added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T23:15:48.569984+00:00 | 1,493,054,247,000 | 7caef658c1dfb9e7d33e6374d496fdc22b068c25 | 3 | {
"blob_id": "7caef658c1dfb9e7d33e6374d496fdc22b068c25",
"branch_name": "refs/heads/master",
"committer_date": 1493054247000,
"content_id": "633aff194e0c7c7371bb84e68c5c36d326ab053a",
"detected_licenses": [
"MIT"
],
"directory_id": "9ba396ade063c1d52805e222cec01e208357fb04",
"extension": "py",
"fi... | 2.5625 | stackv2 | import discord
import discord.utils
import asyncio
import os.path
import re
import markovify
import random
import datetime
from chatBot.settings import JSONSettings
prog_path = os.path.dirname(os.path.abspath(__file__))
default_settings = {"Discord token": "",
"Source type (channel or user)": "",... | 172 | 31.16 | 148 | 22 | 1,319 | python | [{"finding_id": "codeql_py/overly-large-range_9a531e6464f9994e_fbd432a4", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 7 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range ... | [
35,
35,
35,
35,
35,
35,
36
] | [
null,
null,
null,
null,
null,
null,
null
] | [
15,
18,
21,
24,
30,
33,
15
] | [
19,
22,
25,
28,
34,
37,
19
] | |
2024-11-18T23:15:50.898340+00:00 | 1,556,089,082,000 | b72639ef54edd7cd5bd86093e8a42e807402016b | 3 | {
"blob_id": "b72639ef54edd7cd5bd86093e8a42e807402016b",
"branch_name": "refs/heads/master",
"committer_date": 1556089082000,
"content_id": "9f1b0bafb8891394393c6f7ab6b30f13aa1e9c81",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7981fa8a679fd3bfe3494273fe61a2abbf31aaad",
"extension": "py"... | 2.734375 | stackv2 | # -*- coding: utf-8 -*
import os
import hashlib
import sys
import os, sys, time
from paramiko import SSHClient, SFTPClient, AutoAddPolicy
import pickle
class SshServer(object):
def __init__(self, ip=None, port=22, user='root', password=None):
"""
:param ip: 服务器ip地址
:param port: 服务器端口 ssh端口默认22
:... | 231 | 26.02 | 111 | 20 | 2,011 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_39edfbe6cf35c0ad_d222617b", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
46
] | [
null
] | [
5
] | [
58
] | |
2024-11-18T22:30:20.269345+00:00 | 1,660,119,292,000 | f72fafb674ae5a313bc4293f32d00cd46d09f2ac | 2 | {
"blob_id": "f72fafb674ae5a313bc4293f32d00cd46d09f2ac",
"branch_name": "refs/heads/master",
"committer_date": 1660119292000,
"content_id": "0dfc65f6878045d1126b22a8df04450483cc1913",
"detected_licenses": [
"MIT"
],
"directory_id": "d25047446b4c66f955d5fab54111ec1fd16dc93c",
"extension": "py",
"fi... | 2.359375 | stackv2 | #!/usr/bin/python
# -*- coding: utf-8 -*-
#
# TalkTalkTalk
#
# is an easy-installable small chat room, with chat history.
#
# author: Joseph Ernest (twitter: @JosephErnest)
# url: http://github.com/josephernest/talktalktalk
# license: MIT license
import sys, json, bleach, time, threading, dumbdbm, random, re
i... | 177 | 40.96 | 177 | 35 | 1,654 | python | [{"finding_id": "codeql_py/reflective-xss_a5ce6a38463d7443_f6af4fdb", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
153
] | [
null
] | [
17
] | [
24
] | |
2024-11-18T22:30:35.027922+00:00 | 1,692,841,992,000 | 748fcb2b0b6d142e8844c73c669706fbbe0f17ef | 3 | {
"blob_id": "748fcb2b0b6d142e8844c73c669706fbbe0f17ef",
"branch_name": "refs/heads/main",
"committer_date": 1692841992000,
"content_id": "086eb5c16e2f1f4507dfb38391b5c1f295a1a5ca",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "352a7d9d534587adc9e1130c71c0b832c020bb10",
"extension": "py",
... | 2.546875 | stackv2 | import random
import string
import json
import logging
import copy
import io
from ruamel.yaml import YAML, representer
from kubernetes import config as kubeconfig
from kubernetes.client.api import core_v1_api
from kubernetes.client.rest import ApiException
from kubernetes.stream import stream
from submitter.abstracts... | 314 | 28.5 | 79 | 18 | 1,986 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_67d72fa66f9eb1bb_6fb91bd5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
89,
100
] | [
null,
null
] | [
22,
22
] | [
76,
77
] | |
2024-11-18T22:44:43.444076+00:00 | 1,467,369,588,000 | 1c3f895fab26fbab62939b193ec45bfd418320b4 | 3 | {
"blob_id": "1c3f895fab26fbab62939b193ec45bfd418320b4",
"branch_name": "refs/heads/master",
"committer_date": 1467369588000,
"content_id": "cf070cf597017f9376ac52c152d3bfbff857d383",
"detected_licenses": [
"MIT"
],
"directory_id": "6a9f51df453b3088ab62682c72690c00ecd9b552",
"extension": "py",
"fi... | 2.75 | stackv2 | '''
The following module implements a REST API for resources. This allows
us to manipulate our database using simple HTTP requests and without
having to go through a form. This may be useful in the future if we
are looking to have a mobile app or add an analytics application that is
separate from the main site.
The ba... | 223 | 26.87 | 84 | 15 | 1,461 | python | [{"finding_id": "codeql_py/stack-trace-exposure_3fd0eed22f4b1221_6b9795b2", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 12 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
68,
74,
80,
105,
111,
117,
157,
163,
169,
194,
200,
206
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
33,
33,
33,
33,
33,
33,
33,
33,
33,
33,
33,
33
] | [
39,
39,
39,
39,
39,
39,
39,
39,
39,
39,
39,
39
] | |
2024-11-18T23:36:57.331922+00:00 | 1,691,855,948,000 | 8fa464f6d78cf4756ac5b26e5823f5567dd7cde6 | 3 | {
"blob_id": "8fa464f6d78cf4756ac5b26e5823f5567dd7cde6",
"branch_name": "refs/heads/main",
"committer_date": 1691855948000,
"content_id": "51287431b6c90b006e14b098fc6a4044293dd548",
"detected_licenses": [
"MIT"
],
"directory_id": "416559370cfed287db119360d2747783c6bcc512",
"extension": "py",
"file... | 2.671875 | stackv2 | import jinja2
import os
from posty.util import slugify_posty1
from .base import Renderer
class Posty1RedirectRenderer(Renderer):
"""
Renderer which creates pages to redirect old Posty1 URLs to new Posty2 URLs
Old Posty1 post URLs are in the form of:
/:year/:month/:old_slug.html
Posty2 URLs are ... | 37 | 31.16 | 79 | 18 | 251 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_17f9ec254810b90d_98edc76d", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
21
] | [
null
] | [
20
] | [
63
] | |
2024-11-18T23:37:01.852361+00:00 | 1,521,912,309,000 | 2cd1c933bffa1c1471cdfe91e66a8d73299e8c64 | 2 | {
"blob_id": "2cd1c933bffa1c1471cdfe91e66a8d73299e8c64",
"branch_name": "refs/heads/master",
"committer_date": 1521912309000,
"content_id": "f08d8f634993abc9be7458bfbfdd45cf735e7cf9",
"detected_licenses": [
"MIT"
],
"directory_id": "2638d80ca13744caa06f44f6b69d11b41279451b",
"extension": "py",
"fi... | 2.4375 | stackv2 | #coding = utf-8
import re
import json
import tweepy
from tweepy import OAuthHandler
from tweepy import Stream
from tweepy.streaming import StreamListener
consumer_key = "RNOGX5TiB0Kyto9ggDxcT8Gie"
consumer_secret = "Kn7ut4mvlwqPDNXIrl9uQxAblb1115Rg87XZ319UEaaJ09Kf0i"
access_token = "3293164734-flLNI737Kx80gPEsJN5DBMX... | 54 | 28.3 | 148 | 18 | 521 | python | [{"finding_id": "codeql_py/overly-large-range_0f55e28bc9fcef51_e513957b", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
27
] | [
null
] | [
58
] | [
61
] | |
2024-11-18T23:37:06.101384+00:00 | 1,553,788,666,000 | 766664356ebe868216e85995a43ddc26df1c4349 | 3 | {
"blob_id": "766664356ebe868216e85995a43ddc26df1c4349",
"branch_name": "refs/heads/master",
"committer_date": 1553788666000,
"content_id": "29f8ecef97333e2ac510b4652aa320714d462f24",
"detected_licenses": [
"MIT"
],
"directory_id": "b0d9a6326db00683109c2e0139206ee236b30eab",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python
import argparse, os, logging, json, sys
from jinja2 import Template
parser = argparse.ArgumentParser()
parser.add_argument('-t', '--template', default="-", help='A configuration template')
parser.add_argument('-o', '--output', default="-", help='A path to write the rendered configuration to')
... | 64 | 30.69 | 160 | 16 | 480 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e7ae77aa37fb6321_fda573a9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
61
] | [
null
] | [
16
] | [
45
] | |
2024-11-18T23:37:10.106319+00:00 | 1,613,485,448,000 | 98b60335df9987982b0668293878fe7c1259c02e | 2 | {
"blob_id": "98b60335df9987982b0668293878fe7c1259c02e",
"branch_name": "refs/heads/master",
"committer_date": 1613485448000,
"content_id": "81c01e3fdc0181b06e6fdc4ed22c834e750c9a0e",
"detected_licenses": [
"MIT"
],
"directory_id": "441a612051a33b5563c3d644604e597b2e8c5251",
"extension": "py",
"fi... | 2.46875 | stackv2 | from flask import Blueprint, request, jsonify, redirect, url_for
from twitoff.twitter import add_or_update_user, update_all_users, add_users, TWITTER_USERS
from twitoff.models import db, User, Tweet
user_routes = Blueprint("user_routes", __name__)
@user_routes.route('/user', methods=['POST'])
def add_user(message=No... | 72 | 34.57 | 90 | 18 | 537 | python | [{"finding_id": "codeql_py/stack-trace-exposure_6a536842c7584f03_fdef7d3d", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
35,
50
] | [
null,
null
] | [
20,
20
] | [
60,
76
] | |
2024-11-18T23:37:10.526117+00:00 | 1,492,797,560,000 | 79c8981311861f409d38eeebf0a57924e186c0fa | 3 | {
"blob_id": "79c8981311861f409d38eeebf0a57924e186c0fa",
"branch_name": "refs/heads/master",
"committer_date": 1492797560000,
"content_id": "12c9c422aa5cdb90132a6662b8b40eeb2fee6574",
"detected_licenses": [
"MIT"
],
"directory_id": "01de22ca189e8b1014c1fbc806d5469d3f41c1e6",
"extension": "py",
"fi... | 3.15625 | stackv2 | # Import requests so we can use HTML
import requests
# Import Time so we can use a delay
import time
# Import smtplib so we can send emails
import smtplib
# Import MIMEText, which we will use to create the message
from email.mime.text import MIMEText
# while this is true (it is true by default),
def main():
st... | 75 | 30.21 | 149 | 14 | 545 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bb874f93d4704ef7_19c20a8a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
29
] | [
null
] | [
24
] | [
72
] | |
2024-11-18T21:14:03.819070+00:00 | 1,540,101,602,000 | 269c2fefc1e7c5da5fad8fc1c6da24d98c1ff312 | 3 | {
"blob_id": "269c2fefc1e7c5da5fad8fc1c6da24d98c1ff312",
"branch_name": "refs/heads/master",
"committer_date": 1540101602000,
"content_id": "fe25761b98fd49aa71a44c161423e0d61d165790",
"detected_licenses": [
"MIT"
],
"directory_id": "9a7069a9044b2b26f7f95c4c611b69f3c4d91007",
"extension": "py",
"fi... | 2.75 | stackv2 | #!/usr/local/bin/python
# -*- coding: utf-8 -*-
from sklearn import datasets,svm
from sklearn import metrics
from influxdb import InfluxDBClient
from pytz import timezone
from datetime import datetime
from flask import Flask, jsonify, request
import json
app = Flask(__name__)
@app.route("/", methods=['GET'])
def he... | 101 | 22.48 | 68 | 13 | 694 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_33ea7cfbaa7585f7_8481ffdd", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-215"
] | [
"py/clear-text-logging-sensitive-data",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
89,
34
] | [
null,
null
] | [
40,
5
] | [
48,
51
] | |
2024-11-18T21:15:49.019787+00:00 | 1,625,838,941,000 | b7613fb7dc6340cbe3a9c03852a7b859d0cb679e | 2 | {
"blob_id": "b7613fb7dc6340cbe3a9c03852a7b859d0cb679e",
"branch_name": "refs/heads/master",
"committer_date": 1625838941000,
"content_id": "21cf6abf0691444a659f8f00e463f9e9bcf5d1e9",
"detected_licenses": [
"MIT"
],
"directory_id": "57b1dbb89c717237ee3d90e32a2c0a3511000016",
"extension": "py",
"fi... | 2.5 | stackv2 | """Class for initializing remote virtual machines for agent lifecycle."""
