added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T22:30:20.181053+00:00 | 1,693,352,020,000 | 717d5182de32647219d29dde6cb6f5298b8ac557 | 4 | {
"blob_id": "717d5182de32647219d29dde6cb6f5298b8ac557",
"branch_name": "refs/heads/master",
"committer_date": 1693352020000,
"content_id": "d1576151d755db52665c0c97485c5adad38a00c4",
"detected_licenses": [
"MIT"
],
"directory_id": "6f90ed39c673c0553b4173ca1c8dd17fa5994ccf",
"extension": "py",
"fi... | 4 | stackv2 | '''
In this mission you need to create a password verification function.
The verification conditions are:
the length should be bigger than 6;
should contain at least one digit, but it cannot consist of just digits;
having numbers or containing just numbers does not apply to the password longer than 9;
a string should... | 81 | 35.79 | 101 | 16 | 742 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e707f4f5975f1633_5b391921", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
62
] | [
null
] | [
7
] | [
38
] | |
2024-11-18T22:30:23.128199+00:00 | 1,609,296,703,000 | 817e1b492e9711d1d4cd65a090f9d5547334c912 | 3 | {
"blob_id": "817e1b492e9711d1d4cd65a090f9d5547334c912",
"branch_name": "refs/heads/main",
"committer_date": 1609296703000,
"content_id": "a8d0470bef144a5fffefa03e938e9d65953c43ac",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1390e4a0c05a73a177748a7087da71078a07f316",
"extension": "py",
... | 2.515625 | stackv2 | import paramiko
import os
import re
import sys
import msvcrt
username = '*****'
pw1 = '***************'
host_ip_list1 = '192.168.50.130'
def run(host_ip, username, password, command):
ssh = paramiko.SSHClient()
try:
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
ssh.connect(host_ip... | 73 | 31.42 | 95 | 17 | 565 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2da8d63652c36952_a8d6dd29", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
15
] | [
null
] | [
9
] | [
66
] | |
2024-11-18T22:30:23.969409+00:00 | 1,609,969,169,000 | 82f3832cca283d78460c719030416c03abe92a6b | 3 | {
"blob_id": "82f3832cca283d78460c719030416c03abe92a6b",
"branch_name": "refs/heads/master",
"committer_date": 1610079484000,
"content_id": "4e46562221bf363a904484d864ec6604f7ac48ef",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e3eb2f99c5d268d80fdd4fd25f26b52d67e907ae",
"extension": "py"... | 2.5625 | stackv2 | """ Handle session info """
import functools
import logging
import uuid
from flask import g, abort, make_response, session, current_app, Blueprint, request
from werkzeug.exceptions import BadRequest
import redis
import psycopg2
import hashlib
import os
bp = Blueprint('auth', __name__)
__password_hash_version = 1
de... | 220 | 32.12 | 120 | 19 | 1,689 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_849c2310c6840780_749d3fcc", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
61
] | [
null
] | [
19
] | [
28
] | |
2024-11-18T22:30:25.046139+00:00 | 1,491,416,123,000 | 6c582dbde75cf665ee6ebe93d58c666a0839c13a | 2 | {
"blob_id": "6c582dbde75cf665ee6ebe93d58c666a0839c13a",
"branch_name": "refs/heads/master",
"committer_date": 1491416123000,
"content_id": "2650ea9c0e7a7f3edf466cc3aa220238fe3f423a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b30a8202a89914a5dc1dc6a9d19564d27df7bd5f",
"extension": "py"... | 2.46875 | stackv2 | from werkzeug.exceptions import default_exceptions
from werkzeug.exceptions import HTTPException
from flask import Flask, request, make_response
from flask import abort as flask_abort, _app_ctx_stack
import collections
DATABASE = {
'ideas': {
'0': {
'title': 'amy',
'desc': 'dances... | 278 | 26.46 | 117 | 17 | 1,826 | python | [{"finding_id": "codeql_py/flask-debug_494a6b6aac5731e3_4ad15001", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-730",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/regex-injection",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This regular expression depends on a [user-provided value](1) and is executed by [re.match](2).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripti... | [
277,
110,
152,
249
] | [
null,
null,
null,
null
] | [
5,
24,
12,
12
] | [
40,
45,
36,
36
] | |
2024-11-18T22:44:43.796614+00:00 | 1,535,853,817,000 | 7cd4063b052cbb526701ff95ccd649297c6aff1c | 2 | {
"blob_id": "7cd4063b052cbb526701ff95ccd649297c6aff1c",
"branch_name": "refs/heads/master",
"committer_date": 1535853817000,
"content_id": "43a7d134ce266a080999fa4930722b43b665d628",
"detected_licenses": [
"MIT"
],
"directory_id": "d2c378d953788aca76fd37f45ebfe36661e894a8",
"extension": "py",
"fi... | 2.484375 | stackv2 | import fileinput
import mysql.connector
import os
import re
import tarfile
import urllib.request
class Whippy:
unwanted_characters = re.compile('(\W+)|(_+)')
def __init__(self, use_defaults):
if use_defaults:
self.directory_home = ""
self.directory_nginx_available = ""
... | 259 | 34.23 | 119 | 17 | 1,877 | python | [{"finding_id": "codeql_py/tarslip_20f0195442b7d4b7_cd41e039", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
109
] | [
null
] | [
9
] | [
17
] | |
2024-11-18T23:37:03.598631+00:00 | 1,575,120,447,000 | d3ab30d3100cabe75a595351a5bff5c8b2575f86 | 3 | {
"blob_id": "d3ab30d3100cabe75a595351a5bff5c8b2575f86",
"branch_name": "refs/heads/master",
"committer_date": 1575120447000,
"content_id": "fca388d8893dfc708cf033d681685a7e37d999d8",
"detected_licenses": [
"MIT"
],
"directory_id": "5b85541e5f8bee1b07df9d33266b25c4d0c80c23",
"extension": "py",
"fi... | 3.359375 | stackv2 | ###
#
# Exercise 18.1 - Update the Guess a secret number game
#
# Now that you've learned how to save an object into a database and read from it, you can update the
# "Guess a secret number" game.
#
# Your user model should have the following fields:
# id (integer)
# name (string)
# email (string)
# secret_numb... | 121 | 31.54 | 100 | 20 | 915 | python | [{"finding_id": "codeql_py/cookie-injection_5cef6e7ff80b6c80_b92a2838", "tool_name": "codeql", "rule_id": "py/cookie-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cookie is constructed from a [user-supplied input](1).", "remediation": "", "location": {"file_path": "... | 2 | true | [
"CWE-020",
"CWE-215"
] | [
"py/cookie-injection",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cookie is constructed from a [user-supplied input](1).",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
60,
121
] | [
null,
null
] | [
34,
5
] | [
39,
24
] | |
2024-11-18T23:37:05.178195+00:00 | 1,637,691,276,000 | b8a16f5bb51f8ac7c24948af5db9121c1b3c4964 | 2 | {
"blob_id": "b8a16f5bb51f8ac7c24948af5db9121c1b3c4964",
"branch_name": "refs/heads/master",
"committer_date": 1637691276000,
"content_id": "7bbfbf666b3990a79056867a9793517679df68a2",
"detected_licenses": [
"MIT"
],
"directory_id": "5d9591c19450e0f023a2722a0dde4c52e0dfca68",
"extension": "py",
"fi... | 2.34375 | stackv2 | import os
import getpass
import logging
import ipaddress
import configparser
import urllib.request as urllib
import spdyn_update.consts as consts
from urllib.parse import urlencode
logger = logging.getLogger(__name__)
ADDRESSES = ['https://api.ipify.org', 'http://checkip4.spdns.de']
class SpDynUpdate(object):
... | 128 | 38.27 | 153 | 19 | 1,127 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_db5427cd5f5a04b2_53ad9728", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
99
] | [
null
] | [
26
] | [
65
] | |
2024-11-18T23:37:11.367702+00:00 | 1,490,341,743,000 | 25b5961bd2e64470f2abbb03e2dfd6074add07d4 | 3 | {
"blob_id": "25b5961bd2e64470f2abbb03e2dfd6074add07d4",
"branch_name": "refs/heads/master",
"committer_date": 1490341743000,
"content_id": "40e0878cf41d1e89bdcf6f0733c077d8ff9b0739",
"detected_licenses": [
"MIT"
],
"directory_id": "7e64d8979f41695b90aed05b04abaaf36dcfc034",
"extension": "py",
"fi... | 2.65625 | stackv2 | from .structure_generator import StructureGenerator
from collections import namedtuple
import io
import itertools
import operator
import os
import re
Variable = namedtuple('Variable', 'name type initializer is_constant')
class Function(object):
def __init__(self, structure_generator = None, name = '', return_typ... | 253 | 25.89 | 117 | 16 | 1,274 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_23045fc58fe46342_dcb3bf03", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
140
] | [
null
] | [
15
] | [
43
] | |
2024-11-18T23:37:11.415909+00:00 | 1,449,681,268,000 | 91d1055dae1ba8b29ece3bb7dd9ee3566ace60bd | 2 | {
"blob_id": "91d1055dae1ba8b29ece3bb7dd9ee3566ace60bd",
"branch_name": "refs/heads/master",
"committer_date": 1449681268000,
"content_id": "a53c8eabc1a990a99eb2a0b85e3d75e21c91c0d8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4a4de52f291c7c520afaeaf26e35c4be07d3133c",
"extension": "py"... | 2.375 | stackv2 | """
NGINXify
"""
from flask import Flask, request, jsonify, abort
from flask_limiter import Limiter
from jinja2 import Environment
from jinja2.loaders import FileSystemLoader
from werkzeug.contrib.fixers import ProxyFix
from subprocess import call
from datetime import datetime, timedelta
from psutil import cpu_percent,... | 130 | 28.98 | 74 | 16 | 929 | python | [{"finding_id": "codeql_py/path-injection_703ce4001e52622b_02ea18e2", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 5 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-079"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
69,
82,
91,
92,
44
] | [
null,
null,
null,
null,
null
] | [
23,
19,
23,
19,
7
] | [
35,
31,
35,
31,
57
] | |
2024-11-18T21:57:27.378336+00:00 | 1,481,218,147,000 | 99226dfd3a556a942a77b17d9646b066358bd99c | 3 | {
"blob_id": "99226dfd3a556a942a77b17d9646b066358bd99c",
"branch_name": "refs/heads/master",
"committer_date": 1481218147000,
"content_id": "513c7a0c569c2832559077df4bc945e745e06106",
"detected_licenses": [
"MIT"
],
"directory_id": "7ee3d58796a1615f235fed185554b3c1be9bb59d",
"extension": "py",
"fi... | 3.015625 | stackv2 | #!/usr/bin/python3
import random
import sys
import json
import string
PASSWORD_LEN = 10
CHARS = string.ascii_letters + string.digits
def main():
random.seed(23456)
if len(sys.argv) < 2:
print("Usage:\n{} amount_of_teams".format(sys.argv[0]))
sys.exit()
amount_of_teams = int(sys.argv[1])
... | 40 | 26.1 | 81 | 14 | 287 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_60869ee9da43f3eb_d75d462e", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text."
] | [
33,
37
] | [
null,
null
] | [
17,
17
] | [
28,
31
] | |
2024-11-18T21:57:58.274971+00:00 | 1,480,003,780,000 | aa4207c8f40b790fd052d76ebf3b2a37bf39cef2 | 3 | {
"blob_id": "aa4207c8f40b790fd052d76ebf3b2a37bf39cef2",
"branch_name": "refs/heads/master",
"committer_date": 1480003780000,
"content_id": "44109ff70a1e1abd928cd31fbaf535fb40d83fcd",
"detected_licenses": [
"MIT"
],
"directory_id": "1149bbebffd4d2ef611ce51a45de53c4563fca10",
"extension": "py",
"fi... | 2.5625 | stackv2 | from flask import Flask
from flask import render_template, request
import click
import requests
import json
import redis
from ledger import Ledger
app = Flask(__name__)
@click.command()
@click.option('--port', default=8000, help='Listening port.')
@click.option('--name', help='Peer name.')
@click.option('--peer-ad... | 153 | 22.99 | 94 | 14 | 817 | python | [{"finding_id": "codeql_py/stack-trace-exposure_a138014e27e2280f_83c317a8", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
113
] | [
null
] | [
16
] | [
22
] | |
2024-11-18T21:58:04.131733+00:00 | 1,643,319,457,000 | e0f3b4f440773ea84ad0e9e9b9a8e56ee9929510 | 3 | {
"blob_id": "e0f3b4f440773ea84ad0e9e9b9a8e56ee9929510",
"branch_name": "refs/heads/master",
"committer_date": 1643319457000,
"content_id": "35de55863dd23391a7e5d5b97aca842e9d1c8f2b",
"detected_licenses": [
"MIT"
],
"directory_id": "b3ed4a75d08010308c833fbe8f0aa32ec71991d7",
"extension": "py",
"fi... | 3.46875 | stackv2 | import math
import cmath
import datetime
from math import sqrt
import random
from collections import Counter
#Dictionaries Challenge 22: Database Admin Program
print("Welcome to the Database Admin Program")
log_on_information = {
'admin00':'Rafalq25',
'admin2':'Ravix12345',
'admin3':'Polska123',
'adm... | 53 | 31.89 | 127 | 20 | 419 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0f37674bdc04df6b_e7ee0a1d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
46
] | [
null
] | [
23
] | [
84
] | |
2024-11-18T21:58:04.367776+00:00 | 1,607,921,845,000 | dffeb5f1d5be63940d3f8be05d21d16875df766e | 3 | {
"blob_id": "dffeb5f1d5be63940d3f8be05d21d16875df766e",
"branch_name": "refs/heads/master",
"committer_date": 1607921845000,
"content_id": "9e069c5c901bdfc7017820b61ca21813d29da5df",
"detected_licenses": [
"MIT"
],
"directory_id": "085f286152eb99b6cb7c47754e1d8fea65f3d5e7",
"extension": "py",
"fi... | 2.84375 | stackv2 | from flask import Flask, redirect, url_for
app = Flask(__name__)
@app.route("/")
def home():
return "<h1>Welcome to my project! Add a /hidden/ to the end of the URL to see another page!<h1>"
@app.route("/<name>")
def user(name):
return f"Hello {name}!"
