00 | 1,594,825,602,000 | bf3a63b4c64969376b8eb76ce8a95c6f1cd21595 | 3 | {
"blob_id": "bf3a63b4c64969376b8eb76ce8a95c6f1cd21595",
"branch_name": "refs/heads/master",
"committer_date": 1594825602000,
"content_id": "34c4be13e9c749aa00c370c7e38050371375d427",
"detected_licenses": [
"MIT"
],
"directory_id": "1aacf84f6c8106f04ea03da0a790bce33b22f8b2",
"extension": "py",
"fi... | 2.859375 | stackv2 | import requests
import json
from Get_Team import get_team
from tools.api_key_webex import key
url = "https://webexapis.com/v1/rooms"
def get_rooms():
request = requests.session()
request.headers = {
'Authorization': f'Bearer {key}',
'Content-Type': 'application/json'
}
team_id = get_t... | 40 | 20.55 | 75 | 13 | 217 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f512e8c057b53542_7679f543", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
21
] | [
null
] | [
16
] | [
69
] | |
2024-11-18T19:58:34.599200+00:00 | 1,614,364,309,000 | 3cd21abeb669483f253faae2901d057aece6e99d | 3 | {
"blob_id": "3cd21abeb669483f253faae2901d057aece6e99d",
"branch_name": "refs/heads/master",
"committer_date": 1614364309000,
"content_id": "9f7fa88a7e02491e97f96a5d711aa26784bdac45",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "8de35ef918f5c41b90c4e1f9627d7d1c84808d7e",
"extension": "p... | 2.6875 | stackv2 | #!/usr/bin/env python3
import os
import sys
buf = ''
_next = 0
limit = 0
max_bytes = 1000
eof = ''
jobs = []
def getchar():
global eof # Access globals
i
global buf
global _next
global limit
if _next == limit: # First run, or limit rea... | 216 | 42.13 | 114 | 17 | 1,914 | python | [{"finding_id": "codeql_py/overly-permissive-file_cb258dbccdee1feb_dd39a957", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in open sets file to world readable.", "remediation": "", "location": {... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in open sets file to world readable."
] | [
127
] | [
null
] | [
18
] | [
68
] | |
2024-11-18T18:39:23.677866+00:00 | 1,693,281,661,000 | 726e674e6128f31f84502ffe550134ee6b55c988 | 3 | {
"blob_id": "726e674e6128f31f84502ffe550134ee6b55c988",
"branch_name": "refs/heads/main",
"committer_date": 1693282554000,
"content_id": "7a2bc03ecc7da9bedd044dc1227b5bf3ce9a8de5",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "7aa58030cd72c9f9c7906042e6c89693d373f065",
"extension": "py"... | 2.671875 | stackv2 | #!/usr/bin/env python
#
# Copyright 2017 Google Inc.
#
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
"""Delete cached repos on a Swarming bot."""
from __future__ import print_function
import errno
import os
import shutil
import subprocess
import sys
import tim... | 114 | 33.87 | 140 | 17 | 1,038 | python | [{"finding_id": "codeql_py/overly-permissive-file_acbfd4af3b30752e_2334c515", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to group writable."
] | [
99
] | [
null
] | [
5
] | [
26
] | |
2024-11-18T18:39:28.321537+00:00 | 1,615,568,306,000 | 7ed6ee65ee4b54198729615c2a5fcb18d2f43298 | 3 | {
"blob_id": "7ed6ee65ee4b54198729615c2a5fcb18d2f43298",
"branch_name": "refs/heads/master",
"committer_date": 1615568306000,
"content_id": "8de3a76b1bd830bcf931f9709067ecf01671bb11",
"detected_licenses": [
"MIT"
],
"directory_id": "130f946bba5e51e73f9fb75518bec8045aa1d289",
"extension": "py",
"fi... | 3.484375 | stackv2 | #!/usr/bin/env python3.6
import random
import string
from userData import UserData
from credentialsData import CredentialsData
def new_users(name_one, name_two, email_address, user_name, pass_word):
"""
creates new user
"""
new_user = UserData(name_one, name_two, email_address, user_name, pass_wo... | 183 | 28.99 | 133 | 19 | 1,016 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7fa238b78b95b451_3040684b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.",
"This expression logs [sensitive data (p... | [
108,
158,
169
] | [
null,
null,
null
] | [
19,
19,
27
] | [
66,
60,
133
] | |
2024-11-18T18:39:48.812352+00:00 | 1,571,308,228,000 | 60ba1a98cdf5f9868e2ac38b5ebe3af2be7e569b | 3 | {
"blob_id": "60ba1a98cdf5f9868e2ac38b5ebe3af2be7e569b",
"branch_name": "refs/heads/master",
"committer_date": 1571308228000,
"content_id": "0b469b6e2948cdc5fa3d27dc7525c4a01f4053eb",
"detected_licenses": [
"Unlicense"
],
"directory_id": "14227ede61924e94ba4442c58021ddaa7a9f0e28",
"extension": "py",... | 2.59375 | stackv2 | """ Microservice main programm file """
##
#
# This file is the microservice itself.
#
##
# pylint: disable=invalid-name;
# In order to avoid false positives with Flask
import json
from os import environ
from datetime import datetime
from flask import Flask, jsonify, make_response, url_for, request, logging
import set... | 153 | 23.03 | 87 | 16 | 858 | python | [{"finding_id": "codeql_py/log-injection_fc8da8af74d76190_3e0bb843", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
133
] | [
null
] | [
47
] | [
54
] | |
2024-11-18T18:40:03.637890+00:00 | 1,643,244,122,000 | 75f7663f4b26ccf3acfd545b5383e557e09d0f01 | 3 | {
"blob_id": "75f7663f4b26ccf3acfd545b5383e557e09d0f01",
"branch_name": "refs/heads/main",
"committer_date": 1643244122000,
"content_id": "d9176576d8fa33859d57bf532a01b89ae459819a",
"detected_licenses": [
"MIT"
],
"directory_id": "5c9dd8aa0bd7a7feec1a3e8800d4c21b05efb90f",
"extension": "py",
"file... | 3.46875 | stackv2 | """A command-line tool for generating passwords using the Diceware method.
MIT License
Copyright (c) 2018 John Eastman
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, includ... | 68 | 42.09 | 119 | 14 | 646 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_db301296ee06e492_86cb6d62", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-327"
] | [
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that i... | [
68,
63
] | [
null,
null
] | [
11,
25
] | [
26,
42
] | |
2024-11-18T20:52:26.832954+00:00 | 1,600,731,269,000 | 916721c6912f3796c232a7fa179fe73628e7057d | 3 | {
"blob_id": "916721c6912f3796c232a7fa179fe73628e7057d",
"branch_name": "refs/heads/main",
"committer_date": 1600731269000,
"content_id": "e2c91d72449fad349a8ca2ab17e151f78840d950",
"detected_licenses": [
"Unlicense"
],
"directory_id": "a2cffb7a44ef799e7ec1a8d189c6e058e26ae0d3",
"extension": "py",
... | 2.625 | stackv2 | """
Generate Validation Certificate bases on Azure IoT Hub Verification Code
Based on sample code from the cryptography library docs:
https://cryptography.io/en/latest/x509/tutorial/#creating-a-self-signed-certificate
"""
import datetime
from pathlib import Path
from cryptography.hazmat.primitives import has... | 53 | 36 | 99 | 23 | 468 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cb6c0027b183dcb5_40ba0506", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