from file_handling import collect_local_dir_names, collect_neuralnets_from_dir
from subprocess import Popen, PIPE
import os, time, json
# Define global variable
stricthostkeycheck_flag = "-o StrictHostKeyChecking=no"
class RemoteEnvsSetup(obj... | 327 | 37.76 | 101 | 18 | 2,764 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_81b640200e1c18a2_39fd777b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
60,
152
] | [
null,
null
] | [
32,
38
] | [
41,
48
] | |
2024-11-18T21:57:28.866564+00:00 | 1,594,272,809,000 | b677d518e2e630ef60eb426d6f570cf632412c8b | 3 | {
"blob_id": "b677d518e2e630ef60eb426d6f570cf632412c8b",
"branch_name": "refs/heads/master",
"committer_date": 1594272809000,
"content_id": "d352447f9e1f040272c5d7bcd024c1b7daa42eb5",
"detected_licenses": [
"MIT"
],
"directory_id": "3408811873f33e4bfce856f164cdf3180ba83b0c",
"extension": "py",
"fi... | 2.609375 | stackv2 | # app.py - a minimal flask api using flask_restful
from flask import Flask, request, render_template, jsonify
from flask_restful import Resource, Api
import os
import requests
application = Flask(__name__)
api = Api(application)
class HelloWorld(Resource):
def get(self):
return {
"name" :... | 74 | 20.54 | 62 | 12 | 387 | python | [{"finding_id": "codeql_py/flask-debug_0d20b000e8ca09a8_67ebc00e", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
74,
27
] | [
null,
null
] | [
5,
12
] | [
48,
24
] | |
2024-11-18T21:57:30.273461+00:00 | 1,686,755,672,000 | 6ad937268eb4294061d331e022683593fbd2207d | 3 | {
"blob_id": "6ad937268eb4294061d331e022683593fbd2207d",
"branch_name": "refs/heads/master",
"committer_date": 1686755672000,
"content_id": "3802415fa8797a942f46f290e50cda045089a6bd",
"detected_licenses": [
"MIT"
],
"directory_id": "6e2fc3d3ab6b1291c088d41e6224b476ca9e6b4a",
"extension": "py",
"fi... | 2.671875 | stackv2 | '''
The process for building the request is as follows:
- Combine all params (except sign_type and sign) into a alphabetically sorted list in the form key=value&
- Attach your AliPay MD5 secret to the signstring
- Calculate the MD5 hash from this combined string
- Attach the sign_type and sign parameter with the above ... | 61 | 27.87 | 105 | 12 | 494 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_e6ca21a482a95d75_65157d3b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
49
] | [
null
] | [
10
] | [
39
] | |
2024-11-18T21:57:53.169920+00:00 | 1,542,808,582,000 | 3290faa1c0bc32f91c9930e9491b323d990d584d | 3 | {
"blob_id": "3290faa1c0bc32f91c9930e9491b323d990d584d",
"branch_name": "refs/heads/master",
"committer_date": 1542808582000,
"content_id": "cb361b99675f070caeef5c9fea1da040fefb3ab2",
"detected_licenses": [
"MIT"
],
"directory_id": "5ac60fef12f7501a7045fbefefd0ca0fa7973829",
"extension": "py",
"fi... | 2.53125 | stackv2 | import os
import uuid
import json
from glob import glob
import numpy as np
import requests
import pandas as pd
import tornado.web
from tornado import concurrent
from tornado import gen
from concurrent.futures import ThreadPoolExecutor
from app.base_handler import BaseApiHandler
from app.settings import MAX_MODEL_THRE... | 103 | 31.38 | 92 | 17 | 712 | python | [{"finding_id": "codeql_py/full-ssrf_54b7a81dd3d09177_27b7ae3a", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
56
] | [
null
] | [
26
] | [
49
] | |
2024-11-18T21:58:28.524459+00:00 | 1,532,359,516,000 | d0918515948dc900d549fc729240075b4363731c | 3 | {
"blob_id": "d0918515948dc900d549fc729240075b4363731c",
"branch_name": "refs/heads/master",
"committer_date": 1532359516000,
"content_id": "d108a76584efd02d33cead3f4906e04d3653d0da",
"detected_licenses": [
"MIT"
],
"directory_id": "9f287bfe376e9416fb5a5be81238da12b041d9df",
"extension": "py",
"fi... | 2.546875 | stackv2 | import re
from collections import namedtuple
import numpy
from bs4 import BeautifulSoup
from sklearn import svm
from sklearn.feature_extraction.text import (CountVectorizer, TfidfTransformer,
TfidfVectorizer)
LabeledVideo = namedtuple('LabeledVideo', ['path', 'label'])
DAT... | 99 | 25.63 | 81 | 13 | 637 | python | [{"finding_id": "codeql_py/bad-tag-filter_02d854f5c001ddd3_76edfe8d", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match comments containing newlines."
] | [
37
] | [
null
] | [
20
] | [
29
] | |
2024-11-18T21:58:37.924719+00:00 | 1,503,338,336,000 | 8b86489991f8b92453531390a4b3a3bd22f19041 | 3 | {
"blob_id": "8b86489991f8b92453531390a4b3a3bd22f19041",
"branch_name": "refs/heads/master",
"committer_date": 1503338336000,
"content_id": "8cf0d4f54fa740370045728f4b30c3258115ed6e",
"detected_licenses": [
"MIT"
],
"directory_id": "e9a5e773a4305c6363d0127939d5b82338dfee72",
"extension": "py",
"fi... | 2.59375 | stackv2 | '''
@author Gabriel
'''
import datetime
import serial
import time
leidoAnterior = ""
class xbee:
def __init__(self,USB):
self.connection=serial.Serial(USB,9600)
self.timestamp=''
self.challenge='0'
self.latitude= 'HDDD.DDDDDD'
self.longitude='HDDD.DDDDDD'
self.takeoff='0'
self.flying='0'
self.landin... | 70 | 23.53 | 137 | 23 | 544 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bc4d1985fa22e908_2f1ab67e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
45
] | [
null
] | [
9
] | [
15
] | |
2024-11-18T23:10:50.835792+00:00 | 1,622,061,069,000 | eaa07f8793b4ce7988c043eb1c5a722b6daeafb7 | 3 | {
"blob_id": "eaa07f8793b4ce7988c043eb1c5a722b6daeafb7",
"branch_name": "refs/heads/main",
"committer_date": 1622061069000,
"content_id": "eeefb12b994bcf63ccc6bc46167dd50afdf3e90d",
"detected_licenses": [
"MIT"
],
"directory_id": "38b17235eae34a13126c7d6597d3aba620c26eff",
"extension": "py",
"file... | 2.796875 | stackv2 | import subprocess
from scapy.all import *
import re
from enum import Enum
import requests
import time
class ipType(Enum):
NONE = 0
IP = 1
CIDR = 2
class lanServer:
def __init__(self):
self.ip = self.get_local_ip()
self.cidr = 24
self.network_addr = ".".join(self.ip.split('.')... | 107 | 30.48 | 91 | 18 | 874 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9739cece49379a30_df54fc1e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
102
] | [
null
] | [
19
] | [
25
] | |
2024-11-18T23:10:52.828646+00:00 | 1,552,597,759,000 | 5af028f0b3a1c3249c526aa6971849c20d5e7a18 | 2 | {
"blob_id": "5af028f0b3a1c3249c526aa6971849c20d5e7a18",
"branch_name": "refs/heads/master",
"committer_date": 1552597759000,
"content_id": "4af7bbb7d0507bbeb2d70d472aac4b1f9d28e6ad",
"detected_licenses": [
"MIT"
],
"directory_id": "724a54f533d9d5af9b76066902f09676306dee28",
"extension": "py",
"fi... | 2.359375 | stackv2 |
url = 'https://files.pythonhosted.org/packages/9d/a4/afaf98be714d3701d47c47b3b6aa3d5e52bf277fe8ceb9a2e3fdb05eaf86/micropython-uasyncio-2.0.tar.gz'
proto, _, host, urlpath = url.split('/', 3)
try:
ai = usocket.getaddrinfo(host, 443, 0, usocket.SOCK_STREAM)
except OSError as e:
fatal("Unable to resolve %s (no In... | 95 | 26.39 | 154 | 13 | 814 | python | [{"finding_id": "codeql_py/insecure-default-protocol_d3e7674b08472508_56b7c710", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/insecure-default-protocol",
"py/insecure-default-protocol"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used.",
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
33,
18
] | [
null,
null
] | [
13,
6
] | [
31,
57
] | |
2024-11-18T23:10:55.490412+00:00 | 1,610,054,421,000 | c5e452bc1f61bce15932314648f2daf275eaca76 | 3 | {
"blob_id": "c5e452bc1f61bce15932314648f2daf275eaca76",
"branch_name": "refs/heads/master",
"committer_date": 1610054421000,
"content_id": "020b2eefb4a41266232d65a64a73137dd2ec9fa8",
"detected_licenses": [
"MIT"
],
"directory_id": "b77b571c0198eaadfc978e348089dda964529bdb",
"extension": "py",
"fi... | 2.625 | stackv2 | from flask import Flask, request, render_template
import sqlite3
import matplotlib, os
matplotlib.use('agg')
import matplotlib.pyplot as plt
import pandas as pd
import folium
def startup():
try:
name = input("Name of the database you will use")
check_connection = 'file:{}.db?mode=rw'.format(name)
... | 258 | 34.03 | 134 | 21 | 2,168 | python | [{"finding_id": "codeql_py/sql-injection_d171ebcf12915379_ea0b4ddc", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 2 | true | [
"CWE-089",
"CWE-089"
] | [
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
69,
164
] | [
null,
null
] | [
32,
35
] | [
34,
48
] | |
2024-11-18T23:10:57.141382+00:00 | 1,623,006,274,000 | 90da0e993aa49f83e00253d404a6d5d3cce3f7ac | 2 | {
"blob_id": "90da0e993aa49f83e00253d404a6d5d3cce3f7ac",
"branch_name": "refs/heads/main",
"committer_date": 1623006274000,
"content_id": "dcf8cbfae5fe0d24b6e1ab08eaa2d7ab1352b16d",
"detected_licenses": [
"MIT"
],
"directory_id": "40aa9e69bb9fe4bc9c68a6ce0329963497cf54f0",
"extension": "py",
"file... | 2.375 | stackv2 | import os
import secrets
from PIL import Image
from flask import render_template, url_for, flash, redirect, request, abort
from flask_login import login_user, current_user, logout_user, login_required
from . import app, db, bcrypt
from .models import User, Post
from .forms import RegistrationForm, LoginForm, AccountUp... | 188 | 42.66 | 153 | 16 | 1,868 | python | [{"finding_id": "codeql_py/url-redirection_b71075e93a6a99fe_8cb55577", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
94
] | [
null
] | [
33
] | [
42
] | |
2024-11-18T23:11:01.522000+00:00 | 1,540,730,913,000 | d679a781db13851e0027064b6a340a48e9e6f3d1 | 2 | {
"blob_id": "d679a781db13851e0027064b6a340a48e9e6f3d1",
"branch_name": "refs/heads/master",
"committer_date": 1540730913000,
"content_id": "3a1b728681aa46cc38cd41fea65262693431ae98",
"detected_licenses": [
"MIT"
],
"directory_id": "8966c316c56586ca589206d83b9d35aec69cc1eb",
"extension": "py",
"fi... | 2.453125 | stackv2 | from flask import Flask, request, abort
import os
from linebot import (
LineBotApi, WebhookHandler
)
from linebot.exceptions import (
InvalidSignatureError
)
from linebot.models import (
MessageEvent, TextMessage, TextSendMessage,
)
import json
import urllib.request
import re
app = Flask(__name__)
# 環境変... | 175 | 26.87 | 100 | 21 | 1,305 | python | [{"finding_id": "codeql_py/log-injection_8124326e9b23129d_fc051c47", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
38
] | [
null
] | [
21
] | [
44
] | |
2024-11-18T22:05:55.032360+00:00 | 1,608,092,682,000 | 5fe165f6666c0adaa5037a9e56aab9044d0fdbc0 | 3 | {
"blob_id": "5fe165f6666c0adaa5037a9e56aab9044d0fdbc0",
"branch_name": "refs/heads/master",