@app.route("/hidden/")
def admin():
return redirect... | 22 | 27.45 | 123 | 12 | 176 | python | [{"finding_id": "codeql_py/reflective-xss_3b71dbea4e0c7d29_91af01bc", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
11
] | [
null
] | [
12
] | [
28
] | |
2024-11-18T21:58:23.705620+00:00 | 1,620,081,598,000 | 419cc6b65dca3da85eae8ca106424c06160785b5 | 3 | {
"blob_id": "419cc6b65dca3da85eae8ca106424c06160785b5",
"branch_name": "refs/heads/master",
"committer_date": 1620081598000,
"content_id": "8f01283e0331c7b5a8a4dfb56abb593d384107a1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d98c0a32d578593f4320aa75710a09647d1b250f",
"extension": "py"... | 2.59375 | stackv2 | import re
import pandas as pd
# -*- coding: utf-8 -*-
# Taken from https://github.com/bfelbo/DeepMoji/blob/master/deepmoji/tokenizer.py
"""
Splits up a Unicode string into a list of tokens.
Recognises:
- Abbreviations
- URLs
- Emails
- #hashtags
- @mentions
- emojis
- emoticons (limited support)
Multiple consecutive... | 201 | 25.66 | 103 | 14 | 1,769 | python | [{"finding_id": "codeql_py/overly-large-range_5ed5d4667529c461_5060d574", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
54
] | [
null
] | [
50
] | [
53
] | |
2024-11-18T21:58:38.762990+00:00 | 1,552,548,080,000 | a09949af064ece510f0d6bebc111cc9d9cfc7134 | 2 | {
"blob_id": "a09949af064ece510f0d6bebc111cc9d9cfc7134",
"branch_name": "refs/heads/master",
"committer_date": 1552548080000,
"content_id": "6f125896da04f39e0b4fe39d378da88296e18bb2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "81060302e96d36262c6f577fe48bf9ad4631b253",
"extension": "py"... | 2.484375 | stackv2 | import os, webapp2, jinja2
import urllib
from google.appengine.api import users
from google.appengine.ext import ndb
# templates_folder = current_folder + "\\templates"
current_folder = os.path.dirname(__file__)
templates_folder = os.path.join(current_folder, "templates")
environment = jinja2.Environment(loader = jinj... | 286 | 34.68 | 107 | 20 | 2,180 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4391f941e5280eea_0d0b316f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
9
] | [
null
] | [
15
] | [
85
] | |
2024-11-18T21:58:40.364582+00:00 | 1,428,764,901,000 | c8ca99ff18f36422d0809d32295a94d10ce71ce1 | 3 | {
"blob_id": "c8ca99ff18f36422d0809d32295a94d10ce71ce1",
"branch_name": "refs/heads/master",
"committer_date": 1428764901000,
"content_id": "be7b5e5f4c3aae3700304e8d09e9431bb9c8302b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bea3b6b9b79d39fd70d778822f555547b526a8fc",
"extension": "py"... | 2.640625 | stackv2 | #!/usr/bin/env python
"""PyCon JSON to HTML Exporter
Usage:
./export.py <group>
./export.py 'day1_group1'
./export.py '__all__'
Options:
-h --help Show this screen
"""
from datetime import datetime
import urllib
import time
import json
import os
from babel import dates
from docopt import ... | 152 | 28.97 | 140 | 14 | 1,368 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_cad5913439a3b500_5b2f2b80", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
38
] | [
null
] | [
13
] | [
69
] | |
2024-11-18T23:10:52.228482+00:00 | 1,603,644,741,000 | 8d15de77fae9f0d3a517720bb566cb325ff174c5 | 4 | {
"blob_id": "8d15de77fae9f0d3a517720bb566cb325ff174c5",
"branch_name": "refs/heads/master",
"committer_date": 1603644741000,
"content_id": "0d04b6333e4c8d56976580796171c586c64bd1d1",
"detected_licenses": [
"MIT"
],
"directory_id": "82d972e2c7cf9f1e962a07cde976661b1b7a7f40",
"extension": "py",
"fi... | 3.890625 | stackv2 | # --------------
#Code starts here
#Function to read file
def read_file(path):
#Opening of the file located in the path in 'read' mode
file= open(path, 'r')
#Reading of the first line of the file and storing it in a variable
sentence=file.readline()
#Closing of the file
file.close... | 218 | 20.11 | 73 | 11 | 1,161 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_62c82cef01844ec8_6539bd52", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec... | [
205,
55,
96,
148,
186,
213
] | [
null,
null,
null,
null,
null,
null
] | [
16,
7,
7,
7,
7,
7
] | [
26,
19,
19,
19,
19,
17
] | |
2024-11-18T23:10:53.909318+00:00 | 1,548,608,672,000 | 749ec002254a8c7aa26cc108a73cfba41afbdf9a | 2 | {
"blob_id": "749ec002254a8c7aa26cc108a73cfba41afbdf9a",
"branch_name": "refs/heads/master",
"committer_date": 1548608672000,
"content_id": "1de41add06645846c7b60252cf9373012d74fbf4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c1559ca6b9a49b08c5de4549f8974eb9776dccf5",
"extension": "py"... | 2.390625 | stackv2 | from __future__ import unicode_literals, print_function
import jinja2
'''
intf_config = """
interface GigabitEthernet0/1
description {{ descript }}
no switchport
ip address {{ ip_addr }} {{ netmask }}
speed auto
duplex auto
"""
'''
with open("template_jinja.j2") as file: # read whatever is in the file defined... | 29 | 21.07 | 91 | 9 | 181 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_73238a4075fd484b_0bc0f439", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
26
] | [
null
] | [
12
] | [
40
] | |
2024-11-18T23:10:58.956655+00:00 | 1,383,870,311,000 | c58eded652205e32e9cc6647b37a3dd123fdc184 | 3 | {
"blob_id": "c58eded652205e32e9cc6647b37a3dd123fdc184",
"branch_name": "refs/heads/master",
"committer_date": 1383870311000,
"content_id": "fbee3507f388c6830a0058e39a13b1f4a435ce59",
"detected_licenses": [
"MIT"
],
"directory_id": "56f09831300412ec654844a1e2b79530dee04333",
"extension": "py",
"fi... | 2.984375 | stackv2 | import re
import urllib
import urllib2
import time
def request(tree):
url = 'http://www.americanforests.org/bigtrees/bigtrees-search/'
user_agent = "Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)"
values = {'search_val' : tree }
headers = { 'User-Agent' : user_agent }
data = u... | 41 | 30.46 | 90 | 13 | 356 | python | [{"finding_id": "codeql_py/overly-large-range_d1a4646794ab2875_f58514c2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
18
] | [
null
] | [
74
] | [
77
] | |
2024-11-18T22:36:00.829861+00:00 | 1,565,693,793,000 | 106eeeb8bace3395b07df936fb361beca2201177 | 3 | {
"blob_id": "106eeeb8bace3395b07df936fb361beca2201177",
"branch_name": "refs/heads/master",
"committer_date": 1565693793000,
"content_id": "c1c8d2537fe4dd0e812c6a46d4604c99671d9518",
"detected_licenses": [
"MIT"
],
"directory_id": "dd25f12d1754f7796296845fdbef24f204e572f6",
"extension": "py",
"fi... | 3.03125 | stackv2 | """import private key or keystore file as parity account"""
import json
import os
import re
import sys
import click
from eth_account import Account
class TrustlinesFiles:
def __init__(self, password_file, address_file, keystore_file):
self.password_file = password_file
self.address_file = addres... | 110 | 30.25 | 105 | 19 | 761 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8bb575edaec58d3d_0226699b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text."
] | [
29
] | [
null
] | [
21
] | [
29
] | |
2024-11-18T22:49:03.115318+00:00 | 1,591,171,612,000 | 98beb2a2f5a09736cedf41935d70f9484fc5bfaa | 3 | {
"blob_id": "98beb2a2f5a09736cedf41935d70f9484fc5bfaa",
"branch_name": "refs/heads/master",
"committer_date": 1591171612000,
"content_id": "1069eb2f4d02e5a1dcaba9e06d114086d843010f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4310e12366818af27947b5e2c80cb162da93a4b5",
"extension": "py"... | 2.65625 | stackv2 | # Copyright 2015 Open Platform for NFV Project, Inc. and its contributors
# This software is distributed under the terms and conditions of the 'Apache-2.0'
# license which can be found in the file 'LICENSE' in this package distribution
# or at 'http://www.apache.org/licenses/LICENSE-2.0'.
import html
import re
import... | 331 | 35.13 | 114 | 26 | 2,517 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2fcc75eb0bd0a037_f337f750", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2).",
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
301,
313
] | [
null,
null
] | [
19,
15
] | [
94,
91
] | |
2024-11-18T22:49:04.430745+00:00 | 1,573,777,769,000 | c78e277534f5435daea3682a8aa2d6ab28966a91 | 3 | {
"blob_id": "c78e277534f5435daea3682a8aa2d6ab28966a91",
"branch_name": "refs/heads/master",
"committer_date": 1573777769000,
"content_id": "df297c431fd865b8aa1b28b9c58a929f9c6d7835",
"detected_licenses": [
"Unlicense"
],
"directory_id": "7104f42032eac4816105aed5eba87d25fd43c79e",
"extension": "py",... | 2.625 | stackv2 | #!/usr/bin/env python3
import os
import argparse
from jinja2 import Environment, FileSystemLoader
if __name__ == '__main__':
parser = argparse.ArgumentParser()
parser.add_argument('input', metavar='FILE', type=str)
args = parser.parse_args()
env = Environment(
loader=FileSystemLoader('.'),
... | 22 | 21.36 | 58 | 12 | 111 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_72bfd607ff2fdf4a_e668ea9e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12
] | [
14
] | [
11
] | [
6
] | |
2024-11-18T22:49:06.751694+00:00 | 1,607,192,785,000 | efa1a01760bf7ec7f312ba0484dd363611a47d7b | 3 | {
"blob_id": "efa1a01760bf7ec7f312ba0484dd363611a47d7b",
"branch_name": "refs/heads/master",
"committer_date": 1607192785000,
"content_id": "e3a35461ce8de6c9f51e3c865ae794b66f06aafe",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3c6c816056a14979f658cf3f7a3ce885b304ba79",
"extension": "py"... | 2.6875 | stackv2 | from __future__ import print_function
import numpy as np
import os
import sys
import tarfile
import pickle
from urllib.request import urlretrieve
from sklearn.linear_model import logistic
from scipy import ndimage
url = 'http://commondatastorage.googleapis.com/books1000/'
last_percent_reported = None
def download_... | 267 | 31.95 | 113 | 18 | 2,064 | python | [{"finding_id": "codeql_py/tarslip_002249d7392b0fd7_cb9f928e", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
55
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T22:49:07.152932+00:00 | 1,582,669,822,000 | 2e93fb3ededb798ba81f187bc5bf40e1350847f2 | 3 | {
"blob_id": "2e93fb3ededb798ba81f187bc5bf40e1350847f2",
"branch_name": "refs/heads/master",
"committer_date": 1582669822000,
"content_id": "8dc89ca856499574d6c48dc8aa0bd6e5c482c367",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "03be39bffde1c9f3edf55ea8401ae865436f5b6d",
"extension": "py"... | 2.75 | stackv2 | # the docs for the format: https://docs.google.com/spreadsheets/d/1LGEnOfUu5PjuE42dMoEhIRve5rv3vNsBtk-8DWozwdg/edit?ts=5e322488#gid=870428257
# https://docs.google.com/spreadsheets/d/1raDs8m-Yd_XOFskueqqcMcMxvR2KVhTJg6ILsQXBhnw/edit#gid=121665415
import codecs
from datetime import datetime
now = datetime.now() # curre... | 172 | 40.13 | 179 | 16 | 3,060 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e52a2bc6bbce80a4_b670340a", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text."