53
] | [
null
] | [
11
] | [
65
] | |
2024-11-18T20:58:19.485962+00:00 | 1,634,845,788,000 | 9f788c1c2f54ee4e94a8edaed600fa9edef48357 | 3 | {
"blob_id": "9f788c1c2f54ee4e94a8edaed600fa9edef48357",
"branch_name": "refs/heads/master",
"committer_date": 1634845788000,
"content_id": "59500f1d5b444da2dca76e3875fe53f91485e479",
"detected_licenses": [
"MIT"
],
"directory_id": "d9e6dd09e4606b93092eb7175bd5f327fbf3c854",
"extension": "py",
"fi... | 2.84375 | stackv2 | #!/usr/bin/env python
# coding: utf-8
import os
import tarfile
import glob
import pandas as pd
import boto3
import json
from requests import get, post
s3_accessKey = os.getenv("AWS_ACCESS_KEY")
s3_secretKey = os.getenv("AWS_SECRET_KEY")
bucket_name = "jataware-world-modelers"
# Specifics for S3 zipped json file
s3_... | 81 | 26.14 | 78 | 16 | 561 | python | [{"finding_id": "codeql_py/tarslip_a5b40c8779ef1f89_db803f1f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
38
] | [
null
] | [
5
] | [
8
] | |
2024-11-18T20:15:50.051947+00:00 | 1,669,140,932,000 | f7ad8263f0e00978a00dde93a8df44b12325788b | 3 | {
"blob_id": "f7ad8263f0e00978a00dde93a8df44b12325788b",
"branch_name": "refs/heads/master",
"committer_date": 1669140932000,
"content_id": "6ac15f52d38df2ce6d8b18ef1192ff815bc6292c",
"detected_licenses": [
"MIT"
],
"directory_id": "2d03be96751d29bc8e2686ee3a8bed890261b0fa",
"extension": "py",
"fi... | 2.609375 | stackv2 | import sys
import os
import paramiko
import time
import logging
import json
import re
# create logger and set debugging level
logger = logging.getLogger()
logger.setLevel(logging.WARNING)
#logger.setLevel(logging.DEBUG)
# create console handler and set level
ch = logging.StreamHandler()
# create formatter
formatter =... | 163 | 32.31 | 112 | 22 | 1,246 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_8cc7fc5f27cae901_1c5656d5", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
29
] | [
null
] | [
9
] | [
81
] | |
2024-11-18T20:15:53.017996+00:00 | 1,575,873,993,000 | 5bd3984966fc0da1fb4cffec10db44113d5b39b1 | 3 | {
"blob_id": "5bd3984966fc0da1fb4cffec10db44113d5b39b1",
"branch_name": "refs/heads/master",
"committer_date": 1575873993000,
"content_id": "4d8ae1edbbe0b0f29458d56894d484cc2f3dc5fb",
"detected_licenses": [
"MIT"
],
"directory_id": "ccadfe12165fadcbe907f0306020fbde3d6a0f0a",
"extension": "py",
"fi... | 2.640625 | stackv2 | from pathlib import Path
from typing import Optional
from jinja2 import Template
from logger.my_logger import MyLogger
from models.article import Article
from tools.base64 import urlsafe_decode
from tools.bookmarklet_tools import (
get_raw_encoded_article,
get_raw_encoded_message,
is_success,
)
logger = ... | 72 | 26.86 | 86 | 13 | 431 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d8f9e4486829d992_ff6e6a30", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
66,
71
] | [
null,
null
] | [
16,
16
] | [
47,
48
] | |
2024-11-18T20:15:55.246875+00:00 | 1,505,091,292,000 | eef49328b690471ce45910a889061e0289d729f4 | 2 | {
"blob_id": "eef49328b690471ce45910a889061e0289d729f4",
"branch_name": "refs/heads/master",
"committer_date": 1505091292000,
"content_id": "b9e7768abb1d3ee465fd46c27df976be846bbe02",
"detected_licenses": [
"MIT"
],
"directory_id": "04dfdd89aba44c44f809054d260d23c6bf7255c6",
"extension": "py",
"fi... | 2.46875 | stackv2 | import json
import threading
from django.shortcuts import render
from django.http import HttpResponse, HttpResponseRedirect, JsonResponse
from django.contrib.auth import login, logout, authenticate
from django.contrib.auth.decorators import login_required
from django.contrib.auth.models import User
from django.views.de... | 246 | 34.38 | 146 | 19 | 1,836 | python | [{"finding_id": "codeql_py/stack-trace-exposure_fb44a991bc7bc0b6_1697b036", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
189,
210
] | [
null,
null
] | [
29,
29
] | [
36,
36
] | |
2024-11-18T19:38:47.039907+00:00 | 1,678,294,746,000 | a363ddd0805d1714f5bb597f7fae8fdba2843516 | 4 | {
"blob_id": "a363ddd0805d1714f5bb597f7fae8fdba2843516",
"branch_name": "refs/heads/master",
"committer_date": 1678294746000,
"content_id": "a07489f4fab728d6ff4ef8a05cddb05ea224fae3",
"detected_licenses": [
"MIT"
],
"directory_id": "2eb2b76c5ef03b3323cb37db17134b08f8c6892a",
"extension": "py",
"fi... | 4 | stackv2 | from __future__ import print_function
import numpy as np
def readBinary(file_name):
""" Read a binary file. """
with open(file_name, 'rb') as fid:
# Read the header
header_size = int(np.fromfile(fid, dtype=np.uint32, count=1))
station_latitude = np.fromfile(fid, dtype=np.float64, cou... | 137 | 37.37 | 111 | 17 | 1,346 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1fded9b849d08775_9bc18e6c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
29,
30
] | [
null,
null
] | [
11,
11
] | [
27,
28
] | |
2024-11-18T20:10:37.638602+00:00 | 1,571,798,284,000 | 19a2c73eabfe3913652ef14445c936f206ee389f | 2 | {
"blob_id": "19a2c73eabfe3913652ef14445c936f206ee389f",
"branch_name": "refs/heads/master",
"committer_date": 1571798284000,
"content_id": "fe4eb2c5a9af9f64a841514fd6b4ab40afa79ccd",
"detected_licenses": [
"MIT"
],
"directory_id": "e9a973d496074fda29a22af8415e7aa4acfc867b",
"extension": "py",
"fi... | 2.4375 | stackv2 | from flask import Flask, request, redirect, render_template
from http.client import HTTPConnection
from pathlib import Path
from threading import Thread
from tkinter import Toplevel
from tkinter.ttk import Frame, Button, Label
from werkzeug import secure_filename
import logging
import netifaces
import os.path
import sh... | 129 | 34.56 | 99 | 21 | 999 | python | [{"finding_id": "codeql_py/url-redirection_05de2537bac14cda_b6ad06aa", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 8 | true | [
"CWE-601",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/url-redirection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-... | [
113,
81,
86,
87,
107,
108,
110,
111
] | [
null,
null,
null,
null,
null,
null,
null,
null
] | [
29,
32,
39,
35,
39,
33,
35,
35
] | [
53,
37,
48,
44,
48,
42,
44,
44
] | |
2024-11-18T20:11:04.458585+00:00 | 1,510,168,289,000 | e8e4b207f672922748873a4654afd9ea690e1ae7 | 2 | {
"blob_id": "e8e4b207f672922748873a4654afd9ea690e1ae7",
"branch_name": "refs/heads/master",
"committer_date": 1510168289000,
"content_id": "2a84d8968c496541fb8b1b1a965aad2040c45277",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "cf577643747527582ce3e7c619c9687cd7b1d61a",
"extension": "p... | 2.421875 | stackv2 | #!/usr/bin/env python
# Licensed under a 3-clause BSD style license - see LICENSE.rst
"""
Transfer stage files from HEAD network to OCC GRETA network via ftp server lucky.
