added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T21:10:27.759362+00:00 | 1,461,235,377,000 | a8e1fa34515795534bb237b1e769f8b181b69296 | 3 | {
"blob_id": "a8e1fa34515795534bb237b1e769f8b181b69296",
"branch_name": "refs/heads/master",
"committer_date": 1461235377000,
"content_id": "8ae82cea70cab98de623cbe4bf0acc2db8a59fb6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fe30cf0e8b7b715146f0bae023d58103d586d702",
"extension": "py"... | 2.59375 | stackv2 | #!/usr/bin/env python
import os
import urllib2
import re
import math
def get_ip():
data = urllib2.urlopen(
'http://ftp.apnic.net/apnic/stats/apnic/delegated-apnic-latest'
).read()
cnregex = re.compile(r'^apnic\|cn\|ipv4\|[\d\.]+\|\d+\|\d+\|a\w*$', re.I | re.M)
cndata = cnregex.findall(data)
... | 63 | 22.21 | 95 | 16 | 491 | python | [{"finding_id": "codeql_py/overly-permissive-file_fd18d99be9736acd_dcc9084e", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable."
] | [
51,
52
] | [
null,
null
] | [
5,
5
] | [
38,
40
] | |
2024-11-18T19:03:18.619633+00:00 | 1,547,418,302,000 | dd9395d4c9c8405d3dc2042838307773bd47d186 | 2 | {
"blob_id": "dd9395d4c9c8405d3dc2042838307773bd47d186",
"branch_name": "refs/heads/master",
"committer_date": 1547418302000,
"content_id": "6f8fbdc868cbaa8c7fa6742297b02562217eaf1f",
"detected_licenses": [
"MIT"
],
"directory_id": "a63e151547974b04991682e652718a5dd04fdf12",
"extension": "py",
"fi... | 2.359375 | stackv2 | import os
import json
from flask import render_template, jsonify, request
from networkx.readwrite import json_graph
from Mercator import app, analysis_dir
from Mercator.utils import graph
@app.route('/show_individual_analysis/<string:md5>', methods=['GET'])
def show_individual_analysis(md5):
"""Display Ego grap... | 52 | 35.81 | 110 | 18 | 464 | python | [{"finding_id": "codeql_py/path-injection_f0249d9a39e62edd_41a5351e", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 3 | true | [
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
29,
31,
48
] | [
null,
null,
null
] | [
23,
19,
19
] | [
34,
30,
30
] | |
2024-11-18T19:03:21.189892+00:00 | 1,525,002,476,000 | 177b0fd6e86159b368e8ea48e082b3014d1eddb2 | 3 | {
"blob_id": "177b0fd6e86159b368e8ea48e082b3014d1eddb2",
"branch_name": "refs/heads/master",
"committer_date": 1525002476000,
"content_id": "f93274af90d8233bf5bd1dc80a3a3fe7ad4bf8e0",
"detected_licenses": [
"MIT"
],
"directory_id": "01726476850128dff3e52b0d2c3ac2873d2fcd0a",
"extension": "py",
"fi... | 3.078125 | stackv2 | #! /usr/bin/python
"""
Assumes a Linux system (Debian, more specifically)
Requires Python libraries re, requests, os, and lxml
Requires program transmission-cli
A simple script that searches Nyaa.se for the newest HorribleSubs torrents.
Pick the show you wish to download, then pick the quality, and that torrent
wil... | 120 | 32.6 | 111 | 17 | 1,071 | python | [{"finding_id": "codeql_py/redos_53b621443501f1a7_3f03cd05", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\\[horriblesubs\\] ' and containi... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '\\[horriblesubs\\] ' and containing many repetitions of ' '."
] | [
29
] | [
null
] | [
44
] | [
46
] | |
2024-11-18T19:03:39.565208+00:00 | 1,577,803,234,000 | 48f229be41688fc405b24d4c93252518898d9eb3 | 3 | {
"blob_id": "48f229be41688fc405b24d4c93252518898d9eb3",
"branch_name": "refs/heads/master",
"committer_date": 1577803234000,
"content_id": "dbc1e0cfbeb432cf30db51516246494b79be4a21",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "05870c108ab7a1934b7588aa9d28fd78c05aa70f",
"extension": "py"... | 2.734375 | stackv2 | #!/usr/bin/python
import os
import hashlib
from scp import SCPClient
from paramiko import SSHClient
from paramiko import SFTPClient
from paramiko import AutoAddPolicy
def _str(data):
try:
return str(data.decode('utf-8'))
except:
return str(data)
class LRFSClient(object):
def __init__(se... | 72 | 30.36 | 76 | 16 | 565 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_cf4c2e400e0b1173_0a5e909b", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
22
] | [
null
] | [
9
] | [
62
] | |
2024-11-18T19:28:34.545056+00:00 | 1,629,156,751,000 | 9e419b835bd57a45ad3921a92dba6c4c473c5ad2 | 2 | {
"blob_id": "9e419b835bd57a45ad3921a92dba6c4c473c5ad2",
"branch_name": "refs/heads/main",
"committer_date": 1629156751000,
"content_id": "8d20dad20d07876a19b72e7fe92a62defee66ebb",
"detected_licenses": [
"MIT"
],
"directory_id": "2966f20ba49e1b1dafbab09ef1fbfdc1f880b244",
"extension": "py",
"file... | 2.359375 | stackv2 | import base64
import json
from requests import Session
apikey = ""
url_head = "https://terra--search.datahub.figment.io/apikey/"
url_tail = "/transactions_search"
url = url_head + apikey + url_tail
block_cache = {}
headers = {"content-type": "application/json"}
oracle_feeder = "terra1zue382qey9l5uhhwcwumjhmsne49a0a... | 245 | 32.24 | 126 | 26 | 2,017 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4fa7f9005fbe0a5c_410b08fc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
121
] | [
null
] | [
19
] | [
38
] | |
2024-11-18T19:28:50.180491+00:00 | 1,633,400,300,000 | b8851519af5515052af8599d52dbcb30c588b688 | 3 | {
"blob_id": "b8851519af5515052af8599d52dbcb30c588b688",
"branch_name": "refs/heads/main",
"committer_date": 1633400300000,
"content_id": "37ebf2a62833baee6ba6fb36028238a44a2f9bf0",
"detected_licenses": [
"MIT"
],
"directory_id": "739547a5f1f8f589086990d0dc9e7d696ae564d1",
"extension": "py",
"file... | 2.59375 | stackv2 | from flask import Flask, request, render_template, redirect, url_for
import os
app = Flask(__name__)
app.config['UPLOAD_FOLDER'] = 'static/portraits/'
@app.route('/')
def root():
return render_template('index.html')
@app.route('/submit', methods=['POST'])
def submit():
candidate_no = request.form['candidate... | 24 | 24.79 | 78 | 13 | 141 | python | [{"finding_id": "codeql_py/flask-debug_75b99a1027af3fde_75f37561", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
24,
21
] | [
null,
null
] | [
null,
20
] | [
20,
78
] | |
2024-11-18T19:29:02.341470+00:00 | 1,578,941,746,000 | 91da6e4099ce853bf489be5e1416334c2c9c23b5 | 2 | {
"blob_id": "91da6e4099ce853bf489be5e1416334c2c9c23b5",
"branch_name": "refs/heads/master",
"committer_date": 1578941746000,
"content_id": "ea9bd6576c9ef37f50f8f6b9dc2529959b20b0e7",
"detected_licenses": [
"MIT"
],
"directory_id": "c4a3f6eaf5dd8eb70ec31b545487a15c9b091053",
"extension": "py",
"fi... | 2.375 | stackv2 | #!/usr/bin/python3
GRID = (('', '', 'panama', '', '', '', '', '', '', '', 'bell', '', 'echo'),
('bell', '', '', '', '', '', '', '', '', '', 'hounds', 'crickets', ''),
('grammar', 'surprise', '', '', '', '', '', '', 'hallelujah', '', 'bell', '', 'bell'),
('', '', '', '', '', '', '', '', 'bell', ... | 148 | 27.47 | 94 | 16 | 1,132 | python | [{"finding_id": "codeql_py/path-injection_d73ebf62d4aad740_c61f619b", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
110
] | [
null
] | [
15
] | [
17
] | |
2024-11-18T19:39:33.474159+00:00 | 1,572,360,126,000 | 21cf6e8d0f400ddc2c90014af76eaca3abb68182 | 2 | {
"blob_id": "21cf6e8d0f400ddc2c90014af76eaca3abb68182",
"branch_name": "refs/heads/master",
"committer_date": 1572360126000,
"content_id": "c5b0f1740ad0fc630261de77fbb7d7852ae41e4e",
"detected_licenses": [
"MIT"
],
"directory_id": "b1f32c9b68fdc942175d784698edca976747c259",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python
# encoding: utf-8
import os
import paramiko
from config import config as conn
class SysCommandor():
def __init__(self):
self.conObj = conn.ConfigInspector()
#Create the system connection Object
def ConEStablisher(self,sysip=None, syspass=None, sysusername=None):
try... | 69 | 38.41 | 95 | 16 | 549 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_a4ac2057164266f1_a04800c9", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
17
] | [
null
] | [
13
] | [
73
] | |
2024-11-18T19:39:37.889779+00:00 | 1,689,872,064,000 | 9a1990b2095ff910b468d747d9a926dd4efe65b1 | 3 | {
"blob_id": "9a1990b2095ff910b468d747d9a926dd4efe65b1",
"branch_name": "refs/heads/main",
"committer_date": 1689872064000,
"content_id": "23aa8432623486d2cf8a5b0c52dc0ac6acf0c898",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "da2c72776c900705a1408b1baeaf88e6849ef12f",
"extension": "py",
... | 2.78125 | stackv2 | import gzip
import os
import shutil
import tarfile
import zipfile
from pathlib import Path
from urllib.parse import urlparse
from urllib.request import urlretrieve
from zipfile import ZipFile
def get_df_count(df, col):
if df is None:
return None
return df.agg({col: "max"}).collect()[0][0] + 1
def do... | 83 | 34.11 | 114 | 20 | 608 | python | [{"finding_id": "codeql_py/tarslip_d4d28790e8a8da18_8bc56b73", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 5 | true | [
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/tarslip",
"py/tarslip",
"py/tarslip",
"py/tarslip",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1).",
"This file extractio... | [
42,
45,
48,
51,
55
] | [
null,
null,
null,
null,
null
] | [
21,
21,
21,
21,
25
] | [
24,
24,
24,
24,
28
] | |
2024-11-18T19:39:52.958728+00:00 | 1,622,384,730,000 | 44748b4c2cf192daa72065b7d5bcfe8c67a096b5 | 3 | {
"blob_id": "44748b4c2cf192daa72065b7d5bcfe8c67a096b5",
"branch_name": "refs/heads/main",
"committer_date": 1622384730000,
"content_id": "a370341768529813e678a7e4f7e60fcb1892ba36",
"detected_licenses": [
"MIT"
],
"directory_id": "1c0a33ead3aec49d7864959f4ffbae6920431928",
"extension": "py",
"file... | 2.75 | stackv2 | import logging
import os
import time
from typing import NamedTuple, Any, Optional
import paramiko
import yaml
log = logging.getLogger(__name__)
CONFIG_FILENAME = 'config.yaml'
CONFIG_FILEPATH = os.path.join(os.path.dirname(__file__), CONFIG_FILENAME)
class Config(NamedTuple):
sas_user: str
sas_password: st... | 113 | 32.22 | 75 | 14 | 919 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_07279cf05bb285d7_2b47f77e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
62
] | [
null
] | [
9
] | [
75
] | |
2024-11-18T20:18:06.173706+00:00 | 1,621,557,647,000 | 1bcefa929c7acdd61e06f7a4b368b03e21bb3d5d | 2 | {
"blob_id": "1bcefa929c7acdd61e06f7a4b368b03e21bb3d5d",
"branch_name": "refs/heads/master",
"committer_date": 1621557647000,
"content_id": "6b9c4f964b1faab0702fbe4bf908b58606409594",
"detected_licenses": [
"MIT"
],
"directory_id": "b44edc501ccf57e1a2940aec4997a32619281784",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python
"""
netapp - Uses the NetApp RestAPI to access NetApp data.
Docs: https://library.netapp.com/ecmdocs/ECMLP2856304/html/index.html
Examples: https://github.com/NetApp/ontap-rest-python/tree/master/examples/rest_api
"""
import json
import time
import logging.config
import base64
import requests
... | 159 | 39.01 | 126 | 19 | 1,460 | python | [{"finding_id": "codeql_py/request-without-cert-validation_602336975418758a_5abca589", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
80,
97
] | [
null,
null
] | [
13,
13
] | [
92,
86
] | |
2024-11-18T20:18:31.572631+00:00 | 1,487,415,877,000 | 22e1b30bed894cacf12cd4dd24cc512704c7a870 | 3 | {
"blob_id": "22e1b30bed894cacf12cd4dd24cc512704c7a870",
"branch_name": "refs/heads/master",
"committer_date": 1487415877000,
"content_id": "571eb7e0a6c80ace7fb150fc0b604fc32abf06e2",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "d1993b56122976afc3b2eccfc9b5b76899d793c5",
"extension": "p... | 3.25 | stackv2 | """
users.py -
NOTE: this module should not be run as a standalone scripts, excepts for
built-in tests.