] | [
164,
166,
169
] | [
null,
null,
null
] | [
28,
28,
28
] | [
41,
41,
41
] | |
2024-11-18T22:14:54.560821+00:00 | 1,598,844,091,000 | c6a6c1b12747cfe23694dee4fb18a6534754bf62 | 3 | {
"blob_id": "c6a6c1b12747cfe23694dee4fb18a6534754bf62",
"branch_name": "refs/heads/master",
"committer_date": 1598844091000,
"content_id": "b5a6031335e33d90c468efbab4376a0aec1f1fa1",
"detected_licenses": [
"MIT"
],
"directory_id": "6222739af0f48139afee1337c089647815cc36e6",
"extension": "py",
"fi... | 2.625 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
# import os
# import sys
import wmi
from hashlib import sha1
def _cpuid(c):
# 处理器
for cpu in c.Win32_Processor():
cpuid = cpu.ProcessorId.strip()
if cpuid is not None:
return cpuid
else:
return ""
def _boardid(c):
# 主板
for... | 168 | 26.93 | 80 | 11 | 1,417 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_ea30484c0bc4fbbb_f71795ea", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (id)](3) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (id)](4) is used in a hashing algorithm (SHA1) that i... | [
51
] | [
null
] | [
15
] | [
33
] | |
2024-11-18T22:14:57.350519+00:00 | 1,566,533,881,000 | ae4b919893b1373dac8d56312c6e03e3807f0c1e | 3 | {
"blob_id": "ae4b919893b1373dac8d56312c6e03e3807f0c1e",
"branch_name": "refs/heads/master",
"committer_date": 1566533881000,
"content_id": "5927b72310ed9b948c6654921cf7e673522c4691",
"detected_licenses": [
"MIT"
],
"directory_id": "f94c7ec6f226272264519127ea9651dc30c38508",
"extension": "py",
"fi... | 2.75 | stackv2 | import requests
import requests_ftp
import re
import sys
import urllib3
urllib3.disable_warnings()
# NOTE: urllib warnings are disabled because https certificate validation is disabled.
# In general, this is not a secure practice; see more here: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#ssl-warnings... | 103 | 39.36 | 133 | 16 | 1,094 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c100f45ba6331d7d_b520c648", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
22
] | [
null
] | [
11
] | [
108
] | |
2024-11-18T22:14:59.753776+00:00 | 1,437,932,163,000 | 7ae2e387ea5891161f24f7a9adec9928dc8841c2 | 3 | {
"blob_id": "7ae2e387ea5891161f24f7a9adec9928dc8841c2",
"branch_name": "refs/heads/master",
"committer_date": 1437932163000,
"content_id": "47b9e5a2888d139daf4c07d2192296dab57b8740",
"detected_licenses": [
"MIT"
],
"directory_id": "190afbd8f751e69f4c97155cddff25b50229b74f",
"extension": "py",
"fi... | 3.1875 | stackv2 | #!/usr/bin/env python
import socket
import ssl
import datetime
import smtplib
import argparse
import sys
import logging
# The one external library
import certifi
def get_connection(address, port):
''' Establishes an SSL connection to the specified address and port '''
# Find out where certifi's root certs ... | 129 | 31.98 | 114 | 14 | 931 | python | [{"finding_id": "codeql_py/insecure-default-protocol_61583a6db055348d_1ef2f823", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
25
] | [
27
] | [
16
] | [
60
] | |
2024-11-18T22:55:24.663931+00:00 | 1,559,855,168,000 | 2d239d74165e17d4a65e213188c36679c649a4eb | 3 | {
"blob_id": "2d239d74165e17d4a65e213188c36679c649a4eb",
"branch_name": "refs/heads/master",
"committer_date": 1559855168000,
"content_id": "07d16211b41d2a9d8ac7fde926e0f70329bdacaf",
"detected_licenses": [
"MIT"
],
"directory_id": "561c2632a69f13c774918a466fb097ee613d432f",
"extension": "py",
"fi... | 3.25 | stackv2 | import os
import csv
from Group import Group
from Member import Member
from Table import Table
from Date import Date
def csvParser(filePath):
""" filePath is where the file is save, and it
must include the name of the file
Also, if the file name does not include "Members" or
"Fincances", csvParser wil... | 130 | 31.13 | 83 | 21 | 906 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_f91099f24a82100b_3c5c6195", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
120
] | [
null
] | [
23
] | [
25
] | |
2024-11-18T23:24:03.352188+00:00 | 1,574,888,635,000 | 0fd16a8555da1045c3971d9f731b206977bdfa52 | 2 | {
"blob_id": "0fd16a8555da1045c3971d9f731b206977bdfa52",
"branch_name": "refs/heads/master",
"committer_date": 1574888635000,
"content_id": "17ce3208356e2666120a6b7b203f229c837e4ca6",
"detected_licenses": [
"MIT"
],
"directory_id": "fcbb9da73752589d9ff3b9d9835f84e2a537f9a9",
"extension": "py",
"fi... | 2.421875 | stackv2 | """
This library contains utilities to use authentication and authorization features of the DCP.
"""
from typing import List
from .dcp_service_account import DCPServiceAccountManager
from ..errors import SecurityException
security_config_not_set_error = "security configuration not set for {}. Use Config.setup() to s... | 59 | 37.66 | 119 | 15 | 487 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_29a819f064e8961d_9a1ec184", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [iam.gserviceaccount.com](1) may be at an arbitrary pos... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [iam.gserviceaccount.com](1) may be at an arbitrary position in the sanitized URL."
] | [
37
] | [
null
] | [
82
] | [
119
] | |
2024-11-18T23:32:13.806443+00:00 | 1,568,670,754,000 | aac30affadedd8f239ed5f691a2682b6fa7311d8 | 2 | {
"blob_id": "aac30affadedd8f239ed5f691a2682b6fa7311d8",
"branch_name": "refs/heads/master",
"committer_date": 1568670754000,
"content_id": "4c89c2fa1d0d4bfdfe6b989b41697b8c19f98f0b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "362e8a29e503fa48f34548fa23da7060ab1e961d",
"extension": "py"... | 2.4375 | stackv2 | import hashlib
import shlex
import subprocess
import tempfile
from lib.constants import PROXYCHAINS
from lib.modules.DetectionModule import *
class Module(DetectionModule):
def __init__(self, name, event_json):
super().__init__(name=name, event_json=event_json)
def run(self):
self.logger.deb... | 63 | 45.03 | 150 | 23 | 580 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_8fafd6e68db3b4cd_857ac966", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [wetransfer.net](1) may be at an arbitrary position in ... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [wetransfer.net](1) may be at an arbitrary position in the sanitized URL.",
"The string [wetransfer.com](1) may be at an arbitrary position in the sanitized URL."
] | [
29,
29
] | [
null,
null
] | [
20,
52
] | [
43,
75
] | |
2024-11-18T23:55:42.755116+00:00 | 1,519,667,481,000 | a5d0311734ff6290f47a588ce0caf25984a2bdfa | 2 | {
"blob_id": "a5d0311734ff6290f47a588ce0caf25984a2bdfa",
"branch_name": "refs/heads/master",
"committer_date": 1519667481000,
"content_id": "6d07cd94b89473a5af0b6b4c5552465ed2d74fcb",
"detected_licenses": [
"MIT"
],
"directory_id": "a692d07d33bda26ab4f3f2d3b393d068c78eb63d",
"extension": "py",
"fi... | 2.34375 | stackv2 | from __future__ import unicode_literals
import datetime
import logging
import re
import emoji
import markdown2
class Message(object):
def __init__(self, USER_DATA, CHANNEL_DATA, message):
self.__USER_DATA = USER_DATA
self.__CHANNEL_DATA = CHANNEL_DATA
self._message = message
#######... | 217 | 32.75 | 81 | 21 | 1,736 | python | [{"finding_id": "codeql_py/overly-large-range_5b096b96ac4687a7_574440d3", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in the same character class, and is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
96
] | [
null
] | [
48
] | [
51
] | |
2024-11-18T23:55:48.192155+00:00 | 1,581,347,173,000 | 09893761c22b5694cf723f5bf859d85caf7398f8 | 4 | {
"blob_id": "09893761c22b5694cf723f5bf859d85caf7398f8",
"branch_name": "refs/heads/master",
"committer_date": 1581347173000,
"content_id": "1550292d10ade710498d22b52dd18212e9955f7d",
"detected_licenses": [
"MIT"
],
"directory_id": "fa66a855af11d55a97a12d6f5c284c4bfaea7671",
"extension": "py",
"fi... | 3.578125 | stackv2 | # Simple command line password manager
# can have multiple users passwords, requires user and master key to login
# saves the passwords to a encrypted text file
import secrets
import hashlib
import binascii
import os
import getpass
import pickle, json
import pyperclip
from cryptography.fernet import Fernet
def passwor... | 144 | 36.1 | 129 | 22 | 1,135 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eb464a40621f68de_0e49a1c2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
100,
123
] | [
null,
null
] | [
57,
51
] | [
65,
59
] | |
2024-11-18T23:18:23.357072+00:00 | 1,610,667,673,000 | 7dba5d42fbe50fd88aee200ed5b5f037e7d183bd | 2 | {
"blob_id": "7dba5d42fbe50fd88aee200ed5b5f037e7d183bd",
"branch_name": "refs/heads/master",
"committer_date": 1610667673000,
"content_id": "37d03f618ec66e2289d62a44dc88eeafb26f8759",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "d86e14e487cb3c872ef54fcd991818513d5219f2",
"extension": "p... | 2.453125 | stackv2 | from __future__ import division
from builtins import range
from past.utils import old_div
import bisect
from collections import defaultdict
from datetime import timedelta, datetime
import dateutil.parser
from decimal import Decimal
import re
import cloudsigma.resource as cr
start_time = datetime(2014, 1, 1)
end_time ... | 110 | 30.06 | 79 | 19 | 760 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_555470879b721f3b_db982582", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
110
] | [
null
] | [
15
] | [
45
] | |
2024-11-19T00:07:26.251448+00:00 | 1,577,359,150,000 | 3222727928ae4ecd5d51cf536368fc826b8ac6e7 | 3 | {
"blob_id": "3222727928ae4ecd5d51cf536368fc826b8ac6e7",
"branch_name": "refs/heads/master",
"committer_date": 1577359150000,
"content_id": "6c9d63958f85ee6757a392cf213b66e0607bd837",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "531e7716c126a26dd54e07ce52a973059a44a472",
"extension": "py"... | 3.015625 | stackv2 | from day21.script1 import parse, Program, to_codes, to_ascii
import re
DIRECTIONS = ["north", "east", "south", "west"]
DANGEROUS_ITEMS = ["infinite loop", "giant electromagnet", "escape pod", "photons", "molten lava"]
def get_combinations_rec(so_far, items, res):
if len(items) == 0:
res.append(so_far)
... | 197 | 34.23 | 101 | 17 | 1,545 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1e9749a002200832_bf193c1e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
197
] | [
null
] | [
11
] | [
35
] | |
2024-11-19T00:45:03.483978+00:00 | 1,399,823,488,000 | c8fc657c761165565548f28453e1414a418d7a16 | 2 | {
"blob_id": "c8fc657c761165565548f28453e1414a418d7a16",
"branch_name": "refs/heads/master",
"committer_date": 1399823488000,
"content_id": "8fdf7ac622482e85eee99da3ba7ffd8f12964075",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "a4c17715ade823941ef905848b4c509d21ef2a32",
"extension": "p... | 2.375 | stackv2 | import json
from django.core.serializers.json import DjangoJSONEncoder
from django.http import HttpResponse
#from django.utils.encoding import force_unicode
from django.utils.encoding import force_text
from django.utils.functional import Promise
from django.utils.translation import ugettext as _
from django.utils.cach... | 80 | 30.75 | 77 | 19 | 491 | python | [{"finding_id": "codeql_py/stack-trace-exposure_57a91d34803bdd64_20cfa557", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
37
] | [
null
] | [
33
] | [
40
] | |
2024-11-19T00:45:05.816367+00:00 | 1,622,808,266,000 | cde5f5c5adeb28636b70b29e50e184d947ef8b21 | 3 | {
"blob_id": "cde5f5c5adeb28636b70b29e50e184d947ef8b21",
"branch_name": "refs/heads/main",
"committer_date": 1622808266000,
"content_id": "43587910b211c6bde24fd1f3c245a6ea97343415",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "c36bc912ec289488d6d96bf6447e14ada15363f8",
"extension": "py"... | 3.125 | stackv2 | import requests
def host_header(host, port):
if port == 80:
port = 'http://'
elif port == 443:
port = 'https://'
else:
print("Couldn't fetch data for the given PORT")
return
url = port + host
headers = {'Host': 'http://evil.com'}
response = requests.get(url, he... | 19 | 25 | 56 | 11 | 122 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_008fc3524321d071_366c4faf", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [evil.com](1) may be at an arbitrary position in the sa... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [evil.com](1) may be at an arbitrary position in the sanitized URL."