"committer_date": 1608092682000,
"content_id": "4afd2bac64b668a5a3226c315d67886be1ab5fc4",
"detected_licenses": [
"MIT"
],
"directory_id": "b041baf74ad7e684f4da7581f28d8c5702c4bce3",
"extension": "py",
"fi... | 2.890625 | stackv2 | from datetime import datetime
from zoneinfo import ZoneInfo
from django.conf import settings
from django.contrib.auth import get_user_model
from django.contrib.auth.backends import BaseBackend
import requests
from .models import User
def retrieve_user_from_api(username, password):
"""
The MyVision API uses ... | 118 | 41.25 | 105 | 21 | 1,012 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d471ea8c3703fe4c_914c54a7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
69
] | [
null
] | [
28
] | [
42
] | |
2024-11-18T22:05:55.651343+00:00 | 1,611,807,379,000 | bff0dae7792db3897d9005b1b49aec928541bff9 | 4 | {
"blob_id": "bff0dae7792db3897d9005b1b49aec928541bff9",
"branch_name": "refs/heads/main",
"committer_date": 1611807379000,
"content_id": "72ede1bcf753123febfed4a586017c5514fb8a2c",
"detected_licenses": [
"MIT"
],
"directory_id": "aed1fdbad787e252c19b6fa1e7328014df02feda",
"extension": "py",
"file... | 4.28125 | stackv2 | # https://www.globaletraining.com/
# Public & Private Access Modifiers
# Public
class Employee:
# Class Constructor (Method with a special name)
def __init__(self, first_name, last_name, base_annual_salary, bonus_percentage):
self.first_name = first_name
self.last_name = last_name
sel... | 36 | 29.81 | 84 | 11 | 277 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_25d19b6142d55196_f679dad6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
30,
32
] | [
null,
null
] | [
11,
11
] | [
72,
73
] | |
2024-11-18T22:48:58.644531+00:00 | 1,524,799,686,000 | 7e61b0b07534007c9cb4399ac55bc5f2233d7b3b | 2 | {
"blob_id": "7e61b0b07534007c9cb4399ac55bc5f2233d7b3b",
"branch_name": "refs/heads/master",
"committer_date": 1524799686000,
"content_id": "4d79771974ba1d72729dba79c6a72fb8f1fcfad0",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e5af08144bcf3d07d015e8d41834ea5a281bc594",
"extension": "py"... | 2.453125 | stackv2 | from cloudant import Cloudant
from flask import Flask, render_template, request, jsonify
import atexit
import cf_deployment_tracker
import os
import json
import ibmiotf.application
import pandas as pd
import numpy as np
from sklearn import svm
import time
import datetime
client=None
train_dataframe = pd.read_csv('trai... | 123 | 26.89 | 155 | 16 | 954 | python | [{"finding_id": "codeql_py/flask-debug_c471a3f5f6954ce6_6b64fb73", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
123,
110
] | [
null,
null
] | [
2,
9
] | [
48,
18
] | |
2024-11-18T22:48:59.075670+00:00 | 1,558,521,116,000 | 0477c25462079544459863b1f2164a8432b2d9a4 | 3 | {
"blob_id": "0477c25462079544459863b1f2164a8432b2d9a4",
"branch_name": "refs/heads/master",
"committer_date": 1558521116000,
"content_id": "1113a19e472876f997967740763802e76cde1916",
"detected_licenses": [
"MIT"
],
"directory_id": "e565dba72af21c596f1405aac4bc132a97a0e562",
"extension": "py",
"fi... | 3.15625 | stackv2 | import hashlib
import random
import string
def _hash(salt, raw_password):
data = "{0}{1}".format(salt, raw_password)
return hashlib.sha512(data.encode("UTF-8")).hexdigest()
def encrypt_password(plaintext):
salt = "".join(random.sample(string.ascii_letters + string.digits, 32))
hashstr = _hash(salt, ... | 19 | 25.53 | 75 | 12 | 128 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_318bab7e8071ae9e_2078d94d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally e... | [
8
] | [
null
] | [
27
] | [
47
] | |
2024-11-18T23:25:57.837205+00:00 | 1,530,038,426,000 | bcdb17b82c0edb39255c1de9b6dea7041c3de84f | 4 | {
"blob_id": "bcdb17b82c0edb39255c1de9b6dea7041c3de84f",
"branch_name": "refs/heads/master",
"committer_date": 1530038426000,
"content_id": "3f7635c7eb77867493457c6dc499a0c1bf63251b",
"detected_licenses": [
"MIT"
],
"directory_id": "4e2f687b73f8794bd75d75509e63dba1a8079ac2",
"extension": "py",
"fi... | 4.1875 | stackv2 | print("Let's practice everything.")
print('You \'d need to know \'bout escapes with \\ that do:')
print('\n new;ines and \t tabs.')
poem = """
\t The lovely world
with logic so family p;anted
cannot discern \n the needs of love
nor comprehend passion from intuition
and requires an expalanation
\n\t\t where there is ... | 36 | 26.14 | 68 | 8 | 267 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_aa99dc2b678e5be9_ed01b8b2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
30,
30,
30
] | [
null,
null,
null
] | [
21,
38,
51
] | [
26,
42,
57
] | |
2024-11-18T23:26:01.331192+00:00 | 1,692,791,435,000 | 34da59d67c71680142e0d4229728116d4abce239 | 2 | {
"blob_id": "34da59d67c71680142e0d4229728116d4abce239",
"branch_name": "refs/heads/master",
"committer_date": 1692791435000,
"content_id": "7c990f4eba753e71848fe6b67fc4fcf46bfa8ead",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "1cd48a9c3e558e05e0ceeb9ab4b689a2d2be5cf8",
"extension": "p... | 2.390625 | stackv2 | from datetime import datetime
from random import sample
from os import path
from time import time
import os
from jinja2 import Template
SCRIPT_DIR = path.abspath(path.join(path.dirname(__file__)))
def hand... | 22 | 33.55 | 97 | 15 | 160 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_051444a1ed20dbf4_8a0ee473", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
18
] | [
null
] | [
16
] | [
96
] | |
2024-11-18T23:26:05.579216+00:00 | 1,532,162,870,000 | f93a2f0e1d8c616d14570bd04ff579a600af1838 | 3 | {
"blob_id": "f93a2f0e1d8c616d14570bd04ff579a600af1838",
"branch_name": "refs/heads/master",
"committer_date": 1532162870000,
"content_id": "54a110a7add4c5fd4c7a462226dd7556e518f7d4",
"detected_licenses": [
"MIT"
],
"directory_id": "0a38ee8211153b53c6b67110dd912f694c1c2519",
"extension": "py",
"fi... | 2.625 | stackv2 | import sys
import os
import os.path
import paramiko
import re
local_path = ''
ssh_path = ''
local_file = []
local_folder = []
class ssh:
hostname=''
port=22
username=''
password=''
def connect(self):
self.ssh = paramiko.SSHClient()
self.ssh.set_missing_host_key_policy(paramiko.Aut... | 77 | 26.35 | 112 | 13 | 516 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_c9d9180cc5b2db5a_eef9ddfb", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
20
] | [
null
] | [
9
] | [
69
] | |
2024-11-18T23:26:08.083901+00:00 | 1,627,009,793,000 | 16319537426cf4f8ec539692739dfe1914063ff7 | 2 | {
"blob_id": "16319537426cf4f8ec539692739dfe1914063ff7",
"branch_name": "refs/heads/main",
"committer_date": 1627009793000,
"content_id": "acb58b6eeceadcf3aaa35ad22040bb04f95021c9",
"detected_licenses": [
"MIT"
],
"directory_id": "48a90d421800be13742cec493775e6c0a8c4d131",
"extension": "py",
"file... | 2.390625 | stackv2 | import os
from flask import Flask, flash, request, redirect, url_for
from werkzeug.utils import secure_filename
from flask import send_from_directory
import requests
app = Flask(__name__)
UPLOAD_FOLDER = os.path.join(app.root_path, 'melody_separator/src/input')
DOWNLOAD_FOLDER = os.path.join(app.root_path, 'SPICE')
... | 61 | 31.56 | 83 | 16 | 458 | python | [{"finding_id": "codeql_py/flask-debug_a20b17191c089111_fdddd8a8", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-601",
"CWE-601"
] | [
"py/flask-debug",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
61,
30,
36
] | [
null,
null,
null
] | [
5,
29,
29
] | [
49,
40,
40
] | |
2024-11-18T22:39:21.834863+00:00 | 1,567,605,827,000 | 7d80363bd458d63e665ece123675838c7302cdfc | 3 | {
"blob_id": "7d80363bd458d63e665ece123675838c7302cdfc",
"branch_name": "refs/heads/master",
"committer_date": 1567605827000,
"content_id": "64cc7277655483a663732238f6b93c47e9ddc16a",
"detected_licenses": [
"MIT"
],
"directory_id": "4b06fd6b46ffc8bdfa476499b96fdefc93053300",
"extension": "py",
"fi... | 2.734375 | stackv2 | import time
import urllib
import urllib.request
import json
class TransitlandRequest(object):
"""Simple transitland API interface, with rate limits."""
last_request_time = 0.0 # time of last request
def __init__(self, host='https://transit.land', apikey=None, ratelimit=8, retrylimit=5):
self.host = host
... | 70 | 31.79 | 90 | 19 | 594 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_5dbc52c15c97a045_6ce7a650", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
29
] | [
null
] | [
11
] | [
14
] | |
2024-11-18T22:14:47.876441+00:00 | 1,570,565,161,000 | dc3f3aeb140af36971ad6eed7702db748482f36b | 2 | {
"blob_id": "dc3f3aeb140af36971ad6eed7702db748482f36b",
"branch_name": "refs/heads/master",
"committer_date": 1570565161000,
"content_id": "5ebda871123d2863932dd8d49453e21a52af3f6d",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "8daeab974fd462b6a776f8d8336ec99730bc5ca1",
"extension": "p... | 2.3125 | stackv2 | #!/bin/env python
#
# Python script to generate new DCDE user mapfiles
# /etc/globus/globus-acct-map (for globus ssh)
#
# ldapsearch -LLL -H ldaps://ldap.cilogon.org \
# -D 'uid=readonly_user,ou=system,o=DCDE,o=CO,dc=cilogon,dc=org' -x \
# -w XXXXXXXX \
# -b 'o=DCDE,o=CO,dc=cilogon,dc=org'
#
import argparse
i... | 131 | 27.04 | 127 | 17 | 1,064 | python | [{"finding_id": "codeql_py/overly-permissive-file_9c6b108cee898551_9a816d2e", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
91
] | [
null
] | [
3
] | [
27
] | |
2024-11-18T22:15:00.472406+00:00 | 1,550,581,160,000 | b6a96b78d94dc127a88c1b5643525fbabef6a860 | 3 | {
"blob_id": "b6a96b78d94dc127a88c1b5643525fbabef6a860",
"branch_name": "refs/heads/master",
"committer_date": 1550581160000,
"content_id": "d62756ee8155af743fa6440395c50fd41a2a712f",
"detected_licenses": [
"MIT"
],
"directory_id": "a0fe87fbc3541205f6587e297b22311f744592eb",
"extension": "py",
"fi... | 2.65625 | stackv2 | from selenium import webdriver
from selenium.webdriver.common.keys import Keys
from tts import tts
import re
def open_firefox():
tts("OK, opening Firefox")
webdriver.Firefox()
def check_email():
un = "YOUR_USER_NAME"
pw = "YOUR_PASSWORD"
driver = webdriver.Firefox()
driver.get("https://mail.pr... | 33 | 31.39 | 71 | 9 | 245 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_64d2e6d16455a01d_b20518fb", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [Startpage.com](1) may be at an arbitrary position in t... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [Startpage.com](1) may be at an arbitrary position in the sanitized URL."