"""
# HISTORY ####################################################################
#
# 1 Dec12 MR Added the implementation of the Password class
# 2 Dec14 MR Ported to Py3 (fi... | 72 | 29.78 | 78 | 15 | 501 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2a5ba0e01245b078_d39585a4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
61
] | [
null
] | [
11
] | [
12
] | |
2024-11-18T20:18:46.134756+00:00 | 1,469,890,689,000 | 9474f355d12b20542845ffeda51278ba2dd4ccec | 3 | {
"blob_id": "9474f355d12b20542845ffeda51278ba2dd4ccec",
"branch_name": "refs/heads/master",
"committer_date": 1469890689000,
"content_id": "016d0b22d2aa7bd451e9e98da7d753bbb7338797",
"detected_licenses": [
"ISC"
],
"directory_id": "df455397a270a6cd5ca4af1f37685182159f5e53",
"extension": "py",
"fi... | 2.59375 | stackv2 | """App Entry Point, initializes wsgi app, sets the routes."""
import json
import logging
import random
from gevent import queue, pool
from flask import Flask, render_template, request, Response
from cosette.thing import Playlist, Artist, Tag, Track
log = logging.getLogger(__name__)
app = Flask(__name__)
app.config['... | 113 | 28.59 | 81 | 18 | 730 | python | [{"finding_id": "codeql_py/flask-debug_2739cde4bd86fe7b_7377d2e5", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 5 | true | [
"CWE-215",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/flask-debug",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry de... | [
113,
76,
39,
42,
45
] | [
null,
null,
null,
null,
null
] | [
5,
69,
44,
53,
55
] | [
24,
74,
49,
58,
60
] | |
2024-11-18T20:18:53.240917+00:00 | 1,637,434,355,000 | d11a9da5fdbdfc9e870ca61b7ca6161984f3622f | 3 | {
"blob_id": "d11a9da5fdbdfc9e870ca61b7ca6161984f3622f",
"branch_name": "refs/heads/main",
"committer_date": 1637434355000,
"content_id": "86657e595bf8f515e0cda203fb7df9be6f8ee5e2",
"detected_licenses": [
"MIT"
],
"directory_id": "21e72a42ec5583b915c91c7b5035fc860db107bd",
"extension": "py",
"file... | 2.6875 | stackv2 | # -*- coding: utf-8 -*-
from __future__ import annotations
from subprocess import check_output, CalledProcessError
from re import findall, search
# EDITABLES
PROFILES_KEYWORD = "Profile"
KEY_CONTENT_KEYWORD = "Key Content"
def wifi_passwords(
profiles_keyword: str = "Profile",
key_content_keyword: st... | 49 | 26.57 | 74 | 17 | 312 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_85627676b91644f4_83da46a3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
49
] | [
null
] | [
9
] | [
66
] | |
2024-11-18T20:29:36.817571+00:00 | 1,693,495,759,000 | 813031c752fb8068397497147362689843e761e7 | 2 | {
"blob_id": "813031c752fb8068397497147362689843e761e7",
"branch_name": "refs/heads/master",
"committer_date": 1693495759000,
"content_id": "3cfa6760b3c94a0754801270a7a28e801c1a0d4d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b095173b2dbc77c8ad61c42403258c76169b7a63",
"extension": "py"... | 2.359375 | stackv2 | # Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License"). You
# may not use this file except in compliance with the License. A copy of
# the License is located at
#
# http://aws.amazon.com/apache2.0/
#
# or in the "license" file accompan... | 110 | 45.32 | 100 | 18 | 1,083 | python | [{"finding_id": "codeql_py/tarslip_728d7bffd8c8ca1d_39faa4e3", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
63
] | [
null
] | [
13
] | [
15
] | |
2024-11-18T20:29:45.904303+00:00 | 1,614,119,134,000 | c2fd5702cf9ea2cec19804caa28d3e1f6a79842c | 3 | {
"blob_id": "c2fd5702cf9ea2cec19804caa28d3e1f6a79842c",
"branch_name": "refs/heads/master",
"committer_date": 1614119134000,
"content_id": "c796632c4b00857069aa0b9b1f9f915890df52a8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "89f44bdf5a79eb02ffd27fc14e80e3a971703672",
"extension": "py"... | 2.78125 | stackv2 | # -*- coding: UTF-8 -*-
"""
This module contains variables that do not change during run time. The
idea is to only ever build one source of truth (be it a binary, or package), and
execute that same built thing regardless of the run time environment.
"""
import time
from os import environ
from urllib.parse import urljoi... | 71 | 36.56 | 90 | 15 | 599 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c1192c998818958c_a5271652", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
44
] | [
null
] | [
20
] | [
84
] | |
2024-11-18T20:29:49.843352+00:00 | 1,538,639,761,000 | 9a66f3a6c9dec6c858c448d5aecbbc2a5696b704 | 3 | {
"blob_id": "9a66f3a6c9dec6c858c448d5aecbbc2a5696b704",
"branch_name": "refs/heads/master",
"committer_date": 1538639761000,
"content_id": "266725ac0f62c75a8b5c59de1c96faf8a1b2fe2d",
"detected_licenses": [
"MIT"
],
"directory_id": "69ddb1aeeeb855dff73b4c9135e9d2ac9e3cfbdb",
"extension": "py",
"fi... | 2.921875 | stackv2 | """Pull all profile pictures from randomuser.me and save them to images in .ico format. Also make sure copies of all images in icons/ exist in .ico format."""
from io import BytesIO
from os import path, listdir
from PIL import Image
import requests
pull_icons = False
convert_images = True
convert_icons = True
num_ico... | 46 | 37.15 | 158 | 19 | 430 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_37e9009219387739_e1568274", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
34
] | [
null
] | [
23
] | [
27
] | |
2024-11-18T20:29:50.245667+00:00 | 1,587,436,113,000 | 4a6325299bcd26214d5f0c938e1e276129918b81 | 3 | {
"blob_id": "4a6325299bcd26214d5f0c938e1e276129918b81",
"branch_name": "refs/heads/master",
"committer_date": 1587436113000,
"content_id": "f7bfb29dfa48f8fb5cfbc7028fa5538f90c82ce8",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1c1163cb3ac21ff177bfd92f8b3975adccdad320",
"extension": "py"... | 2.640625 | stackv2 | #!/usr/bin/env python3
import requests
import string
import argparse
from multiprocessing import Process, Queue
import urllib3
urllib3.disable_warnings()
try:
import curses
except:
curses = None
def check(pattern, spot, q, url, iterate=False):
headers={'content-type': 'application/x-www-form-urlencode... | 186 | 32.97 | 125 | 17 | 1,524 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8b716e54109e44f4_c34857e2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-295"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/request-without-cert-validation"
] | [
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive dat... | [
179,
186,
186,
29
] | [
null,
null,
null,
null
] | [
15,
7,
17,
13
] | [
47,
15,
25,
107
] | |
2024-11-18T20:51:21.622469+00:00 | 1,545,325,280,000 | a2920b7309c94452e31a5adcf73756077ff06a28 | 2 | {
"blob_id": "a2920b7309c94452e31a5adcf73756077ff06a28",
"branch_name": "refs/heads/master",
"committer_date": 1545325280000,
"content_id": "2183524ac1239de1dfa41bcb81fe99caf493b93a",
"detected_licenses": [
"MIT"
],
"directory_id": "cfca41bbb5b18530ec57d0efe8392e69bd608755",
"extension": "py",
"fi... | 2.46875 | stackv2 | from flask import render_template, abort, redirect, url_for, request, session, flash, g
# from json import JSONDecodeError
from .models import db, Company, Portfolio, User
# import requests as req
from . import app
from .forms import CompanySearchForm, CompanyAddForm, PortfolioAddForm
import json
import requests
from s... | 146 | 36.28 | 96 | 16 | 1,127 | python | [{"finding_id": "codeql_py/partial-ssrf_6bafbc7d7cde3bdc_cea70672", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
143
] | [
null
] | [
11
] | [
84
] | |
2024-11-18T20:51:45.167978+00:00 | 1,672,184,505,000 | 1afbc07c011228b2c27902246a438588434d4d45 | 2 | {
"blob_id": "1afbc07c011228b2c27902246a438588434d4d45",
"branch_name": "refs/heads/master",
"committer_date": 1672184505000,
"content_id": "432b2052521b4a205c7f91c4f16d52ca0ef35511",
"detected_licenses": [
"MIT"
],
"directory_id": "c667ff125997a0202968d6df79d654d4b7aa3a6c",
"extension": "py",
"fi... | 2.453125 | stackv2 | # -*- coding:utf-8 -*-
"""Reader and writer for URDF format
:Organization:
AIST
Requirements
------------
* numpy
* lxml xml parser
* jinja2 template engine
Examples
--------
Read URDF model data given the model file
>>> import subprocess
>>> subprocess.call('rosrun xacro xacro.py `rospack find atlas_description... | 369 | 35.82 | 134 | 23 | 3,171 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_08bc818d5c5cd4b8_ec6490f7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
270
] | [
null
] | [
15
] | [
48
] | |
2024-11-18T20:51:46.856936+00:00 | 1,630,954,568,000 | 7d4fbe3d2826d3caaaf251c29bd09474280fa169 | 3 | {
"blob_id": "7d4fbe3d2826d3caaaf251c29bd09474280fa169",
"branch_name": "refs/heads/main",
"committer_date": 1630954568000,
"content_id": "1047ceab7b671c29373311adb5792f274f688551",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2152f85c6d18f729d471d1d772c321c9671bb5d6",
"extension": "py",
... | 3 | stackv2 | import csv
import sys
import time
from os import system, name
import requests
import colorama
import pyfiglet
from requests.packages.urllib3.exceptions import InsecureRequestWarning
requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
from colorama import Fore, Style, Back
colorama.init(autoreset=True)
... | 95 | 19.83 | 84 | 18 | 487 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2b95d4df2c6c3a15_a9f4bb76", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
50,
65
] | [
null,
null
] | [
13,
9
] | [
48,
44
] | |
2024-11-18T19:07:18.710933+00:00 | 1,538,518,093,000 | 648c971586db3bf6bb391c25ebfec98386c4b8f3 | 2 | {
"blob_id": "648c971586db3bf6bb391c25ebfec98386c4b8f3",
"branch_name": "refs/heads/master",
"committer_date": 1538518093000,
"content_id": "2b24fb98633fbef8639d89aa1211fbe303dd1333",
"detected_licenses": [
"MIT"
],
"directory_id": "6532f7a6347c37f11217b8f23ec49afcd303a328",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python
import os
import sys
import time
import json
import paramiko
import logging
logging.basicConfig(level=logging.ERROR)
logger = logging.getLogger(__name__)
if len(sys.argv) < 2:
print("argument: json script file not speicifed")
sys.exit(1)
localpath = sys.argv[1]
username = "crestron"
pas... | 70 | 33.36 | 97 | 22 | 502 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_9815499f6a94d2de_bcbaeee7", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
29
] | [
null
] | [
5
] | [
65
] | |
2024-11-18T19:07:19.376420+00:00 | 1,591,671,993,000 | 8ffa6add6b48d6d98000ea6437d9590cce4a945d | 2 | {
"blob_id": "8ffa6add6b48d6d98000ea6437d9590cce4a945d",
"branch_name": "refs/heads/master",
"committer_date": 1591671993000,
"content_id": "2814be0d53653e278667fde7ce685df1d716c442",
"detected_licenses": [
"MIT"
],
"directory_id": "3c77b25316dd3446a6bc09558c5c15f5e5a38503",
"extension": "py",
"fi... | 2.3125 | stackv2 | import tornado.ioloop
import tornado.web
import hashlib
import web
import requests
import time
import os
import recieve
import generateResponseText as grt
# ----------------------------------------------------------------
# 基本配置
# ----------------------------------------------------------------
PORT = 8000
APPID = '... | 173 | 34.42 | 92 | 21 | 1,606 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_191783356de37103_701b3f2c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 4 | true | [
"CWE-312",
"CWE-094",
"CWE-079",
"CWE-918"
] | [
"py/clear-text-logging-sensitive-data",
"py/code-injection",
"py/reflective-xss",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This code execution depends on a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
82,
59,
107,
58
] | [
null,
null,
null,
null
] | [
15,
21,
24,
16
] | [
23,
30,
31,
46
] | |
2024-11-18T19:07:49.342093+00:00 | 1,473,966,198,000 | 95c4457359d17d00b7b4a4c96b0b8c4051c64e8f | 3 | {
"blob_id": "95c4457359d17d00b7b4a4c96b0b8c4051c64e8f",
"branch_name": "refs/heads/master",
"committer_date": 1473966198000,
"content_id": "9ff2c95fae06ccf07bcefdba140d6604d4e2d5c8",
"detected_licenses": [
"MIT"
],
"directory_id": "c6d1e0d374314cca89ba45f10773ad8eb61525b1",
"extension": "py",
"fi... | 2.625 | stackv2 | from .estimate import Estimate
from .state import State, evaluate_state
import contextlib
import datetime
import iso8601
import os
import os.path as p
import pytz
import shortuuid
import tempfile
import yaml
def utcnow():
return pytz.UTC.localize(datetime.datetime.utcnow())
@contextlib.contextmanager
def cd(ne... | 187 | 29.2 | 79 | 16 | 1,240 | python | [{"finding_id": "codeql_py/overly-permissive-file_29846bfa3fe94df4_663bab14", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
113
] | [
null
] | [
13
] | [
41
] | |
2024-11-18T19:07:55.535948+00:00 | 1,620,767,719,000 | 82baa95dbb7327daaf1188bd8f323c716d10c645 | 3 | {
"blob_id": "82baa95dbb7327daaf1188bd8f323c716d10c645",
"branch_name": "refs/heads/master",
"committer_date": 1620767719000,
"content_id": "5feca92d258b5fd511673a1100d8ac99d0152cc4",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "a2742aa0500fe9dd8f5307a5528d7e1d0b078ee0",
"extension": "p... | 2.53125 | stackv2 | """
Copyright 2019 Pacific Gas and Electric Company
ALL RIGHTS RESERVED
"""
import sys
import json
import requests
import threading
from time import sleep
from datetime import datetime
from uuid import uuid4
import urllib3
from conf.ssh import SSH
from conf.argumentparser import argparse_get_options
from conf.histor... | 142 | 34.51 | 120 | 23 | 1,210 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e01a6ee2c9aeadba_eedb6abe", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
64
] | [
66
] | [
11
] | [
70
] | |
2024-11-18T19:07:55.734077+00:00 | 1,498,281,413,000 | 6cf92fbbded7cff60f0bc5ceca4cfbaf6a5a78f5 | 3 | {
"blob_id": "6cf92fbbded7cff60f0bc5ceca4cfbaf6a5a78f5",
"branch_name": "refs/heads/master",
"committer_date": 1498281413000,
"content_id": "befe3032387fb0f331e887c919111e8613b5abb5",
"detected_licenses": [
"MIT"
],
"directory_id": "f895cb405a50f17281fd1399c5461a7c2bc887c8",
"extension": "py",
"fi... | 3.171875 | stackv2 | """
SafeTalk
End to end talk encryption, automatically read and clipboard
Using pure python rsa module, so the message cannot be too long
Author: zjuchenyuan
"""
import rsa
import base64
import pickle
import traceback
import binascii
import threading
import os
from time import sleep
from storage import storage_save, ... | 171 | 25.07 | 89 | 15 | 1,099 | python | [{"finding_id": "codeql_py/weak-crypto-key_b2cce4b2ab85d2c3_21bafd87", "tool_name": "codeql", "rule_id": "py/weak-crypto-key", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable.", "remediation": "",... | 1 | true | [
"CWE-326"
] | [
"py/weak-crypto-key"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Creation of an RSA key uses [1024](1) bits, which is below 2048 and considered breakable."