] | [
16
] | [
null
] | [
8
] | [
38
] | |
2024-11-19T01:11:39.852482+00:00 | 1,539,970,125,000 | ba7c7bdbe917ce80fc19a8fdee3aa5b9a700eb91 | 4 | {
"blob_id": "ba7c7bdbe917ce80fc19a8fdee3aa5b9a700eb91",
"branch_name": "refs/heads/master",
"committer_date": 1539970125000,
"content_id": "d4d220a70fd3611809f2317b872f06b170dea02f",
"detected_licenses": [
"MIT"
],
"directory_id": "ffeae925479dfa94d0ec710fcd19061ac3a6e98a",
"extension": "py",
"fi... | 4 | stackv2 | class Student:
def __init__(self,name,school,marks=[]):
self.name=name;
self.school=school
self.marks=marks
def average(self):
return sum(self.marks)/len(self.marks);
@classmethod
def friend(cls,origin,friend_name):
print ("It Came to Student Class Method")
... | 30 | 31.63 | 72 | 11 | 269 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0df6b6dbc46c5765_9c8e8323", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (priva... | [
28,
30
] | [
null,
null
] | [
7,
7
] | [
22,
20
] | |
2024-11-19T00:44:27.027048+00:00 | 1,381,987,851,000 | 932ad9f242394d07484817a1ffc6b8cf19bdc864 | 2 | {
"blob_id": "932ad9f242394d07484817a1ffc6b8cf19bdc864",
"branch_name": "refs/heads/master",
"committer_date": 1381987851000,
"content_id": "ca6dec330b337935804f586f606a21259002f430",
"detected_licenses": [
"MIT"
],
"directory_id": "f1543edc36cf61725bdec2a14c1ac0ee65c31cc3",
"extension": "py",
"fi... | 2.40625 | stackv2 | from django.http import HttpResponseRedirect
from django.views.generic import FormView, TemplateView
from django.views.generic.detail import SingleObjectMixin
from django_persistent_todo.forms import AddToDoForm
from django_persistent_todo.models import ToDoItem
class RedirectMixin(object):
def get_success_url(s... | 37 | 31.16 | 66 | 13 | 253 | python | [{"finding_id": "codeql_py/url-redirection_3d720dd3df782436_dc50cc76", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
37
] | [
null
] | [
37
] | [
59
] | |
2024-11-19T00:44:29.858565+00:00 | 1,495,361,546,000 | 512108991df79bca3da91cf0dacc012f0be7f364 | 2 | {
"blob_id": "512108991df79bca3da91cf0dacc012f0be7f364",
"branch_name": "refs/heads/master",
"committer_date": 1495361546000,
"content_id": "f5482c6d77d61c3aaadb23b59ee4492c241930d9",
"detected_licenses": [
"MIT"
],
"directory_id": "cc3a3d0db136e361b5f10bdefd131470d60a7705",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/python -p
import MySQLdb, base64, json, datetime
from bottle import run, post, request, response, get, route
KEY = "P3NT4G0N"
db = MySQLdb.connect("localhost","root","parrot","parrot" )
cursor = db.cursor()
def encode(key, string):
encoded_chars = []
for i in xrange(len(string)):
key_c = key[i % len(... | 132 | 23.7 | 76 | 17 | 962 | python | [{"finding_id": "codeql_py/sql-injection_1c7de1bf06dd62ae_651f5add", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 4 | true | [
"CWE-089",
"CWE-089",
"CWE-089",
"CWE-089"
] | [
"py/sql-injection",
"py/sql-injection",
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
49,
90,
93,
112
] | [
null,
null,
null,
null
] | [
19,
19,
19,
19
] | [
22,
22,
22,
22
] | |
2024-11-19T00:44:31.837678+00:00 | 1,600,202,174,000 | 8ea94f9a76513f444433e448f92901b75603bc0b | 3 | {
"blob_id": "8ea94f9a76513f444433e448f92901b75603bc0b",
"branch_name": "refs/heads/master",
"committer_date": 1600202174000,
"content_id": "b0f116de9d876699da83bdb7b31e69e5ed8aa25f",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "02fc8eabe1f497947e9a23828fb663109c172197",
"extension": "py"... | 2.5625 | stackv2 | #!/usr/bin/env python3
from datetime import datetime
import requests
import pymongo
import sys
import threading
import queue
from bs4 import BeautifulSoup
SCAN_INTERVAL = 180 # days
mongo_client = pymongo.MongoClient('localhost', 27017)
db = mongo_client.domain
NUM_THREADS = 2
q = queue.Queue()
from stem import S... | 119 | 31.23 | 128 | 21 | 977 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c96fbf05f5218cd4_0983f9d6", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
47
] | [
null
] | [
9
] | [
127
] | |
2024-11-19T00:44:31.942285+00:00 | 1,515,910,182,000 | ad87093e8e9ab49ca4ca676cfacc60207403a73b | 3 | {
"blob_id": "ad87093e8e9ab49ca4ca676cfacc60207403a73b",
"branch_name": "refs/heads/master",
"committer_date": 1515910182000,
"content_id": "db799df665c248210116f23554d7f185c849fdfd",
"detected_licenses": [
"MIT"
],
"directory_id": "389a4f97e3d20ae9d4ad40fa5ddb354826540421",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/bin/env python
from flask import Flask, request
from flask_cors import CORS
from configparser import ConfigParser
from controller import Window
from threading import Thread
import requests
import pyautogui
import win32gui
import win32api
import win32con
import logging
import time
import os
config = ConfigParse... | 145 | 25.3 | 93 | 13 | 926 | python | [{"finding_id": "codeql_py/stack-trace-exposure_ce700a136b2f0f8e_350aaf7c", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
79,
91
] | [
null,
null
] | [
12,
12
] | [
25,
28
] | |
2024-11-18T23:05:27.726984+00:00 | 1,453,577,442,000 | 214288ee375ba76ae319955ae8dc3686f7820ca7 | 2 | {
"blob_id": "214288ee375ba76ae319955ae8dc3686f7820ca7",
"branch_name": "refs/heads/master",
"committer_date": 1453577442000,
"content_id": "ba73cae787200500f45402d6fd7a53f590e01b9f",
"detected_licenses": [
"MIT"
],
"directory_id": "207a316dde969bfcdb7d65db346060a2f8db65e5",
"extension": "py",
"fi... | 2.5 | stackv2 | from apscheduler.scheduler import Scheduler
from datetime import datetime, timedelta, date
from flask import Flask, g, request
import json
import time
from TwitterAPI import TwitterAPI
from twilio.rest import TwilioRestClient
secret = open("secret").read().strip()
access_secret = open("access_secret").read().strip()
tw... | 143 | 30.51 | 84 | 14 | 1,158 | python | [{"finding_id": "codeql_py/reflective-xss_c77458fca254c5c9_c49a3c0a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 4 | true | [
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
127,
130,
136,
139
] | [
null,
null,
null,
null
] | [
16,
16,
16,
16
] | [
49,
49,
47,
47
] | |
2024-11-18T23:05:33.688067+00:00 | 1,682,161,973,000 | 3776b27f6dd6044425354d524f0806e03f8751f5 | 2 | {
"blob_id": "3776b27f6dd6044425354d524f0806e03f8751f5",
"branch_name": "refs/heads/master",
"committer_date": 1682161973000,
"content_id": "29af1683a8f8db8d6b82c047be667e8feb707853",
"detected_licenses": [
"MIT"
],
"directory_id": "84429a65215f58b11649f4d722fce407a9a0f28e",
"extension": "py",
"fi... | 2.40625 | stackv2 | __author__ = 'raz0r'
import re
import click
import requests
from requests.packages.urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
def run(url):
response = requests.get(url + '/non_existing', verify=False)
banner = parse_response(response.co... | 23 | 30.04 | 116 | 14 | 159 | python | [{"finding_id": "codeql_py/request-without-cert-validation_11c59170cf013689_1e09842b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
11
] | [
null
] | [
16
] | [
65
] | |
2024-11-18T23:11:07.371720+00:00 | 1,686,980,980,000 | f3cdc7eb53f89f76aa0db148a607c4671c84ab31 | 3 | {
"blob_id": "f3cdc7eb53f89f76aa0db148a607c4671c84ab31",
"branch_name": "refs/heads/main",
"committer_date": 1686980980000,
"content_id": "c4737cc304361fe7fce5e51988dab12fbac99e5a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4a20b102bf7fedcfb03436c627b77e70650a794d",
"extension": "py",
... | 3.453125 | stackv2 | """
Implementation of Shamir's secret sharing scheme, based on
https://en.m.wikipedia.org/wiki/Shamir%27s_Secret_Sharing#Python_example.
"""
from __future__ import division, print_function
import random
import functools
# For this application we want a known prime number as close as possible to
# our security level; e... | 146 | 30.55 | 98 | 15 | 1,200 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_21451948eb2516b4_6772a447", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 5 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secre... | [
54,
138,
139,
140,
141
] | [
null,
null,
null,
null,
142
] | [
11,
11,
11,
11,
11
] | [
34,
38,
38,
98,
36
] | |
2024-11-18T23:11:08.307754+00:00 | 1,556,260,901,000 | 47ea4133bd79b562b6b214ea5ec91a42f24e4294 | 3 | {
"blob_id": "47ea4133bd79b562b6b214ea5ec91a42f24e4294",
"branch_name": "refs/heads/master",
"committer_date": 1556260901000,
"content_id": "fafa1379c344420317b08f37db0fd40ce0e4e29f",
"detected_licenses": [
"MIT"
],
"directory_id": "5eec3e39da814e6979e9e5fc2d663e1e13a8d52b",
"extension": "py",
"fi... | 2.671875 | stackv2 | from flask_restful import Resource, Api
from flask import Flask, request, render_template, jsonify
import json, requests
APIKEY = 'OTgxMDg5ZDc1M2MyMjhmYjQwNTFlMz'
class Weather(Resource):
def getWeather(locationID):
url = 'https://api.willyweather.com.au/v2/{APIKEY}/locations/{locationID}/weather.json?for... | 24 | 37.25 | 160 | 11 | 235 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_add58744366ba97c_88bed98b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
12,
20
] | [
null,
null
] | [
15,
15
] | [
18,
18
] | |
2024-11-19T01:21:44.720035+00:00 | 1,549,217,934,000 | 39f968d6031a7d07c22f4beb1fb7761c80e4604e | 3 | {
"blob_id": "39f968d6031a7d07c22f4beb1fb7761c80e4604e",
"branch_name": "refs/heads/master",
"committer_date": 1549217934000,
"content_id": "80bd901c80d3ece077eaf8d98c2ad72fdfbb3e34",
"detected_licenses": [
"MIT"
],
"directory_id": "0f07107b016d2aee64788966b9f0d322ac46b998",
"extension": "py",
"fi... | 3.0625 | stackv2 | """Manage Moya version comparisons
Moya version numbers used in libraries consist of one to three integers separated by dots. If there are less than three components, then they are assumed to be equal to 0.
Version numbers may also be appended with a hyphen and string to indicate the pre-release version.
For exampl... | 345 | 26.66 | 171 | 21 | 2,383 | python | [{"finding_id": "codeql_py/overly-large-range_5271ae15a79556ad_37fd9103", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\d in the same character class.", "remediation": "", "loc... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\d in the same character class.",
"Suspicious character range that overlaps with \\d in the same character class."
] | [
44,
46
] | [
null,
null
] | [
48,
60
] | [
51,
63
] | |
2024-11-19T00:11:38.124930+00:00 | 1,588,921,237,000 | 59f345dea61e48d2e1da690c4d6efaddf9cf3c25 | 3 | {
"blob_id": "59f345dea61e48d2e1da690c4d6efaddf9cf3c25",
"branch_name": "refs/heads/master",
"committer_date": 1588921237000,
"content_id": "3de234096186eee51489d1c1e8ecc29a8244743a",
"detected_licenses": [
"MIT"
],
"directory_id": "55d0e2c5c299573281983eac80b5f28c254e7c21",
"extension": "py",
"fi... | 2.90625 | stackv2 | import os
import shutil
from jinja2 import Environment, ChoiceLoader, FileSystemLoader
from roman_numerals import convert_to_numeral
def relative_to_absolute(base, rel):
return os.path.abspath(os.path.join(os.path.dirname(base), rel))
def absolute_directory(filename):
return os.path.abspath(os.path.dirname(... | 77 | 25.86 | 83 | 19 | 439 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_456a10975af0273a_84c41c63", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
34
] | [
39
] | [
11
] | [
6
] | |
2024-11-19T00:11:40.219068+00:00 | 1,560,649,541,000 | e340f9eb422bdfee7847d5db832011c9bf4ca17f | 3 | {
"blob_id": "e340f9eb422bdfee7847d5db832011c9bf4ca17f",
"branch_name": "refs/heads/master",
"committer_date": 1560649541000,
"content_id": "220bb7c1f7330ff51a9470048a34eb1212e15281",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "627635361eda4252726f85a792b3437e2772e8da",
"extension": "p... | 3.015625 | stackv2 | #coding=utf-8
from django.shortcuts import render
from django.views.generic import View
from django.http import JsonResponse
import json
from api.transmitters import Transmitters2D
from api.hungarian_algorithm import Hungarian
class TransmitterDataWrapper:
def __init__(self, request):
# type: (Dict) ->... | 99 | 29.91 | 84 | 16 | 661 | python | [{"finding_id": "codeql_py/stack-trace-exposure_75eeca0ab7253289_b964eae8", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
76
] | [
78
] | [
33
] | [
14
] | |
2024-11-19T00:36:59.319953+00:00 | 1,507,080,334,000 | ff69e28ec1026d8f674e40c20b99767c3280573f | 3 | {
"blob_id": "ff69e28ec1026d8f674e40c20b99767c3280573f",
"branch_name": "refs/heads/master",
"committer_date": 1507080334000,
"content_id": "4d6a133acbfd5695ade3c82370c986db2606bca9",
"detected_licenses": [
"MIT"
],
"directory_id": "935d026e12df90de8a6a300a3b2f48552eaffb60",
"extension": "py",
"fi... | 2.8125 | stackv2 | # -*- coding: utf-8 -*-
import logging
from flask import request
from flask_restful import Resource
from werkzeug.exceptions import BadRequest
from server import api
from server.exceptions import HTTPBadRequest
from server.models import Users, Products
logger = logging.getLogger(__name__)
def _is_valid_user(user_... | 375 | 27.69 | 90 | 18 | 2,060 | python | [{"finding_id": "codeql_py/log-injection_fbd5017af51951ba_95282f1b", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 4 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
53,
80,
131,
269
] | [
null,
null,
null,
null
] | [
26,
26,
26,
30
] | [
33,
33,
33,
37
] | |
2024-11-19T00:37:01.120903+00:00 | 1,647,379,388,000 | 01bc046e1ef35ddbb3ca84504e97b0f76e3fc101 | 3 | {
"blob_id": "01bc046e1ef35ddbb3ca84504e97b0f76e3fc101",
"branch_name": "refs/heads/main",
"committer_date": 1647379388000,
"content_id": "8961ebf8646a4ccc4b3b994e8a3f3bb75a0d707b",
"detected_licenses": [
"MIT"
],
"directory_id": "617b6944969b5ebad0759a1a10ea184373d7d959",
"extension": "py",
"file... | 2.765625 | stackv2 | """Net Functions.
The following functions give you access to interact with http services.