"""
import re, os, sys
import time
import optparse
import tarfile
import shutil
from Chandra.Time import DateTime
import Ska.ftp
import Ska.engar... | 142 | 31.1 | 96 | 14 | 1,114 | python | [{"finding_id": "codeql_py/tarslip_50d40350a537e3ba_534e720a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
115
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T20:26:21.460120+00:00 | 1,551,721,525,000 | 495daacee0574d2a76c8b4dda452822b44385fe4 | 2 | {
"blob_id": "495daacee0574d2a76c8b4dda452822b44385fe4",
"branch_name": "refs/heads/master",
"committer_date": 1551721525000,
"content_id": "0551d7a0533f64737fbe0ea8236db30956d4bfac",
"detected_licenses": [
"MIT"
],
"directory_id": "8cb5512b466cbdbbb80835d00332109d959988e6",
"extension": "py",
"fi... | 2.40625 | stackv2 | from flask import Flask, request
from flask_cors import CORS
import requests
import json
import IPython
app = Flask("Backend")
CORS(app)
api_key = "API KEY NOT SET"
with open("api_key", "r") as file:
api_key = file.read()
subdomain = "gmusmash"
root_url = "https://api.challonge.com/v1/"
def check_ip():
re... | 66 | 26.32 | 113 | 17 | 469 | python | [{"finding_id": "codeql_py/reflective-xss_97d250b83ef75858_f01fbc65", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-918"
] | [
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
46,
45
] | [
null,
null
] | [
16,
13
] | [
34,
114
] | |
2024-11-18T20:26:23.902381+00:00 | 1,589,530,268,000 | 168393415ad3ac410b69d1aa2e6905d1d120c73f | 3 | {
"blob_id": "168393415ad3ac410b69d1aa2e6905d1d120c73f",
"branch_name": "refs/heads/master",
"committer_date": 1589530268000,
"content_id": "74e46e1c79ec72635e2bd7f3675d4f5b5f3de376",
"detected_licenses": [
"MIT"
],
"directory_id": "8cd4ade6139bfd15b0122d34f68b80be5818513b",
"extension": "py",
"fi... | 2.8125 | stackv2 | from PyQt5.QtWidgets import QApplication, QWidget, QInputDialog, QLineEdit
import sql
class PasswordCheckDialog(QWidget):
""" Take password but input dialog and check it is valid or not """
def __init__(self):
super().__init__()
self.title = 'Password Check'
self.left = 10
s... | 48 | 28 | 111 | 13 | 288 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc60555b1331a67a_2e3a658e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
35,
41
] | [
null,
null
] | [
19,
19
] | [
32,
32
] | |
2024-11-18T20:26:24.891146+00:00 | 1,692,614,193,000 | 0b6d649f29fd6e715c2f23b82c0c131d817ae271 | 3 | {
"blob_id": "0b6d649f29fd6e715c2f23b82c0c131d817ae271",
"branch_name": "refs/heads/master",
"committer_date": 1692614193000,
"content_id": "5ed27ebefd2169eeba80ad422b3be17c2d6d417a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "16c78d28ea7c9080cd914ee1e7a8356f8b997810",
"extension": "py"... | 2.5625 | stackv2 | import logging
import logging.handlers
from . import logger_config
import threading
try:
import http.client as httplib
except ImportError:
import httplib
try:
from urllib.parse import urlencode
except ImportError:
from urllib import urlencode
import json
import time
import os
# encodings
JSON = 'json'
... | 351 | 34.21 | 124 | 22 | 2,794 | python | [{"finding_id": "codeql_py/overly-permissive-file_4b636b33924d9401_d4245224", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
237
] | [
null
] | [
9
] | [
39
] | |
2024-11-18T20:26:35.060473+00:00 | 1,508,987,873,000 | 95642a071fc444c060a63470bc74824e83ffadd0 | 3 | {
"blob_id": "95642a071fc444c060a63470bc74824e83ffadd0",
"branch_name": "refs/heads/master",
"committer_date": 1508987873000,
"content_id": "78b43546b82c167e8d13faae12a061ae04bd85a8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ab7dc5bd2c97d7d431658669b8442eb6a31928ef",
"extension": "py"... | 2.515625 | stackv2 | """
TODO: Add description of this script
TODO: Add license
"""
from __future__ import print_function, division, unicode_literals
import os
import pickle
from flask import Flask
from flask import render_template, url_for
app = Flask(__name__)
# SETTINGS
VALIDATION_METRIC = "valid_acc"
TRAIN_METRIC = "train_acc... | 125 | 36.36 | 103 | 16 | 1,065 | python | [{"finding_id": "codeql_py/path-injection_b72684153e938dca_ec03be7b", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
57,
72
] | [
null,
null
] | [
15,
19
] | [
19,
73
] | |
2024-11-18T20:26:35.450698+00:00 | 1,443,647,171,000 | 31b77bc262121a673cd33190386c40e98ad75585 | 3 | {
"blob_id": "31b77bc262121a673cd33190386c40e98ad75585",
"branch_name": "refs/heads/master",
"committer_date": 1443647171000,
"content_id": "a479b3a630447bb2ca491a6aa86a0603b15206e7",
"detected_licenses": [
"BSD-3-Clause",
"MIT"
],
"directory_id": "ad808d158533435e8cd16f308f454311bb68c369",
"ext... | 2.78125 | stackv2 | import xml.etree.ElementTree as ET
from jinja2 import FileSystemLoader,Environment
import argparse, webbrowser, os
class Message():
prio = { "error": 1000, "warning": 100 }
def __init__(self, type, code, desc, f, line):
self.type = type
self.code = code
self.desc = desc
self.fil... | 62 | 32.82 | 106 | 13 | 503 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_02c2e41346984d5d_991e6baa", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
20
] | [
null
] | [
11
] | [
85
] | |
2024-11-18T20:26:36.870762+00:00 | 1,602,221,603,000 | f926563f4b2f2709a6f8ffdbdc13b3c0944ca5f7 | 3 | {
"blob_id": "f926563f4b2f2709a6f8ffdbdc13b3c0944ca5f7",
"branch_name": "refs/heads/master",
"committer_date": 1602221603000,
"content_id": "db3047d0abda2ea129958b25cba46ac99fcd0e2f",
"detected_licenses": [
"MIT"
],
"directory_id": "81407be1385564308db7193634a2bb050b4f822e",
"extension": "py",
"fi... | 3.125 | stackv2 | import configparser
# https://docs.python.org/zh-cn/3/library/configparser.html
# 配置文件是由小节组成的,每个小节都有一个 [section] 标头,加上多个由特定字符串 (默认为 = 或 : 1) 分隔的键/值条目。
# 默认情况下小节名对大小写敏感而键对大小写不敏感 1。 键和值开头和末尾的空格会被移除。 值可以被省略,在此情况下键/值分隔符也可以被省略。
# 值还可以跨越多行,只要其他行带有比值的第一行更深的缩进。 依据解析器的具体模式,空白行可能被视为多行值的组成部分也可能被忽略。
# 配置文件可以包含注释,要带有指定字符前缀 (默认为 # 和... | 90 | 32.46 | 115 | 9 | 1,078 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3ab201882522a022_583f7ba9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
36,
37
] | [
null,
null
] | [
7,
7
] | [
30,
42
] | |
2024-11-18T20:26:52.805428+00:00 | 1,478,079,938,000 | 27a2fb5ddce3c70c53fcc7ccd06c5f246cb3ebb6 | 2 | {
"blob_id": "27a2fb5ddce3c70c53fcc7ccd06c5f246cb3ebb6",
"branch_name": "refs/heads/master",
"committer_date": 1478079938000,
"content_id": "a44c7fe5fbc6057032c8c8458108ffb194645734",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "187aad32c5ce110d53caa5e7ba5d5872646f064e",
"extension": "py"... | 2.390625 | stackv2 | import flask
import hashlib
import requests
import os
from datetime import datetime
from models.models import db
from models.models import User
from models.models import Posts
from models.models import Connection
from decorator import decorator
from sqlalchemy.sql import select
from sqlalchemy.orm import session
'''
I... | 95 | 35.83 | 135 | 20 | 843 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_ce5d5b99bfcd110c_1c81062c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
26
] | [
null
] | [
66
] | [
83
] | |
2024-11-18T20:52:09.186578+00:00 | 1,591,743,107,000 | e5043618254951c8a4cfed855908b2e29402a76f | 3 | {
"blob_id": "e5043618254951c8a4cfed855908b2e29402a76f",
"branch_name": "refs/heads/master",
"committer_date": 1591743107000,
"content_id": "cc4b3abbc7c1b5ee215246aa5780053b257d72f4",
"detected_licenses": [
"MIT"
],
"directory_id": "3e64f996dfe9cdc51e76493054602049174b6f4a",
"extension": "py",
"fi... | 2.609375 | stackv2 | from flask import Flask, request, Response
from flask_cors import CORS
from threading import Timer
from waitress import serve
from typing import Union
import logging
import os
import time
import traceback
import sys
import json
import requests
import random
from backendy_stuff.primes import find_next_mersenne_prime
fro... | 358 | 30.27 | 163 | 17 | 2,646 | python | [{"finding_id": "codeql_py/reflective-xss_8aec723f1f9ae833_779a3433", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability d... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-918",