] | [
28
] | [
null
] | [
12
] | [
43
] | |
2024-11-18T22:55:27.651487+00:00 | 1,417,717,687,000 | c62be33fd7ecef59f4fc063b0ff7859391a3523f | 3 | {
"blob_id": "c62be33fd7ecef59f4fc063b0ff7859391a3523f",
"branch_name": "refs/heads/master",
"committer_date": 1417717687000,
"content_id": "6e6c1ebe5cf40150e89a009e718731dfba8ad75e",
"detected_licenses": [
"MIT"
],
"directory_id": "0912e909b34753d4159c8804c77208ef00b358b0",
"extension": "py",
"fi... | 2.53125 | stackv2 | #!/usr/bin/env python
import os , sys , getopt, subprocess , paramiko , csv
#executes a remote process in a node
def execute(channel, command):
command = 'echo $$; exec ' + command
stdin, stdout, stderr = channel.exec_command(command)
pid = int(stdout.readline())
return pid, stdin, stdout, stderr
def ge... | 171 | 36.15 | 86 | 24 | 1,694 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_884863f6b87b6d81_9f771464", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation",
"py/paramiko-missing-host-key-validation"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe.",
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
100,
131
] | [
null,
null
] | [
7,
9
] | [
64,
66
] | |
2024-11-19T00:34:38.865721+00:00 | 1,500,230,440,000 | a09d4ae03d7f1e6042b785739a202996333c95be | 3 | {
"blob_id": "a09d4ae03d7f1e6042b785739a202996333c95be",
"branch_name": "refs/heads/master",
"committer_date": 1500230440000,
"content_id": "b7a6b733bcf98e9d9889d93acc0297d91500f692",
"detected_licenses": [
"MIT"
],
"directory_id": "6424de9456d193939fa68c44655d9e2096f3fd9d",
"extension": "py",
"fi... | 2.859375 | stackv2 |
import os
import json
import numpy as np
import pandas as pd
from IPython.display import display, clear_output
from scipy.optimize import linprog
from bs4 import BeautifulSoup
from IPython.display import HTML
from fractions import Fraction
from urllib.parse import urlparse
class Election:
"""
Random elect... | 388 | 33.1 | 100 | 20 | 3,197 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8601c347dca4e7a3_2a52395c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
267
] | [
269
] | [
15
] | [
56
] | |
2024-11-19T00:45:01.854365+00:00 | 1,540,455,105,000 | ca9f13c02fd33a6b924d2b652b5752d150c67f76 | 2 | {
"blob_id": "ca9f13c02fd33a6b924d2b652b5752d150c67f76",
"branch_name": "refs/heads/master",
"committer_date": 1540455105000,
"content_id": "0836eb334eb95a45f2cec1d08faa89b5000daced",
"detected_licenses": [
"MIT"
],
"directory_id": "5d0e83e9e1e1e335e371eef7f3a3105ee250a96e",
"extension": "py",
"fi... | 2.390625 | stackv2 | # -*- coding: utf-8 -*-
import flask_login
from flask import request, make_response, render_template, url_for, Blueprint
from flask_restful import abort
from werkzeug.utils import redirect
from robot_ctl.db_util import get_user_session, get_qq_page
from robot_ctl.logger import getLogger
from robot_ctl.login_manager i... | 97 | 30.71 | 95 | 16 | 744 | python | [{"finding_id": "codeql_py/insecure-cookie_ea061c3d093e7057_056f9daa", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"... | 3 | true | [
"CWE-614",
"CWE-020",
"CWE-1004"
] | [
"py/insecure-cookie",
"py/cookie-injection",
"py/client-exposed-cookie"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cookie is added to response without the 'secure' flag being set.",
"Cookie is constructed from a [user-supplied input](1).",
"Sensitive server cookie is set without HttpOnly flag."
] | [
50,
50,
50
] | [
null,
null,
null
] | [
13,
41,
13
] | [
50,
49,
50
] | |
2024-11-18T23:39:44.456672+00:00 | 1,458,163,508,000 | 284473c3b1363596d4cc94aba093196f7111aecf | 3 | {
"blob_id": "284473c3b1363596d4cc94aba093196f7111aecf",
"branch_name": "refs/heads/master",
"committer_date": 1458163508000,
"content_id": "c67b7ef0740556599aaf7e27760b43d9f626e5d2",
"detected_licenses": [
"MIT"
],
"directory_id": "7db38f91cd751121e944988a69cba21da9cad428",
"extension": "py",
"fi... | 2.8125 | stackv2 | from hashlib import sha256
from uuid import uuid4
import sqlite3
import getpass
import os
import os.path
##
# Prints a header for the configuration script
def print_header():
print ' == DODSCP CONFIGURATION SCRIPT =='
print ' '
print 'This program will configure DODSCP for your use.'
print 'It is... | 129 | 31.11 | 120 | 13 | 996 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1def38457973fac2_c6ddd875", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
87
] | [
null
] | [
21
] | [
51
] | |
2024-11-18T23:40:01.784414+00:00 | 1,471,646,347,000 | 51f8bdb621dea191bfc009e936cf718d474c1350 | 2 | {
"blob_id": "51f8bdb621dea191bfc009e936cf718d474c1350",
"branch_name": "refs/heads/master",
"committer_date": 1471646347000,
"content_id": "61ced50a49c0d75d641be5525a47fa8d074785ab",
"detected_licenses": [
"MIT"
],
"directory_id": "712277959b65f12b745027214c11fbf431aaa74d",
"extension": "py",
"fi... | 2.421875 | stackv2 | # -*- coding: utf-8 -*-
from os import path, environ
from flask import Flask, jsonify, abort, render_template, request, redirect
from flask import url_for, flash
import yaml
import json
from glob import glob
import itertools
import urbanairship as ua
import redis
import datetime
import time
import uuid
import sys
from ... | 275 | 25.79 | 78 | 17 | 1,724 | python | [{"finding_id": "codeql_py/flask-debug_5ec4890bb024e1f4_91462573", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
275,
210,
219
] | [
null,
null,
null
] | [
5,
26,
26
] | [
24,
27,
27
] | |
2024-11-19T01:11:27.718313+00:00 | 1,598,535,210,000 | edc11f883ac033edacbe25ccf2d2b254bdd58bbe | 3 | {
"blob_id": "edc11f883ac033edacbe25ccf2d2b254bdd58bbe",
"branch_name": "refs/heads/master",
"committer_date": 1598535210000,
"content_id": "98c17cebb44245b1da0caedbd6d573d562612b9b",
"detected_licenses": [
"MIT"
],
"directory_id": "d70dbd11e73cb4425630c4d1ad1a0e4c2ebd705e",
"extension": "py",
"fi... | 3.21875 | stackv2 | """
Common helper functions
"""
import logging
import functools
from jinja2 import Template
import json
logger = logging.getLogger('main.helpers')
def dot_to_json(a):
output = {}
for key, value in a.items():
path = key.split('.')
if path[0] == 'json':
path = path[1:]
targe... | 82 | 24.34 | 86 | 17 | 465 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_52aac0e507e85fcf_d213b4c8", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
34
] | [
null
] | [
9
] | [
27
] | |
2024-11-19T01:11:30.817557+00:00 | 1,600,882,894,000 | edb4bd3907379b77e64fbf458fdff6f122d89e1f | 3 | {
"blob_id": "edb4bd3907379b77e64fbf458fdff6f122d89e1f",
"branch_name": "refs/heads/master",
"committer_date": 1600882894000,
"content_id": "b704ff75e3ad689e46edd7a4559e718b30c1d180",
"detected_licenses": [
"MIT"
],
"directory_id": "f5f0df08146a4f506bc2668ebfbac006e3bc428f",
"extension": "py",
"fi... | 3.140625 | stackv2 | from models import ManagerModel
from encryption import Crypto
class ManagerService:
def __init__(self, password):
self.crypto = Crypto(password)
self.model = ManagerModel()
def add(self):
App = self.crypto.EncryptString(input("App/Webpage name: "))
Username = self.crypto.En... | 87 | 32.9 | 125 | 19 | 606 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f50b902c524ca6fd_d20a95ed", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
74
] | [
null
] | [
19
] | [
103
] | |
2024-11-19T01:11:33.085997+00:00 | 1,583,134,181,000 | f829714210432ed2ab4e0e6980b407339578e556 | 2 | {
"blob_id": "f829714210432ed2ab4e0e6980b407339578e556",
"branch_name": "refs/heads/master",
"committer_date": 1583134181000,
"content_id": "861ac663d595b2a85bef46c3aa083e84ceda9bba",
"detected_licenses": [
"MIT"
],
"directory_id": "f2c52ff65bbd835acd8289c5d71b4ecb56463504",
"extension": "py",
"fi... | 2.5 | stackv2 | from flask import render_template, request, redirect, flash, url_for
from app.auth.forms import LoginForm
from flask_login import current_user, login_user, logout_user
from app.models import User
from werkzeug.urls import url_parse
from app.auth import bp
@bp.route('/')
@bp.route('/login',methods=['GET','POST'])
de... | 48 | 31.65 | 73 | 16 | 330 | python | [{"finding_id": "codeql_py/url-redirection_45af9117d57a007b_0fd77f09", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
39
] | [
null
] | [
25
] | [
34
] | |
2024-11-19T01:11:37.142631+00:00 | 1,555,944,739,000 | 584f8a9a611ce5fe6433a1271b69439d86211b9a | 2 | {
"blob_id": "584f8a9a611ce5fe6433a1271b69439d86211b9a",
"branch_name": "refs/heads/master",
"committer_date": 1555944739000,
"content_id": "45f3f51122d94b1d3bbe76ac60ea486e65d27bee",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bba0c52a24495fd612d9365de20e0ccb6185c161",
"extension": "py"... | 2.328125 | stackv2 | #coding: utf8
import hashlib
from rust.core import business
from rust.core.exceptions import BusinessError
from rust.resources.business.user.encode_service import EncodeService
from rust.resources.business.user.user_repository import UserRepository
from rust.utils.jwt_service import JWTService
from rust.resources.db... | 38 | 28.39 | 71 | 14 | 260 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_bac7e926264f9061_bffe6ff2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
24
] | [
null
] | [
23
] | [
42
] | |
2024-11-18T23:48:14.690224+00:00 | 1,647,787,659,000 | 12fd58f365c6179240fd2396e0792f8ec0a22d48 | 3 | {
"blob_id": "12fd58f365c6179240fd2396e0792f8ec0a22d48",
"branch_name": "refs/heads/master",
"committer_date": 1647787659000,
"content_id": "c930c1d31559eac1e3c1e2cfc5533d7df0b77b46",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3da3704c5e87255697f75a5ec38effd2e8480ce6",
"extension": "py"... | 3.0625 | stackv2 | # Environment Preparation =============================================================
'''
After install Anaconda
pip install jupyter
# Check environments
conda env list
# Creating a environment for web crawling
conda create --name crawler python=3
# Activate environment
conda activate crawler
# Installing required pa... | 187 | 30.85 | 106 | 13 | 1,636 | python | [{"finding_id": "codeql_py/request-without-cert-validation_300faa1fc89d245e_336484f5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
48,
57,
101,
107
] | [
null,
null,
null,
null
] | [
5,
5,
5,
5
] | [
87,
88,
86,
102
] | |
2024-11-18T23:48:20.426203+00:00 | 1,443,337,931,000 | cb5e87cc4a611ab45103d8255298ee93804627be | 2 | {
"blob_id": "cb5e87cc4a611ab45103d8255298ee93804627be",
"branch_name": "refs/heads/master",
"committer_date": 1443337931000,
"content_id": "aed5ec14c92a1d40607665b78acf2d549839b0b2",
"detected_licenses": [
"MIT"
],
"directory_id": "2c7fc19093601619a52bace4f35b981b8586bc20",
"extension": "py",
"fi... | 2.375 | stackv2 | import re
import zlib
import gzip
import struct
import socket
from datetime import datetime, timedelta
import requests
from ybk.log import quote_log as log
from ybk.models import Quote, Collection
from ybk.settings import SITES, get_conf
session = requests.Session()
session.headers = {
'User-Agent': 'Mozilla/5.0... | 253 | 34.72 | 81 | 23 | 2,326 | python | [{"finding_id": "codeql_py/request-without-cert-validation_64e8497baccd3e06_a1caf0bb", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
68
] | [
69
] | [
17
] | [
55
] | |
2024-11-18T23:48:21.971164+00:00 | 1,607,801,627,000 | 7a37683bc1fd7de9a0156892de5905ddd9e66dd0 | 3 | {
"blob_id": "7a37683bc1fd7de9a0156892de5905ddd9e66dd0",
"branch_name": "refs/heads/master",
"committer_date": 1607801627000,
"content_id": "5450b9c686609dfb6177464e0e3346c57a021dcb",
"detected_licenses": [
"MIT"
],
"directory_id": "d87a7d2234a376dc3f234c3d8298ed0f9055dbb9",
"extension": "py",
"fi... | 2.5625 | stackv2 | from dbArtistsBase import dbArtistsBase
from dbBase import dbBase
from artistMB import artistMB
from discogsUtils import musicbrainzUtils
import urllib
from urllib.parse import quote
from webUtils import getHTML
from fsUtils import isFile, setFile
from multiArtist import multiartist
from ioUtils import getFile
from tim... | 177 | 37.86 | 118 | 21 | 1,392 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d505cec1ac97f142_642a5973", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
90
] | [
null
] | [
26
] | [
45
] | |
2024-11-18T23:23:31.287780+00:00 | 1,663,770,033,000 | dda795265b958c14817748c7aa905aa59d7bffc9 | 2 | {
"blob_id": "dda795265b958c14817748c7aa905aa59d7bffc9",
"branch_name": "refs/heads/master",
"committer_date": 1663770033000,
"content_id": "0bdcaf24710f5c5bcee88075a1c7af21f71261e5",
"detected_licenses": [
"MIT"
],
"directory_id": "70bc025dea64f085ff830e29d453121a68bf410c",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/env python
import logging
logging.basicConfig(level=logging.INFO)
import flickrapi
from flask import Flask, render_template, redirect, url_for, request, session
app = Flask(__name__)
api_key = u'ecd01ab8f00faf13e1f8801586e126fd'
api_secret = u'2ee3f558fd79f292'
@app.route("/")
def index():
return r... | 62 | 28.45 | 80 | 13 | 454 | python | [{"finding_id": "codeql_py/reflective-xss_989dfebab82d0660_27690cca", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
56
] | [
null
] | [
12
] | [
39
] | |
2024-11-18T23:23:31.688583+00:00 | 1,497,536,316,000 | 706c6eb30dc7f674ea52b170f13d4ef42e3f11fc | 3 | {
"blob_id": "706c6eb30dc7f674ea52b170f13d4ef42e3f11fc",
"branch_name": "refs/heads/master",
"committer_date": 1497536316000,
"content_id": "befcd67768beb0220be743288e6ab8d72063b752",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "46ec3c28890f9dbd6516d5f71d94705943a6c418",
"extension": "py"... | 2.703125 | stackv2 | import asyncio
import ssl
import warnings
from pypeman import endpoints, channels, nodes, message
import aiohttp
from aiohttp import web
class HTTPEndpoint(endpoints.BaseEndpoint):
"""
Endpoint to receive HTTP connection from outside.