"""
from __future__ import print_function
__all__ = [
"getExternalIpAddress",
"getHostName",
"getIpAddress",
"getRemoteServers",
"httpClient",
"httpDelete",
"httpGet",
"httpPost",
"httpPut",
... | 414 | 35.57 | 88 | 11 | 3,342 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1c12416071cc88f2_88a17c3d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive dat... | [
157,
207,
266,
407
] | [
null,
null,
null,
null
] | [
9,
9,
9,
9
] | [
17,
17,
17,
17
] | |
2024-11-19T00:51:22.269848+00:00 | 1,539,207,444,000 | 617f18186e2d7f652dc8abd01ba3f7075c6b10e1 | 3 | {
"blob_id": "617f18186e2d7f652dc8abd01ba3f7075c6b10e1",
"branch_name": "refs/heads/master",
"committer_date": 1539207444000,
"content_id": "cd82e0db5bd4912ab33b9898a44c723dc56bcdd0",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "ec5180742c04dc7c49f275ba5780d0088cb3efc1",
"extension": "p... | 2.625 | stackv2 | #!/usr/bin/env python
''' A log aggregator, parser and forwarder'''
import os
import sys
import asyncore
import socket
import logging
import json
from time import sleep
from flask import Flask
from Queue import Queue
from threading import Thread
from numbers import Number
from collections import Set, Mapping, deque
im... | 256 | 28.93 | 101 | 17 | 1,794 | python | [{"finding_id": "codeql_py/stack-trace-exposure_5d8e18623710f213_da2a84f8", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-327"
] | [
"py/stack-trace-exposure",
"py/insecure-default-protocol"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
230,
164
] | [
null,
null
] | [
16,
16
] | [
79,
46
] | |
2024-11-19T00:51:23.131292+00:00 | 1,621,278,759,000 | 652ab8601a27449103fcdea84f30c79bb000be73 | 3 | {
"blob_id": "652ab8601a27449103fcdea84f30c79bb000be73",
"branch_name": "refs/heads/main",
"committer_date": 1621278759000,
"content_id": "e0c575b57eb24efea80cde49f55ade2e5e00ca7f",
"detected_licenses": [
"MIT"
],
"directory_id": "5a44940f9d022f0121ef6b13fac3e0ac48cf6b1d",
"extension": "py",
"file... | 2.546875 | stackv2 | import pathlib
import re
from cronc.libs.task import Task, TCollection
class CrontabIO:
__ENCODING: str = 'utf-8'
def __init__(self, crontab_file: pathlib.Path) -> None:
self.__crontab_file: pathlib.Path = crontab_file
def read_params(self) -> str:
params: str = ''
content: str =... | 55 | 33.78 | 78 | 20 | 473 | python | [{"finding_id": "codeql_py/overly-large-range_b789cbfe9eec2f00_13a855fc", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", "remediation": "", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
16
] | [
null
] | [
51
] | [
54
] | |
2024-11-19T00:51:25.139359+00:00 | 1,439,805,631,000 | fe5896bc79ddd8c510bc7f76b6f80fff441ea421 | 2 | {
"blob_id": "fe5896bc79ddd8c510bc7f76b6f80fff441ea421",
"branch_name": "refs/heads/master",
"committer_date": 1439805631000,
"content_id": "9d2a825ab01237c3731637e878c15e07301c02ed",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "c20842c2f19bb904f1eba7a2ce8a33c72eae8f6c",
"extension": "p... | 2.5 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
import socket
import select
import time
import sys
buffer_size = 4096
delay = 0.0001
class Forward:
"""连接需要转发的服务器地址
返回连接后的socket对象
"""
def __init__(self):
self.forward = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
def start(self, host,... | 134 | 29.94 | 88 | 16 | 1,028 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_fbcaa048e90cd2ed_12f63feb", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [twsapp.com](1) may be at an arbitrary position in the ... | 2 | true | [
"CWE-020",
"CWE-200"
] | [
"py/incomplete-url-substring-sanitization",
"py/bind-socket-all-network-interfaces"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [twsapp.com](1) may be at an arbitrary position in the sanitized URL.",
"'' binds a socket to all interfaces."
] | [
25,
46
] | [
null,
null
] | [
16,
9
] | [
36,
51
] | |
2024-11-19T01:02:11.509422+00:00 | 1,629,361,109,000 | bd9dea15e816ce6af26eaba75f432a2989901d60 | 2 | {
"blob_id": "bd9dea15e816ce6af26eaba75f432a2989901d60",
"branch_name": "refs/heads/master",
"committer_date": 1629364015000,
"content_id": "8a45d336c7c550c277da1c21a160dbaffc1a943c",
"detected_licenses": [
"MIT"
],
"directory_id": "7718cea6708eb7acfa37565362a8b03ade932fee",
"extension": "py",
"fi... | 2.34375 | stackv2 | import json
import re
from base64 import b64decode
from Crypto.Cipher import AES
from Crypto.Cipher import PKCS1_v1_5
from Crypto.PublicKey import RSA
from api.core.anime import *
def rsa_decrypt(encrypted_text: str, private_key: str) -> bytes:
"""使用 RSA 解密, 模式 RSA/ECB/PKCS1Padding"""
key = b64decode(privat... | 146 | 41.03 | 86 | 16 | 2,494 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_d6fcc1a07c044b75_8157c1ba", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [quan.qq.com](1) may be at an arbitrary position in the... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [quan.qq.com](1) may be at an arbitrary position in the sanitized URL."
] | [
143
] | [
null
] | [
12
] | [
37
] | |
2024-11-18T23:48:44.524734+00:00 | 1,458,642,940,000 | ab5f6c680e0818de36d5dc94ec1977c8b1b12b0a | 3 | {
"blob_id": "ab5f6c680e0818de36d5dc94ec1977c8b1b12b0a",
"branch_name": "refs/heads/master",
"committer_date": 1458642940000,
"content_id": "93944bc222ca0d255df8da60be980493f258298c",
"detected_licenses": [
"MIT"
],
"directory_id": "0d6b39606b448fca36d919e92e722f8e08e7225f",
"extension": "py",
"fi... | 2.578125 | stackv2 | # -*- coding: UTF-8 -*-
import sys
import time
import hashlib
import urllib
import urllib2
import argparse
def get(url, **kwargs):
if kwargs:
data = urllib.urlencode(kwargs)
request = urllib2.Request(url, data)
else:
request = urllib2.Request(url)
request.add_header('User-Agent', ... | 118 | 27.3 | 94 | 15 | 878 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_3ecf4fd798b3f91d_169f1a1d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
103
] | [
null
] | [
36
] | [
58
] | |
2024-11-18T23:50:00.035436+00:00 | 1,553,943,463,000 | 126fb45f596e85f9ab2c8a6526a3dbc744451faa | 2 | {
"blob_id": "126fb45f596e85f9ab2c8a6526a3dbc744451faa",
"branch_name": "refs/heads/master",
"committer_date": 1553943463000,
"content_id": "10b757997cea36d3bdbd230f9628b48d7875c28e",
"detected_licenses": [
"MIT"
],
"directory_id": "651e7a5bbb392db33083b15d0967a9dbeca36b3b",
"extension": "py",
"fi... | 2.359375 | stackv2 | from os import listdir
from os.path import isfile, join
import os
from jinja2 import Template, FileSystemLoader, Environment
import yaml
recipes_folder="./recipes"
out_dir="out"
if not os.path.exists(out_dir):
os.makedirs(out_dir)
env = Environment(loader=FileSystemLoader('templates'))
template = env.get_templat... | 35 | 27.09 | 102 | 12 | 249 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_03ce6575e8e7e599_83798b01", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
null
] | [
7
] | [
56
] | |
2024-11-19T01:51:52.588658+00:00 | 1,607,673,291,000 | 232ec1aa1530bf32fafc5865ba9e9f5049371196 | 4 | {
"blob_id": "232ec1aa1530bf32fafc5865ba9e9f5049371196",
"branch_name": "refs/heads/main",
"committer_date": 1607673291000,
"content_id": "d483d3b6b026757b077c917c066fee2d503f2f4a",
"detected_licenses": [
"MIT"
],
"directory_id": "85fec238f380e5c3205724af65473c2f5238b521",
"extension": "py",
"file... | 3.5625 | stackv2 | def index_password_checker(line):
min_max, char, password = line.split(' ')
first_index, second_index = [int(i)-1 for i in min_max.split('-')]
char = char.replace(':', '')
char_count = password.count(char)
# bitwise exclusive or
if (password[first_index] == char) ^ (password[second_index] == c... | 19 | 33.16 | 93 | 12 | 157 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2dc92244e4cdb3eb_5773a3d8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
19
] | [
null
] | [
11
] | [
93
] | |
2024-11-19T01:52:01.121224+00:00 | 1,607,613,445,000 | 5a7cd694c648124abc700d63ebb948a48ba5b7f3 | 3 | {
"blob_id": "5a7cd694c648124abc700d63ebb948a48ba5b7f3",
"branch_name": "refs/heads/master",
"committer_date": 1607613445000,
"content_id": "142b08fc4a7446b4295cff20393343cbdb096873",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c934f728ee4ef42eaa276ae30769ad9e7c51c285",
"extension": "py"... | 3.0625 | stackv2 | """Manage file transfer to HPCOM7 devices.
"""
from scp import SCPClient
from lxml import etree
from pyhpecw7.utils.xml.lib import *
from pyhpecw7.features.errors import FileTransferUnsupportedProtocol, FileTransferError, FileHashMismatchError
import paramiko
import hashlib
import os
class FileUpload(object):
"""... | 236 | 32.21 | 130 | 21 | 1,660 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_7542a18a61fb0b46_083d15cf", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
196
] | [
null
] | [
9
] | [
66
] | |
2024-11-19T01:52:01.469834+00:00 | 1,628,842,788,000 | 51b3696aa9d23908774571e2392ef1ae8f9ef6c7 | 3 | {
"blob_id": "51b3696aa9d23908774571e2392ef1ae8f9ef6c7",
"branch_name": "refs/heads/main",
"committer_date": 1628842788000,
"content_id": "e4687dabd1a418d787081516a3a9fa5e2a0f604a",
"detected_licenses": [
"MIT"
],
"directory_id": "a1bb4670af2b7893e50beb9e386724f4bbb85199",
"extension": "py",
"file... | 3.0625 | stackv2 | from app.test.userCredentialsTest import isCredentialsNotBlank
credentialsTest = isCredentialsNotBlank
#manage user credentials
def readUserCrenditialFile():
'''
this function have a functionality to read userCredential.txt file
'''
file = open("userCredentials.txt", "r")
print("\tUser Name\tAccount... | 61 | 30.57 | 89 | 18 | 420 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e43b98cf3a8b8d1a_21e4223f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text."
] | [
26,
51
] | [
null,
null
] | [
16,
16
] | [
54,
42
] | |
2024-11-19T01:52:01.527990+00:00 | 1,586,447,871,000 | d1e2f92d9617d39e88cd7d7274a830f4c458eddb | 2 | {
"blob_id": "d1e2f92d9617d39e88cd7d7274a830f4c458eddb",
"branch_name": "refs/heads/master",
"committer_date": 1586447871000,
"content_id": "d71f894483418fd8541b418a2d59b63250c56a7a",
"detected_licenses": [
"MIT"
],
"directory_id": "f69e3be9ddb8dc736bcf3cd31d4c72c0eca620aa",
"extension": "py",
"fi... | 2.359375 | stackv2 | import time
import logging
from flask import Blueprint, request, url_for
from flask_api import status
from ..models import Room, Color
from . import _exceptions as exceptions
from ._utils import get_content
blueprint = Blueprint('api_rooms', __name__, url_prefix="/api/rooms")
log = logging.getLogger(__name__)
@b... | 153 | 24.32 | 79 | 15 | 902 | python | [{"finding_id": "codeql_py/log-injection_65c2268ca5dd48ba_1b9d93fd", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
106,
147
] | [
null,
null
] | [
44,
34
] | [
48,
38
] | |
2024-11-19T01:52:13.942981+00:00 | 1,618,493,158,000 | 3f24755f273e54731b5f4bd45f334611f36f1415 | 3 | {
"blob_id": "3f24755f273e54731b5f4bd45f334611f36f1415",
"branch_name": "refs/heads/master",
"committer_date": 1618493158000,
"content_id": "67b5a29a89805c6e4c78e15ede289303cc4525f4",
"detected_licenses": [
"MIT"
],
"directory_id": "e156c86203b9c7fa2378bf9ecc58051109de8249",
"extension": "py",
"fi... | 2.546875 | stackv2 | import os, glob
import argparse
import json
import requests
from requests import auth
def create_parser():
parser = argparse.ArgumentParser(description='Add dashboards to Grafana')
parser.add_argument('--login', type=str, required=True)
parser.add_argument('--password', type=str, required=True)
parser... | 35 | 31.57 | 93 | 16 | 259 | python | [{"finding_id": "codeql_py/request-without-cert-validation_3896a3c597bf848d_37e1d2ff", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
27
] | [
30
] | [
20
] | [
14
] | |
2024-11-19T01:40:02.218659+00:00 | 1,513,709,550,000 | 2e2df3c4b4582bf680b6e561a246d690e84a9291 | 4 | {
"blob_id": "2e2df3c4b4582bf680b6e561a246d690e84a9291",
"branch_name": "refs/heads/master",
"committer_date": 1513709550000,
"content_id": "7e0cf4fd8d6d7a6d965d5a34bbb3bd8d69404dbf",
"detected_licenses": [
"MIT"
],
"directory_id": "8eb8c42f5e82ffed9f47258d55e1d03e4fcd46b7",
"extension": "py",
"fi... | 4.34375 | stackv2 | # Hangman Game
# ------------
import string
import sys
import random
WORDLIST_FILENAME = "words.txt"
def load_words():
"""
Returns a list of valid words. Words are strings of lowercase letters.
Depending on the size of the word list, this function may
take a while to finish.
"""
#print("Loading word list fro... | 142 | 28.75 | 90 | 15 | 1,109 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6308820fd3221dcd_6b7b0687", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text.",
"This expression logs [sensitive data (secret)](... | [
120,
122,
125
] | [
null,
null,
null
] | [
9,
10,
10
] | [
55,
62,
64
] | |
2024-11-18T23:43:31.344231+00:00 | 1,399,824,304,000 | a9285e62ade344261d0cbc9d842ac4bedf93acd6 | 3 | {
"blob_id": "a9285e62ade344261d0cbc9d842ac4bedf93acd6",
"branch_name": "refs/heads/master",
"committer_date": 1399824304000,
"content_id": "ff2e79ca47f3973f2eae66c0649a59645d798d64",
"detected_licenses": [
"MIT"
],
"directory_id": "ba0652c18184cdfc9deb153a4ac8d36750bbcd9c",
"extension": "py",
"fi... | 2.84375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
'''
Created on 16 mai 2013
@author: Aristote
'''
import webapp2
from google.appengine.ext import ndb
import datetime
import timezone
import re
from conf import UL_DEPARTEMENT
def html5_datetime_parser(unedate):
"""
Cette fonction est une fonction qui transfo... | 170 | 34.96 | 155 | 14 | 1,511 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_953c48328bf95d35_e82070d4", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This string, which is used as a regular expression [here](1), has an unescaped '.' before 'eventbuck.com', so it might match more hosts than expected."