"CWE-918"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).",
"Cross-site scripting vulnerability due to a [user-provided value](1).\nCross-site scripting vulnerability due to a [user-provided value](2).",
"Part of the URL of this... | [
315,
318,
314,
317
] | [
null,
null,
null,
null
] | [
29,
29,
17,
17
] | [
38,
38,
66,
92
] | |
2024-11-18T20:52:25.469537+00:00 | 1,427,218,357,000 | 2ff5ae9009d704f6bab8e3ad7291aca07462f220 | 2 | {
"blob_id": "2ff5ae9009d704f6bab8e3ad7291aca07462f220",
"branch_name": "refs/heads/master",
"committer_date": 1427218357000,
"content_id": "9267059a6658718403634cfc18fa7c602f013c69",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "0d0042be17488f4e6beda56e73bfa307681c335c",
"extension": "p... | 2.375 | stackv2 | import os
import json
import urlparse
from redis import StrictRedis
from markdown2 import markdown
import requests
import bleach
from flask import Flask, render_template, make_response, abort
app = Flask(__name__)
HEROKU = 'HEROKU' in os.environ
if HEROKU:
urlparse.uses_netloc.append('redis')
redis_url = ur... | 96 | 27.64 | 87 | 16 | 796 | python | [{"finding_id": "codeql_py/flask-debug_e93fa7964d170b78_ade189b2", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
96,
78
] | [
null,
null
] | [
9,
9
] | [
55,
67
] | |
2024-11-18T20:52:41.925168+00:00 | 1,614,060,280,000 | e5c0476674ca992e0e664f99c960e7418e63170e | 3 | {
"blob_id": "e5c0476674ca992e0e664f99c960e7418e63170e",
"branch_name": "refs/heads/main",
"committer_date": 1614060280000,
"content_id": "a7d550c913b7b526236d5b7a18e8e75e00424a00",
"detected_licenses": [
"MIT"
],
"directory_id": "70c43015c642db6ca5adf63b537853741b0f92a9",
"extension": "py",
"file... | 2.8125 | stackv2 | import json
import plotly
import pandas as pd
import re
from nltk.stem import WordNetLemmatizer
from nltk.tokenize import word_tokenize
from nltk.corpus import stopwords
from flask import Flask
from flask import render_template, request, jsonify
from plotly.graph_objs import Bar, Pie
import joblib
from sqlalchemy impo... | 186 | 25.76 | 106 | 18 | 1,122 | python | [{"finding_id": "codeql_py/overly-large-range_d5c2512f1e51d8b4_3aad1f65", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 2 | true | [
"CWE-020",
"CWE-215"
] | [
"py/overly-large-range",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
34,
182
] | [
null,
null
] | [
48,
5
] | [
51,
51
] | |
2024-11-18T20:52:45.463743+00:00 | 1,629,659,976,000 | 6cfc00e34dc7493a23cc8a5a4cd766b5a49f0aa2 | 2 | {
"blob_id": "6cfc00e34dc7493a23cc8a5a4cd766b5a49f0aa2",
"branch_name": "refs/heads/master",
"committer_date": 1629659976000,
"content_id": "aae469ccc16ce035caadfb8360e5667fbd350579",
"detected_licenses": [
"MIT"
],
"directory_id": "71ae8e73eb8f2ff0564b4e445b069b0727afe2ff",
"extension": "py",
"fi... | 2.328125 | stackv2 | import os
from flask import Flask, render_template, request, redirect
from inference import get_prediction
from commons import format_class_name, create_predictions_folders
from commons import get_model
app = Flask(__name__)
@app.route('/', methods=['GET', 'POST'])
def upload_file():
predicted_files = []
# ch... | 41 | 40.85 | 114 | 16 | 347 | python | [{"finding_id": "codeql_py/flask-debug_bfe44c0c5df8818b_7cdcd3af", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
41,
19
] | [
null,
null
] | [
5,
29
] | [
64,
40
] | |
2024-11-18T20:52:50.171971+00:00 | 1,369,228,447,000 | 62a44022e0353f367762eae37007bd5c653e78c0 | 3 | {
"blob_id": "62a44022e0353f367762eae37007bd5c653e78c0",
"branch_name": "refs/heads/master",
"committer_date": 1369228447000,
"content_id": "1ed7dfb26a803b3034f956e814afad39f6e7599e",
"detected_licenses": [
"MIT"
],
"directory_id": "6b8d1dcf18f688192eebb95e3bd922250b352429",
"extension": "py",
"fi... | 2.5625 | stackv2 | #
# Represents a single EC2 region
#
# Copyright (c) 2013 by Michael Luckeneder
#
import boto
import sys
import time
import itertools
import boto.ec2
import config
import paramiko
from abstract_region import AbstractRegion
class EC2Region(AbstractRegion):
"""Represents a single EC2 instance in a region"""
d... | 123 | 32.26 | 113 | 17 | 886 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e16414c63ef9e013_58ad95d6", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
29
] | [
null
] | [
9
] | [
71
] | |
2024-11-18T19:03:02.315730+00:00 | 1,633,022,001,000 | 18141e7ad4aec5bd995827fdff46ddc928ae4de0 | 2 | {
"blob_id": "18141e7ad4aec5bd995827fdff46ddc928ae4de0",
"branch_name": "refs/heads/main",
"committer_date": 1633022001000,
"content_id": "e3febb3d54b624ed2c5f9d6fc61170cd89d2eee5",
"detected_licenses": [
"MIT"
],
"directory_id": "816958975c8ae556735f9e438d61a9cfdff101a2",
"extension": "py",
"file... | 2.4375 | stackv2 | import json
import dash
from dash import html
from dash import dcc
from dash.dependencies import Input, Output, State
import dash_auth
from pandas.io.json import json_normalize
import importlib
insta = importlib.import_module("instagram-locations")
# read credentials from file
with open('config', 'r') as cred:
CRE... | 124 | 43.44 | 129 | 17 | 1,142 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aee1d266fc3735a7_1d351c57", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
73,
73
] | [
null,
null
] | [
22,
32
] | [
30,
41
] | |
2024-11-18T19:14:28.664313+00:00 | 1,616,222,380,000 | 867a4319795c090bdc71243b675802e811460189 | 4 | {
"blob_id": "867a4319795c090bdc71243b675802e811460189",
"branch_name": "refs/heads/master",
"committer_date": 1616222380000,
"content_id": "c4d54f8a9bc6ef8dfbd4130aa79c69f494791007",
"detected_licenses": [
"MIT"
],
"directory_id": "e0ab4a91a07c7f0ae2b513563c977e030f6117e3",
"extension": "py",
"fi... | 3.828125 | stackv2 | import random
def generator_password():
upper_list = ['A','B','C','D','E','F','G','H','I','J','k']
lower_list = ['a','b','c','d','e','f','g','h','i','j','K']
symbol_list = ['!','?','$','Ç','¡','&','y','%',':','/','|']
numbers_list = ['1','2','3','4','5','6','7','8','9','10','11']
character_list =... | 31 | 21.87 | 73 | 10 | 203 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8c9fb9ef9488b9c0_6f0c41b1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
25
] | [
null
] | [
11
] | [
45
] | |
2024-11-18T19:14:34.682928+00:00 | 1,336,690,961,000 | 9eee0a8f858e217d1771b4c9d67af1232be371d3 | 2 | {
"blob_id": "9eee0a8f858e217d1771b4c9d67af1232be371d3",
"branch_name": "refs/heads/master",
"committer_date": 1336690961000,
"content_id": "4e3039756fdf84081214e8cc3015010528786827",
"detected_licenses": [
"MIT"
],
"directory_id": "6458b581fb18da223e7c7cc7156bd66f50b17682",
"extension": "py",
"fi... | 2.46875 | stackv2 | # -*- coding: utf-8 -*-
# vim: tabstop=8 expandtab shiftwidth=4 softtabstop=4
__author__ = "Ole Christian Weidner"
__copyright__ = "Copyright 2011, Ole Christian Weidner"
__license__ = "MIT"
from bliss.interface import FilesystemPluginInterface
import os, pwd
import time
import bliss.saga
import logging
import... | 287 | 35.5 | 119 | 20 | 2,205 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_8c6f584281888637_8c1aa082", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
74
] | [
null
] | [
17
] | [
74
] | |
2024-11-18T19:14:34.980478+00:00 | 1,613,069,844,000 | 1548c422fe5f3040557a8b5625e0b167d10f8066 | 3 | {
"blob_id": "1548c422fe5f3040557a8b5625e0b167d10f8066",
"branch_name": "refs/heads/master",
"committer_date": 1613069844000,
"content_id": "d163712cedf17b838b494f379dd982f567dee880",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b47eaf319ca8a80a29dd5aa54a8454cf56a2014d",
"extension": "py"... | 2.5625 | stackv2 |
import re
from time import sleep
from paramiko import SSHClient, AutoAddPolicy
class SwitchStack:
def __init__(self, name, ip, username, password, port=22):
self.name = name
self.ip = ip
self.username = username
self.password = password
self.port = port
self.swit... | 139 | 36.3 | 102 | 25 | 1,082 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_c21f5e73bd735aa6_d7729ced", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