] | [
42
] | [
null
] | [
23
] | [
71
] | |
2024-11-18T19:18:12.665689+00:00 | 1,535,677,357,000 | cb696345ec94a5b0af500f2d2ab567c9986d9d07 | 3 | {
"blob_id": "cb696345ec94a5b0af500f2d2ab567c9986d9d07",
"branch_name": "refs/heads/master",
"committer_date": 1535677357000,
"content_id": "dd43b27e2806e4ccfb30003853bda8ec05288855",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b6b59aae5ae63416eac5e9615ec20447ce8e0260",
"extension": "py"... | 3.03125 | stackv2 | import os
import re
dirname = os.path.dirname(__file__)
def strip_special_chars(string):
return re.sub(r"[^A-z^0-9^ ^\-^_^é^ñ]|\\|\^|\]|\[", " ", string)
def amalgamate():
files = []
for file in os.listdir(dirname):
if file.endswith(".txt"):
files.append(os.path.join(dirname, file))
... | 46 | 23.52 | 74 | 15 | 294 | python | [{"finding_id": "codeql_py/overly-large-range_49a574cdefaa6ccf_f3bd1ffb", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
7
] | [
null
] | [
23
] | [
26
] | |
2024-11-18T19:18:19.661217+00:00 | 1,498,373,756,000 | b80e52560e250eebc3f81663e3c83b815864a7d9 | 3 | {
"blob_id": "b80e52560e250eebc3f81663e3c83b815864a7d9",
"branch_name": "refs/heads/master",
"committer_date": 1498373756000,
"content_id": "44fa97421f44d8b340b46babe30f71d093e446d8",
"detected_licenses": [
"MIT"
],
"directory_id": "80ad608515eef3e15137136d38f1d32b9697e1ff",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/bin/python3
# -*- coding: latin-1 -*-
import os
import sys
# import psycopg2
import json
from bson import json_util
from pymongo import MongoClient
from flask import Flask, request, session, g, redirect, url_for, abort, \
render_template, flash
def strip_quotes(word):
"""Strip all quotations marks fro... | 137 | 24.08 | 99 | 17 | 845 | python | [{"finding_id": "codeql_py/code-injection_a1704dbfbdb7a8f5_41690a19", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-094"
] | [
"py/code-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1)."
] | [
69
] | [
null
] | [
20
] | [
36
] | |
2024-11-18T19:18:20.245257+00:00 | 1,646,420,441,000 | 339059921fea89d6a9177ad7a193506e38f376b7 | 2 | {
"blob_id": "339059921fea89d6a9177ad7a193506e38f376b7",
"branch_name": "refs/heads/main",
"committer_date": 1646420441000,
"content_id": "a559975a2804277ae0612c9519b9450536a79c09",
"detected_licenses": [
"MIT"
],
"directory_id": "44c648a8248fa81823721d9b9a24852e18ee7996",
"extension": "py",
"file... | 2.484375 | stackv2 | """The difference between `dev` and `db` is that `dev` invokes docker.
"""
from lagoon.config import get_config
import pathlib
import subprocess
import typer
import os
app = typer.Typer()
DB_VERSION = 'postgres:13'
@app.command()
def backup_restore(fpath: pathlib.Path=typer.Argument(..., exists=True)):
"""Rest... | 156 | 27.33 | 88 | 16 | 1,098 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d0d463c33213030d_21f1368a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
36
] | [
null
] | [
11
] | [
17
] | |
2024-11-18T19:18:29.138716+00:00 | 1,566,930,916,000 | 829c80cb45da9eabaeabc9380877760e832fbdb6 | 3 | {
"blob_id": "829c80cb45da9eabaeabc9380877760e832fbdb6",
"branch_name": "refs/heads/master",
"committer_date": 1566930916000,
"content_id": "b473e9a272584a526ab3bf95fdfa53a8e946e94e",
"detected_licenses": [
"MIT"
],
"directory_id": "1a3b25a6e430ee68041f315eb10c7402a480b0b4",
"extension": "py",
"fi... | 2.671875 | stackv2 | """ Caching interface to Kerr QNMs
This is a high-level interface to the package.
The global cache `qnm.modes_cache` (an instance of
:class:`KerrSeqCache`) will return instances of
:class:`qnm.spinsequence.KerrSpinSeq` from memory or disk. If a spin
sequence is neither in memory nor on disk then it will be computed an... | 435 | 28.9 | 96 | 19 | 3,201 | python | [{"finding_id": "codeql_py/tarslip_908b2516a495170e_ee4f4325", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
430
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T19:18:48.794118+00:00 | 1,649,810,226,000 | fa99723055372863faa838c587977fa67c3051e7 | 3 | {
"blob_id": "fa99723055372863faa838c587977fa67c3051e7",
"branch_name": "refs/heads/master",
"committer_date": 1649811090000,
"content_id": "ba74e20a29fb62df4cba125aa9771226259c7e15",
"detected_licenses": [
"MIT"
],
"directory_id": "41d52285fe21e969bea0b816c9e69eb59368a091",
"extension": "py",
"fi... | 2.578125 | stackv2 | """Contains sty file generation code."""
from enum import Enum, auto, unique
from time import gmtime, strftime
from typing import Any, Dict
from jinja2 import Environment, FileSystemLoader, Template
MAIN_TEMPLATE = "kappak.sty"
OUTPUT_DIRECTORY = "../out/texmf/tex/latex/kappak"
TEMPLATE_DIRECTORY = "templates"
@un... | 105 | 32.93 | 75 | 17 | 775 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_da773303b5714fbe_95d84dbd", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
90
] | [
102
] | [
19
] | [
6
] | |
2024-11-18T19:18:57.381927+00:00 | 1,447,293,135,000 | c222c35e30eb6cff2a73bbf3f041665bd572ee57 | 3 | {
"blob_id": "c222c35e30eb6cff2a73bbf3f041665bd572ee57",
"branch_name": "refs/heads/master",
"committer_date": 1447293135000,
"content_id": "29ba54cdf6548936ee576bfce961fd022eac55c6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "09b9f534be445657c40e2e2285466dbd15436d5b",
"extension": "py"... | 2.9375 | stackv2 | #! /bin/env python2.7
import argparse
import getpass
import hashlib
import os
import subprocess
from itertools import starmap, cycle
def encrypt(message, key):
# single letter encrpytion.
def enc(c, k): return chr((ord(k) + ord(c)) % 256)
return "".join(starmap(enc, zip(message, cycle(key))))
def decryp... | 82 | 33.76 | 90 | 14 | 713 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_aa7ca82683d26909_1ba96b64", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-327"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function."... | [
58,
60,
30
] | [
null,
null,
null
] | [
18,
11,
27
] | [
35,
53,
61
] | |
2024-11-18T19:29:48.627424+00:00 | 1,558,904,702,000 | 6bf4387a9a9f566fbda5450142f3ce956c66e55b | 3 | {
"blob_id": "6bf4387a9a9f566fbda5450142f3ce956c66e55b",
"branch_name": "refs/heads/master",
"committer_date": 1558904702000,
"content_id": "1fcf1211735f18ebaae136175759245331553a6d",
"detected_licenses": [
"MIT"
],
"directory_id": "a066058f4246a55aa219dd0efe46d86961330ff0",
"extension": "py",
"fi... | 2.796875 | stackv2 | import json
import os
import requests
import pandas as pd
from textblob import TextBlob
from datetime import date as dt
from datetime import timedelta
from vaderSentiment.vaderSentiment import SentimentIntensityAnalyzer
import statistics
class news_data():
def __init__(self, stock_name,from_date=str(dt.today())):
... | 119 | 25.97 | 91 | 18 | 670 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1d67cabd4194a712_af42dcac", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive dat... | [
32,
33,
34
] | [
null,
null,
null
] | [
19,
19,
19
] | [
33,
31,
34
] | |
2024-11-18T19:29:53.618366+00:00 | 1,441,402,373,000 | 09c97b83f681afeb2cff1ae3059ab734ecc2fd11 | 2 | {
"blob_id": "09c97b83f681afeb2cff1ae3059ab734ecc2fd11",
"branch_name": "refs/heads/master",
"committer_date": 1441402373000,
"content_id": "3a88dbbd1c2a3117499d9077c91247361e1484fc",
"detected_licenses": [
"MIT"
],
"directory_id": "eb44f4ad176f3cfc17f341d97578d977ff3a276a",
"extension": "py",
"fi... | 2.484375 | stackv2 | """Bark
Usage:
bark new <name>
bark make [<settings>]
Options:
-h --help Show this screen.
--version Show version.
"""
__author__ = 'Casey Weed'
__version__ = '1.3.4'
from docopt import docopt
import json
import errno
import shutil
from hoedown import Markdown, HtmlRenderer, SmartyPants
from dateti... | 281 | 30.69 | 150 | 18 | 1,936 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_95531948fe128db4_06451b2a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
123,
148
] | [
null,
null
] | [
25,
22
] | [
44,
35
] | |
2024-11-18T20:23:15.153737+00:00 | 1,629,685,035,000 | 562f136d6f7ecd9b8e68ca83da3835d236dd2f0b | 2 | {
"blob_id": "562f136d6f7ecd9b8e68ca83da3835d236dd2f0b",
"branch_name": "refs/heads/master",
"committer_date": 1629685035000,
"content_id": "8ace412909263bbfa29d0d674a858344e19c45d1",
"detected_licenses": [
"MIT"
],
"directory_id": "73cda135ead724647b0068a64b0d575ba2d1fa8f",
"extension": "py",
"fi... | 2.3125 | stackv2 | import jinja2
import json
import os
import pickle
import yaml
from collections import defaultdict
from jinja2 import Environment
from pathlib import Path
# Path to read the Bioconda recipes
ROOT = "."
# Path to write the Bioconda recipes.
AROT = "."
def fake(foo, **args):
pass
def parse_bioconda(directory):
... | 36 | 29.67 | 172 | 18 | 269 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_59faaadcb310d2d1_a002c15c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
24
] | [
null
] | [
24
] | [
54
] | |
2024-11-18T20:23:24.421663+00:00 | 1,592,757,298,000 | db03557dfef23c781b45ecb6ff883418f7b664c9 | 3 | {
"blob_id": "db03557dfef23c781b45ecb6ff883418f7b664c9",
"branch_name": "refs/heads/master",
"committer_date": 1592757298000,
"content_id": "09f97d322f7548f02cc52579b24254787dda4d3e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "be88364bdcb3eb3bcf18bdaa9f8adfdf897f72bb",
"extension": "py"... | 2.578125 | stackv2 | import logging
import threading
import config
from dahua import DahuaController, Status
class BruteThread(threading.Thread):
def __init__(self, brute_queue, screenshot_queue):
threading.Thread.__init__(self)
self.brute_queue = brute_queue
self.screenshot_queue = screenshot_queue
... | 53 | 36.6 | 106 | 20 | 443 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_42231c892efe5354_f4340a2f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive dat... | [
26,
29,
35
] | [
null,
null,
null
] | [
27,
27,
27
] | [
85,
85,
106
] | |
2024-11-18T20:23:25.270849+00:00 | 1,609,267,873,000 | 3b35894ec9d49ba1524d057142854a0be859bb15 | 3 | {
"blob_id": "3b35894ec9d49ba1524d057142854a0be859bb15",
"branch_name": "refs/heads/master",
"committer_date": 1609267873000,
"content_id": "048836e691d10f21c391bf749fcfacb54e6cb499",
"detected_licenses": [
"MIT"
],
"directory_id": "d0c00685d91b73273acd8d0eaa1f4190afca2bc2",
"extension": "py",
"fi... | 2.734375 | stackv2 | #### Convert the (vougen)rsc File to csv
#### PEZHMAN SHAFIGH 2019
import os
import re
import csv
import datetime
file_in = 'users.rsc'
file_ou = 'users.csv'
num_lines = sum(1 for line in open(file_in))
with open(file_in) as file_object:
string = ''
for line in file_object:
string += line.rstrip()... | 35 | 26.94 | 59 | 16 | 303 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_3881631829804fdb_6ab9dd80", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
34
] | [
null
] | [
25
] | [
35
] | |
2024-11-18T20:23:34.425391+00:00 | 1,639,626,651,000 | 9df8c19b187d0ca54a6806ed8102c61b28059bed | 2 | {
"blob_id": "9df8c19b187d0ca54a6806ed8102c61b28059bed",
"branch_name": "refs/heads/master",
"committer_date": 1639626651000,
"content_id": "eee869426a094c36ead4fcc45421945e2f7b7a21",
"detected_licenses": [
"MIT"
],
"directory_id": "5b92ff560ab2e25f431c65b6add6adb022cb7aa7",
"extension": "py",
"fi... | 2.375 | stackv2 | #!/usr/bin/env python
import json
import requests
import logging
import watchtower
import os
from admanagerplusclient.connection import Connection
logging.basicConfig(level=logging.INFO)
logger = logging.getLogger(__name__)
env_name = "prod" if "prod" in os.environ.get('SMP_SETUP_DIR') else "dev"
logger.addHandler(wa... | 100 | 39.88 | 138 | 16 | 951 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d7e90c9b8fe21071_90cbb9d0", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
63,
61
] | [
null,
null
] | [
17,
17
] | [
96,
109
] | |
2024-11-18T20:23:41.579706+00:00 | 1,517,289,115,000 | 3f95fc6028f33f85b985803deb7a7ef3efe6e31f | 2 | {
"blob_id": "3f95fc6028f33f85b985803deb7a7ef3efe6e31f",
"branch_name": "refs/heads/master",
"committer_date": 1517289115000,
"content_id": "5a083af9bae7d63a0d9a473ba521361b29fd6ae2",
"detected_licenses": [
"Apache-2.0",
"MIT",
"BSD-2-Clause"
],
"directory_id": "f1b759605f5be03b9059f854b6a2bc7... | 2.390625 | stackv2 | from __future__ import print_function
import json, re, os, operator, urllib, argparse
import praw
from praw.exceptions import APIException
import prawcore
import ImgurBot
import VideoBot
import bmemcached
import SlaveBot
import GfycatBot
import moviepy.editor as mp
class RiskyClickerBot:
def __init__(self, herok... | 371 | 34.09 | 139 | 21 | 2,939 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b8fd69ed950ec2d5_76394610", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imgur.com/](1) may be at an arbitrary position in the ... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-1333"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/overly-large-range",
"py/redos"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [imgur.com/](1) may be at an arbitrary position in the sanitized URL.",
"The string [gfycat.com/](1) may be at an arbitrary position in the sanitized URL.",
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",
"This part of the regular expression... | [
37,
64,
98,
98
] | [
null,
null,
null,
null
] | [
12,
14,
53,
34
] | [
40,
43,
56,
101
] | |
2024-11-18T20:48:57.922842+00:00 | 1,619,391,911,000 | 685b753162526806fb643720ab365603031877a0 | 2 | {
"blob_id": "685b753162526806fb643720ab365603031877a0",
"branch_name": "refs/heads/master",
"committer_date": 1619391911000,
"content_id": "40038e5a8c478e91a7863b4ae568d20ceebfaa63",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bb51d23687a6ff9cc10620455c74055b78a3082b",