] | [
166
] | [
null
] | [
38
] | [
62
] | |
2024-11-19T01:18:10.806572+00:00 | 1,588,702,800,000 | 2c2b78d3788be8ed1ff68ca0dae1c4839b489fee | 3 | {
"blob_id": "2c2b78d3788be8ed1ff68ca0dae1c4839b489fee",
"branch_name": "refs/heads/master",
"committer_date": 1588702800000,
"content_id": "1ae01493b4387d98f683a46d9064909af88d95ef",
"detected_licenses": [
"MIT"
],
"directory_id": "a9eb1dd8f643b9f85c040330af8b0e19e3e6b9a1",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/env python3.8
import subprocess
import platform
import os
ssids = []
passwords = []
credentials = []
osName = platform.system()
result = None
if osName == 'Linux':
if os.geteuid() != 0:
exit('This script needs root privilages, please re-execute as root.')
result = subprocess.run(
... | 53 | 32.49 | 147 | 18 | 500 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_542a46a41dc36e68_9775458c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
53
] | [
null
] | [
11
] | [
14
] | |
2024-11-19T00:15:56.321966+00:00 | 1,578,399,651,000 | fda4538e10d9cf0cdec7fca044f713e2f2e83e1c | 2 | {
"blob_id": "fda4538e10d9cf0cdec7fca044f713e2f2e83e1c",
"branch_name": "refs/heads/master",
"committer_date": 1578399651000,
"content_id": "41834119d2e2f8234d01c1d5531f0c8fd3984e39",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "45333ef93e17f3e647729c387f6c40dba714f651",
"extension": "p... | 2.328125 | stackv2 | # -*- coding: utf-8 -*-
from django.db import models
from django.utils.encoding import python_2_unicode_compatible
from django.utils.translation import ugettext_lazy as _
import logging
from jinja2 import Environment
from permabots.models.base import PermabotsModel
from permabots import validators
logger = logging.get... | 48 | 48.54 | 138 | 14 | 433 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_535edfdf3bf2a46b_a1d66b36", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
38
] | [
null
] | [
15
] | [
68
] | |
2024-11-19T00:16:03.269703+00:00 | 1,556,322,162,000 | ee04b7f1f61b01da587cb2ced9d5ffde78cdf4c1 | 3 | {
"blob_id": "ee04b7f1f61b01da587cb2ced9d5ffde78cdf4c1",
"branch_name": "refs/heads/master",
"committer_date": 1556322162000,
"content_id": "3af31c893651ef80b61c192bea532de31445e0f6",
"detected_licenses": [
"MIT"
],
"directory_id": "1d58cbc572ef201e912921bdd4f7fcd6d27ff263",
"extension": "py",
"fi... | 3.265625 | stackv2 | # imports
from pymongo import MongoClient
import hashlib
import uuid
import re
# connecto to mongodb
client = MongoClient("mongodb+srv://root:root@cluster0-xyrvy.mongodb.net/test?retryWrites=true")
# tell which database you would like to use
db = client.User
# name of the collection
collection = db.passwords
# hash ... | 141 | 31.76 | 98 | 17 | 1,032 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_4733bbdbd3bdbf32_0e316552", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
18,
23
] | [
null,
null
] | [
27,
39
] | [
60,
77
] | |
2024-11-19T00:16:13.661261+00:00 | 1,576,521,979,000 | c95b5dab42ae2dd97291d48f6daca5e8bf9f4d78 | 3 | {
"blob_id": "c95b5dab42ae2dd97291d48f6daca5e8bf9f4d78",
"branch_name": "refs/heads/master",
"committer_date": 1576521979000,
"content_id": "707199f5100a2139f6fba82b5524f1edcf051ede",
"detected_licenses": [
"MIT"
],
"directory_id": "9faf3dbb02ab71d6865aca86b9647c84729147e7",
"extension": "py",
"fi... | 2.796875 | stackv2 | import os
import logging
from flask import Flask, render_template, request, session, \
make_response, jsonify, redirect
from flask_socketio import SocketIO, emit
app = Flask(__name__)
app.config["SECRET_KEY"] = os.getenv("SECRET_KEY")
socketio = SocketIO(app)
# This is the structure that will hold all the chann... | 75 | 30.51 | 93 | 16 | 525 | python | [{"finding_id": "codeql_py/log-injection_3be26f7e42428a9a_6aa9175c", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
64
] | [
null
] | [
21
] | [
48
] | |
2024-11-19T00:28:37.625372+00:00 | 1,585,483,019,000 | 8a31a79d776e74ba0d94b5ad8c7f62896d6650f1 | 4 | {
"blob_id": "8a31a79d776e74ba0d94b5ad8c7f62896d6650f1",
"branch_name": "refs/heads/master",
"committer_date": 1585483019000,
"content_id": "f14c8c9e8b596fafc55118db56de5c862775f372",
"detected_licenses": [
"MIT"
],
"directory_id": "4ae93a9d624c3bf2cbca1d4c50f0eb8c4bf0b901",
"extension": "py",
"fi... | 3.5 | stackv2 | import random
info = {}
s = "abcdefghijklnmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ!@#$%^&*()?"
len_password = int(input("Enter number of letters in password: "))
password ="".join(random.sample(s,len_password))
print(password)
answer = input("Do you wnat to keep this password: ")
if("yes" in answer):
a... | 19 | 21.63 | 80 | 9 | 111 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0e6d73e08da6e7c6_172a955c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
11
] | [
null
] | [
7
] | [
15
] | |
2024-11-19T00:50:19.197712+00:00 | 1,478,300,401,000 | eaf7519df2fd7b9410f31e1b09e7fba2e1cf5ff7 | 3 | {
"blob_id": "eaf7519df2fd7b9410f31e1b09e7fba2e1cf5ff7",
"branch_name": "refs/heads/master",
"committer_date": 1478300401000,
"content_id": "50c66d228dc8734c9dd7c401ef631d9eeb8b7b88",
"detected_licenses": [
"MIT"
],
"directory_id": "6221bd5acd6ada51669baae059bd71c609f3d077",
"extension": "py",
"fi... | 2.875 | stackv2 | # Copyright (c) 2016 Arista Networks, Inc. All rights reserved.
# Arista Networks, Inc. Confidential and Proprietary.
"""This is a sample EapiClient library. The goal here is to demonstrate
several different approaches to solving the same problem. I hope that by
doing this the reader will better understand the under... | 376 | 30.12 | 81 | 14 | 2,759 | python | [{"finding_id": "codeql_py/request-without-cert-validation_7870c4b51ab78de3_496e30d5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
277
] | [
280
] | [
20
] | [
47
] | |
2024-11-19T01:54:57.101707+00:00 | 1,611,149,832,000 | 459cf474bbe69f4dfcb15a3a28b23e050619e997 | 3 | {
"blob_id": "459cf474bbe69f4dfcb15a3a28b23e050619e997",
"branch_name": "refs/heads/master",
"committer_date": 1611149832000,
"content_id": "a3b0dd454860c9490ff1d8959a6f44f6287fd625",
"detected_licenses": [
"MIT"
],
"directory_id": "a77f00189c729e99247b67c83eba29b432b16b1f",
"extension": "py",
"fi... | 3.34375 | stackv2 | from Employee import Employee
def main():
humans = [Employee("Raiden", "Kusumo", 5000000), Employee("Norman", "Kamaru", 10000000)]
for human in humans:
print("Gajimu perbulang sekarang adalah", human.monthly_salary)
for human in humans:
human.monthly_salary += human.monthly_salary * 10 / 100
print()
for h... | 19 | 22.11 | 89 | 11 | 139 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4f229d59b88732fd_0faa07c5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
7,
15
] | [
null,
null
] | [
45,
45
] | [
65,
65
] | |
2024-11-19T01:55:01.200400+00:00 | 1,531,478,260,000 | 483bd684a525f6397fb65a123a751c3971ed811a | 2 | {
"blob_id": "483bd684a525f6397fb65a123a751c3971ed811a",
"branch_name": "refs/heads/master",
"committer_date": 1531478260000,
"content_id": "0e0837e8222932d2857af1f9d750aef317b7218a",
"detected_licenses": [
"MIT"
],
"directory_id": "0a9d7d7844d0a87303bef52703794a0af2b44fcc",
"extension": "py",
"fi... | 2.40625 | stackv2 | #! /usr/bin/env python
# -*- coding: utf-8 -*-
"""
@version: 1.0
@ __author__: kute
@ __file__: sftp_downloader.py
@ __mtime__: 2016/10/19 17:12
ssh 公私钥密码认证,sftp下载
http://blog.csdn.net/kutejava/article/details/52880573
"""
import sys
import socket
import traceback
import paramiko
from paramiko import SSHException,... | 192 | 36.33 | 126 | 20 | 1,568 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2f3b357afeebb0c4_a64010a4", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
60
] | [
null
] | [
13
] | [
73
] | |
2024-11-19T00:53:46.604808+00:00 | 1,508,162,677,000 | 6ee608d2d0c61117038013d59a24beefd89932be | 2 | {
"blob_id": "6ee608d2d0c61117038013d59a24beefd89932be",
"branch_name": "refs/heads/master",
"committer_date": 1508162677000,
"content_id": "4abb51116fe34c518b2c500cf3fab2b3e5c68e50",
"detected_licenses": [
"MIT"
],
"directory_id": "34ce5b142d87efe6b6e8fe183d8136f04c594b14",
"extension": "py",
"fi... | 2.421875 | stackv2 | '''
WeSee Server
'''
import os
import sqlite3
import ConfigParser
from flask import Flask, request, session, g, redirect, url_for, \
abort, render_template, flash, jsonify, send_from_directory
DEBUG = True
HOST = '0.0.0.0'
PORT = 51008
SECRET_KEY = 'wesee in hhdt dep dev key'
app = Flask(__name__)
app.config.from... | 102 | 22.79 | 67 | 13 | 655 | python | [{"finding_id": "codeql_py/path-injection_3c38bb9eb8ad0bfb_2f93f81f", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
97
] | [
null
] | [
32
] | [
66
] | |
2024-11-19T02:00:48.831217+00:00 | 1,601,318,166,000 | 8de7a42a39de2ea3ecda09dd17e01eeb144817c7 | 3 | {
"blob_id": "8de7a42a39de2ea3ecda09dd17e01eeb144817c7",
"branch_name": "refs/heads/master",
"committer_date": 1601318166000,
"content_id": "427acaea02594d749e71551c9fc3b39238c6b02a",
"detected_licenses": [
"MIT"
],
"directory_id": "460fe15ffffdc0f9824a69bda931c23542d8bdc2",
"extension": "py",
"fi... | 2.734375 | stackv2 | from tkinter import *
import os
from PIL import ImageTk, Image
import pickle
def deleteMAIN ():
screen.destroy()
def delete1():
screen1.destroy()
def DeleteScreen2():
screen2.destroy()
def delete2():
screen3.destroy()
def delete3():
screen4.destroy()
def delete4():
screen5.destroy()
def Addpass():
fil... | 231 | 27.91 | 146 | 15 | 1,870 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_36d373bdf80ded51_7e135d59", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text."
] | [
114
] | [
null
] | [
14
] | [
32
] | |
2024-11-19T02:01:05.662266+00:00 | 1,555,918,630,000 | 1ea12b2f696da3cde2469079e686fdbb13788191 | 2 | {
"blob_id": "1ea12b2f696da3cde2469079e686fdbb13788191",
"branch_name": "refs/heads/master",
"committer_date": 1555918630000,
"content_id": "19172d158fed6e26146ffa1b9d6719479f70d825",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7395f9aface26190507f0f224be2b91bd9e30440",
"extension": "py"... | 2.359375 | stackv2 | #!/usr/bin/env python
# *_* coding: UTF-8 *_*
"""
@author: Siffre@三弗
@contact: Siffre@aliyun.com
@version: 1.0
@license: Apache Licence
@file: alisms.py
@time: 2018/12/15 11:34 AM
┏┓ ┏┓+ +
┏┛┻━━━┛┻┓ + +
┃ ┃
┃ ━ ┃ ++ + + +
████━████ ┃+
┃ ┃ +
... | 137 | 28.88 | 87 | 15 | 1,206 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7fcd00f9d5be9127_933d145f", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
122
] | [
null
] | [
32
] | [
36
] | |
2024-11-19T00:04:31.503372+00:00 | 1,585,099,651,000 | 398a7089081d59f51d3ade4ceb08e347dede26c7 | 3 | {
"blob_id": "398a7089081d59f51d3ade4ceb08e347dede26c7",
"branch_name": "refs/heads/master",
"committer_date": 1585099651000,
"content_id": "8265c9af4f9fe8bec59c294fa25c6fb2956a4e46",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ede32896410ba8f12bb7b516e19490ebbfcf79d1",
"extension": "py"... | 2.796875 | stackv2 | # validator for UrlSource
from typing import List, Callable, Dict, Union, Tuple
from loguru import logger
import pandas as pd
import re
from sources.url_source import UrlSource
from shared import udatetime
class UrlSourceValidator():
def __init__(self):
self._locations = {}
self._urls = {}
... | 138 | 34.18 | 94 | 18 | 1,077 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_5462ef44f1a8a285_8853e51a", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://google.com](1) may be at an arbitrary position... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [https://google.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [https://www.google.com](1) may be at an arbitrary position in the sanitized URL."