"""
def __init__(self, adress='127.0.0.1', port='8080', loop=None... | 146 | 35.79 | 169 | 17 | 1,168 | python | [{"finding_id": "codeql_py/stack-trace-exposure_20ad836d866b412f_76ca44fb", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
76
] | [
null
] | [
38
] | [
60
] | |
2024-11-19T00:44:13.785987+00:00 | 1,389,170,186,000 | aaeb0fe4fc16b6513eba917873e1d4e24b2906bc | 3 | {
"blob_id": "aaeb0fe4fc16b6513eba917873e1d4e24b2906bc",
"branch_name": "refs/heads/master",
"committer_date": 1389170186000,
"content_id": "54c5b232923d568581d39ea0c6444712c5197d66",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "c4f3f6b335501bf82a548cdf1e14ea234fe0c913",
"extension": "p... | 2.953125 | stackv2 | #-*- coding: utf-8 -*-
#
# This file belongs to Gyrid Server.
#
# Copyright (C) 2012 Roel Huybrechts
# All rights reserved.
"""
Module that provides a few simple tests and conversions. Can for instance be used to validate configuration file values.
All tests take at least the value to validate as an argument. When t... | 80 | 25.85 | 120 | 10 | 641 | python | [{"finding_id": "codeql_py/redos_62d6674c8a624997_2f54f71d", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\013'."
] | [
73
] | [
null
] | [
14
] | [
89
] | |
2024-11-19T00:44:16.133805+00:00 | 1,512,327,801,000 | 0edef055c353b2276adb6facf70b32afdc203a71 | 3 | {
"blob_id": "0edef055c353b2276adb6facf70b32afdc203a71",
"branch_name": "refs/heads/master",
"committer_date": 1512327801000,
"content_id": "67d11d099bbbbf84419dd5cf45d566da2d23f9f2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "363bfead6b995bdc7242654e5002b9de3ce2810c",
"extension": "py"... | 2.609375 | stackv2 | from cloudant import Cloudant
from flask import Flask, render_template, request, jsonify
import atexit
import cf_deployment_tracker
import os
import json
# Emit Bluemix deployment event
cf_deployment_tracker.track()
app = Flask(__name__)
db_name = 'mydb'
client = None
db = None
if 'VCAP_SERVICES' in os.environ:
... | 133 | 32.44 | 135 | 17 | 1,519 | python | [{"finding_id": "codeql_py/flask-debug_93e695c54c1cb06b_cae65c6a", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
133,
77
] | [
null,
null
] | [
5,
16
] | [
51,
60
] | |
2024-11-19T00:44:31.682027+00:00 | 1,593,064,691,000 | 8c58fb641072cde36fe843559148dd5bf1dea0ce | 2 | {
"blob_id": "8c58fb641072cde36fe843559148dd5bf1dea0ce",
"branch_name": "refs/heads/master",
"committer_date": 1593064691000,
"content_id": "b28bef001a40b3c01e8f1ee534261b3b419431d2",
"detected_licenses": [
"MIT"
],
"directory_id": "9d0093d9545df0fc646b11c80007c55d797242ea",
"extension": "py",
"fi... | 2.375 | stackv2 | import requests
from flask import Flask, json,jsonify,render_template
from json2table import convert
#pull data from api
if __name__ == "__main__":
url_players = "https://www.balldontlie.io/api/v1/players"
r_players = requests.get(url_players)
response_data_players = r_players.json()
url_teams = "https://www.ba... | 105 | 31.52 | 106 | 10 | 841 | python | [{"finding_id": "codeql_py/flask-debug_24a432bcf868202a_960bb932", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-918",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
105,
49,
77
] | [
null,
null,
null
] | [
2,
14,
12
] | [
23,
56,
55
] | |
2024-11-18T23:05:25.870685+00:00 | 1,612,626,156,000 | 394f5ff27a8a40e6ab945070e2a0db5d91629ffa | 3 | {
"blob_id": "394f5ff27a8a40e6ab945070e2a0db5d91629ffa",
"branch_name": "refs/heads/master",
"committer_date": 1612626156000,
"content_id": "1b3fc65069f6d4e1be9b4b6e13d55d01629f13be",
"detected_licenses": [
"MIT"
],
"directory_id": "4f674ae175b633fc5b1c5614344fe1ab114c1752",
"extension": "py",
"fi... | 2.59375 | stackv2 | import flask
from flask import request, jsonify
import json
import base64
import requests
import json
import cv2
import os
import numpy as np
import urllib.request as urllib2
app = flask.Flask(__name__)
def download_video(url):
file_name = 'trial_video.mp4'
rsp = urllib2.urlopen(url)
with open(file_name... | 98 | 21.07 | 81 | 14 | 586 | python | [{"finding_id": "codeql_py/full-ssrf_3a1301a9b1e93574_dd3d92bb", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
17
] | [
null
] | [
11
] | [
31
] | |
2024-11-18T23:05:28.271163+00:00 | 1,452,452,314,000 | f463ad22cf25a82867f9415d1db0d696e3df7d94 | 2 | {
"blob_id": "f463ad22cf25a82867f9415d1db0d696e3df7d94",
"branch_name": "refs/heads/master",
"committer_date": 1452452314000,
"content_id": "eaaba8ebfc3f4dde1b957128a01703452404a01f",
"detected_licenses": [
"MIT"
],
"directory_id": "b4a9f3f7c1fef09daf8e88a38d0d16c0baa33017",
"extension": "py",
"fi... | 2.328125 | stackv2 | #!/usr/bin/env python
#
# Python Version: 2.7
# Boto Version 2.38
#
# Enable CloudTrail logging in all AWS regions
#
# Must be the first line
from __future__ import print_function
import boto.cloudtrail
import boto.sns
import sys, getopt
def get_regions():
""" Build a region list """
reg_list = []
for reg in... | 155 | 28.94 | 112 | 15 | 1,355 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1040a81e5703a37b_bd916079", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
116
] | [
null
] | [
11
] | [
87
] | |
2024-11-18T23:05:36.695279+00:00 | 1,529,659,443,000 | b610f9c10ffd199df8fd2fe5ca8a2900c9694312 | 4 | {
"blob_id": "b610f9c10ffd199df8fd2fe5ca8a2900c9694312",
"branch_name": "refs/heads/master",
"committer_date": 1529659443000,
"content_id": "32e582f834285fdd277d18124f4b6c1baa4d6f1b",
"detected_licenses": [
"MIT"
],
"directory_id": "5e442dd400abaeaeb74a3f58d1002ad60cb909f2",
"extension": "py",
"fi... | 4 | stackv2 | import re
def split_input_string(input_string):
"""
Split input string into identifiers, symbols and numbers.
:param input_string: str, input string representing an assignment statement,
like 'A=B+C'.
:return: list with each item containing split symbols, identifiers and numbers.
All ... | 30 | 32.77 | 101 | 15 | 227 | python | [{"finding_id": "codeql_py/overly-large-range_27fbe4b8c7999cc4_59a489f7", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with 0-9 in the same character class, and is equivalent to \\[+,\\-.\\/0-9:;<=\\]."
] | [
13
] | [
null
] | [
43
] | [
46
] | |
2024-11-18T23:05:40.963661+00:00 | 1,629,547,185,000 | 21763d3e9e754c856cc46fd1ca614623a3f872cb | 3 | {
"blob_id": "21763d3e9e754c856cc46fd1ca614623a3f872cb",
"branch_name": "refs/heads/main",
"committer_date": 1629547185000,
"content_id": "e129cd1eb80b85d1d3fc86cdaeeff6a9b81c1266",
"detected_licenses": [
"MIT"
],
"directory_id": "a17be47b4a785f831a4b8b0ee43eacc4515de518",
"extension": "py",
"file... | 3.390625 | stackv2 | """
Preparing the data for both the stanford parser
Java implementations and the Jython implementations.
"""
import pandas as pd
class PrepareStanfordParser:
"""Useful functions for pipeline to iterate towards the use of the
Stanford parser"""
def __init__(self):
self.genes = self.get_genes()
... | 78 | 29.67 | 90 | 15 | 537 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_c0151d162cb931b5_21727f8d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text."
] | [
75
] | [
null
] | [
29
] | [
44
] | |
2024-11-18T23:05:49.836450+00:00 | 1,515,663,195,000 | 991e1a216fa9035d6bdc7587ba7233b6d81af03a | 3 | {
"blob_id": "991e1a216fa9035d6bdc7587ba7233b6d81af03a",
"branch_name": "refs/heads/master",
"committer_date": 1515663195000,
"content_id": "aa0b3c5f7a01e2d58f0aee17288e6fe813c07ac2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cd4645887981f86afd9d1b0f20fdc25834020239",
"extension": "py"... | 3.03125 | stackv2 | import hashlib
import os
import base64
class PasswordHelper:
def get_hash(self, plain):
hash = hashlib.sha512()
hash.update(('%s%s' % (self.get_salt(), plain)).encode('utf-8'))
return hash.hexdigest()
def get_salt(self):
password_salt = os.urandom(32).hex()
return pass... | 19 | 26.84 | 72 | 16 | 135 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_32f72486faed3c00_b85d8436", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
9
] | [
null
] | [
21
] | [
72
] | |
2024-11-18T23:42:49.755577+00:00 | 1,433,803,405,000 | 4950dbcab1fb7bd5b60a056c3adceaecc50e55ee | 2 | {
"blob_id": "4950dbcab1fb7bd5b60a056c3adceaecc50e55ee",
"branch_name": "refs/heads/master",
"committer_date": 1433803405000,
"content_id": "47afeaad1a0258115becaffc1947ec7b271638f4",
"detected_licenses": [
"MIT"
],
"directory_id": "824c6f07b1ceae9c517e9839a5d77d43f9409d3a",
"extension": "py",
"fi... | 2.453125 | stackv2 | # -*- coding: utf-8 -*-
#------------------------------------------------------------------------------
# Python API kit for the Bits on the Run System API
#
# Author: Sergey Lashin
# Copyright: (c) 2010 - 2011 LongTail Ad Solutions
# License: GNU Lesser General Public License, version 3
# http:... | 328 | 34.37 | 102 | 26 | 2,396 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_17571a23ae03df3e_23459272", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure."
] | [
298
] | [
null
] | [
38
] | [
56
] | |
2024-11-19T01:21:50.494988+00:00 | 1,531,311,928,000 | 2ad7140b9e55c4be0ec730c1de03a6aaf1fb5782 | 3 | {
"blob_id": "2ad7140b9e55c4be0ec730c1de03a6aaf1fb5782",
"branch_name": "refs/heads/master",
"committer_date": 1531311928000,
"content_id": "a7c3d5e8de4fea842e46ed26bbfc3a59c6d66ae6",
"detected_licenses": [
"Unlicense"
],
"directory_id": "49369bb12b964c8546cf66528875f2890098a805",
"extension": "py",... | 2.65625 | stackv2 | #!/usr/bin/env python3
import re
import operator
import nltk
from nltk.corpus import stopwords
import requests
from flask import Flask, render_template, request
from collections import Counter
from bs4 import BeautifulSoup
import mysql.connector as mysql
from flask import jsonify
app = Flask(__name__)
@app.route... | 60 | 32.78 | 114 | 17 | 428 | python | [{"finding_id": "codeql_py/flask-debug_a6bcfb9597317605_90fa0ef3", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-918",
"CWE-089"
] | [
"py/flask-debug",
"py/full-ssrf",
"py/sql-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1)."