"extension": "py"... | 2.453125 | stackv2 | import os
import sys
import tarfile
import argparse
import pathlib
import urllib.request as request
from google_drive_downloader import GoogleDriveDownloader as gdd
from scipy import io
import glob
# The URL where the CVPR2016 FLOWERS data can be downloaded.
# https://github.com/reedscot/cvpr2016
# http://www.robots.o... | 105 | 40.31 | 123 | 17 | 1,161 | python | [{"finding_id": "codeql_py/tarslip_9251bfd516ca02e6_789a4995", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/tarslip",
"py/tarslip"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1).",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
59,
71
] | [
null,
null
] | [
5,
5
] | [
49,
40
] | |
2024-11-18T20:50:51.603906+00:00 | 1,487,824,817,000 | 9851fd65b8ff4d415b6f8431ad90d100256a9f92 | 2 | {
"blob_id": "9851fd65b8ff4d415b6f8431ad90d100256a9f92",
"branch_name": "refs/heads/master",
"committer_date": 1487824817000,
"content_id": "2ec7175f2c406ed09f3ad99a53707ef6c785dcde",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "69c0174cbc7acea6f55ef725d1e669e08c977dd6",
"extension": "py"... | 2.390625 | stackv2 | # Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under th... | 36 | 35.92 | 92 | 13 | 288 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f04b016f92124e77_fcab3c72", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
36
] | [
null
] | [
16
] | [
65
] | |
2024-11-18T20:50:53.432398+00:00 | 1,597,492,448,000 | 385ed17f16a9f470c4b4e8e6de8a35428e9d2b7c | 3 | {
"blob_id": "385ed17f16a9f470c4b4e8e6de8a35428e9d2b7c",
"branch_name": "refs/heads/master",
"committer_date": 1597492448000,
"content_id": "d3b57b607d807b2f8d59b06f11c069f726a3f4ff",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "8bcce040afc41a91056ee44f9853df610c34f7cf",
"extension": "p... | 2.625 | stackv2 | import hashlib
import string
import random
def random_string(string_length=20):
letters = string.ascii_letters
return ''.join(random.choice(letters) for i in range(string_length))
def new_account(redis):
redis.incr("uids")
uid = redis.get("uids")
passwd = random_string()
pipe = redis.pipelin... | 59 | 33.8 | 72 | 13 | 624 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_39209f5970e13050_54ccd42a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
17
] | [
null
] | [
14
] | [
40
] | |
2024-11-18T20:50:54.311782+00:00 | 1,693,279,486,000 | 664ce27a2290fca1c5aed6b735f925762db357fe | 3 | {
"blob_id": "664ce27a2290fca1c5aed6b735f925762db357fe",
"branch_name": "refs/heads/main",
"committer_date": 1693279486000,
"content_id": "4a414fe7adc8346047d9be6bb285b9290318bd8c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5e6221deeb03b53957c1c24754fd81370587c743",
"extension": "py",
... | 2.5625 | stackv2 | """
Helpers for madgraph
"""
from __future__ import annotations
import logging
import multiprocessing
import re
import shutil
import sys
from pathlib import Path
import in_place
from jinja2 import StrictUndefined, Template
from mapyde.typing import ImmutableConfig
logging.basicConfig()
log = logging.getLogger()
... | 362 | 36.69 | 157 | 23 | 3,271 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5452a9090cd55d94_0323157d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
241,
223
] | [
243,
null
] | [
9,
9
] | [
10,
66
] | |
2024-11-18T21:13:47.331614+00:00 | 1,616,495,279,000 | 8ad9f198ed72e80206626ab78965b4ad435c214f | 3 | {
"blob_id": "8ad9f198ed72e80206626ab78965b4ad435c214f",
"branch_name": "refs/heads/main",
"committer_date": 1616495279000,
"content_id": "5dd44f1c120f256b5f85bdf642e4cc0da79e04a5",
"detected_licenses": [
"MIT"
],
"directory_id": "0804c9f4d46e15a93a4322808b487eb00c28da95",
"extension": "py",
"file... | 3.234375 | stackv2 | from flask import Flask, request, g
app = Flask(__name__)
@app.before_first_request
def first_request():
print ("This function is run before first request")
@app.before_request
def each_request():
g.user='guest'
print ("This is run before {} visits '{}'".format(g.user, request.path))
@app.after_request
d... | 24 | 27.62 | 96 | 11 | 159 | python | [{"finding_id": "codeql_py/reflective-xss_882bfc4e8c86e21b_e256326c", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
20
] | [
null
] | [
12
] | [
72
] | |
2024-11-18T21:13:47.385105+00:00 | 1,686,919,876,000 | af02e595124c971a56c1e2cea8003b52fb6672c3 | 2 | {
"blob_id": "af02e595124c971a56c1e2cea8003b52fb6672c3",
"branch_name": "refs/heads/master",
"committer_date": 1686920835000,
"content_id": "7464ba0f4cb84722ee3a4d55b5018fb335e84e04",
"detected_licenses": [
"MIT"
],
"directory_id": "5a09825ce30b58b75a04f0cfff355207991ffd1e",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/env python3
"""This module contain a "download-scripts" subcommand for the airgap
resource."""
import os
from itertools import groupby
from os.path import abspath, basename, dirname, join
import requests
from cbw_api_toolbox.cbw_api import CBWApi
SH_EXECUTE_SCRIPT = """#!/bin/bash
set -eu
readonly DIR=... | 134 | 32.96 | 88 | 15 | 1,033 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c1b115856ee928c1_739d1807", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-732"
] | [
"py/request-without-cert-validation",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"Overly permissive mask in chmod sets file to world readable."
] | [
91,
125
] | [
null,
null
] | [
18,
9
] | [
71,
36
] | |
2024-11-18T21:13:47.820655+00:00 | 1,693,318,965,000 | ce493445059f08ab78bd8d7a79b37d65a7f329d1 | 3 | {
"blob_id": "ce493445059f08ab78bd8d7a79b37d65a7f329d1",
"branch_name": "refs/heads/master",
"committer_date": 1693318965000,
"content_id": "10b3d75ad848b88e55ceba1af7ea4071154a5e5a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "29eac50cc208d8aaebde699e8c851ed84b2de591",
"extension": "py"... | 2.546875 | stackv2 | """
About the speech_commands corpus
This is a set of one-second .wav audio files, each containing a single spoken English word or background noise.
These words are from a small set of commands, and are spoken by a variety of different speakers.
This data set is designed to help train simple machine learning models.
It... | 402 | 36.29 | 120 | 19 | 3,365 | python | [{"finding_id": "codeql_py/tarslip_d4963ebba58760e9_fb7148c5", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
88
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T21:13:53.169424+00:00 | 1,610,140,135,000 | 72a1ae83543a865886d50f580b2b8f61a50fec11 | 2 | {
"blob_id": "72a1ae83543a865886d50f580b2b8f61a50fec11",
"branch_name": "refs/heads/master",
"committer_date": 1610140135000,
"content_id": "e38696794d1cb5364ec53a5a4a8fc1b1faa4123e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b19a334e253bbcab8889e502c5fe0c87c4f227c7",
"extension": "py"... | 2.375 | stackv2 | '''Arsenal API bulk tags.'''
# Copyright 2015 CityGrid Media, LLC
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required ... | 120 | 36.65 | 113 | 20 | 989 | python | [{"finding_id": "codeql_py/log-injection_d53e528d15dbabe1_a7200d30", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
104,
112,
119
] | [
null,
113,
null
] | [
19,
23,
19
] | [
53,
71,
82
] | |
2024-11-18T21:14:01.066201+00:00 | 1,318,428,684,000 | b04586d4d77553300fac90221dab8e1ef215cbd6 | 2 | {
"blob_id": "b04586d4d77553300fac90221dab8e1ef215cbd6",
"branch_name": "refs/heads/master",
"committer_date": 1318428684000,
"content_id": "677c393e86fb4046d67e91b9a0284d8ac71389b0",
"detected_licenses": [
"MIT"
],
"directory_id": "6751e291b2305a5f1aa983e8aa3cdf61f916b1e7",
"extension": "py",
"fi... | 2.390625 | stackv2 | import glob
import os
from BaseHTTPServer import BaseHTTPRequestHandler, HTTPServer
import cgi
import threading
class JSRPCServer(HTTPServer, threading.Thread):
def __init__(self, io, **kargs):
self.io = io
self.config = {'interface': '', 'port': 8080, 'handler': JSRPCRequestHandler, 'htt... | 80 | 32.83 | 110 | 16 | 586 | python | [{"finding_id": "codeql_py/path-injection_48e2c06aabd096cc_43a5961a", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 2 | true | [
"CWE-022",
"CWE-022"
] | [
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](2)."