] | [
43,
43
] | [
null,
null
] | [
12,
53
] | [
49,
94
] | |
2024-11-19T00:04:32.565743+00:00 | 1,474,462,547,000 | 4f8e7bf716fa5ee3199e6dd201d2a6577341e964 | 3 | {
"blob_id": "4f8e7bf716fa5ee3199e6dd201d2a6577341e964",
"branch_name": "refs/heads/master",
"committer_date": 1474462547000,
"content_id": "65a6cca76735f19fe594ea81b3fbeb8f4b108e71",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9d388f338ccb52a818c345a6ccdc87775eb38c52",
"extension": "py"... | 2.9375 | stackv2 | import getpass
import hashlib
from pymongo import MongoClient
spider_db = MongoClient().spider
admin_present = False
for user in spider_db.auth.find():
if user["username"] == "admin":
admin_present = True
break
if not admin_present:
password1 = getpass.getpass("Give a password for the admin u... | 27 | 28.44 | 78 | 17 | 179 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_a9e2014fb70f765d_a2a7f4e6", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
19
] | [
null
] | [
40
] | [
65
] | |
2024-11-19T00:04:34.866545+00:00 | 1,611,940,115,000 | 595c4fc516f11c14de4156aafc707f7b0b88bd79 | 3 | {
"blob_id": "595c4fc516f11c14de4156aafc707f7b0b88bd79",
"branch_name": "refs/heads/main",
"committer_date": 1611940115000,
"content_id": "4d9472b05a25c943af68a6d28c5c9ed54a893ecd",
"detected_licenses": [
"MIT"
],
"directory_id": "5379177a869e77f78521997769b944c82d8275f2",
"extension": "py",
"file... | 2.625 | stackv2 | from jinja2 import Template, Environment, FileSystemLoader
from yaml import safe_load
from typing import List
import os
# Some constants
ROOT_DIR = os.path.join("..", "..")
DOCS_DIR = os.path.join(ROOT_DIR, "docs/")
LANG_DIR = os.path.join(ROOT_DIR, "lang/")
SPECIFICATION_FILE = os.path.join(ROOT_DIR, "spec.yaml")
JI... | 212 | 28.86 | 108 | 17 | 1,505 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_cf0de882805b7b36_2b5d916c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12
] | [
null
] | [
21
] | [
71
] | |
2024-11-19T00:04:38.804577+00:00 | 1,663,956,995,000 | 3be0109a7c24d1b4061202ed43865f34d4fc3d90 | 3 | {
"blob_id": "3be0109a7c24d1b4061202ed43865f34d4fc3d90",
"branch_name": "refs/heads/master",
"committer_date": 1663956995000,
"content_id": "004725917a4bac05f5894f6c1e60a3650f3ad992",
"detected_licenses": [
"MIT"
],
"directory_id": "bb0c6df450fd7e444454dde0e815c37b13f6bb0c",
"extension": "py",
"fi... | 2.5625 | stackv2 | """Customized attributes
"""
import re
import os
import shutil
import json
from numbers import Number, Integral
import numpy as np
import datajoint as dj
from loris.database.attribute_mixin import Placeholder, ProcessMixin
from loris.errors import LorisSerializationError
from loris.io import spickledumps, spickleloa... | 592 | 22.76 | 147 | 17 | 3,314 | python | [{"finding_id": "codeql_py/redos_256b1b6067a8ea97_d78787c7", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetition... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'a' and containing many repetitions of 'a'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'a@a' and containing many repetitions of 'a'."
] | [
265,
265
] | [
null,
null
] | [
30,
46
] | [
33,
49
] | |
2024-11-19T00:27:15.128998+00:00 | 1,463,063,348,000 | 45265b24c1f1fc6e96c950bcaf154a9d9fe537d0 | 2 | {
"blob_id": "45265b24c1f1fc6e96c950bcaf154a9d9fe537d0",
"branch_name": "refs/heads/master",
"committer_date": 1463063348000,
"content_id": "a775c94a44bfbba1ee70a6fee8945b3bac8723b4",
"detected_licenses": [
"MIT"
],
"directory_id": "fc1545bfe6b329dc1ad553de588af132da921596",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/python
from flask import Flask, request, jsonify
import logging
from logging.handlers import RotatingFileHandler
# create our little application :)
app = Flask(__name__)
app.debug = True
app.config['SECRET_KEY'] = 'F34TF$($e34D';
app.config['SQLALCHEMY_DATABASE_URI'] = 'sqlite:///phonebook_server.db'
from... | 97 | 24.1 | 72 | 14 | 553 | python | [{"finding_id": "codeql_py/log-injection_e0fc6f5fe9239e91_4f9129e3", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 5 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
16,
36,
58,
74,
88
] | [
null,
null,
null,
null,
null
] | [
18,
18,
18,
18,
18
] | [
25,
25,
25,
25,
25
] | |
2024-11-19T00:40:23.505913+00:00 | 1,639,898,793,000 | f8161fbb409d41ebb090fc2c30c2a58409337b05 | 2 | {
"blob_id": "f8161fbb409d41ebb090fc2c30c2a58409337b05",
"branch_name": "refs/heads/master",
"committer_date": 1639898793000,
"content_id": "efa66bb83ca475e1f57416a76454ba181736721b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6c3739d13a12bc0cae927da5fe67ceab969d9e55",
"extension": "py"... | 2.328125 | stackv2 | #!/usr/bin/env python
#
# Description:
#
# Usage:
#
# Files generated
# actions/*.yaml (one for each operation in etc/algosec_wsdl.xml)
#
import argparse
import datetime
import glob
import jinja2
import json
import os
import re
import requests
from xml.dom import minidom
import yaml
import zeep
from operator import i... | 330 | 40.7 | 95 | 18 | 2,761 | python | [{"finding_id": "codeql_py/request-without-cert-validation_b12122838ba49378_8d8ec997", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-079",
"CWE-079"
] | [
"py/request-without-cert-validation",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
109,
150,
155
] | [
null,
152,
null
] | [
28,
16,
16
] | [
64,
10,
36
] | |
2024-11-19T00:40:29.506504+00:00 | 1,619,633,422,000 | febe6355d4384b4cfd00af4c697b8410c4303d84 | 2 | {
"blob_id": "febe6355d4384b4cfd00af4c697b8410c4303d84",
"branch_name": "refs/heads/master",
"committer_date": 1619633422000,
"content_id": "c2193bae6522a6d3589f280445cc73eba57cff0f",
"detected_licenses": [
"MIT"
],
"directory_id": "861ecab6d098a64cfa43c675654fc32e86ed96be",
"extension": "py",
"fi... | 2.4375 | stackv2 | import numpy as np
import torch
import torch.nn as nn
import torchvision.datasets as dsets
import torchvision.transforms as transforms
from torch.autograd import Variable
from tqdm import tqdm
from typing import Optional, Union, Tuple, List, Sequence, Iterable
import math
from scipy.spatial.distance import euclidean
fr... | 318 | 36.58 | 169 | 17 | 2,901 | python | [{"finding_id": "codeql_py/overly-permissive-file_4eaf8cc1f71819a8_335a1c6f", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
181
] | [
null
] | [
9
] | [
35
] | |
2024-11-19T01:06:06.071486+00:00 | 1,618,526,230,000 | 61898af23afa14818028fb27011c9bc30919ac5f | 2 | {
"blob_id": "61898af23afa14818028fb27011c9bc30919ac5f",
"branch_name": "refs/heads/master",
"committer_date": 1618526230000,
"content_id": "5e8098b87ccc404739ee8438f1dc4a7c97219884",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "51a6d0e88550863ba74572a8537119d903e78719",
"extension": "p... | 2.34375 | stackv2 | import os
import io
import contextlib
import paramiko
import jinja2
@contextlib.contextmanager
def make_client(host, user, private_key):
with paramiko.SSHClient() as client:
client.set_missing_host_key_policy(paramiko.AutoAddPolicy())
client.connect(host, username=user, pkey=private_key)
... | 148 | 26.05 | 74 | 15 | 1,025 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_5a8175320afa2b4d_17f666cf", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 2 | true | [
"CWE-295",
"CWE-079"
] | [
"py/paramiko-missing-host-key-validation",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
12,
39
] | [
null,
null
] | [
9,
11
] | [
69,
44
] | |
2024-11-19T01:17:13.071376+00:00 | 1,500,399,871,000 | 68bdfee548601d4016792aa412e6a25286a3f5f8 | 3 | {
"blob_id": "68bdfee548601d4016792aa412e6a25286a3f5f8",
"branch_name": "refs/heads/master",
"committer_date": 1500399871000,
"content_id": "976e1b3923935d653c1476e87dd026d40ad1bf53",
"detected_licenses": [
"MIT"
],
"directory_id": "d3372e4375976f9ac7f80bc511c8dfb2122a0a5b",
"extension": "py",
"fi... | 3.0625 | stackv2 | """Script for generating html chart file (./html directory) based on local data files"""
import json
import fsutil
import timeutil
import wkhtmltoimage
from jinja2 import Environment
def get_daily_chart_path(config, time):
"""Returns full path of chart, by given time """
time_str = timeutil.format_to_date_st... | 70 | 34.79 | 101 | 13 | 526 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e68526ad617ea489_331ee6bc", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
31
] | [
33
] | [
22
] | [
58
] | |
2024-11-19T01:17:29.184822+00:00 | 1,545,281,307,000 | 660ec63759bc98ff77f81d08e0d3994fb590fc03 | 3 | {
"blob_id": "660ec63759bc98ff77f81d08e0d3994fb590fc03",
"branch_name": "refs/heads/master",
"committer_date": 1545281307000,
"content_id": "42e38e9cdbedafc073d510514def448f78406c81",
"detected_licenses": [
"MIT"
],
"directory_id": "6b32cfb89434ed6d6dd6cc0fc28b9597c3242c5e",
"extension": "py",
"fi... | 2.5625 | stackv2 | from flask import Flask, request
import json
import subprocess
app = Flask(__name__)
app.config.from_json("config.json")
def get_repo(content):
return content["repository"]["name"]
def execute_script(repo):
try:
filename = f"./scripts/{repo}.sh"
subprocess.call(filename, shell=True)
excep... | 34 | 24.09 | 57 | 15 | 193 | python | [{"finding_id": "codeql_py/command-line-injection_2ce77705064af134_d459b2e4", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 2 | true | [
"CWE-078",
"CWE-079"
] | [
"py/command-line-injection",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
14,
31
] | [
null,
null
] | [
25,
16
] | [
33,
28
] | |
2024-11-19T01:17:42.353261+00:00 | 1,683,637,775,000 | f1bbc1cb33e96a4ce5ce6ebf90ddd2be4ae9fe7b | 3 | {
"blob_id": "f1bbc1cb33e96a4ce5ce6ebf90ddd2be4ae9fe7b",
"branch_name": "refs/heads/main",
"committer_date": 1683637775000,
"content_id": "1cfcff6787cf2e99bd16b2aec0caca85ff65ba36",
"detected_licenses": [
"MIT"
],
"directory_id": "55a654177d5faeedfc3716530281ab1817b9d793",
"extension": "py",
"file... | 2.828125 | stackv2 | # -*- coding: utf-8 -*-
# Copyright (C) Cardiff University (2018-2021)
# SPDX-License-Identifier: MIT
"""Utilities for URL handling
"""
import re
from os.path import (basename, splitext)
from .utils import segments_overlap
# GWOSC filename re
URL_REGEX = re.compile(
r"\A((.*/)*(?P<obs>[^/]+)-"
r"(?P<ifo>[A-... | 208 | 24.17 | 79 | 18 | 1,324 | python | [{"finding_id": "codeql_py/redos_0a275011b450ee5b_4f9fd628", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '/'.", "remediati... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '/'."
] | [
15
] | [
null
] | [
11
] | [
14
] | |
2024-11-19T00:41:03.826441+00:00 | 1,631,354,420,000 | d705afa9a50f21ffb48f2c9329c051b73fe7678f | 3 | {
"blob_id": "d705afa9a50f21ffb48f2c9329c051b73fe7678f",
"branch_name": "refs/heads/master",
"committer_date": 1631354420000,
"content_id": "7c4c7c59db8ce222b2a850592236ebedda2e19df",
"detected_licenses": [
"MIT"
],
"directory_id": "8d397c0a15d98d4c8f0872d9c31a6936ffc7e7f5",
"extension": "py",
"fi... | 2.703125 | stackv2 | import os
import secrets
import string
import sys
from django.core.management.base import BaseCommand
from conf.settings.base import BASE_DIR
# TODO: check choice for debug (True/False)
def secret_key():
return "".join(
secrets.choice(string.digits + string.ascii_letters + string.punctuation)
fo... | 107 | 32.05 | 81 | 17 | 867 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e5593313541a8797_5330ea44", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
60
] | [
null
] | [
25
] | [
33
] | |
2024-11-19T00:43:42.138027+00:00 | 1,498,224,656,000 | 4cc64334bb3b4db6418dce1d69d027f84c2a22e1 | 3 | {
"blob_id": "4cc64334bb3b4db6418dce1d69d027f84c2a22e1",
"branch_name": "refs/heads/master",
"committer_date": 1498224656000,
"content_id": "402d21cee1f542a91b2bf6b0b6377eb8133a8b88",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "eeb53c9e3cc947ca4e29a6d13856229f5fd04a5e",
"extension": "py"... | 2.890625 | stackv2 | # coding=utf-8
import argparse
import json
import re
from urllib import request
days = {"0":"星期日", "1":"星期一", "2":"星期二", "3":"星期三", "4":"星期四", "5":"星期五", "6":"星期六"}
class Anime():
def __init__(self):
self.info = None
def fetch_anime(self, url):
if not re.match("(https?://)?bangumi.bilibili.com... | 186 | 46.82 | 169 | 28 | 2,009 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_6d662f66b23e6f70_e1fd4f13", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'bilibili.com/anime/', so it might m... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'bilibili.com/anime/', so it might match more hosts than expected."