27
] | [
null
] | [
9
] | [
67
] | |
2024-11-18T19:14:42.296761+00:00 | 1,626,610,439,000 | f1c26c1a3bcd1fcac3ab72c27d2d63e267d495ae | 2 | {
"blob_id": "f1c26c1a3bcd1fcac3ab72c27d2d63e267d495ae",
"branch_name": "refs/heads/main",
"committer_date": 1626610439000,
"content_id": "ad054cfa732b8f8dfaf6a6e5bd1728e7a4a79534",
"detected_licenses": [
"MIT"
],
"directory_id": "e5509bb1d049d7da1ebd64a9426e83388733a920",
"extension": "py",
"file... | 2.3125 | stackv2 | import json, os, copy, logging
from pathlib import Path
from flask import Flask, request, redirect, render_template, jsonify, url_for
from fer.utils import *
ROOT = Path(__file__).resolve().parent.parent
WEB = ROOT / 'ui'
# An instance of Flask class used as WSGI application
app = Flask(__name__, template_folder = ... | 79 | 26.09 | 100 | 14 | 545 | python | [{"finding_id": "codeql_py/flask-debug_eee83e762902cb86_4cfa479e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
76,
44
] | [
null,
null
] | [
2,
20
] | [
77,
31
] | |
2024-11-18T19:27:50.609856+00:00 | 1,557,529,137,000 | 3fa722c896f90708aa3824be675db218a3048dad | 3 | {
"blob_id": "3fa722c896f90708aa3824be675db218a3048dad",
"branch_name": "refs/heads/master",
"committer_date": 1557529137000,
"content_id": "364c3a41242701a61014a2b1edf9d32a2c05c37c",
"detected_licenses": [
"MIT"
],
"directory_id": "49f2efefa49c68b78e0df56fede5088c205e288c",
"extension": "py",
"fi... | 3.046875 | stackv2 | import os
from typing import Optional
from jinja2 import Template
import mistune
from pygments import highlight
from pygments.lexers import get_lexer_by_name
from pygments.formatters import html
from premailer import transform
class HighlightRenderer(mistune.Renderer):
"""
This highlight renderer improves the... | 61 | 32.77 | 118 | 17 | 474 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e8662a37d8b4630d_750d381a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
51,
54
] | [
null,
null
] | [
20,
9
] | [
38,
26
] | |
2024-11-18T19:38:27.388647+00:00 | 1,442,986,938,000 | 4226b453bd12d8e27ba16dd5a5bebc22947cb3c1 | 3 | {
"blob_id": "4226b453bd12d8e27ba16dd5a5bebc22947cb3c1",
"branch_name": "refs/heads/master",
"committer_date": 1442986938000,
"content_id": "1785b2a9b5f19839a911558cdc7f0a13681b5677",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "d413ac9beb1d9987e17464df2b2aa8d75bd347d5",
"extension": "p... | 2.90625 | stackv2 | #!/usr/bin/env python
import urllib2
import httplib
import ssl
import socket
import os
import re
CA_FILE = os.path.join(os.path.dirname(os.path.realpath(__file__)), 'ca.pem')
class CertificateError(Exception):
pass
# The following 2 functions are from Python 3 lib/ssl
# To bring SSL hostname matching to Python 2... | 135 | 29.81 | 88 | 15 | 1,151 | python | [{"finding_id": "codeql_py/insecure-default-protocol_994c3d639f038867_10c676d5", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
125
] | [
126
] | [
15
] | [
50
] | |
2024-11-18T19:38:43.139493+00:00 | 1,449,995,697,000 | 3ad669cab6e68016bec49f20c383650ee6af43c4 | 3 | {
"blob_id": "3ad669cab6e68016bec49f20c383650ee6af43c4",
"branch_name": "refs/heads/master",
"committer_date": 1449995697000,
"content_id": "f1ba692f6180faa0f2fcf35123272718bf26539a",
"detected_licenses": [
"BSD-2-Clause",
"MIT"
],
"directory_id": "65cd560a1c2f47421e20e389c5f1d1c8f1ee1ba3",
"ext... | 2.671875 | stackv2 | import os
import os.path
import json
import io
import glob
import uuid
import re
import random
import shortuuid
import shelve
from flask import Flask, abort, redirect, jsonify, render_template, request, make_response, url_for
class UrlObject:
def to_JSON(self):
return json.dumps(self, default=lambda o: o._... | 122 | 32.27 | 117 | 16 | 988 | python | [{"finding_id": "codeql_py/code-injection_78eebeb8b31429fc_39c0b6aa", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-094"
] | [
"py/code-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1)."
] | [
114
] | [
null
] | [
25
] | [
37
] | |
2024-11-18T19:38:52.151028+00:00 | 1,554,997,107,000 | 28addf2d56ee9e1cbcc35c4105a49ff63bb950ed | 3 | {
"blob_id": "28addf2d56ee9e1cbcc35c4105a49ff63bb950ed",
"branch_name": "refs/heads/master",
"committer_date": 1554997107000,
"content_id": "9b03a1dc70225b5feac5fe1ab8baf2edce78f12b",
"detected_licenses": [
"MIT"
],
"directory_id": "3b12173fb2338d51e9cc971ea18d5d561519d648",
"extension": "py",
"fi... | 2.90625 | stackv2 | #! /usr/bin/python3
import subprocess
import fcntl
import socket
import struct
class ChecksumError(Exception):
def __init__(self, _type):
self.type = _type
def __str__(self):
return self.type + ' checksum is not match.'
class TimeOutError(Exception):
def __init__(self):
pass
... | 87 | 24.17 | 91 | 15 | 616 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_fc19ce3aa4d1dc40_342e8e91", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-200"
] | [
"py/clear-text-logging-sensitive-data",
"py/bind-socket-all-network-interfaces"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"'' binds a socket to all interfaces."
] | [
85,
28
] | [
null,
null
] | [
11,
5
] | [
46,
20
] | |
2024-11-18T19:38:55.616521+00:00 | 1,693,573,922,000 | f6f42dc70ade5178ec3f2ee349884c9848b92b5d | 3 | {
"blob_id": "f6f42dc70ade5178ec3f2ee349884c9848b92b5d",
"branch_name": "refs/heads/main",
"committer_date": 1693573922000,
"content_id": "49486e5e5f3dbd75608bd57a77b45bdd062252df",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9493f8b85660a0965f6e236ab6d9673aa48ff3cb",
"extension": "py",
... | 2.796875 | stackv2 | #!/usr/bin/env python
# coding=utf-8
import copy
import os
import json
import codecs
import requests
from jinja2 import Environment, FileSystemLoader
CHINESE_WIKI_LANG = "zh"
SIMPLIFIED_CHINESE_LANG = "zh-hans"
TRADITIONAL_CHINESE_LANG = "zh-hant"
# T114042
NORWEGIAN_BOKMAL_WIKI_LANG = "no"
NORWEGIAN_BOKMAL_LANG = ... | 193 | 34.4 | 114 | 20 | 1,798 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_925d13c77e6da692_281641fa", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [wikipedia.org](1) may be at an arbitrary position in t... | 2 | true | [
"CWE-020",
"CWE-079"
] | [
"py/incomplete-url-substring-sanitization",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [wikipedia.org](1) may be at an arbitrary position in the sanitized URL.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
81,
41
] | [
null,
43
] | [
16,
29
] | [
47,
15
] | |
2024-11-18T20:06:25.071840+00:00 | 1,620,848,868,000 | 3f2e71aac1f72a4d4730b5b72dd2ff73f4825556 | 3 | {
"blob_id": "3f2e71aac1f72a4d4730b5b72dd2ff73f4825556",
"branch_name": "refs/heads/master",
"committer_date": 1620848868000,
"content_id": "7d62012468385aa5e37c9e56da123db3c693577c",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "a39ad7f40cb8102246b6a56769936281edce1818",
"extension": "p... | 2.65625 | stackv2 | """
Transfer Learning (Time Delayed) version of the Convolutional Denoising Autoencoder
Contains functions to read in preprocessed data, split according to training parameters,
train models, and save model outputs
"""
import logging
from numpy.random import seed
seed(1)
import tensorflow
tensorflow.random.set_seed(2)
... | 205 | 40.61 | 132 | 17 | 2,122 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2942acb7a6ea76bd_cf74612d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (p... | [
124,
134,
157,
168,
181
] | [
null,
null,
null,
null,
null
] | [
19,
15,
19,
15,
44
] | [
72,
105,
72,
105,
57
] | |
2024-11-18T20:18:19.592741+00:00 | 1,584,732,930,000 | 829acdb9a76a13302d9e144133a296e348d35a36 | 3 | {
"blob_id": "829acdb9a76a13302d9e144133a296e348d35a36",
"branch_name": "refs/heads/master",
"committer_date": 1584732930000,
"content_id": "ea2ade73d0015a67fb4d97e1c5aaa4822907cef4",
"detected_licenses": [
"MIT"
],
"directory_id": "dfa0169fcbf997f7a44e963d78dbdcf9e81039bb",
"extension": "py",
"fi... | 3.28125 | stackv2 | import requests
import json
import pprint
salary_list_from = [] # список с зарплатами от...
salary_list_to = [] # список с зарплатами до...