] | [
34,
69
] | [
null,
null
] | [
22,
22
] | [
70,
31
] | |
2024-11-18T21:14:20.108642+00:00 | 1,610,287,687,000 | 34cf0b250d65e18acf7147cf29e0005a797694ea | 3 | {
"blob_id": "34cf0b250d65e18acf7147cf29e0005a797694ea",
"branch_name": "refs/heads/master",
"committer_date": 1610287687000,
"content_id": "5bf6df012005a829f83e129b4812238e3b4a4435",
"detected_licenses": [
"MIT"
],
"directory_id": "88baa949f65a25cb12c67c8750145bd0b833406f",
"extension": "py",
"fi... | 2.75 | stackv2 | import re
import json
import tarfile
from pathlib import Path
from PIL import Image
from torch.utils.data import Dataset
from torchvision.datasets.utils import download_url
from horch.datasets.utils import download_google_drive
SPLIT_FILES = {
"train": {
"name": "train.tar",
"md5": "5e2cf0c808741e... | 126 | 33.05 | 95 | 14 | 1,084 | python | [{"finding_id": "codeql_py/tarslip_62c41a975bdc0459_324793d8", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
124
] | [
null
] | [
13
] | [
16
] | |
2024-11-18T21:14:23.665091+00:00 | 1,630,974,272,000 | 4db7e39995a1fe56675d3778b765f3e83b0283ad | 2 | {
"blob_id": "4db7e39995a1fe56675d3778b765f3e83b0283ad",
"branch_name": "refs/heads/main",
"committer_date": 1630974272000,
"content_id": "9f2964272495866ac0392bea7ad7b0c99b80cd97",
"detected_licenses": [
"MIT"
],
"directory_id": "ba0dc07e0b5a4b3253c6ac82fb5e8bbd23732994",
"extension": "py",
"file... | 2.34375 | stackv2 | import teraexport
import argparse
import sys
import os
import stat
args = sys.argv[1:]
parser = argparse.ArgumentParser(
prog=u'sc-tera-export',
description=u'Mobilize.NET Teradata Code Export Tools' +
'Version ' + teraexport.__version__)
parser.add_argument(
u'-S', u'--server',
... | 108 | 30.5 | 122 | 14 | 865 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_b09f4d4e6858ec21_7dfd165b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
85
] | [
null
] | [
20
] | [
28
] | |
2024-11-18T21:14:33.797985+00:00 | 1,433,573,861,000 | afc4a940454e6464dfbd5a2ecca552caba6ae7af | 2 | {
"blob_id": "afc4a940454e6464dfbd5a2ecca552caba6ae7af",
"branch_name": "refs/heads/master",
"committer_date": 1433573861000,
"content_id": "6420848d271644124e812d2fa86b0679c2881bcd",
"detected_licenses": [
"MIT"
],
"directory_id": "cc29cfeebcd0d804daed465c111fe6589cc27f53",
"extension": "py",
"fi... | 2.5 | stackv2 | #!/usr/bin/env python2.7
import logging, sys, traceback
import telstrasmsapi
from urlparse import parse_qsl
logger = logging.getLogger('telstra-sms')
try:
import config
except ImportError:
raise RuntimeError("no config")
class BadRequest(Exception):
pass
def send_sms_message(params, environ):
try... | 96 | 27.4 | 78 | 14 | 663 | python | [{"finding_id": "codeql_py/stack-trace-exposure_db87dcbc819b6789_f566d2fe", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
63
] | [
null
] | [
16
] | [
26
] | |
2024-11-18T21:14:43.023735+00:00 | 1,693,452,038,000 | 4d1851a05a33ae6087fa736f65ed586c5b25b294 | 3 | {
"blob_id": "4d1851a05a33ae6087fa736f65ed586c5b25b294",
"branch_name": "refs/heads/master",
"committer_date": 1693452038000,
"content_id": "bd23858e95f11918cee3d21e84e430df522e56f8",
"detected_licenses": [
"MIT",
"BSD-3-Clause",
"Apache-2.0"
],
"directory_id": "0760fb4901a75766921a205b55686d6... | 2.625 | stackv2 | # flake8: noqa
# fmt: off
from typing import List
# __textbot_setup_start__
import asyncio
import logging
from queue import Empty
from fastapi import FastAPI
from starlette.responses import StreamingResponse
from transformers import AutoModelForCausalLM, AutoTokenizer, TextIteratorStreamer
from ray import serve
lo... | 348 | 27.97 | 88 | 21 | 2,226 | python | [{"finding_id": "codeql_py/log-injection_1f678efae5410c4e_00c82071", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
40,
134,
280
] | [
null,
null,
null
] | [
21,
29,
21
] | [
46,
54,
46
] | |
2024-11-18T20:10:33.906651+00:00 | 1,589,785,322,000 | dcdb7dc98a25dd440068de85c6f3b9864a647a6e | 3 | {
"blob_id": "dcdb7dc98a25dd440068de85c6f3b9864a647a6e",
"branch_name": "refs/heads/master",
"committer_date": 1589785322000,
"content_id": "93764067a975111980739a5a6b68f5765cb9e947",
"detected_licenses": [
"MIT"
],
"directory_id": "b3b0aaf5372df26d2386dab3313ed06c58fe6bad",
"extension": "py",
"fi... | 2.578125 | stackv2 | from lib.icrypto import ICrypto
from lib.exceptions import ImageAuthoringError
from lib.util import read_file_in_chunks, get_stack
import logging
import os
import json
import time
import datetime
import zipfile
from shutil import rmtree
from lib.image_verification_error import ImageVerificationError
log = logging.ge... | 323 | 39.07 | 131 | 26 | 2,801 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_31ff01abad6c9137_0e6cb1bd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
115
] | [
null
] | [
19
] | [
57
] | |
2024-11-18T20:10:52.482877+00:00 | 1,618,756,997,000 | 207130a39d69dc0a07d79468bdd002436225a47e | 3 | {
"blob_id": "207130a39d69dc0a07d79468bdd002436225a47e",
"branch_name": "refs/heads/main",
"committer_date": 1618756997000,
"content_id": "888f1a0c9dc6c555ce0fce3828b8bd711f2d11b3",
"detected_licenses": [
"MIT"
],
"directory_id": "0a7ebf1ccc4f0f7d373c28802af567dab8ef06e2",
"extension": "py",
"file... | 2.90625 | stackv2 | from bs4 import BeautifulSoup
import requests
from urllib.parse import urljoin
from flask import Flask
from flask import render_template
from flask import request
baseUrl="http://keeranrichardson.com/"
class WebPage:
def __init__(self, url):
self.url = url
def findLinks(self):
self.statusCod... | 147 | 24.51 | 105 | 15 | 850 | python | [{"finding_id": "codeql_py/full-ssrf_616c80cbf5aa617e_8fe63c10", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 2 | true | [
"CWE-918",
"CWE-918"
] | [
"py/full-ssrf",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1).",
"The full URL of this request depends on a [user-provided value](1)."
] | [
21,
54
] | [
null,
null
] | [
21,
33
] | [
43,
56
] | |
2024-11-18T20:48:23.088032+00:00 | 1,693,494,236,000 | cfba223c33fc38a441c3b519dc36df3a805b9b11 | 2 | {
"blob_id": "cfba223c33fc38a441c3b519dc36df3a805b9b11",
"branch_name": "refs/heads/master",
"committer_date": 1693494236000,
"content_id": "6e732b44baff69335c6dc982d20c2e5e5fbfeb3a",
"detected_licenses": [
"MIT"
],
"directory_id": "96a34a048c783a75736bf0ec775df22142f9ee53",
"extension": "py",
"fi... | 2.3125 | stackv2 | """ Defines **async** handlers for socket.io server
SEE https://pypi.python.org/pypi/python-socketio
SEE http://python-socketio.readthedocs.io/en/latest/
"""
import logging
from typing import Any
from aiohttp import web
from models_library.users import UserID
from servicelib.aiohttp.observer import emit
from... | 195 | 33.48 | 93 | 17 | 1,443 | python | [{"finding_id": "codeql_py/log-injection_1788759af8e44160_051dabb1", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
52
] | [
null
] | [
58
] | [
81
] | |
2024-11-18T20:48:28.611198+00:00 | 1,381,451,865,000 | ac30fe9f14a138d08272d3f55f34ba3b5f1cc789 | 2 | {
"blob_id": "ac30fe9f14a138d08272d3f55f34ba3b5f1cc789",
"branch_name": "refs/heads/master",
"committer_date": 1381451865000,
"content_id": "3ac4b65599af80352787ed2472f6680472d3d4db",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "0ab9ccab9673a87716f34ae992f5450c771d9ac6",
"extension": "p... | 2.4375 | stackv2 | import bcrypt
import sqlite3
import peewee as pw
from WCSUGaming import app, g
from contextlib import closing
from datetime import datetime
def init_db():
User.create_table()
Page.create_table()
Post.create_table()
P_Session.create_table()
admin = User.create(
name='admin',
password... | 373 | 30.47 | 128 | 19 | 2,558 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7249d8b12e5f891e_9a6642b3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
45
] | [
null
] | [
29
] | [
42
] | |
2024-11-18T20:48:29.629108+00:00 | 1,597,713,759,000 | 365bfe903dad9b673dbb5dd0f994a1e092d34e99 | 2 | {
"blob_id": "365bfe903dad9b673dbb5dd0f994a1e092d34e99",
"branch_name": "refs/heads/master",
"committer_date": 1597713759000,
"content_id": "c79f1cf8551a2c35b58bfd665d654b6d4afbf9fa",
"detected_licenses": [
"MIT"
],
"directory_id": "51e498cb84ead6f220d860a44c88f193136a0321",
"extension": "py",
"fi... | 2.3125 | stackv2 | # -*- coding: utf-8 -*-
"""MySQL prerequisite."""
import logging
import os
from spet.lib.utilities import download
from spet.lib.utilities import execute
from spet.lib.utilities import extract
from spet.lib.utilities import prettify
class MySQL:
"""MySQL prerequisite.
Args:
mysql_ver (str): Version... | 114 | 29.62 | 79 | 14 | 757 | python | [{"finding_id": "codeql_py/overly-permissive-file_053753a60b9178b8_76897910", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to group readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to group readable."
] | [
103
] | [
null
] | [
9
] | [
35
] | |
2024-11-18T20:48:31.252863+00:00 | 1,618,749,402,000 | abc1fef0fbf061f6871b68ba9e927ad98ef96f9f | 3 | {
"blob_id": "abc1fef0fbf061f6871b68ba9e927ad98ef96f9f",
"branch_name": "refs/heads/master",
"committer_date": 1618749402000,
"content_id": "13c37e2d0773ee15c98674da33385e92fabdc4ce",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2a718238004855786b86143acb429ec0af8cd3df",
"extension": "py"... | 2.984375 | stackv2 | #!/home/bemootzer/anaconda3/envs/bahnfail/bin/python
"""Module handles connections to MySQL databases"""
import mysql.connector
from mysql.connector import MySQLConnection, Error
import datetime
class DatabaseWrapper():
""" Handles everything related to the database. """
class Timer():
"""Measures ... | 94 | 29.14 | 94 | 17 | 545 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_eec555c773c8bb1b_9b02bb25", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
32
] | [
36
] | [
19
] | [
41
] | |
2024-11-18T21:11:29.425766+00:00 | 1,582,399,903,000 | 1a6e861297c67780ef73f3a6f5663624b2b4f2c8 | 2 | {
"blob_id": "1a6e861297c67780ef73f3a6f5663624b2b4f2c8",
"branch_name": "refs/heads/master",
"committer_date": 1582399903000,
"content_id": "7176b5db7a4cdbe61e2ea0439869c2c65e5599e1",
"detected_licenses": [
"MIT"
],
"directory_id": "c173687c8760f22bab0da249cbc1de7870313f98",
"extension": "py",
"fi... | 2.34375 | stackv2 | import os
import shutil
import glob
import pylidc as pl
from pylidc import utils as plutils
import matplotlib.pyplot as plt
import numpy as np
from numpy import savez_compressed
from unet3d.utils import dicom_util
from unet3d.utils import utils
import skimage
import scipy
from multiprocessing import Pool
from skimage.s... | 367 | 37.9 | 139 | 18 | 3,629 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_941f11e0f64361ba_c6bf15da", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 10 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (priva... | [
271,
212,
208,
189,
260,
195,
215,
177,
249,
186
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
44,
32,
30,
50,
51,
48,
42,
31,
43,
70
] | [
54,
42,
40,
60,
61,
58,
52,
41,
53,
80
] | |
2024-11-18T21:11:31.825618+00:00 | 1,690,244,544,000 | 642a9f5fdf863a365643bd548e359c7de2f18419 | 3 | {
"blob_id": "642a9f5fdf863a365643bd548e359c7de2f18419",
"branch_name": "refs/heads/master",
"committer_date": 1690244544000,
"content_id": "aad9d27b7b88a1231cbd8261b4dbb01aef18bd15",
"detected_licenses": [
"MIT"
],
"directory_id": "9249947c07f8addf64dd3d2a2f9f37d379f83921",
"extension": "py",
"fi... | 2.703125 | stackv2 | #!/usr/bin/env python
import time
from hashlib import md5
from gluon.dal import DAL
def motp_auth(db=DAL('sqlite://storage.sqlite'),
time_offset=60):
"""
motp allows you to login with a one time password(OTP) generated on a motp client,
motp clients are available for practically all platfo... | 111 | 40.37 | 119 | 19 | 1,038 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_a2d29e47a0165efd_d4543054", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure."
] | [
87
] | [
null
] | [
24
] | [
31
] | |
2024-11-18T21:11:39.019007+00:00 | 1,633,964,634,000 | fdd87eb1c420e528dacbee81139d392dba368936 | 3 | {
"blob_id": "fdd87eb1c420e528dacbee81139d392dba368936",
"branch_name": "refs/heads/main",
"committer_date": 1633964634000,
"content_id": "2f6fc574055e457e654c5ed1942e7930f2fb4ea8",
"detected_licenses": [
"MIT"
],
"directory_id": "8c57118c62ff00755a6f4d2e578e584d65504228",
"extension": "py",
"file... | 2.703125 | stackv2 | """Handles everything related to the Chrome and Selenium drivers"""
import os
import sys
import tempfile
import zipfile
from io import BytesIO
from pathlib import Path
from typing import Optional
import pefile # type: ignore
import requests
from loguru import logger
__author__ = "Brian Seel"
__copyright__ = "Brian S... | 97 | 35.06 | 108 | 16 | 845 | python | [{"finding_id": "codeql_py/overly-permissive-file_7f9d7888082f5a37_eef8e504", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
95
] | [
null
] | [
13
] | [
35
] | |
2024-11-18T21:26:02.159201+00:00 | 1,463,428,018,000 | 6b902219709619f8f1759da4138da5193e1add9e | 3 | {
"blob_id": "6b902219709619f8f1759da4138da5193e1add9e",
"branch_name": "refs/heads/master",
"committer_date": 1463428018000,
"content_id": "8218a2606276e5cc3d6e21762ab486c20b3ccfaa",
"detected_licenses": [
"Unlicense"
],
"directory_id": "3b84c5c611c4d05684f27a6d6ea5f078c239cea8",
"extension": "py",... | 2.515625 | stackv2 | # coding: utf-8
# In[63]:
import jinja2
import argparse
import csv
import os
# In[65]:
parser = argparse.ArgumentParser(description="Fill template with CSV data.")