] | [
60,
23,
50
] | [
null,
null,
null
] | [
5,
17,
32
] | [
24,
34,
37
] | |
2024-11-19T00:11:34.889381+00:00 | 1,589,470,065,000 | c96e322ed5c03a69a5d37628145d603fa19c819d | 3 | {
"blob_id": "c96e322ed5c03a69a5d37628145d603fa19c819d",
"branch_name": "refs/heads/master",
"committer_date": 1589470065000,
"content_id": "af011dedbebc566a2b637510b403f52beed54f8c",
"detected_licenses": [
"MIT"
],
"directory_id": "98b11c21c3b0df7fb9e37f05ff57e6db4a24495e",
"extension": "py",
"fi... | 2.546875 | stackv2 | import os.path
import tarfile
from collections import defaultdict
from graphdb_builder import mapping as mp, builder_utils
import pandas as pd
###################
# FooDB #
###################
def parser(databases_directory, download=True):
relationships = defaultdict(set)
directory = os.path.join... | 122 | 33.78 | 134 | 20 | 991 | python | [{"finding_id": "codeql_py/tarslip_0f47f2b1e985145f_976133e9", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
32
] | [
null
] | [
9
] | [
11
] | |
2024-11-19T00:11:37.276925+00:00 | 1,607,264,514,000 | 23bb646b04c1cfc4a5f9f5918d8257eb844060f9 | 4 | {
"blob_id": "23bb646b04c1cfc4a5f9f5918d8257eb844060f9",
"branch_name": "refs/heads/main",
"committer_date": 1607264514000,
"content_id": "17827c335a101048a888c94411bf75455a5d4ad1",
"detected_licenses": [
"MIT"
],
"directory_id": "81ec9ad86d16c8d67af3d4a7e28b789ec35d0a23",
"extension": "py",
"file... | 3.96875 | stackv2 | import re;
#amount of valid passwords in database.
#Password is valid if number of times the specified letter appears is between the bounds specified.
#Format: 'lowerbound-upperbound letter: password'
def part1(database):
validPasswords=0
for entry in database:
(lowerbound,upperbound, (letter,*_), pa... | 31 | 36.77 | 100 | 12 | 281 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bd62902cf72029ec_6bcdc549", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
30,
31
] | [
null,
null
] | [
30,
30
] | [
47,
47
] | |
2024-11-19T00:11:39.929753+00:00 | 1,430,851,063,000 | 7f7d58f4e0b5754caef08071e9f2d34dc2d1f7f8 | 3 | {
"blob_id": "7f7d58f4e0b5754caef08071e9f2d34dc2d1f7f8",
"branch_name": "refs/heads/master",
"committer_date": 1430851063000,
"content_id": "a06be2339c7840d1ae77a1e46d41ed13cf74e4d2",
"detected_licenses": [
"MIT"
],
"directory_id": "1eee1c6c45c5cb2596877b5fef07bcd924a0b69f",
"extension": "py",
"fi... | 2.6875 | stackv2 | __author__ = 'eliashussen'
import pandas as p
import requests as r
from StringIO import StringIO
import datetime
from bs4 import BeautifulSoup
import re
from alchemyapi import AlchemyAPI
import json
import numpy as np
from flask import request
from os import path
import csv
from collections import defaultdict
def ge... | 189 | 24.73 | 114 | 18 | 1,296 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_d3bf17060d1a54ea_82608c6f", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'yahoo.com', so it might match more ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'yahoo.com', so it might match more hosts than expected."
] | [
129
] | [
null
] | [
31
] | [
71
] | |
2024-11-19T00:11:44.228129+00:00 | 1,554,437,875,000 | e3a4d7f46963e5c9a48634d638cfd076167d03ed | 3 | {
"blob_id": "e3a4d7f46963e5c9a48634d638cfd076167d03ed",
"branch_name": "refs/heads/master",
"committer_date": 1554437875000,
"content_id": "9930055511685e091254fff849c6bc1c629da36c",
"detected_licenses": [
"MIT"
],
"directory_id": "a074f60de4d3334aad671de363a1a95df52a7f42",
"extension": "py",
"fi... | 2.78125 | stackv2 | #!/usr/bin/env python3
# Downloads universal dependencies datasets
# See http://universaldependencies.org for a list of all datasets
from tqdm import tqdm
import requests
import math
import tarfile
def download_file(url, filename=None):
# Streaming, so we can iterate over the response
r = requests.get(url,... | 53 | 26.66 | 117 | 13 | 350 | python | [{"finding_id": "codeql_py/tarslip_91095797bf0573a8_b09bef88", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
36
] | [
null
] | [
5
] | [
8
] | |
2024-11-19T00:36:48.658913+00:00 | 1,572,657,159,000 | 8c824be0cdeb7a3493b84ef437145386185df179 | 2 | {
"blob_id": "8c824be0cdeb7a3493b84ef437145386185df179",
"branch_name": "refs/heads/master",
"committer_date": 1572657159000,
"content_id": "a1198c2bb80ccfc8d501dbe6a4a90b3515bb7e93",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "a7c444fc1a6bb58bceecc566a15a308b90ff3b81",
"extension": "py"... | 2.484375 | stackv2 | #!/usr/bin/env python
"""
A simple service
Based on version from Michael Hausenblas, http://mhausenblas.info/#i
@author: Jayaprakash Subranmanian
@since: 2019-10-27
"""
import logging
import os
import platform
import distro
import random
import sys
import time
import tornado.ioloop
import tornado.web
from tornado.... | 171 | 29.13 | 119 | 18 | 1,154 | python | [{"finding_id": "codeql_py/log-injection_82269b4dba1f236d_8ada003d", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 4 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
82,
103,
126,
148
] | [
null,
null,
null,
null
] | [
26,
97,
95,
94
] | [
48,
119,
117,
116
] | |
2024-11-19T00:36:56.629933+00:00 | 1,615,909,340,000 | 8080b742ca365aebc9c8b3b3bed8541402db9844 | 3 | {
"blob_id": "8080b742ca365aebc9c8b3b3bed8541402db9844",
"branch_name": "refs/heads/main",
"committer_date": 1615909340000,
"content_id": "6543f926de5bf6122b99f5c0d3437f7185c780b3",
"detected_licenses": [
"MIT"
],
"directory_id": "a91683a535a03a53f90ad37a0b9b99d17453d63c",
"extension": "py",
"file... | 2.8125 | stackv2 | import json
import pickle
from flask import Flask, request
from utils.input_processor import process_input
from database import Database
database = Database()
classifier = pickle.load(open("model.pkl", "rb"))
app = Flask(__name__)
@app.route("/predict", methods=["POST"])
def predict() -> str:
"""Creates route ... | 47 | 28.83 | 76 | 16 | 312 | python | [{"finding_id": "codeql_py/stack-trace-exposure_c3faefc2118610ae_0e8894a3", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
28,
32
] | [
null,
null
] | [
16,
16
] | [
27,
27
] | |
2024-11-19T00:51:21.910627+00:00 | 1,519,742,156,000 | 4a3f17569adce04d3f487695e01951a94fa362bf | 2 | {
"blob_id": "4a3f17569adce04d3f487695e01951a94fa362bf",
"branch_name": "refs/heads/master",
"committer_date": 1519742156000,
"content_id": "3671aa5dfeb49a312fce012b105d33d8e92f4aac",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cfe25397f27a17cc642dd8e1ba78ceb75a1c9a93",
"extension": "py"... | 2.328125 | stackv2 | # Influxdb core
from influxdb_metrics.utils import query
from influxdb.exceptions import InfluxDBClientError
# Django core
from django.http import HttpResponse
from django.template import loader
from django.shortcuts import redirect
from django.contrib.auth.decorators... | 200 | 36.47 | 118 | 19 | 1,541 | python | [{"finding_id": "codeql_py/polynomial-redos_33711755a90848d9_e0d33e8c", "tool_name": "codeql", "rule_id": "py/polynomial-redos", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with ma... | 1 | true | [
"CWE-1333"
] | [
"py/polynomial-redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This [regular expression](1) that depends on a [user-provided value](2) may run slow on strings with many repetitions of '.'."
] | [
79
] | [
null
] | [
49
] | [
60
] | |
2024-11-19T00:51:23.848737+00:00 | 1,638,662,775,000 | 5f98ceec443728963eefa718bf43fb7173624e03 | 3 | {
"blob_id": "5f98ceec443728963eefa718bf43fb7173624e03",
"branch_name": "refs/heads/main",
"committer_date": 1638662775000,
"content_id": "aca30483571722335aa0778af5249904cbe05a4a",
"detected_licenses": [
"MIT"
],
"directory_id": "23509f4a73e20acb4f370e6c66341aaada8e88fe",
"extension": "py",
"file... | 3.0625 | stackv2 | from DAO.sql_helper import sql_helper
class user_dao:
"""
Class that contains required functions for user_dao.
"""
def __init__(self):
"""
Default constructor for the user_dat class. Initializes self.__db with sql_helper()
"""
self.__db = sql_helper()
def create_u... | 149 | 28.65 | 98 | 20 | 950 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c50ab47afa9efcb0_aa3220e9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
29,
29
] | [
null,
null
] | [
22,
32
] | [
30,
38
] | |
2024-11-19T01:02:23.628233+00:00 | 1,595,007,333,000 | 7910722ec1ea89a7a3b26f32343ef232d9ca4850 | 2 | {
"blob_id": "7910722ec1ea89a7a3b26f32343ef232d9ca4850",
"branch_name": "refs/heads/master",
"committer_date": 1595007333000,
"content_id": "ee3549eb79346845a8b3827c2395e31cfc6bd487",
"detected_licenses": [
"MIT"
],
"directory_id": "c3a33db74ef936eae39d5d79e5211e4862d22039",
"extension": "py",
"fi... | 2.4375 | stackv2 | from typing import Dict, Union
from django.contrib.auth import authenticate
from django.contrib.auth.models import User
from django.contrib.sessions.models import Session
from django.core.exceptions import ObjectDoesNotExist
from django.db.utils import IntegrityError
from django.utils import timezone
from rest_framewo... | 286 | 39.62 | 77 | 17 | 2,251 | python | [{"finding_id": "codeql_py/insecure-cookie_3738830f45fdc777_757804ed", "tool_name": "codeql", "rule_id": "py/insecure-cookie", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Cookie is added to response without the 'secure' flag being set.", "remediation": "", "location": {"file_path"... | 7 | true | [
"CWE-614",
"CWE-614",
"CWE-614",
"CWE-020",
"CWE-1004",
"CWE-1004",
"CWE-1004"
] | [
"py/insecure-cookie",
"py/insecure-cookie",
"py/insecure-cookie",
"py/cookie-injection",
"py/client-exposed-cookie",
"py/client-exposed-cookie",
"py/client-exposed-cookie"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cookie is added to response without the 'secure' flag being set.",
"Cookie is added to response without the 'secure' flag being set.",
"Cookie is added to response without the 'secure' flag being set.",
"Cookie is constructed from a [user-supplied input](1).",
"Sensitive server cookie is set without HttpOn... | [
80,
228,
281,
282,
80,
228,
281
] | [
83,
231,
284,
null,
83,
231,
284
] | [
13,
13,
13,
30,
13,
13,
13
] | [
14,
14,
14,
47,
14,
14,
14
] | |
2024-11-18T23:50:11.012012+00:00 | 1,409,329,507,000 | c8fdaace51c60791fe7d16a1cd19aa9a0fb1c1d8 | 2 | {
"blob_id": "c8fdaace51c60791fe7d16a1cd19aa9a0fb1c1d8",
"branch_name": "refs/heads/master",
"committer_date": 1409329507000,
"content_id": "100424d81b90782dffbbaba80ed79364f65c882d",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "ebcbbe645d70d4f756704d3c5113ba25e8a1814c",
"extension": "p... | 2.359375 | stackv2 | from flask import (Blueprint, current_app, redirect, render_template, request,
session, url_for)
from jinja2.filters import urlize
from markdown import markdown
from urlparse import urljoin
from werkzeug.contrib.atom import AtomFeed
from sqlalchemy import desc
from standup.apps.status.helpers import... | 246 | 30.12 | 126 | 18 | 1,682 | python | [{"finding_id": "codeql_py/url-redirection_ffdefe382619a55f_069bce2c", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
246
] | [
null
] | [
21
] | [
33
] | |
2024-11-19T01:51:51.106201+00:00 | 1,517,311,061,000 | 89d4d8daa91af278738a5f2a339a5ee79c8fe480 | 3 | {
"blob_id": "89d4d8daa91af278738a5f2a339a5ee79c8fe480",
"branch_name": "refs/heads/master",
"committer_date": 1517311061000,
"content_id": "a92b9ec6dd9c723db6e6253c481501edebad05d5",
"detected_licenses": [
"MIT"
],
"directory_id": "c3f317030e35db0effb85327d7b49f12641c4909",
"extension": "py",
"fi... | 2.53125 | stackv2 | import jinja2 as jga
import os
import itertools as it
class LmpWriter(object):
'''Writes the pdb data in a lammps compatible data format.
Additional parameters are specified in the config file.