for n in range(20):
URL = 'https://api.hh.ru/vacancies'
params = {'text': 'Python && Москва',
'only_with_salary': True,
'per_page': 100, 'page': n
}
# {'i... | 41 | 31.83 | 89 | 14 | 383 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_71a7a7d930349326_cbf3e2f1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (p... | [
29,
30,
38
] | [
null,
null,
null
] | [
7,
7,
7
] | [
23,
21,
75
] | |
2024-11-18T20:18:25.298161+00:00 | 1,531,104,128,000 | 90e2d0e296a314978bca9a791ae75a580fa0fefa | 2 | {
"blob_id": "90e2d0e296a314978bca9a791ae75a580fa0fefa",
"branch_name": "refs/heads/master",
"committer_date": 1531104128000,
"content_id": "1e41d8a1b59909bd8c6ab6dc23cae7670eff2d83",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "15a6d1070f59cf49f4356cf7164c50c69259d4f4",
"extension": "py",
... | 2.46875 | stackv2 | import logging
import os
from flask import Flask, request
from core.webhook.message_saver import MessageSaver
from common.util.util import log, mark_seen
from pprint import pprint
app = Flask(__name__)
@app.route('/', methods=['GET'])
def verify():
# when the endpoint is registered as a webhook, it must echo bac... | 79 | 33.03 | 109 | 23 | 558 | python | [{"finding_id": "codeql_py/flask-debug_67fdfc318d39f518_c5510cc7", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
79,
18
] | [
null,
null
] | [
5,
16
] | [
24,
50
] | |
2024-11-18T20:31:38.228406+00:00 | 1,552,991,391,000 | 52a0fa43c9a63968387ad33e5a8262b30561c6e8 | 2 | {
"blob_id": "52a0fa43c9a63968387ad33e5a8262b30561c6e8",
"branch_name": "refs/heads/master",
"committer_date": 1552991391000,
"content_id": "c24d637522c032788dc002305d5a9404a66ed6cd",
"detected_licenses": [
"MIT"
],
"directory_id": "7e7f1e157049b8fa983ebbc6e19665c7b9245c2d",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/python3
# # Get PLAZA information for Galaxy
#
# Get all genomes and annotations available in PLAZA data warehouse, formatted to be used by Ephemeris
import json
import os
from jinja2 import Environment
import urllib
import urllib.request
from urllib.error import HTTPError, URLError
# Template for anno... | 148 | 40.78 | 135 | 22 | 1,428 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d34e90437c43be20_3f46160f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
140
] | [
null
] | [
13
] | [
26
] | |
2024-11-18T20:43:21.184622+00:00 | 1,560,024,501,000 | 911956415e3034f58cc9455b928c665b62308bb3 | 2 | {
"blob_id": "911956415e3034f58cc9455b928c665b62308bb3",
"branch_name": "refs/heads/master",
"committer_date": 1560024501000,
"content_id": "81ab8e40b9483945a551c3ca766041eef9d7a92a",
"detected_licenses": [
"MIT"
],
"directory_id": "c05a6e6af9a6386fb36bc99c9ac77ef081dab8e4",
"extension": "py",
"fi... | 2.46875 | stackv2 | from Co import *
from loader import *
from Interpreter import *
"""
Foe every "user" in starting accounts:
Change the "user"'s password according to the OS type.
"""
def changeAllPasswords(stringsList,readCurrentUsersList,readNewPasswordList):
accounts = []
for user in readCurrentUsersList:
readCurre... | 261 | 28.83 | 100 | 18 | 1,697 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_aad16aba5cacf751_a3ddd5af", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text.\nThis expression stores [sensitive d... | [
246,
75,
199
] | [
null,
null,
null
] | [
17,
23,
15
] | [
24,
26,
22
] | |
2024-11-18T20:43:55.866554+00:00 | 1,580,943,344,000 | 62de4e7049f46e903a1529e49b8d29c45ea7fe7e | 3 | {
"blob_id": "62de4e7049f46e903a1529e49b8d29c45ea7fe7e",
"branch_name": "refs/heads/master",
"committer_date": 1591886878000,
"content_id": "dcd40f3397da0671b197e7b1bcbba405bd975c94",
"detected_licenses": [
"MIT"
],
"directory_id": "8ccff6fd5fa3da398816b54988db14b6091e04cc",
"extension": "py",
"fi... | 2.671875 | stackv2 | from __future__ import print_function
# usage:
# python letters.py input.csv
# logs to csv's in the output directory
import csv
import datetime
import os
import sys
# Load lob-python root directory into the import path so you can use the lob package without having to install it through pip.
sys.path.insert(0, os... | 161 | 30.72 | 126 | 22 | 1,066 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5476d7ce030de7ac_ca58c0e6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
88
] | [
null
] | [
15
] | [
62
] | |
2024-11-18T20:44:01.761343+00:00 | 1,626,836,173,000 | bc381a68736ac9104223e66ad08f1e00ae9d7d43 | 3 | {
"blob_id": "bc381a68736ac9104223e66ad08f1e00ae9d7d43",
"branch_name": "refs/heads/main",
"committer_date": 1626836173000,
"content_id": "845821edbf2f2c7c42fa0bd5bad721e00cc968d7",
"detected_licenses": [
"BSD-2-Clause-Views"
],
"directory_id": "7f8204bb9dc907bcefecfa4b6221a73d638a5995",
"extension"... | 2.75 | stackv2 | """
Copyright (c) 2021, Timothy Murphy
All rights reserved.
This source code is licensed under the BSD-style license found in the
LICENSE file in the root directory of this source tree.
"""
import os
from cryptography.fernet import Fernet
from loqet.loqet_configs import LOQET_CONFIG_DIR, LOQ_KEY_FILE
from loqet.file_... | 83 | 27.36 | 77 | 14 | 599 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a5a7330db2e92589_c7a082a5", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.",
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
48,
67
] | [
null,
null
] | [
17,
21
] | [
27,
31
] | |
2024-11-18T20:44:06.069417+00:00 | 1,471,285,160,000 | c58d7a1a480c48e1392c6dea1d59daf82bca4289 | 4 | {
"blob_id": "c58d7a1a480c48e1392c6dea1d59daf82bca4289",
"branch_name": "refs/heads/master",
"committer_date": 1471285160000,
"content_id": "6de3d27856ab8ad868b663a71d67a7bfee694bf4",
"detected_licenses": [
"MIT"
],
"directory_id": "2a323a4e16cead0ea470e60774400266b2fb7c87",
"extension": "py",
"fi... | 4.15625 | stackv2 | # hangman_mit-ocw_musovzky.py
# Python version: 3.4.3
# Created by: Musovzky (viviyi4@gmail.com)
# Created on: June 27, 2016
# Hangman is a guessing game between you and your computer...
# You can choose among 3 difficulty levels: Beginner, Intermediate and Savvy
# This is the first project of MIT OpenCourseWare:
# A... | 170 | 33.38 | 93 | 21 | 1,218 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4cc377bc3b3ecca8_3803ddfd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
94,
119,
142
] | [
null,
null,
null
] | [
19,
27,
31
] | [
68,
74,
68
] | |
2024-11-18T20:44:17.453722+00:00 | 1,571,975,594,000 | 36a50c446c58f120105ea2c33e7ec93d05596e64 | 3 | {
"blob_id": "36a50c446c58f120105ea2c33e7ec93d05596e64",
"branch_name": "refs/heads/master",
"committer_date": 1571975594000,
"content_id": "cbbb473909c6751bbce9b519e17ddd6e34715a31",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1d7ae0cd984f1b1cb94d25f21df51d0e2caeb983",
"extension": "py"... | 2.796875 | stackv2 | import requests
import re
import json
from contextlib import closing
from pyquery import PyQuery as pq
from requests import RequestException
class bilibili():
def __init__(self):
self.getHtmlHeaders={
'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chro... | 75 | 38.08 | 139 | 16 | 814 | python | [{"finding_id": "codeql_py/request-without-cert-validation_5f942cda3ee975ea_e7dd81a5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
59
] | [
null
] | [
21
] | [
104
] | |
2024-11-18T20:57:29.329479+00:00 | 1,627,124,773,000 | a1b0a6fe480c47b3e2d3fbc7481a6b3caac4dacb | 3 | {
"blob_id": "a1b0a6fe480c47b3e2d3fbc7481a6b3caac4dacb",
"branch_name": "refs/heads/master",
"committer_date": 1627124773000,
"content_id": "8f27ebefee905981e61ade3f3ac5e1c028a3e117",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c705b2620119df0d60e925e55228bfbb5de3f568",
"extension": "py"... | 3.140625 | stackv2 | # -*- coding: UTF-8 -*-
__author__ = 'mcxiaoke'
import hashlib
from base64 import b64encode
def make_hash(username, secret, password):
"""Generate a salt and return a new hash for the password."""