parser.add_argument('--template', '-t', help="template file to use", required=True)
parser.add_argument('--output-dir', '-o', help="where to store fil... | 55 | 29.02 | 109 | 20 | 360 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_9f2dc9934f2d65d0_5898ad9f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
34
] | [
45
] | [
7
] | [
20
] | |
2024-11-18T21:26:07.945157+00:00 | 1,458,689,318,000 | 06c30541dd39c2ef0eb9a4e6638873e96e4adbe5 | 2 | {
"blob_id": "06c30541dd39c2ef0eb9a4e6638873e96e4adbe5",
"branch_name": "refs/heads/master",
"committer_date": 1458689318000,
"content_id": "6833bab70a1d41c7338b192d0134ab87aeb963f5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "62a499631282495f3182511c3cf917f9485bde56",
"extension": "py"... | 2.390625 | stackv2 |
import os
import datetime
import random
import jinja2
from wtforms import Form, RadioField, validators
import base
from organization import Organization
from question_db import MultipleChoiceQuestion
import page_db
jinja_environment = jinja2.Environment(
loader=jinja2.FileSystemLoader(
os.path.join(
... | 122 | 27.93 | 89 | 14 | 717 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_66083bbe72186531_bbf474af", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
16
] | [
23
] | [
21
] | [
2
] | |
2024-11-18T21:26:10.985655+00:00 | 1,681,669,999,000 | 5e3b525d8c1b771c064e775a09aa341e4bff2e32 | 3 | {
"blob_id": "5e3b525d8c1b771c064e775a09aa341e4bff2e32",
"branch_name": "refs/heads/master",
"committer_date": 1681669999000,
"content_id": "cbf2959728d8676bdf49bb6467c0b4de7d457c94",
"detected_licenses": [
"MIT"
],
"directory_id": "9f5065cd1b8e6269097f9a203a0796197387001a",
"extension": "py",
"fi... | 2.546875 | stackv2 | from flask import render_template, request, flash, redirect
import werkzeug
import statbotics_api
import traceback
import scouting.Page
import scouting.Element
ELEMENT_TYPES = {
"number": scouting.Element.ElementNumber,
"radio": scouting.Element.ElementSelect,
"checkbox": scouting.Element.ElementCheckbox,... | 119 | 35.92 | 133 | 18 | 873 | python | [{"finding_id": "codeql_py/url-redirection_ae259e0728b7798e_dff51d06", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 3 | true | [
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
67,
98,
109
] | [
null,
null,
null
] | [
25,
29,
25
] | [
37,
41,
37
] | |
2024-11-18T21:52:17.064363+00:00 | 1,636,011,621,000 | 1417a10ab413545ef8d4972b7648ac7b4607a55c | 2 | {
"blob_id": "1417a10ab413545ef8d4972b7648ac7b4607a55c",
"branch_name": "refs/heads/main",
"committer_date": 1636011621000,
"content_id": "a4e9ca65bfcbcc28de8e1546c16646f3078ff0ec",
"detected_licenses": [
"MIT"
],
"directory_id": "25d1b14d1239277a4ac7db06998ac7a78a0b7579",
"extension": "py",
"file... | 2.484375 | stackv2 | # -*- coding: UTF-8 -*-
from flask import Flask, jsonify, redirect, make_response
import requests
import json
from bs4 import BeautifulSoup
import re
app = Flask(__name__)
# author: https://github.com/Zfour
def github_json(owner, repo, branch):
source_url = 'https://raw.githubusercontent.com/' + owner + '/' + rep... | 38 | 32.82 | 124 | 13 | 317 | python | [{"finding_id": "codeql_py/partial-ssrf_331e44fdd60a489b_0db11523", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).\nPart of the URL of this request depends on a [user-provided value](3).\nPart of the URL of this request depends on a [user-provided value](4).\nPart of the URL of this req... | [
13
] | [
null
] | [
11
] | [
35
] | |
2024-11-18T21:52:26.009596+00:00 | 1,628,940,141,000 | 07a06fd722b7c5ff221957261a9bf2a4b48e803a | 3 | {
"blob_id": "07a06fd722b7c5ff221957261a9bf2a4b48e803a",
"branch_name": "refs/heads/main",
"committer_date": 1628940141000,
"content_id": "0dd3bf160072d94891f9fb16f6ec22cf5f7e0751",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "4a84b29149592e804e7e003193fd464614370795",
"extension": "py"... | 2.640625 | stackv2 | #! /usr/local/Python_envs/Python3/bin/python3
import paramiko
import time
from getpass import getpass
import re
version_pattern = re.compile(r'Cisco .+ Software, Version (\S+)')
model_pattern = re.compile(r'cisco (\S+).+bytes of memory\.')
serial_no_pattern = re.compile(r'Processor board ID (\S+)')
uptime_pattern = re... | 62 | 30.06 | 70 | 14 | 548 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_4283541fe8f72d28_1c158890", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
27
] | [
null
] | [
3
] | [
64
] | |
2024-11-18T20:31:24.984595+00:00 | 1,546,496,614,000 | 2c96890b1d3dc1a1c5f8e7ed788daa43b21c4e68 | 2 | {
"blob_id": "2c96890b1d3dc1a1c5f8e7ed788daa43b21c4e68",
"branch_name": "refs/heads/master",
"committer_date": 1546496614000,
"content_id": "9cf2d314469a052a8b3a13f742bbd6528087e11c",
"detected_licenses": [
"MIT"
],
"directory_id": "a303929774cc1fd9ddf726ff340d298896de599b",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/env python2
# -*- coding: utf-8 -*-
"""A simple bot script.
This sample script leverages web.py (see http://webpy.org/). By default the
web server will be reachable at port 8080 - append a different port when
launching the script if desired. ngrok can be used to tunnel traffic back to
your server if you ... | 138 | 35.54 | 78 | 17 | 1,160 | python | [{"finding_id": "codeql_py/request-without-cert-validation_341bf68b833b64ab_209569ca", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
90
] | [
null
] | [
16
] | [
57
] | |
2024-11-18T20:31:35.809618+00:00 | 1,329,922,120,000 | cc83a065e3d434fbce9ced90a3f4fe84f9aef818 | 3 | {
"blob_id": "cc83a065e3d434fbce9ced90a3f4fe84f9aef818",
"branch_name": "refs/heads/master",
"committer_date": 1329922120000,
"content_id": "ef73d48d25a41dd3925ef9abef5b14493a253634",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bcfac4119be873f6f9e72125b04cb1080debb2e9",
"extension": "py"... | 2.578125 | stackv2 | # -*- coding: utf-8 -*-
import re
import operator
from urlparse import urlparse, urljoin
from goose.utils import FileHelper
from goose.parsers import Parser
from goose.images.Image import Image
from goose.images.ImageUtils import ImageUtils
KNOWN_IMG_DOM_NAMES = [
"yn-story-related-media",
"cnn_strylccimg300cn... | 418 | 34.55 | 91 | 24 | 3,022 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_cb2cc5ae078ffe96_9233fb23", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'atdmt.com', so it might match more ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'atdmt.com', so it might match more hosts than expected."
] | [
57
] | [
null
] | [
60
] | [
73
] | |
2024-11-18T21:00:02.573038+00:00 | 1,435,600,157,000 | 83ee87559ba4af63159e5230dc0a04ac4dcde076 | 2 | {
"blob_id": "83ee87559ba4af63159e5230dc0a04ac4dcde076",
"branch_name": "refs/heads/master",
"committer_date": 1435600157000,
"content_id": "63b32aa38e8abd27aaa6e1181e460584dff8dc28",
"detected_licenses": [
"MIT"
],
"directory_id": "87b18d817634c518818609ecd9c6ae334bc868a0",
"extension": "py",
"fi... | 2.375 | stackv2 |
from google.appengine.ext import ndb
import hashlib #we need this to safely store passwords
import logging
class Employee(ndb.Model):
workerID = ndb.StringProperty()
firstName = ndb.StringProperty()
lastName = ndb.StringProperty()
userName = ndb.StringProperty()
password = ndb.StringProperty()
percentJob =... | 59 | 19.76 | 64 | 15 | 276 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b31561ff73c16ae7_2832f87e", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp... | [
17,
21,
47
] | [
null,
null,
null
] | [
31,
31,
35
] | [
39,
39,
43
] | |
2024-11-18T21:10:23.809845+00:00 | 1,683,751,539,000 | d035dba030f1cd92dac62ab9243cd10c525cf737 | 2 | {
"blob_id": "d035dba030f1cd92dac62ab9243cd10c525cf737",
"branch_name": "refs/heads/master",
"committer_date": 1683751539000,
"content_id": "fb5a5a0922ddeaf968ae3998a242df895ea518ab",
"detected_licenses": [
"MIT"
],
"directory_id": "c0361bfbc44c64cb5c607d1745322136deed8fd8",
"extension": "py",
"fi... | 2.40625 | stackv2 | #!/usr/bin/env python
import sys
from flask import Flask, request, render_template
from werkzeug.exceptions import InternalServerError, BadRequest
from chandelier import Chandelier, BROADCAST
import function as src
import generator as g
import filter as f
import random as r
import common
from time import sleep, time
f... | 227 | 20.79 | 74 | 19 | 1,193 | python | [{"finding_id": "codeql_py/stack-trace-exposure_5e3b54856167d3a7_969f9079", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-094"
] | [
"py/stack-trace-exposure",
"py/code-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"This code execution depends on a [user-provided value](1)."
] | [
187,
184
] | [
null,
null
] | [
16,
21
] | [
17,
25
] | |
2024-11-18T21:10:29.249801+00:00 | 1,613,580,292,000 | 45a1cf2ebbc7521db17869413f49635067d554a9 | 3 | {
"blob_id": "45a1cf2ebbc7521db17869413f49635067d554a9",
"branch_name": "refs/heads/main",
"committer_date": 1613580292000,
"content_id": "ed1e2f07cca65e31d35917f56328d48217ecb880",
"detected_licenses": [
"MIT"
],
"directory_id": "bc62a94c7a606cbc12271026bddbf771d4af6588",
"extension": "py",
"file... | 2.609375 | stackv2 | from flask import Flask, request, abort
from linebot import (
LineBotApi, WebhookHandler
)
from linebot.exceptions import (
InvalidSignatureError
)
from linebot.models import (
MessageEvent, TextMessage, TextSendMessage,
)
import os
# 正規表現
import re
# しりとり用
from functions.judge import iskatahira, judger
#... | 102 | 24.72 | 86 | 19 | 730 | python | [{"finding_id": "codeql_py/log-injection_65d68e14bab040df_8ed51fb5", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
44
] | [
null
] | [
21
] | [
44
] | |
2024-11-18T21:10:38.914736+00:00 | 1,603,927,368,000 | 86a3dae282ddeb22d6ef33d40ae701696981ae21 | 3 | {
"blob_id": "86a3dae282ddeb22d6ef33d40ae701696981ae21",
"branch_name": "refs/heads/master",
"committer_date": 1603927368000,
"content_id": "f5b7759c6ab51cb16c85b186ca2328d834398963",
"detected_licenses": [
"MIT"
],
"directory_id": "db18ec5b15bfb0e043148460256458c4d8dc7be9",
"extension": "py",
"fi... | 3.25 | stackv2 | from VirtualCopernicusNG import TkCircuit
# initialize the circuit inside the
configuration = {
"name": "CopernicusNG Weather Forecast",
"sheet": "sheet_forecast.png",
"width": 400,
"height": 267,
"servos": [
{"x": 170, "y": 150, "length": 90, "name": "Servo 1", "pin": 17}
],
"but... | 105 | 24.04 | 117 | 13 | 884 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_43c6b892f4cfd8fe_df64d12d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
54
] | [
null
] | [
20
] | [
26
] | |
2024-11-18T21:10:53.175868+00:00 | 1,585,891,667,000 | 92beab7e3911857378498ae9f3807e63303065bc | 3 | {
"blob_id": "92beab7e3911857378498ae9f3807e63303065bc",
"branch_name": "refs/heads/master",
"committer_date": 1585891667000,
"content_id": "3e9fa865811246f92916c8569f0b7d433e979f93",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5901515deb3d26b6f95a378c467a879b9a480ef2",
"extension": "py"... | 3 | stackv2 | #
# Generates a twitter_configuration.ini file with Twitter Developers API Keys
from pathlib import Path
def get_mysql_configuration():
mysql_conf_dict = {}
mysql_conf_dict['HOST'] = input(
"Hostname (i.e. localhost): ")
mysql_conf_dict['USERNAME'] = input(
"MySQL Username: ")
mysql_c... | 78 | 30.26 | 81 | 13 | 585 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a47e2222d24d7bb7_ef55273b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (secret)](1) as clear text.",
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
47,
57,
61
] | [
null,
null,
null
] | [
20,
13,
13
] | [
64,
73,
81
] | |
2024-11-18T21:10:54.889985+00:00 | 1,568,157,380,000 | 22bdc7ea1bfd88d52fe7c2edcbf9abcc30c273b5 | 3 | {
"blob_id": "22bdc7ea1bfd88d52fe7c2edcbf9abcc30c273b5",
"branch_name": "refs/heads/master",
"committer_date": 1568157380000,
"content_id": "a8f06665c67e860adc35d58ac1c8440a01a56dde",
"detected_licenses": [
"MIT"
],
"directory_id": "6d6e68d76f1e03667aba5eea942e5d29d3c84347",
"extension": "py",
"fi... | 2.640625 | stackv2 | #! /usr/bin/python
from nibbler import *
import argparse
import os
import sys
import json
PATH = os.path.abspath(os.path.dirname(__file__))
def submit_button():
username = n.views['username'].stringValue()
password = n.views['password'].stringValue()
credentials = {
'username': username,
'password': password... | 60 | 26.17 | 75 | 12 | 392 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_63566cdaea88fb60_7300cbbd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
18
] | [
null
] | [
19
] | [
42
] | |
2024-11-18T21:23:38.137058+00:00 | 1,630,378,287,000 | ae6c135db34cea91152ef0b67cb2a7c128ad7beb | 3 | {
"blob_id": "ae6c135db34cea91152ef0b67cb2a7c128ad7beb",
"branch_name": "refs/heads/main",
"committer_date": 1630378287000,
"content_id": "b1081dfd7f588dd69ecad9d8f800e0ae7766af28",
"detected_licenses": [
"MIT"
],
"directory_id": "102c45acfd82161ca3115ecacfd79e5d9f3f0245",
"extension": "py",
"file... | 3.28125 | stackv2 | from io import TextIOWrapper
import random
passwords_file = open('password_generator_file.txt', 'a')
lowercase = []
for x in range(97, 123):
lowercase.append(chr(x))
uppercase = []
for x in range(65, 91):
uppercase.append(chr(x))
numbers = []
for x in range(48, 58):
numbers.append(chr(x))
special = []
for x ... | 45 | 20.73 | 57 | 9 | 283 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8dc0974b19cb7f34_baaeb9e5", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.\nThis expression stores [sensitive data (password)](4) as clear text.\nThis expression stores [sensitive d... | [
37,
43
] | [
null,
null
] | [
14,
7
] | [
18,
55
] | |
2024-11-18T21:23:48.887132+00:00 | 1,570,223,479,000 | 11234043b532a806c7081015cd67130367919191 | 3 | {
"blob_id": "11234043b532a806c7081015cd67130367919191",
"branch_name": "refs/heads/master",
"committer_date": 1570462039000,
"content_id": "0a123fa1688eac10d4a06c8779a479237ae423b6",
"detected_licenses": [
"MIT"
],
"directory_id": "8fa9e8aeb331865ccca8fe09ea2972790d2da705",
"extension": "py",
"fi... | 3.234375 | stackv2 | """Configuration settings for PPP package."""
from jinja2 import Environment, PackageLoader
import re
def question_number(question_num, max_length=4):
"""Splitting question number.