'''
def __init__(self, environment):
template_path = os.path.dirname(os.path.abspath(__file__))+'/lmp... | 181 | 55.15 | 136 | 21 | 2,466 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_e7260afd0ea04f71_0a481d71", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
11
] | [
null
] | [
25
] | [
65
] | |
2024-11-19T00:55:25.025450+00:00 | 1,614,778,114,000 | 7fd77fee6e03f2ccfff48c947b7e2010f2e433c2 | 3 | {
"blob_id": "7fd77fee6e03f2ccfff48c947b7e2010f2e433c2",
"branch_name": "refs/heads/master",
"committer_date": 1614778114000,
"content_id": "b769a73c5de8feb683d9f549ce109cf43ce60aa0",
"detected_licenses": [
"MIT"
],
"directory_id": "8b982f888c26258e2905c725050fe4fae9a9a72c",
"extension": "py",
"fi... | 3.453125 | stackv2 | import tkinter as tk
class LoginApp(tk.Tk):
def __init__(self):
super().__init__()
self.username = tk.Entry(self)
self.password = tk.Entry(self, show="*")
self.loginButton = tk.Button(self, text="Log in",
command=self.printLogin)
self.cle... | 28 | 31.43 | 60 | 14 | 193 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3f64efce5abaa013_55c75c82", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
19
] | [
null
] | [
15
] | [
57
] | |
2024-11-19T00:55:26.177055+00:00 | 1,626,421,076,000 | c316f59a2d4691dfab34640df6666ce6a60575cd | 3 | {
"blob_id": "c316f59a2d4691dfab34640df6666ce6a60575cd",
"branch_name": "refs/heads/master",
"committer_date": 1626421076000,
"content_id": "bf92bbda03a045553cb9f58adb74f9ee09d368a1",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b5167eae1fa86b3729cc149da81a253b0cf3065b",
"extension": "py"... | 2.53125 | stackv2 | # *_* coding:utf-8 *_*
# 开发人员:烈焰
# 开发时间:2019/12/13 15:34
# 文件名称:page6
# 开发工具:PyCharm
# cookie session
from flask import Flask,make_response,request
app = Flask(__name__,static_url_path="/static",static_folder="static",template_folder="templates")
@app.route("/")
def index():
"""
定义视图函数
:return:
"""
... | 44 | 21.82 | 111 | 10 | 312 | python | [{"finding_id": "codeql_py/reflective-xss_050d322c448947df_c565d063", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
32
] | [
null
] | [
12
] | [
38
] | |
2024-11-19T01:39:55.843806+00:00 | 1,622,439,865,000 | 41d0cfdb90ee43f37512ae7f2674002f8f7ee9f4 | 2 | {
"blob_id": "41d0cfdb90ee43f37512ae7f2674002f8f7ee9f4",
"branch_name": "refs/heads/main",
"committer_date": 1622439865000,
"content_id": "cdc68dbf41f9f754ae54192c538bbb90113f1a36",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c0817f089d11be16f8177d21ee83630b81a3f76d",
"extension": "py",
... | 2.5 | stackv2 | import requests
import json
import datetime
import uuid
from faker import Faker
import time
import random
import os
import sys
import traceback
sys.stdout.flush()
file1 = open("output.txt","a")
faker = Faker()
headers = {
'User-Agent': 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTM... | 69 | 35.58 | 160 | 22 | 598 | python | [{"finding_id": "codeql_py/request-without-cert-validation_a794d98aa2755346_08b44572", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
30
] | [
33
] | [
20
] | [
43
] | |
2024-11-19T01:18:05.856369+00:00 | 1,634,657,584,000 | 71e4049b7086e3c355ed79068875bd346919b773 | 3 | {
"blob_id": "71e4049b7086e3c355ed79068875bd346919b773",
"branch_name": "refs/heads/main",
"committer_date": 1634657584000,
"content_id": "9133a8b5e26a77d33434ed6b5a7eb6cc08097b37",
"detected_licenses": [
"MIT"
],
"directory_id": "4b2a5d293a55ac11e761ebddff494d23f18ccf2b",
"extension": "py",
"file... | 2.953125 | stackv2 | from abc import ABC
from io import BytesIO
import re
from typing import Any, Dict, Optional, Tuple, TypeVar
from typing import List
from PIL import Image, ImageOps, ImageDraw, ImageFont, ImageSequence, ImageEnhance
import urllib.request as requests
class Env:
"""
Represents a program environment.
"""
... | 491 | 26.6 | 119 | 18 | 3,461 | python | [{"finding_id": "codeql_py/overly-large-range_4ceefe5a46b76708_26d6bc85", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\].", ... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[$%&'()*+,\\-.\\/0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_\\]."
] | [
338
] | [
null
] | [
45
] | [
48
] | |
2024-11-19T00:02:45.886029+00:00 | 1,423,050,287,000 | bf3602cda8e5e06456a7d13e0db07ed32417344c | 3 | {
"blob_id": "bf3602cda8e5e06456a7d13e0db07ed32417344c",
"branch_name": "refs/heads/master",
"committer_date": 1423050287000,
"content_id": "ee2445ba209e1ff9fc02bd7c1a605a588d1c9c65",
"detected_licenses": [
"MIT"
],
"directory_id": "2749f2ee26c4c04b344465260b99699ee539460a",
"extension": "py",
"fi... | 2.8125 | stackv2 | """scp module"""
import sys, logging, paramiko
from blox.modules.module import module, InvalidInputException, InvalidOutputException
from os.path import basename
logger = logging.getLogger( 'blox.scp' )
class scp(module):
"""scp file to destination"""
def validateInput(self,input):
"""Expect string as an input... | 37 | 32.51 | 98 | 14 | 298 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_8dea45e1943b0b94_8a697b48", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
23
] | [
null
] | [
5
] | [
62
] | |
2024-11-19T00:25:26.792031+00:00 | 1,616,405,575,000 | 4a7213e6f32197c18d0a7edead0e6905aba6a6b8 | 2 | {
"blob_id": "4a7213e6f32197c18d0a7edead0e6905aba6a6b8",
"branch_name": "refs/heads/master",
"committer_date": 1616405575000,
"content_id": "0bb872ea9ac0d6318ba83fa63fa74018608d4fb4",
"detected_licenses": [
"MIT"
],
"directory_id": "4f1642e699ead45e3feea20a3b6180ae6754a0ee",
"extension": "py",
"fi... | 2.3125 | stackv2 | """Authentication module for the swift-sharing-request."""
# The authentication is done via requests signed with a pre-whitelisted token.
# This is done to prevent invalid usage. New tokens can be created either
# manually on the platform that's running the software, or by
# pre-authenticating via Openstack Keystone.
... | 129 | 28.19 | 79 | 21 | 758 | python | [{"finding_id": "codeql_py/log-injection_57bd480828211061_aa1ea943", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).\nThis log entry depends on a [user-provided value](1)."
] | [
59,
72,
117
] | [
null,
null,
null
] | [
22,
18,
30
] | [
63,
76,
73
] | |
2024-11-19T01:02:38.017303+00:00 | 1,586,186,687,000 | 873fe871e99c9741a808bd45c64e7640f702011c | 2 | {
"blob_id": "873fe871e99c9741a808bd45c64e7640f702011c",
"branch_name": "refs/heads/master",
"committer_date": 1586186687000,
"content_id": "968537a208b8adfe6623bdb1ed48c49fcdd341f3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "48346f43b87a2e09f30cf0665f6339f7047b7b44",
"extension": "py"... | 2.40625 | stackv2 | #!/usr/bin/env python
# coding=utf-8
import logging
from contextlib import contextmanager
import click
import psycopg2
from flask import Blueprint, Flask, Response, abort
from prometheus_client import CONTENT_TYPE_LATEST, generate_latest
from prometheus_client.core import REGISTRY, GaugeMetricFamily
import postgraas... | 111 | 27.12 | 115 | 16 | 674 | python | [{"finding_id": "codeql_py/stack-trace-exposure_8c7131724dbea7f4_91b5a83e", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
82
] | [
null
] | [
24
] | [
57
] | |
2024-11-19T00:28:41.270948+00:00 | 1,623,843,086,000 | 42d9733a896287370d38f29c00ca288c473e3a93 | 3 | {
"blob_id": "42d9733a896287370d38f29c00ca288c473e3a93",
"branch_name": "refs/heads/master",
"committer_date": 1623843086000,
"content_id": "b51766c8ed7c377db58163adedcc20b2019354ba",
"detected_licenses": [
"MIT"
],
"directory_id": "f3714febb638555a0d9ac26643b8c31aaaed21df",
"extension": "py",
"fi... | 2.671875 | stackv2 | import argparse
import requests
from flask import Flask, jsonify, request
from dokuztas.blockchain import Blockchain, PendingBlock
from dokuztas.exceptions import *
from dokuztas._internals import _log, MiningThread
class NodeComponent(object):
def __init__(self, miner=False, cb_notify_nodes=None, difficulty=4):... | 324 | 34.58 | 144 | 17 | 2,735 | python | [{"finding_id": "codeql_py/unsafe-deserialization_d3ff60382046c63d_642487d4", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio... | 1 | true | [
"CWE-502"
] | [
"py/unsafe-deserialization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Unsafe deserialization depends on a [user-provided value](1)."
] | [
233
] | [
null
] | [
32
] | [
42
] | |
2024-11-19T00:28:43.560055+00:00 | 1,629,378,150,000 | d6a57d958882908d585144bacd63ffa9e2454eb5 | 3 | {
"blob_id": "d6a57d958882908d585144bacd63ffa9e2454eb5",
"branch_name": "refs/heads/master",
"committer_date": 1629378727000,
"content_id": "4d4252e799bcdcfdc4bc351051c2cf3e2d1910c1",
"detected_licenses": [
"MIT"
],
"directory_id": "5de836cf809ea7088a6c2ae66c4d4c5db2913ca8",
"extension": "py",
"fi... | 2.96875 | stackv2 | # -*- coding: utf-8 -*-
'''
Helper methods used by both pass_checker and pass_checker_async
'''
from hashlib import sha1
import passpwnedcheck.constants as constants
def get_password_prefix_suffix(password):
'''
Calculate prefix and suffix for password.
Prefix: the first 5 characters of hashed value i... | 42 | 26.07 | 88 | 13 | 247 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7f21776ba23a6673_44fad1ac", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
26
] | [
null
] | [
17
] | [
41
] | |
2024-11-19T00:51:41.510250+00:00 | 1,528,933,235,000 | c36752fe305d28ecb07ed253f1836ea4f2685d0a | 2 | {
"blob_id": "c36752fe305d28ecb07ed253f1836ea4f2685d0a",
"branch_name": "refs/heads/master",
"committer_date": 1528933235000,
"content_id": "a3bf85dfaa8214bc12954396efbf435ad3a4eeef",
"detected_licenses": [
"MIT"
],
"directory_id": "a6a9d9603719b5e9748a288cebae9ef4fc6bcd4a",
"extension": "py",
"fi... | 2.453125 | stackv2 | from http.server import BaseHTTPRequestHandler, HTTPServer
from http import cookies
from socketserver import ThreadingMixIn
import dataManagement
import time
import math
dataStor = None
_timeP = 0
def start(port, data):
global dataStor
dataStor = data
serverAddress = ('', port)
httpd = HTTPServerThrea... | 154 | 30.79 | 84 | 18 | 1,173 | python | [{"finding_id": "codeql_py/path-injection_1c449ca6c49c9bfa_ce44a79f", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
140
] | [
null
] | [
19
] | [
39
] | |
2024-11-19T01:54:55.822597+00:00 | 1,613,884,971,000 | 951b802b48ee2041cd5a631d457342e345ee4a57 | 2 | {
"blob_id": "951b802b48ee2041cd5a631d457342e345ee4a57",
"branch_name": "refs/heads/main",
"committer_date": 1613884971000,
"content_id": "b8b1c32140df2df9d489b2aba69a98fc387b29d4",
"detected_licenses": [
"MIT"
],
"directory_id": "b4fbf49978a7678e4835648742ec2dc3a1ca90f5",
"extension": "py",
"file... | 2.5 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
# ========================================================
# import設定
# ========================================================
import requests, time, json, random, string
import hmac, hashlib, base64
# ========================================================
# EndPoint ... | 155 | 31.78 | 120 | 17 | 1,439 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b34397a2b81664c6_e7ab3a23", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text."