if isinstance(password, unicode):
password = password.encode('utf-8')
salt = b64encode(username + se... | 23 | 27.74 | 65 | 11 | 156 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_c8b545e84a45ca56_f99b8856", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
15
] | [
null
] | [
19
] | [
27
] | |
2024-11-18T20:57:52.503132+00:00 | 1,682,636,052,000 | aa2bf093e25942d689ac6895bca8936d656bfc3c | 3 | {
"blob_id": "aa2bf093e25942d689ac6895bca8936d656bfc3c",
"branch_name": "refs/heads/master",
"committer_date": 1682636052000,
"content_id": "0cba4556f66bb816297690c1209be9e82794ce98",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "e5ba883c7ae6761e119e245d66b01efc41631d97",
"extension": "p... | 2.59375 | stackv2 | ## Full writeup on flag 2 found on http://www.ctfhacker.com
## Binary found here: http://csapp.cs.cmu.edu/3e/bomb.tar
import angr
import claripy
import logging
from struct import unpack
class readline_hook(angr.SimProcedure):
def run(self):
pass
class strtol_hook(angr.SimProcedure):
def run(self, str,... | 310 | 31.74 | 113 | 19 | 3,044 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8a0ea8c65b0315c4_84beace6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
277
] | [
null
] | [
11
] | [
41
] | |
2024-11-18T20:58:14.038179+00:00 | 1,503,645,442,000 | 673df3963bd0025e825ca9d8959df95c57d7ab05 | 2 | {
"blob_id": "673df3963bd0025e825ca9d8959df95c57d7ab05",
"branch_name": "refs/heads/master",
"committer_date": 1503645442000,
"content_id": "3a1efe47c0ea80b7b16396be4bfcbb4bf0259650",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d26afaf2030bde67f7c159290e796bc8c1dca968",
"extension": "py"... | 2.390625 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Wed Aug 23 10:54:15 2017
@author: goingcosme20
"""
from flask import Flask, request, abort
from dbModel import *
from datetime import datetime
from linebot import (
LineBotApi, WebhookHandler
)
from linebot.exceptions import (
InvalidSignatureError
)
from linebot.models... | 68 | 23.62 | 93 | 19 | 406 | python | [{"finding_id": "codeql_py/log-injection_b00072fbd12a3cb8_53d3767c", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
40
] | [
null
] | [
22
] | [
45
] | |
2024-11-18T20:58:19.103878+00:00 | 1,583,146,245,000 | f259ae396d8dec5414a7dcecfce1963449391d9c | 3 | {
"blob_id": "f259ae396d8dec5414a7dcecfce1963449391d9c",
"branch_name": "refs/heads/master",
"committer_date": 1583146245000,
"content_id": "0d005e559f04c6f66be6416d170395c16a4e6e62",
"detected_licenses": [
"MIT"
],
"directory_id": "20782c3dff9c09cc8946c5f17da116953ff74318",
"extension": "py",
"fi... | 2.59375 | stackv2 | import os
from flask import Flask, flash, render_template, redirect, request, url_for, send_file
import efficientnetB0_model
import tensorflow as tf
# from flask_bootstrap import Bootstrap
# App config
app = Flask(__name__)
app.config['SECRET_KEY'] = "supertopsecretprivatekey"
app.config['UPLOAD_FOLDER'] = '/tmp/'
# B... | 85 | 30.55 | 86 | 17 | 587 | python | [{"finding_id": "codeql_py/url-redirection_11bdaa149b3a82c1_0f97c53c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 5 | true | [
"CWE-601",
"CWE-601",
"CWE-601",
"CWE-022",
"CWE-022"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
40,
47,
63,
55,
68
] | [
null,
null,
null,
null,
null
] | [
29,
29,
33,
33,
22
] | [
40,
40,
44,
41,
73
] | |
2024-11-18T20:58:32.661003+00:00 | 1,510,915,213,000 | 3cbff60aadba5df212f947e63b6bb57d4c5353cb | 3 | {
"blob_id": "3cbff60aadba5df212f947e63b6bb57d4c5353cb",
"branch_name": "refs/heads/master",
"committer_date": 1510915213000,
"content_id": "2c7bbbd71bb1127820c1d95ab15aa74d42b6e4ad",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "398e76f2b2dc7f06018d0f5126ef0cbbeb1cbfaf",
"extension": "p... | 2.578125 | stackv2 | import numpy as np
from scipy import misc
import os
import hashlib
import urllib.request
DATA_DIR = os.environ.get(
'COPT_DATA_DIR',
os.path.join(os.path.expanduser("~"), 'copt_data'))
def load_img1(n_rows=20, n_cols=20):
"""Load sample image"""
dir_path = os.path.dirname(os.path.realpath(__file__))
... | 254 | 32.39 | 110 | 17 | 2,191 | python | [{"finding_id": "codeql_py/tarslip_474006080c5035cb_028726e2", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
243
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T21:10:25.255320+00:00 | 1,604,676,135,000 | fe226c58fafc16f8ca036118cf106372292091e3 | 3 | {
"blob_id": "fe226c58fafc16f8ca036118cf106372292091e3",
"branch_name": "refs/heads/main",
"committer_date": 1604676135000,
"content_id": "e38d5713540e5becdfd6c3dd347c4c6bc05d5686",
"detected_licenses": [
"MIT"
],
"directory_id": "cfe67567f2168e8435c86692141cabbc3591a8ba",
"extension": "py",
"file... | 2.625 | stackv2 | import argparse
import os.path
import urllib.request
import tarfile
import shutil
import numpy as np
import get_feat as get_feat
import get_labels as get_labels
import cnn as cnn
import conf_matrix as conf_mat
if __name__ == '__main__':
parser = argparse.ArgumentParser()
parser.add_argument("-e", type=int,... | 70 | 28.86 | 96 | 13 | 524 | python | [{"finding_id": "codeql_py/tarslip_6ceb392c4a6bb649_6db76435", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
44
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T21:10:48.050166+00:00 | 1,677,214,094,000 | 85dcab48da1de886a8db39cb35952214648351e0 | 2 | {
"blob_id": "85dcab48da1de886a8db39cb35952214648351e0",
"branch_name": "refs/heads/master",
"committer_date": 1677214094000,
"content_id": "474d72a22e163e3259dbac3a85f500fd81c1c6af",
"detected_licenses": [
"MIT"
],
"directory_id": "393e875c9bb455ed0600d2521aa6049d06cb2818",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/env python
import os
import contextlib
import logging
import shutil
import tarfile
import urllib.request
from argparse import ArgumentParser, RawTextHelpFormatter
from datetime import datetime as dt
from difflib import ndiff, unified_diff
from filecmp import dircmp
from logging import basicConfig
from pack... | 288 | 31.59 | 131 | 17 | 2,127 | python | [{"finding_id": "codeql_py/tarslip_bc37deb0b3a36a03_74941465", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
179
] | [
null
] | [
5
] | [
12
] | |
2024-11-18T21:10:48.313841+00:00 | 1,690,317,962,000 | c3b0a6d7efdbdfb8d3931094143e4e991ff26d5b | 2 | {
"blob_id": "c3b0a6d7efdbdfb8d3931094143e4e991ff26d5b",
"branch_name": "refs/heads/master",
"committer_date": 1690317962000,
"content_id": "968dd9a3d50096378b37c9c6388af9be5212df72",
"detected_licenses": [
"MIT"
],
"directory_id": "a07fd8aca2d69ade2e388054dd2c1c9991232185",
"extension": "py",
"fi... | 2.421875 | stackv2 | import json
import logging
import os
import re
import shutil
import subprocess
from functools import lru_cache
from http.server import HTTPServer, SimpleHTTPRequestHandler
from importlib import metadata
from multiprocessing import Pool
from pathlib import Path
from typing import Any, Dict, List, Optional, Union
import... | 307 | 31.55 | 105 | 15 | 2,399 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_aa8ebaacbdf35098_203024cb", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
164
] | [
null
] | [
16
] | [
49
] | |
2024-11-18T21:10:57.500154+00:00 | 1,470,508,367,000 | 0e420d34da8d7f1263330e9bfa0037a350cf1868 | 3 | {
"blob_id": "0e420d34da8d7f1263330e9bfa0037a350cf1868",
"branch_name": "refs/heads/master",
"committer_date": 1470508367000,
"content_id": "49b5d397bbd0ec0abbe53d7092c24f4098de261c",
"detected_licenses": [
"MIT",
"Apache-2.0"
],
"directory_id": "8350c57eac4b708ff9ce6958f345d9471a393588",
"exten... | 2.59375 | stackv2 | import urllib.request
import bs4
from bs4 import BeautifulSoup
import re
from News import News
import html
class NewsContentCrawler:
contentPatterns = {'metro': '<div class="body parsys">(.*?|\s)*?<\/div>\s<\/div>',
'chronicle': '<div class="article-related-content-wrapper">.*?<p>(.|\s)*?<\/div><!-- \/.article-... | 137 | 33.96 | 141 | 23 | 1,373 | python | [{"finding_id": "codeql_py/redos_97e89727f0b4ded7_c97cd3cc", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<div class=\"text combinedtext pa... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '<div class=\"text combinedtext parbase section\">' and containing many repetitions of ' '.",
"This part of the regular expression may cause exponential backtracking on strings starting with '<p>' and containing many ... | [
55,
62
] | [
null,
null
] | [
79,
42
] | [
82,
46
] | |
2024-11-18T21:11:08.855341+00:00 | 1,572,941,287,000 | eaf8ac81cb9d594a576be0f6fcdb5b53e41cd510 | 2 | {
"blob_id": "eaf8ac81cb9d594a576be0f6fcdb5b53e41cd510",
"branch_name": "refs/heads/master",
"committer_date": 1572941287000,
"content_id": "92eb981ede240f6f7c0584a94d6d7b0b71af7a7f",
"detected_licenses": [
"MIT"
],
"directory_id": "b15fea7545e05f2b55a5eb1400c9264f1888f804",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/env python
import os
import pathlib
import jinja2
import yaml
import tempfile
import invoke
import click
import awss3 as cloudstorage
BASE_PATH = pathlib.Path(__file__).absolute().parents[2]
def __build(diskimage, release, kernel):
print(f'Creating "{diskimage}"..')