Splitting string first by separator chars, then separating
letters from numbers, and then splitting just by length.
All ... | 67 | 32.63 | 79 | 18 | 501 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_590a128244797faa_b663b65a", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
63
] | [
65
] | [
11
] | [
42
] | |
2024-11-18T21:37:31.890062+00:00 | 1,632,355,123,000 | f7b7d59447ae87b5d23fc287eca3156431ffad10 | 3 | {
"blob_id": "f7b7d59447ae87b5d23fc287eca3156431ffad10",
"branch_name": "refs/heads/master",
"committer_date": 1632355123000,
"content_id": "d10829a20252ed325fc3aad83c58d7e6710e25b9",
"detected_licenses": [
"MIT"
],
"directory_id": "77dc569cccfab88c362a74923c764b7050f39ed3",
"extension": "py",
"fi... | 2.671875 | stackv2 | """
Gleam: interactive visualizations in Python
"""
import os
import json
import urlparse
from collections import namedtuple
from flask import Flask, request, send_from_directory
from jinja2 import Environment, PackageLoader
GLEAM_STATIC_DIR = os.path.join(os.path.split(__file__)[0], "static")
class InputData(obj... | 62 | 28.4 | 69 | 18 | 380 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_845456dfaf110d33_b66aaa0f", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
26
] | [
null
] | [
15
] | [
70
] | |
2024-11-18T21:37:35.029550+00:00 | 1,563,595,938,000 | 2d337f3f1be7ae8d32bcc4f5fc405a573fc2d3a1 | 3 | {
"blob_id": "2d337f3f1be7ae8d32bcc4f5fc405a573fc2d3a1",
"branch_name": "refs/heads/master",
"committer_date": 1563595938000,
"content_id": "9a6b80cec8d2a03934e361389697d8b8681ad77c",
"detected_licenses": [
"MIT"
],
"directory_id": "34297adea85466988fa0b194e1dcc1c3ba22aa15",
"extension": "py",
"fi... | 2.828125 | stackv2 | from jinja2 import Environment, FileSystemLoader
from os.path import join
from src.yaml_util import YamlUtil
class SubstitutionException(Exception):
pass
class TemplateManager:
'''
Maintain the template environment and yaml loader
Perform substitutions into templates inside the current environment
... | 27 | 30.37 | 71 | 15 | 156 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_738f09c5849001e2_5fddb167", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
15
] | [
18
] | [
36
] | [
40
] | |
2024-11-18T21:37:43.998197+00:00 | 1,572,425,479,000 | fcd98a23e27369277f66b7fd1424f8ee22a8957d | 3 | {
"blob_id": "fcd98a23e27369277f66b7fd1424f8ee22a8957d",
"branch_name": "refs/heads/master",
"committer_date": 1572425479000,
"content_id": "058515d87720acda0d32975ee966e9a320b46696",
"detected_licenses": [
"MIT"
],
"directory_id": "60ef015e042cf11744bed000909ca26addb150b0",
"extension": "py",
"fi... | 2.6875 | stackv2 | from __future__ import print_function, absolute_import
import os
import numpy as np
from imdb import Imdb
import xml.etree.ElementTree as ET
import cv2
class PascalVoc(Imdb):
"""
Implementation of Imdb for Pascal VOC datasets
Parameters:
----------
image_set : str
set to be used, can be t... | 178 | 32.11 | 122 | 18 | 1,261 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9d6c3aea753997a7_03bc3a86", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
165
] | [
null
] | [
23
] | [
29
] | |
2024-11-18T21:58:56.642010+00:00 | 1,669,222,436,000 | 1fc3315bede8eb08289fe9d8046fc56e4713574b | 3 | {
"blob_id": "1fc3315bede8eb08289fe9d8046fc56e4713574b",
"branch_name": "refs/heads/master",
"committer_date": 1669222436000,
"content_id": "406ff1478e8b1f4aa34dff9deaad74b2d9f677f1",
"detected_licenses": [
"MIT"
],
"directory_id": "9863f0cedd0b8e1b196d4b5edc5ae59b296956ba",
"extension": "py",
"fi... | 2.890625 | stackv2 | """Prepares MSCOCO-like dataset for the im2txt model"""
from datetime import datetime
import json
import logging
from pathlib import Path
from random import choices
import re
import shutil
import sys
from typing import Iterable, List, Tuple
import click
from os import path, walk
COCO_SPLIT_PROPORTIONS = {'val': 0.3,... | 236 | 27.31 | 82 | 16 | 1,523 | python | [{"finding_id": "codeql_py/overly-large-range_4acacea93083b07b_1566a679", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and overlaps with A-Z in the same character class, and is equivalent to \\[.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
47
] | [
null
] | [
33
] | [
36
] | |
2024-11-18T21:58:56.916959+00:00 | 1,600,510,514,000 | 038be5b4e31c030e17575bd071b417fd8235e090 | 3 | {
"blob_id": "038be5b4e31c030e17575bd071b417fd8235e090",
"branch_name": "refs/heads/master",
"committer_date": 1600510514000,
"content_id": "b16ec1a909cfb492a5ebd09432ae8567f24a4d38",
"detected_licenses": [
"MIT"
],
"directory_id": "ca968a0e135418bb8d70cdb75f4351cc1d8af9e9",
"extension": "py",
"fi... | 2.65625 | stackv2 | import os
import sys
import hmac
import hashlib
import time
import datetime
import base64
class Totp:
def __init__(self, interval, digits, iamuser, path):
self.interval = interval
self.digits = digits
self.iamuser = iamuser
self.path = path
def get_remaintime(self):
... | 76 | 34.75 | 113 | 18 | 806 | python | [{"finding_id": "codeql_py/overly-permissive-file_0e9e08277824fd10_6bb97d24", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
24
] | [
null
] | [
13
] | [
37
] | |
2024-11-18T21:58:58.421258+00:00 | 1,400,077,094,000 | 7fcf78fd9a11202b15104f9b062cb35f45495bde | 2 | {
"blob_id": "7fcf78fd9a11202b15104f9b062cb35f45495bde",
"branch_name": "refs/heads/master",
"committer_date": 1400077094000,
"content_id": "b956459d59b11278b8443a7b32e3f2789e48f9eb",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "a625f16b81247f92d22463c0ba564b887ec0183a",
"extension": "p... | 2.40625 | stackv2 | # This file is part of ZS
# Copyright (C) 2013-2014 Nathaniel Smith <njs@pobox.com>
# See file LICENSE.txt for license information.
import requests
import lxml.html
import re
import sys
import multiprocessing
import os
import os.path
import cPickle
import time
import json
OVERVIEW_URL = "http://storage.googleapis.com... | 353 | 34.63 | 140 | 18 | 3,244 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_3849362a9140f939_261db112", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
266
] | [
null
] | [
16
] | [
43
] | |
2024-11-18T21:59:05.270398+00:00 | 1,570,398,879,000 | 4ecd1696a7fd4a486b29324207abe763e18513b2 | 4 | {
"blob_id": "4ecd1696a7fd4a486b29324207abe763e18513b2",
"branch_name": "refs/heads/master",
"committer_date": 1570398879000,
"content_id": "15d55eb1b3281c3fe7b6c6237fa067c25091f1d5",
"detected_licenses": [
"MIT"
],
"directory_id": "d874d544f0380e250a69476ac640efb3d7033046",
"extension": "py",
"fi... | 3.84375 | stackv2 | import random
import string
def gen(length: int) -> str:
password = ""
while len(password) < length:
password += random.choice(string.ascii_letters + string.digits + string.punctuation)
return password
def check_password(password: str) -> bool:
nletter = 0
nint = 0
nspecial = 0
i =... | 39 | 21.26 | 92 | 13 | 223 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d3922ec73902744b_fe2e0d45", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.\nThis expression logs [sensitive data (passw... | [
36
] | [
null
] | [
11
] | [
19
] | |
2024-11-18T21:59:19.476567+00:00 | 1,513,780,363,000 | b76b5013a13a166531d70f9b0174d85601925295 | 2 | {
"blob_id": "b76b5013a13a166531d70f9b0174d85601925295",
"branch_name": "refs/heads/master",
"committer_date": 1513780399000,
"content_id": "da4693263d4dae0e741ab16b46269889e89fa616",
"detected_licenses": [
"MIT"
],
"directory_id": "d0a7c82c0f50fa68153b0deff56ed525d4699d32",
"extension": "py",
"fi... | 2.5 | stackv2 | """
Pluggable development environment.
Example to add a thread to this command, somewhere that will be imported at
startup (ie. yourproject/models.py if you added yourproject to
INSTALLED_APPS)::
import os
from crudlfap.management.commands.dev import Command, CommandThread
Command.threads.append(
... | 202 | 25.82 | 81 | 19 | 1,124 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7f6e04fd10004b27_7ab21a91", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
195
] | [
196
] | [
32
] | [
50
] | |
2024-11-18T22:11:31.022941+00:00 | 1,610,704,011,000 | 79e8049db73a945b3bceea1aa2252c05e4c2a16c | 4 | {
"blob_id": "79e8049db73a945b3bceea1aa2252c05e4c2a16c",
"branch_name": "refs/heads/main",
"committer_date": 1610704011000,
"content_id": "bb981e2379b8ea88204b4d038cd04afc0538ec23",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d4e2c1287d1427ae42bece28108dc4abf96c0dab",
"extension": "py",
... | 3.5625 | stackv2 | import sys
from math import sqrt
from datetime import datetime
def readfile():
f = open("location.txt", "r", encoding="utf8")
lines = f.readlines()
return lines
def createArray(lines,N):
cities = []
nCounter = 0
for line in lines:
if nCounter == N:
break
l = line.sp... | 80 | 25.2 | 108 | 20 | 639 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_229bc3b867530a28_4700e770", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.",
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
34,
36
] | [
null,
null
] | [
31,
31
] | [
108,
101
] | |
2024-11-18T22:11:36.302590+00:00 | 1,640,938,305,000 | e87406b194c2efc7c9c0671b67f276f3348862a1 | 2 | {
"blob_id": "e87406b194c2efc7c9c0671b67f276f3348862a1",
"branch_name": "refs/heads/master",
"committer_date": 1640938305000,
"content_id": "317c2de999f82fc42f69b5a66cf8d538c945bc0a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1a92815f85e7bd4cd6de59668915787631ad1771",
"extension": "py"... | 2.4375 | stackv2 | import requests,shutil,uuid
import threading
def down_img():
for i in range(100):
url = "https://weibo.com/signup/v5/pincode/pincode.php?lang=zh&sinaId=3a7cc9f0714cf8bacea0b44e67b7ea99"
resp = requests.get(url, verify=False, stream=True)
if resp.status_code == 200:
with open("i... | 18 | 31.78 | 111 | 19 | 175 | python | [{"finding_id": "codeql_py/request-without-cert-validation_f60da9a060d22b1e_8ebda605", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
8
] | [
null
] | [
16
] | [
60
] | |
2024-11-18T22:24:18.971815+00:00 | 1,615,545,154,000 | a46b8d88c9e4ff172684accc43ccde2d2ac4cf9a | 3 | {
"blob_id": "a46b8d88c9e4ff172684accc43ccde2d2ac4cf9a",
"branch_name": "refs/heads/main",
"committer_date": 1615545154000,
"content_id": "7e37433e18af25e9ee424101c6de80d9da8b0ab6",
"detected_licenses": [
"MIT"
],
"directory_id": "ca72ad5a3e2300ec02001bcce61bf96343e04b11",
"extension": "py",
"file... | 2.65625 | stackv2 | from models.User import User
from schemas.UserSchema import users_schema, user_schema
from models.Word import Word
from schemas.WordSchema import word_schema, words_schema
from models.SavedWord import SavedWord
from schemas.SavedWordSchema import savedword_schema, savedwords_schema
from main import db, bcrypt
from date... | 132 | 37.52 | 178 | 17 | 1,156 | python | [{"finding_id": "codeql_py/partial-ssrf_2b6bfc4a50a15838_67b72210", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
131
] | [
null
] | [
17
] | [
141
] | |
2024-11-18T22:35:56.584151+00:00 | 1,589,969,901,000 | 39bab7d31e918b154ac029b7de876e3ad16fad18 | 3 | {
"blob_id": "39bab7d31e918b154ac029b7de876e3ad16fad18",
"branch_name": "refs/heads/master",
"committer_date": 1589969901000,
"content_id": "e7a1469759d888ebed15605e47df8078a2bd75d6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7775fb7ba338e8707f559e0372a6d11a78f8c69f",
"extension": "py"... | 2.8125 | stackv2 | """
This code is based on the QM9 dataset from the pythorch-geometric package,
see: https://pytorch-geometric.readthedocs.io/en/latest/_modules/torch_geometric/datasets/qm9.html#QM9
"""
import os
from six.moves import urllib
import torch
from os import makedirs
import tarfile
import numpy as np
import scipy.spatial.di... | 116 | 29.18 | 111 | 13 | 911 | python | [{"finding_id": "codeql_py/tarslip_1096f98a0c0799d6_d8646b41", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
29
] | [
null
] | [
9
] | [
10
] | |
2024-11-18T22:36:03.493509+00:00 | 1,631,152,263,000 | 67400f6a1949c60ac6b1fec65fed2d35e03e85b4 | 3 | {
"blob_id": "67400f6a1949c60ac6b1fec65fed2d35e03e85b4",
"branch_name": "refs/heads/master",
"committer_date": 1631152263000,
"content_id": "4b59b6319a2bba5147b8a0d204bb8e454f9a5f44",
"detected_licenses": [
"MIT"
],
"directory_id": "5868f8e7d1d33da896b7dca99ec264cfd1fe8edb",
"extension": "py",
"fi... | 3.375 | stackv2 | import pickle
file_path = "D:\Sindhi Model School (SMS)\HARSH\.PROGRAMS\School\School12\emp.dat"
def file_write(emp_no):
file_2 = open(file_path, 'ab')
n1 = 1
while n1 <= emp_no:
name1 = input("enter your name : ")
try:
salary = int(input("enter your Salary : "))
l... | 80 | 28.36 | 102 | 18 | 587 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4dcd4ba4de6a823c_c3614f30", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
43
] | [
null
] | [
51
] | [
66
] | |
2024-11-18T22:36:19.617143+00:00 | 1,428,331,743,000 | 479dfc843033999278fc201c40a881d3ed88d182 | 3 | {
"blob_id": "479dfc843033999278fc201c40a881d3ed88d182",
"branch_name": "refs/heads/master",
"committer_date": 1428331743000,
"content_id": "d5c2c474f095f5ecd1507a27fde8740d1beb4907",
"detected_licenses": [
"MIT"
],
"directory_id": "c2c5d7247f512d52d3c6fc67ccc6f3763f5d11a6",
"extension": "py",
"fi... | 2.5625 | stackv2 | import os
import sys
import time
import logging
import argparse
import threading
from flask import Flask, request, abort, jsonify
from utils.scripting import server_address, positive_int
from utils.strings import slugify
import shm
from simulators import get_simulator, available_simulators, NoSuchSimulator
logging.bas... | 307 | 30.99 | 79 | 18 | 2,185 | python | [{"finding_id": "codeql_py/stack-trace-exposure_c8815da9894aefdd_143ac2e4", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
36
] | [
null
] | [
24
] | [
42
] | |
2024-11-18T22:36:22.321136+00:00 | 1,609,393,173,000 | b899a930c67c9698a4c345e450b834086762e912 | 2 | {
"blob_id": "b899a930c67c9698a4c345e450b834086762e912",
"branch_name": "refs/heads/master",
"committer_date": 1609393173000,
"content_id": "d6eb929b74ef5d423ce7962267713e9f407c9ec3",
"detected_licenses": [
"MIT"
],
"directory_id": "33974de9f5c457a9b9a79343686aa9bffdd170b2",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/env python3
import os
from dotenv import load_dotenv
from sqlalchemy.engine.url import make_url
source_dir = os.path.abspath(os.curdir)
# 导入环境变量
env_path = os.path.join(source_dir, '.env')
if os.path.isfile(env_path):
load_dotenv(dotenv_path=env_path, verbose=True)
from config import DockerConfig
# ... | 81 | 36.89 | 105 | 14 | 747 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_a32a0b8b548350f7_ce80c5a8", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text."