] | [
13
] | [
null
] | [
26
] | [
71
] | |
2024-11-19T01:32:01.845196+00:00 | 1,633,272,744,000 | 945dc5383d0ed66e0e58dd4d5d6f65115338d590 | 2 | {
"blob_id": "945dc5383d0ed66e0e58dd4d5d6f65115338d590",
"branch_name": "refs/heads/main",
"committer_date": 1633272744000,
"content_id": "f6401877a8c62d8b1c52f24603122f652db33502",
"detected_licenses": [
"MIT"
],
"directory_id": "cb5783f2c483e331e227f36d0c86d6f4621422fa",
"extension": "py",
"file... | 2.40625 | stackv2 | import os
import requests
from tqdm import tqdm
import tarfile, zipfile
from landslide_sentry.cache_manager.file_registry import getResourceRecord, REGISTERED_FILE
def loadFromCache(key: str, registry=REGISTERED_FILE):
"""
Using the key, locate the file from cache folder. If required file does not exit
i... | 154 | 31.92 | 155 | 17 | 1,068 | python | [{"finding_id": "codeql_py/tarslip_4755b8800aa63462_46616bde", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
143
] | [
null
] | [
9
] | [
12
] | |
2024-11-19T01:32:16.354152+00:00 | 1,614,262,777,000 | ca59ff92cc7b16494c34897991d45fc2a39c7072 | 3 | {
"blob_id": "ca59ff92cc7b16494c34897991d45fc2a39c7072",
"branch_name": "refs/heads/main",
"committer_date": 1614262777000,
"content_id": "5625cc24b3072b03324a31518d9613b09168d47b",
"detected_licenses": [
"MIT"
],
"directory_id": "cc87b93ae02bb47fb878b8a4899de6a433ae9ccb",
"extension": "py",
"file... | 2.9375 | stackv2 | import json
import os
from airflow.utils.decorators import apply_defaults
from airflow.models.baseoperator import BaseOperator
import requests
import logging
class FlightApiToJsonOperator(BaseOperator):
"""
Flight API to S3 Operator
"""
template_fields = ['folder']
api_url = 'http://api.aviationst... | 63 | 33.51 | 100 | 19 | 472 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f18afea10edfac32_2c099078", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
38
] | [
null
] | [
27
] | [
94
] | |
2024-11-19T01:43:37.132728+00:00 | 1,609,929,087,000 | 98f215a1a11d29374d4084ede3e4c24954f92ae6 | 3 | {
"blob_id": "98f215a1a11d29374d4084ede3e4c24954f92ae6",
"branch_name": "refs/heads/master",
"committer_date": 1609929087000,
"content_id": "a2bb0c20b563cb14367f17309b5c88b71af64aaf",
"detected_licenses": [
"MIT"
],
"directory_id": "f3646538e70fa52e55ebfcb85d9bf5e131cb158d",
"extension": "py",
"fi... | 3.234375 | stackv2 | import set2_challenge10 as cbc
import set2_challenge9 as pkcs7
from Crypto.Cipher import AES
import random
def oracle(message):
prepend = bytes([random.randint(0,255) for i in range(random.randint(5,10))])
append = bytes([random.randint(0,255) for i in range(random.randint(5,10))])
plaintext = prepend + me... | 43 | 39.4 | 124 | 15 | 542 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_77afcc3366437c9e_56799046", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 1 | true | [
"CWE-327"
] | [
"py/weak-cryptographic-algorithm"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
15
] | [
null
] | [
22
] | [
88
] | |
2024-11-19T01:43:48.499615+00:00 | 1,603,730,986,000 | 80e210a3847a90a0485a07170e67300d9aa7715a | 3 | {
"blob_id": "80e210a3847a90a0485a07170e67300d9aa7715a",
"branch_name": "refs/heads/main",
"committer_date": 1603730986000,
"content_id": "86db19fef54eeabbe65bbcc1030b0df37d6db8a0",
"detected_licenses": [
"MIT"
],
"directory_id": "e1176ce665afb32f29296e578b55ce6ff46365fb",
"extension": "py",
"file... | 2.625 | stackv2 | '''
File to convert raw arxiv data stored in azure blob into transformed data that can be uploaded
to a graph and other downstream tasks for various learning tasks.
This is the main file that will call multiple other functions.
arxiv_dl
pdf
1991
1992
1993
...
src
1991
... | 260 | 34.59 | 150 | 19 | 1,969 | python | [{"finding_id": "codeql_py/tarslip_34f028679d7505c8_95e5d3da", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
107
] | [
null
] | [
13
] | [
16
] | |
2024-11-19T01:44:00.956288+00:00 | 1,575,389,673,000 | 85ec33214f98d8f36cd5bbaf00c8bd56319dfc00 | 4 | {
"blob_id": "85ec33214f98d8f36cd5bbaf00c8bd56319dfc00",
"branch_name": "refs/heads/master",
"committer_date": 1575389673000,
"content_id": "cf95347c2c3a40d527f187734bef176eb2653bf6",
"detected_licenses": [
"MIT"
],
"directory_id": "5776d9edbb6b8ba4e279512d4c1ced110742f960",
"extension": "py",
"fi... | 4.40625 | stackv2 | #!/usr/bin/env python
# coding: utf-8
# In[ ]:
print("""Welcome to the Password Generator App!
The password generator is a program that will generate a random password
for the user. The user will be allowed to input how many upper case letters,
special characters, and numbers/digits, he or she wants in a password.... | 447 | 34.18 | 127 | 20 | 3,192 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_38491f254b105e94_6484c9ed", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive dat... | [
185,
204,
399
] | [
186,
205,
400
] | [
19,
19,
7
] | [
74,
72,
64
] | |
2024-11-19T01:44:10.850456+00:00 | 1,693,051,838,000 | f0163e3eac43bb3e9cccb8d3e9b7b24a1ad0d645 | 2 | {
"blob_id": "f0163e3eac43bb3e9cccb8d3e9b7b24a1ad0d645",
"branch_name": "refs/heads/master",
"committer_date": 1693051838000,
"content_id": "2fc96e69de528110674eb22349b66e22b4ad3258",
"detected_licenses": [
"MIT"
],
"directory_id": "d0c29e025998ea401398889ad26aa4ff15ae5ab7",
"extension": "py",
"fi... | 2.453125 | stackv2 | """
Manage the wasisdk.
"""
import sys, os, tarfile, shutil
from mod import log, util
if sys.version_info[0] >= 3:
from urllib.request import urlretrieve
else:
from urllib import urlretrieve
dir_name = 'wasi-sdk-14.0'
urls = {
'linux': 'https://github.com/WebAssembly/wasi-sdk/releases/download/wasi-... | 64 | 32.16 | 112 | 14 | 576 | python | [{"finding_id": "codeql_py/tarslip_5bdebd1d992c9926_ca650f5f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
52
] | [
null
] | [
9
] | [
12
] | |
2024-11-19T02:19:53.873614+00:00 | 1,576,442,933,000 | d6f0272ae9536a43ea4239219f5c8dc922fc02ec | 3 | {
"blob_id": "d6f0272ae9536a43ea4239219f5c8dc922fc02ec",
"branch_name": "refs/heads/master",
"committer_date": 1576442933000,
"content_id": "42bbbc87e6bb5764cd58d4be0ab36dcef40a5f16",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "93323c1eaf2a2d6c586c29b45e2c3f5801133a87",
"extension": "py"... | 3.40625 | stackv2 | import db
def main():
userName = ''
password = ''
# capture username
while userName == '':
userName = input('Enter your username:')
# capture password
while password == '':
password = input('Enter your password:')
# create a database connection
conn = db.create_conne... | 22 | 21.5 | 64 | 12 | 108 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8c55e5048082e125_3925e028", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
18
] | [
null
] | [
15
] | [
64
] | |
2024-11-19T01:11:47.520734+00:00 | 1,596,419,162,000 | 783bf0d6d71d9cfe7e790c2baf5b25b37232d41a | 2 | {
"blob_id": "783bf0d6d71d9cfe7e790c2baf5b25b37232d41a",
"branch_name": "refs/heads/master",
"committer_date": 1596419162000,
"content_id": "cc89c7595d6883e53fff858e56294f3b19e30de0",
"detected_licenses": [
"Unlicense"
],
"directory_id": "2cd9343bb90d52dc8eabcf3a5e75b35f6857768a",
"extension": "py",... | 2.375 | stackv2 | import io
import base64
from io import BytesIO
from flask import Flask, jsonify, make_response, send_file, request
from flask_cors import CORS, cross_origin
from grad_cam import grad_cam
from tensorflow.keras.models import load_model
IMG_SIZE = (299, 299)
MODEL_PATH='xception_model_ft.h5'
app = Flask(__name__)
CORS(ap... | 87 | 32.69 | 112 | 13 | 790 | python | [{"finding_id": "codeql_py/path-injection_a3fc51dc1e5aacff_667ca811", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
42
] | [
null
] | [
15
] | [
28
] | |
2024-11-19T01:11:56.022526+00:00 | 1,474,486,532,000 | e622bf002fbdf4a8730ce0dbf8aeac788621e05c | 3 | {
"blob_id": "e622bf002fbdf4a8730ce0dbf8aeac788621e05c",
"branch_name": "refs/heads/master",
"committer_date": 1474486532000,
"content_id": "9ca15e34a80d279407b103f742cbbffa800419d1",
"detected_licenses": [
"MIT"
],
"directory_id": "edcd3847115ae76b68195bdda54e04ed06a04318",
"extension": "py",
"fi... | 2.703125 | stackv2 | import re
from bs4 import BeautifulSoup
import six
def has_attr(attr):
"""Useful wrapper for filtering w/ BeautifulSoup 'find' methods
ex: tag.find('iframe', has_attr('src'))
"""
def inner_has_attr(tag):
return tag and tag.has_attr(attr)
return inner_has_attr
def prepare_iframe(iframe... | 189 | 31.95 | 88 | 21 | 1,479 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_a36da0391d8b92a7_16bc0a52", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'facebook.com/plugins/', so it might... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'facebook.com/plugins/', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'vimeo.com/video/', so it might match more hosts than expected.",
"This regular expression has an unescaped '.' before 'soundcloud.com/... | [
46,
121,
131
] | [
null,
null,
null
] | [
26,
26,
26
] | [
60,
58,
59
] | |
2024-11-19T01:33:47.330450+00:00 | 1,532,362,119,000 | dd7af2ff579c585bda9099d8373b530be4319f6e | 2 | {
"blob_id": "dd7af2ff579c585bda9099d8373b530be4319f6e",
"branch_name": "refs/heads/master",
"committer_date": 1532362119000,
"content_id": "50f2cff4c54720f8d305a83ec151cc2473cd0de0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2b4fcfc3d4e5140af32e351ba10645bd7a6c19bd",
"extension": "py"... | 2.390625 | stackv2 | import os
from flask import (
Flask,
redirect,
url_for,
render_template,
request,
session,
make_response,
jsonify,
)
from inception import (
create_graph,
download_and_extract,
run_inference_on_image,
)
from shutil import copyfile
from werkzeug.utils import secure_f... | 114 | 23.79 | 80 | 16 | 685 | python | [{"finding_id": "codeql_py/flask-debug_aacdb9375700d3ba_df833438", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
114,
79,
84,
89
] | [
null,
null,
null,
null
] | [
5,
19,
42,
15
] | [
35,
56,
62,
35
] | |
2024-11-19T01:56:38.703303+00:00 | 1,628,172,278,000 | d720e7146dbd51ed5bd81965ebed7473e850eabf | 2 | {
"blob_id": "d720e7146dbd51ed5bd81965ebed7473e850eabf",
"branch_name": "refs/heads/master",
"committer_date": 1628172278000,
"content_id": "4e3d7679394fa883f4e558b118a6cc9e1fc42fb4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5c5fbc8547bca3ee2cd147186a3a8ce40e75dbc3",
"extension": "py"... | 2.4375 | stackv2 | from functools import partial
from datetime import datetime
import constants
from parse_utils import group_data
def group_key(row):
return row.vehicle_make
def filter_key(cutoff_date, gender, row):
return row.last_updated >= cutoff_date and row.gender == gender
cutoff_date = datetime(2017, 3, 1)
for gen... | 24 | 28.21 | 77 | 11 | 143 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_89d8ed18c6c150ec_9f88d58f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
23
] | [
null
] | [
11
] | [
48
] | |
2024-11-19T02:10:25.798946+00:00 | 1,563,896,037,000 | 2a03bedc173a6dd225b84624ac1d6138838e6967 | 3 | {
"blob_id": "2a03bedc173a6dd225b84624ac1d6138838e6967",
"branch_name": "refs/heads/master",
"committer_date": 1563896037000,
"content_id": "4d0afdaf9f53394bdc6cd7ddab5ce71fb51bc2ce",
"detected_licenses": [
"MIT"
],
"directory_id": "9d4b7ef25d980b283a625f18b187823fd31e25f8",
"extension": "py",
"fi... | 3.203125 | stackv2 | import re
import numpy as np
import nltk
nltk.download("stopwords")
from nltk.corpus import stopwords
from keras.preprocessing.text import Tokenizer
from keras.preprocessing.sequence import pad_sequences
class DataPreprocessing:
def __init__(self):
pass
def clean_data(self, dataset):
# -... | 104 | 32.1 | 123 | 19 | 748 | python | [{"finding_id": "codeql_py/overly-large-range_a4caaa9270824cec_9f23fa33", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
29
] | [
null
] | [
75
] | [
78
] | |
2024-11-19T02:10:27.256497+00:00 | 1,598,494,162,000 | 9b75b921921d3f53e7aa37f26f1debbe7c597fcf | 3 | {
"blob_id": "9b75b921921d3f53e7aa37f26f1debbe7c597fcf",
"branch_name": "refs/heads/master",
"committer_date": 1598494162000,
"content_id": "d2481ae353574991117d9bdecb8f8e2d072b9707",
"detected_licenses": [
"MIT"
],
"directory_id": "c745a07606ad292f39d011718ae98da27c6f4879",
"extension": "py",
"fi... | 2.859375 | stackv2 | import requests
from unidecode import unidecode
import pandas as pd
import numpy as np
# Carregando dataset
arquivo = "santos_rent.csv"
santos = pd.read_csv(arquivo)
arquivo2 = "santos_local.csv"
end = pd.read_csv(arquivo2)
santos['endereco'] = santos['endereco'].apply(lambda x: x.replace('Primeiro de Maio','1 de Mai... | 68 | 35.44 | 136 | 12 | 757 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_88ac2ae2b1522d4b_cea74341", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
47
] | [
null
] | [
15
] | [
26
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.