sources_tmpl = jinja2.Environ... | 124 | 26.16 | 86 | 19 | 854 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_f06ec6f04aeb8039_bb9604db", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
18,
69
] | [
20,
71
] | [
20,
13
] | [
6,
6
] | |
2024-11-18T21:11:10.138438+00:00 | 1,693,456,282,000 | 863cce0678fabe522c246b293432c9f1e1c661cf | 2 | {
"blob_id": "863cce0678fabe522c246b293432c9f1e1c661cf",
"branch_name": "refs/heads/main",
"committer_date": 1693456282000,
"content_id": "c63d73bf3db520d7b889037db098ce94f6cb5710",
"detected_licenses": [
"MIT"
],
"directory_id": "977f7a7386899a5d0152b29b57ec26682b430437",
"extension": "py",
"file... | 2.46875 | stackv2 | #!/usr/bin/env python
# Data manager for reference data for the QIIME Galaxy tools
import argparse
import ftplib
import json
import os
import tarfile
import zipfile
import requests
protocol = {
"unite": "http",
"greengenes": "ftp",
"silva": "http",
"img": "ftp"
}
baseUrl = {
"unite": "http://uni... | 390 | 29.42 | 105 | 18 | 2,717 | python | [{"finding_id": "codeql_py/tarslip_e85cb97b58679d03_18d4190a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
197
] | [
null
] | [
17
] | [
20
] | |
2024-11-18T21:11:16.275747+00:00 | 1,610,425,898,000 | 536303c4b9e0d98878e8ad080731cd5440b11989 | 2 | {
"blob_id": "536303c4b9e0d98878e8ad080731cd5440b11989",
"branch_name": "refs/heads/master",
"committer_date": 1610425898000,
"content_id": "829d841b7e57ec4431b3eaae8808bdaf507f342b",
"detected_licenses": [
"MIT"
],
"directory_id": "4f725e6bd67c9c0782fc30007f714eee81b267a0",
"extension": "py",
"fi... | 2.40625 | stackv2 | # -*- coding: utf-8 -*-
#!/usr/bin/env python
import json
import requests
from urllib3.exceptions import InsecureRequestWarning
# Suppress only the single warning from urllib3 needed.
requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning)
# options: local || remote
environment = 'local'
# options... | 125 | 34.81 | 118 | 20 | 1,255 | python | [{"finding_id": "codeql_py/request-without-cert-validation_ae82f74d265bf038_0c610eef", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
104
] | [
null
] | [
20
] | [
110
] | |
2024-11-18T19:03:19.908287+00:00 | 1,405,372,266,000 | 9630bdf9d29995be6b0b26e4f7eb445600cc4516 | 3 | {
"blob_id": "9630bdf9d29995be6b0b26e4f7eb445600cc4516",
"branch_name": "refs/heads/master",
"committer_date": 1405372266000,
"content_id": "a412fda94f85c5f3c15458057a256824792ac391",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4453de00f9dbb5228a7b7aaee90052296f91c83d",
"extension": "py"... | 2.546875 | stackv2 | from jinja2 import Environment, FileSystemLoader
import json
import region
###
### PULL REQUESTS ACCEPTED HERE:
### https://github.com/codingoutloud/azuremap
###
#######################################################################
### UPDATE THE LIST BELOW AS DATA CENTER INFORMATION EVOLVES ###
##... | 73 | 35.04 | 118 | 14 | 617 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e2efd15b7f46768e_5f8877f5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
65
] | [
null
] | [
7
] | [
66
] | |
2024-11-18T19:03:20.182425+00:00 | 1,526,632,925,000 | a7095acf5673ab3a99e61484545e956ef40e822f | 2 | {
"blob_id": "a7095acf5673ab3a99e61484545e956ef40e822f",
"branch_name": "refs/heads/master",
"committer_date": 1526632925000,
"content_id": "abc4ec4da5e43d9a6b1fdb7751a037a367a88cb4",
"detected_licenses": [
"ISC"
],
"directory_id": "22e04d844059993681bf22f07a3af43c5c54eb70",
"extension": "py",
"fi... | 2.4375 | stackv2 | """This module implements an agent for KeePassC
Classes:
Agent(Client, Daemon)
"""
import logging
import signal
import socket
import ssl
import sys
from hashlib import sha256
from os import chdir
from os.path import expanduser, realpath, isfile, join
from keepassc.conn import *
from keepassc.client impor... | 218 | 30.98 | 78 | 23 | 1,454 | python | [{"finding_id": "codeql_py/insecure-protocol_fc9261eb238542f7_799a6856", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1).", "remediation": "", "lo... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 specified by [call to ssl.SSLContext](1)."
] | [
78
] | [
null
] | [
28
] | [
62
] | |
2024-11-18T19:03:30.995169+00:00 | 1,593,011,356,000 | e3c1a572de3c3b3d44bc1ff46c2c219a5d2e6090 | 4 | {
"blob_id": "e3c1a572de3c3b3d44bc1ff46c2c219a5d2e6090",
"branch_name": "refs/heads/master",
"committer_date": 1593011356000,
"content_id": "bdc6022436e52af888851d7a3d117234836fe136",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "514c194c4c00900662a8919eff944443cfcfbb19",
"extension": "py",
... | 3.703125 | stackv2 | # bibliotheque pour executer des requetes web :
import requests
import config as conf
baseurl="http://api.openweathermap.org/data/2.5/weather?units=metric&appid="+conf.apikey
def get_locations():
geocode=[] # geocode = tableau des listes de coord
lonlat=open('lonlatonly.txt', 'r') # ouverture du fichier
... | 84 | 34.93 | 132 | 11 | 814 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aaab11a8887bb641_b686c157", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
51,
53
] | [
null,
null
] | [
11,
11
] | [
14,
18
] | |
2024-11-18T19:03:43.133416+00:00 | 1,621,600,867,000 | 953017f3e0861a41b0b6c48cfe602cec79db59c2 | 2 | {
"blob_id": "953017f3e0861a41b0b6c48cfe602cec79db59c2",
"branch_name": "refs/heads/master",
"committer_date": 1621600867000,
"content_id": "afb43dfb67983efd6db3fb0c7241703469eb76e9",
"detected_licenses": [
"MIT"
],
"directory_id": "059a86859bdf336c415f4a840605ba5e257db7db",
"extension": "py",
"fi... | 2.40625 | stackv2 | import json
import logging
import os
import re
import sqlite3
import time
from contextlib import closing
from io import StringIO
from pathlib import Path
import pdfminer
import pytest
import requests as req
from dotenv import load_dotenv
from pdfminer.high_level import extract_text
from pdfminer.high_level import extr... | 168 | 28.3 | 94 | 19 | 1,192 | python | [{"finding_id": "codeql_py/redos_1f11caec23f97df4_0af8dbfb", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'Tema' and containing many repetit... | 3 | true | [
"CWE-1333",
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'Tema' and containing many repetitions of 'Tema'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'Oblig' and containing many repetitions of 'Oblig'.",
"This part o... | [
69,
69,
69
] | [
null,
null,
null
] | [
32,
40,
48
] | [
34,
42,
50
] | |
2024-11-18T19:28:46.319190+00:00 | 1,535,932,966,000 | d269dc07a463af32e83e76b9c4c1a794effaf5d4 | 3 | {
"blob_id": "d269dc07a463af32e83e76b9c4c1a794effaf5d4",
"branch_name": "refs/heads/master",
"committer_date": 1535932966000,
"content_id": "5ff15e151317be17f64ce52ee184952441979057",
"detected_licenses": [
"MIT"
],
"directory_id": "87b947d4cdf0fda9d3d46243380620dfc14e5b59",
"extension": "py",
"fi... | 3.375 | stackv2 | # -*- coding: utf-8 -*-
"""
Created on Wed Aug 29 20:18:56 2018
@author: kevin
"""
import random
import csv
while True: #Age question, nullifies user input errors
try:
n = int(input("Please enter age: "))
except ValueError:
print("Age does not compute, please enter a integer i > 1") ... | 176 | 30.99 | 107 | 25 | 1,481 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5f9c25c285d0954e_ad91388b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
56
] | [
null
] | [
24
] | [
34
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.