] | [
38,
56,
79
] | [
null,
null,
null
] | [
32,
35,
28
] | [
74,
80,
70
] | |
2024-11-18T22:36:46.523744+00:00 | 1,634,583,958,000 | 86a065149bdd95c8b57a00ce4b291c7d8d431d0f | 2 | {
"blob_id": "86a065149bdd95c8b57a00ce4b291c7d8d431d0f",
"branch_name": "refs/heads/main",
"committer_date": 1634583958000,
"content_id": "e043d441bdfb9e08962da52fa279efd4b519f71d",
"detected_licenses": [
"MIT"
],
"directory_id": "4dd82171e3293cdee5d356fc5b0c045cd17ae4f2",
"extension": "py",
"file... | 2.5 | stackv2 | from parseDOM import parseDOM
import spacy
import re
import nltk
from GMFormInput import GMFormInput
from bs4 import BeautifulSoup
# required for github API usage (install using terminal)
#pip install 'git+https://github.com/caiusb/miner-utils'
#pip install 'gitpython'
#pip install 'pandas'
#useful imports (from when... | 424 | 37.79 | 171 | 30 | 3,683 | python | [{"finding_id": "codeql_py/overly-large-range_0ea23fd997380f1a_dac2acb4", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].",
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
142,
187
] | [
null,
null
] | [
59,
75
] | [
62,
78
] | |
2024-11-18T22:36:51.484154+00:00 | 1,461,821,396,000 | fcc623f3377289dc283feab6e97ae151e2f1e347 | 2 | {
"blob_id": "fcc623f3377289dc283feab6e97ae151e2f1e347",
"branch_name": "refs/heads/master",
"committer_date": 1461821396000,
"content_id": "a91648218d7ca7dbaa6cde4e8f5c80555146be2a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d8422247ecbe450c75df45dcf2c92fb4438b65af",
"extension": "py"... | 2.328125 | stackv2 | # --*-- coding:utf-8 --*--
__author__ = 'nolan'
import uuid
from hashlib import md5
from openstack_dashboard.api.member.member import *
import time
import hashlib
def get_user(user_email):
userC = UserCenter()
param = {}
param["email"]=user_email
user = userC.checkUser(param)
return user
# 数字签... | 53 | 18.47 | 73 | 12 | 288 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d7c0674ee7b6be53_e0121331", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
47
] | [
null
] | [
15
] | [
18
] | |
2024-11-18T22:36:52.011572+00:00 | 1,403,028,765,000 | d416d56d22e93260fe6968cfa2df62048fa58680 | 2 | {
"blob_id": "d416d56d22e93260fe6968cfa2df62048fa58680",
"branch_name": "refs/heads/master",
"committer_date": 1403028765000,
"content_id": "c5085b121ab7e6152b692bcd61edf899d1c44431",
"detected_licenses": [
"MIT"
],
"directory_id": "5cefd3f3847774818e7bab5d517922ee29b77f94",
"extension": "py",
"fi... | 2.484375 | stackv2 | #!/usr/bin/env python
"""Scrapes HTML articles from http://www.kcna.co.jp/ for relevant text, outputting as JSON for database import."""
# TODOs:
# Multiple rules defined by year, with function to choose the correct rule
# Process real data
# Confirm you can run just the HTML->JSON function on it's own from cmd ln
# ... | 295 | 36.41 | 146 | 17 | 2,590 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4ea924c39003d7a1_746a8b7e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
136,
144
] | [
null,
null
] | [
24,
22
] | [
101,
53
] | |
2024-11-18T20:23:20.882503+00:00 | 1,592,074,431,000 | ec632663179ba0a556bd9ff93d9f178e185c699c | 4 | {
"blob_id": "ec632663179ba0a556bd9ff93d9f178e185c699c",
"branch_name": "refs/heads/master",
"committer_date": 1592074431000,
"content_id": "7557948a34e14bd04ea7b7059f2b91cf20073a29",
"detected_licenses": [
"MIT"
],
"directory_id": "155e0bf68930488ccd88e6a59f29749b70c981f0",
"extension": "py",
"fi... | 4.25 | stackv2 | #!/usr/bin/env python3
"""A password generator and manager.
Title:
Password Generator
Description:
Create a program that allows a user to enter a password name
eg: "Facebook Account Password"
and length
eg: '24'.
Your program should then proceed to generate a strong password.
This strong password should be generated
... | 81 | 31.75 | 76 | 16 | 536 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_83c5bd38c52ce6dd_0cb1b8c2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
76
] | [
null
] | [
19
] | [
28
] | |
2024-11-18T20:23:39.343152+00:00 | 1,515,499,120,000 | d11c9fac0ee57edab02693f02476593ecbd4ac41 | 3 | {
"blob_id": "d11c9fac0ee57edab02693f02476593ecbd4ac41",
"branch_name": "refs/heads/master",
"committer_date": 1515499120000,
"content_id": "5749fa4866350f873713cd967ab4f8b57e365180",
"detected_licenses": [
"MIT"
],
"directory_id": "8f26a211acfeb55921fccb0841f4efde10409595",
"extension": "py",
"fi... | 2.8125 | stackv2 | # -*- coding: utf-8 -*-
"""
URL Check
URL查重处理
@dependencies:
1. mmh
2. bitarray
"""
import re
import math
import random
import mmh3
from bitarray import bitarray
urls = [
'https://www.zhihu.com/question/26006703',
'https://www.zhihu.com/roundtable/jiqixuexi',
'https://www.zhihu.com/question/6388350... | 202 | 18.59 | 68 | 15 | 1,128 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_9d237468779a0c89_62759d94", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This string, which is used as a regular expression [here](1), has an unescaped '.' befor... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-hostname-regexp",
"py/incomplete-hostname-regexp"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This string, which is used as a regular expression [here](1), has an unescaped '.' before 'zhihu.com/', so it might match more hosts than expected.",
"This string, which is used as a regular expression [here](1), has an unescaped '.' before 'zhihu.com/', so it might match more hosts than expected."
] | [
82,
123
] | [
null,
null
] | [
16,
16
] | [
48,
48
] | |
2024-11-18T20:23:41.593533+00:00 | 1,632,402,912,000 | 02cc474dc769920be604be3a0bc65720e3eb1f40 | 2 | {
"blob_id": "02cc474dc769920be604be3a0bc65720e3eb1f40",
"branch_name": "refs/heads/master",
"committer_date": 1632402912000,
"content_id": "9953be3cc2409baab431091ff0b5c93b04cd0add",
"detected_licenses": [
"MIT"
],
"directory_id": "b3aba03f063816e123b933fa28c60a0be7ee245f",
"extension": "py",
"fi... | 2.484375 | stackv2 | import requests
import pickle
import time
import node
from flask import Blueprint, jsonify, request, render_template
from node import Node, MINING_DIFFICULTY
from block import Block
from transaction import Transaction
from transaction_output import TransactionOutput
from node import Node
############################... | 296 | 31.89 | 118 | 21 | 1,958 | python | [{"finding_id": "codeql_py/unsafe-deserialization_c88700263816f409_84cd1358", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio... | 5 | true | [
"CWE-502",
"CWE-502",
"CWE-502",
"CWE-502",
"CWE-502"
] | [
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization",
"py/unsafe-deserialization"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Unsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provided value](1).",
"Unsafe deserialization depends on a [user-provi... | [
42,
88,
106,
165,
182
] | [
null,
null,
null,
null,
null
] | [
30,
36,
36,
30,
31
] | [
48,
54,
54,
48,
49
] | |
2024-11-18T21:22:14.184175+00:00 | 1,539,809,933,000 | 091878e5a1c0d86ffd01558e7c974a5503a7a02f | 3 | {
"blob_id": "091878e5a1c0d86ffd01558e7c974a5503a7a02f",
"branch_name": "refs/heads/master",
"committer_date": 1539809933000,
"content_id": "e81542d897442535495a108fcd8436b2cef235a2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2c541e4a960ec6abe18ba288b865eacd03efb7f4",
"extension": "py"... | 2.765625 | stackv2 | # -*- coding: utf-8 -*-
#
# Copyright stuff
#
# License stuff
#
import json
from .infoblox import Infoblox, InfobloxGeneralException, Util
# import more stuff
class HighLevelInfobloxActions(object):
""" Implements the following high level infoblox actions
convert_lease_to_fixed_address
"""
def __i... | 162 | 37.46 | 88 | 22 | 1,304 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1c6259068259aace_331c49c6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](1) as clear text."
] | [
73,
137
] | [
null,
null
] | [
15,
15
] | [
33,
43
] | |
2024-11-18T21:22:14.987387+00:00 | 1,600,911,985,000 | 66c0792b133d39a3d46a6e99baf04b1f3c4e0702 | 3 | {
"blob_id": "66c0792b133d39a3d46a6e99baf04b1f3c4e0702",
"branch_name": "refs/heads/master",
"committer_date": 1600911985000,
"content_id": "90d3cfad2964372ef606dd5e28647b1467dd21b0",
"detected_licenses": [
"MIT"
],
"directory_id": "397c5d934c7908bdd6c61360ef4e62b646544be8",
"extension": "py",
"fi... | 2.6875 | stackv2 | import requests
from secrets import tumblr_api_key
type_list = ['text', 'photo', 'quote', 'link', 'answer', 'video', 'audio', 'chat']
posts_dict = {}
for type in type_list:
posts_dict[f'{type}_posts'] = []
api_key = tumblr_api_key.get_tumblr_api_key()
# pull first 20 posts
post_url = f'https://api.... | 35 | 31 | 113 | 16 | 283 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ac6a84ce1db4ecb4_95452539", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
17,
28
] | [
null,
null
] | [
11,
15
] | [
39,
43
] | |
2024-11-18T21:22:30.492836+00:00 | 1,612,359,493,000 | d3cb32f2e103d12e1eee12183f52653fbbc8ea0c | 3 | {
"blob_id": "d3cb32f2e103d12e1eee12183f52653fbbc8ea0c",
"branch_name": "refs/heads/main",
"committer_date": 1612359493000,
"content_id": "171f8b26a73b4ce14bcbfed5b8fc53d5441a390d",
"detected_licenses": [
"MIT"
],
"directory_id": "838f84136ad89d1ee710ca37c50049fa7d4d4b7f",
"extension": "py",
"file... | 3.09375 | stackv2 | #!/usr/bin/python
# Jeremy Kosse 10/30/2020
#
#
#
# - Uses the PUT HTTPS method to add/update a configuration
# - In this example updating the IP of loopback100
#
import requests
import json
# Welcome
print("Welcome to the Netconf_IOS-XE_Put.py Script!")
print("*" * 80)
# Variable collection
host_value = input("Hos... | 73 | 21.64 | 113 | 14 | 457 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d9f2a069150461f4_e8d3ca05", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-295"
] | [
"py/clear-text-logging-sensitive-data",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This request may run without certificate validation because [it is disabled](1)."
] | [
72,
59
] | [
null,
65
] | [
9,
12
] | [
22,
2
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.