] | [
67
] | [
null
] | [
9
] | [
31
] | |
2024-11-19T00:27:24.200809+00:00 | 1,598,692,576,000 | f671fd2a5b11c6a77370573e5145567d7b17437e | 3 | {
"blob_id": "f671fd2a5b11c6a77370573e5145567d7b17437e",
"branch_name": "refs/heads/master",
"committer_date": 1598692576000,
"content_id": "9f10bdb3dba6e95c7c4ccf66c8dbfc96be54afc0",
"detected_licenses": [
"MIT"
],
"directory_id": "2a3d4a2dd3101512c9543e5de7c4943048720915",
"extension": "py",
"fi... | 2.65625 | stackv2 | from src.parser.name_extractor import extract_name_with_rules
from src.parser.text_extractor import extract_text_from_document
from src.parser.phone_number_extractor import extract_phone_number_with_multiple_expressions
from src.parser.email_extractor import extract_email_with_regular_expression_v1
from src.parser.skil... | 43 | 39.44 | 92 | 9 | 356 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2ca868994667c097_56f3ac2a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
35
] | [
null
] | [
22
] | [
27
] | |
2024-11-19T01:06:17.734370+00:00 | 1,454,435,591,000 | 444d5e11f9a4eb59c4ef68d921c2d165034bd065 | 3 | {
"blob_id": "444d5e11f9a4eb59c4ef68d921c2d165034bd065",
"branch_name": "refs/heads/master",
"committer_date": 1454435591000,
"content_id": "34ca3ce1c604a7822215b6f4883085fb5f9ca749",
"detected_licenses": [
"MIT"
],
"directory_id": "d576898e3a41669bd68cade4439ec97a52cc6062",
"extension": "py",
"fi... | 3.0625 | stackv2 | """Reddit Saver
Usage:
saver.py
saver.py -u <user> [-p <password>]
saver.py -o <output> | [-l <links>]
saver.py -h | --help
Fetch saved posts links or read them from a file and try to download their
content.
Arguments:
-u --user <user> specify username
-p --password <password> specify passwo... | 179 | 30.84 | 79 | 19 | 1,431 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_47891a6185f01c3a_b7bb8fda", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [imgur.com/](1) may be at an arbitrary position in the ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [imgur.com/](1) may be at an arbitrary position in the sanitized URL."
] | [
88
] | [
null
] | [
16
] | [
40
] | |
2024-11-19T01:17:11.980605+00:00 | 1,689,012,531,000 | 01eebf66b559748a3abfa5b95d909e24ba744ea5 | 2 | {
"blob_id": "01eebf66b559748a3abfa5b95d909e24ba744ea5",
"branch_name": "refs/heads/master",
"committer_date": 1689012531000,
"content_id": "a1f69e71337e59545a2fe5e13318cc99672ca4bf",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "5415ce8edb8696858f5aafb94e686868a00b872b",
"extension": "p... | 2.4375 | stackv2 | #!/usr/bin/env python3
'''
* Copyright (C) 2022 Intel Corporation.
*
* SPDX-License-Identifier: BSD-3-Clause
'''
import uuid
import socket
import os
import paho.mqtt.client as mqtt
from paho.mqtt import publish
class Sidecar:
def __init__(self, k8s_namespace, k8s_releasename, mac_address):
self.k8s_names... | 61 | 37.23 | 106 | 16 | 576 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_047e24ecc7028c35_cd7afae2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
27
] | [
null
] | [
15
] | [
97
] | |
2024-11-19T01:17:24.955682+00:00 | 1,429,894,168,000 | 960c75f518fc1f7d191211b2f31f78b3a1ecf364 | 3 | {
"blob_id": "960c75f518fc1f7d191211b2f31f78b3a1ecf364",
"branch_name": "refs/heads/master",
"committer_date": 1429894168000,
"content_id": "13a081497f4346a4390de8daa0e45c43b1b237ca",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7019a834e9e278ff3eebbfce8c0fe1ae93eaffa0",
"extension": "py"... | 2.921875 | stackv2 | import requests
import sys
import json
from alchemyapi import AlchemyAPI
alchemyapi = AlchemyAPI()
def main(sku, maxReviews):
print "Searching Best Buy for product reviews and performing NLP analysis..."
pages = (maxReviews/100) + 2
reviews=[]
apiKey= open('bestbuy_key.txt', 'r').read().strip()
... | 122 | 33.51 | 131 | 18 | 1,049 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_80ec833d3f159c9c_8d82521f", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 8 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage... | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression sto... | [
86,
87,
90,
91,
95,
96,
100,
101
] | [
null,
null,
null,
null,
null,
null,
null,
null
] | [
17,
17,
21,
21,
21,
21,
21,
21
] | [
108,
59,
53,
69,
52,
68,
35,
51
] | |
2024-11-19T01:17:28.920846+00:00 | 1,627,362,438,000 | 1e525db3b444ab1ae82332d684d2189713a28f1d | 3 | {
"blob_id": "1e525db3b444ab1ae82332d684d2189713a28f1d",
"branch_name": "refs/heads/master",
"committer_date": 1627362438000,
"content_id": "367d0af947644ff05aa3aef3c7ed0cf75ed9f960",
"detected_licenses": [
"MIT"
],
"directory_id": "6764e2bff984913eaedfde1b811409064852cf10",
"extension": "py",
"fi... | 2.75 | stackv2 | #!env python3.9
"""VEEAM AHV Proxy Dumper
This script creates a backup from VEEAM AHV Proxy configuration
and save them to local place.
In this way way you are able to periodically creates backup of your proxies.
Example:
./fetch.py --host myproxy.company.net:8100 --backup-password veeam
Authors:
Martin Web... | 209 | 30.43 | 92 | 14 | 1,383 | python | [{"finding_id": "codeql_py/request-without-cert-validation_52a1729d4cc241d5_abebdb8e", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
107,
130,
168,
192
] | [
null,
133,
171,
null
] | [
19,
15,
15,
15
] | [
67,
42,
42,
63
] | |
2024-11-19T00:43:42.858095+00:00 | 1,383,284,669,000 | 6105729c87ba234f1fb9ad5997189279bafaeb19 | 3 | {
"blob_id": "6105729c87ba234f1fb9ad5997189279bafaeb19",
"branch_name": "refs/heads/master",
"committer_date": 1383284678000,
"content_id": "a42fd189dcb7e9726585930d42b98fc864f3ff7f",
"detected_licenses": [
"MIT"
],
"directory_id": "ff0c7b22e53d1593cda158dc8a87736bc4114709",
"extension": "py",
"fi... | 2.8125 | stackv2 | import glob
import os
from post import Post
from jinja2 import Template
class Webblog(object):
def __init__(self, base_path, render_base_path):
self.__base_path = base_path
self.__render_base_path = render_base_path
self.__months = ['January', 'February', 'March', 'April',
... | 61 | 32.89 | 79 | 20 | 456 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2311347a88eb6767_af39df41", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
26
] | [
null
] | [
20
] | [
46
] | |
2024-11-19T00:43:44.132660+00:00 | 1,531,194,846,000 | df35c42d1e9176b4117f18f9af163a2603c9a3ea | 2 | {
"blob_id": "df35c42d1e9176b4117f18f9af163a2603c9a3ea",
"branch_name": "refs/heads/master",
"committer_date": 1531194846000,
"content_id": "2e0d06975e1e88b86e4ab33e24c586d6b0d03772",
"detected_licenses": [
"Python-2.0"
],
"directory_id": "4388363ba45b95910c25bae3d9c02ad78f4a75d6",
"extension": "py"... | 2.328125 | stackv2 | # -*- coding: utf-8 -*-
# -----------------------------------------------------------------------------
# Copyright 2016 Continuum Analytics, Inc.
#
# May be copied and distributed freely only as part of an Anaconda or
# Miniconda installation.
# -------------------------------------------------------------------------... | 164 | 26.84 | 79 | 15 | 1,038 | python | [{"finding_id": "codeql_py/overly-permissive-file_2fe75677da9341a2_8d52d8df", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
126
] | [
null
] | [
5
] | [
27
] | |
2024-11-19T00:43:44.656673+00:00 | 1,578,560,931,000 | b4bd137e4b93fdbeb9ab4c4496d19767af08abd0 | 3 | {
"blob_id": "b4bd137e4b93fdbeb9ab4c4496d19767af08abd0",
"branch_name": "refs/heads/master",
"committer_date": 1578560931000,
"content_id": "62f118bd507062d886f16c70ab0c635a445cdd70",
"detected_licenses": [
"MIT"
],
"directory_id": "398fb61114084d7f51dde61cd706250a9449646a",
"extension": "py",
"fi... | 2.53125 | stackv2 | import os
import urllib.request
import urllib.error
import json
import datetime
from weasyprint import HTML
from flask import Flask, Response, render_template, abort
API_KEY = os.environ.get('API_KEY', 'DEMO_KEY')
API_URL = "https://api.nasa.gov/planetary/apod?date={}&api_key=" + API_KEY
app = Flask(__name__)
def a... | 60 | 24.25 | 89 | 15 | 351 | python | [{"finding_id": "codeql_py/flask-debug_e749c3778db0c9df_0204ee88", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/partial-ssrf"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2)."
] | [
60,
16
] | [
null,
null
] | [
5,
10
] | [
24,
54
] | |
2024-11-19T00:43:45.117228+00:00 | 1,627,280,451,000 | 828410f320df89e16a0a571699b63f9ddca22c48 | 3 | {
"blob_id": "828410f320df89e16a0a571699b63f9ddca22c48",
"branch_name": "refs/heads/main",
"committer_date": 1627280451000,
"content_id": "778df52cd98d358aeeaa3cd2f864bdb6647f52ff",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "cfd1e4d90a2781b815e25ca9eddb645cb856caf5",
"extension": "py",
... | 2.65625 | stackv2 | import logging
from threading import Timer
from tencentcloud.ssm.v20190923 import models, ssm_client
from tencentcloud.common.profile import client_profile
from tencentcloud.common import credential
from tencentcloud.common.exception.tencent_cloud_sdk_exception import TencentCloudSDKException
class Error:
"""自定义错... | 180 | 28.94 | 101 | 15 | 1,451 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9c64aad4fbeacb85_de604cbb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text."
] | [
132,
175
] | [
null,
null
] | [
11,
29
] | [
55,
41
] | |
2024-11-19T01:32:05.663906+00:00 | 1,625,714,492,000 | cb3108c564eff22a1c47b45e37bb76c82c31933d | 3 | {
"blob_id": "cb3108c564eff22a1c47b45e37bb76c82c31933d",
"branch_name": "refs/heads/master",
"committer_date": 1625714492000,
"content_id": "e3357a214dda201edf48ce48cc3f370c5aeb3c76",
"detected_licenses": [
"MIT"
],
"directory_id": "327c6c770ef214717f269f4f55d872b204b86765",
"extension": "py",
"fi... | 3.140625 | stackv2 | r"""This module implements ISO/IEC 9797-1 MAC algorithms and
padding methods used in retail payments.
See https://en.wikipedia.org/wiki/ISO/IEC_9797-1 for more information.
"""
import enum as _enum
import typing as _typing
from cryptography.hazmat.backends import default_backend as _default_backend
from cryptography... | 330 | 25.83 | 84 | 12 | 2,631 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_971e1cf990a5bfe6_cfdf46e6", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The cryptographic algorithm TRIPLEDES](1) is broken or weak, and should not be used... | 3 | true | [
"CWE-327",
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[The cryptographic algorithm TRIPLEDES](1) is broken or weak, and should not be used.",
"[The cryptographic algorithm TRIPLEDES](1) is broken or weak, and should not be used.",
"[The cryptographic algorithm TRIPLEDES](1) is broken or weak, and should not be used."
] | [
196,
203,
203
] | [
null,
null,
null
] | [
12,
30,
12
] | [
35,
53,
54
] | |
2024-11-19T01:32:19.428483+00:00 | 1,551,666,052,000 | f06f60b46dfc619fb3dfa93470cd6bbca21242d6 | 5 | {
"blob_id": "f06f60b46dfc619fb3dfa93470cd6bbca21242d6",
"branch_name": "refs/heads/master",
"committer_date": 1551666052000,
"content_id": "7bca42ef1d545f802ea0ec6fa5ef44e08073eec4",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "be6f7f15cb2441f231456143eb75a7a2c19de03e",
"extension": "py"... | 4.8125 | stackv2 | # Lesson 8 Class Inheritance and Polymorphism
# Part 1
class Employee:
"""Employee class"""
def __init__(self, name, salary, hire_date):
self.name = str(name)
self.salary = int(salary)
self.hire_date = str(hire_date)
def get_name(self):
print('Hi! My name is', self.name)
... | 34 | 22.82 | 63 | 11 | 226 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_4ad3f5a9c7a49401_feb849f1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
17
] | [
null
] | [
25
] | [
36
] | |
2024-11-19T01:32:25.295561+00:00 | 1,570,695,761,000 | b2a4a36f3e7f8d405700386d4f2db5f983aacb90 | 2 | {
"blob_id": "b2a4a36f3e7f8d405700386d4f2db5f983aacb90",
"branch_name": "refs/heads/master",
"committer_date": 1570695761000,
"content_id": "01ec7a14c31abf0346545a4b1db22ffc82fc8eb4",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "0e9c8fa95822001c25f4bfe96017a7341f736e27",
"extension": "p... | 2.421875 | stackv2 | """OpenAPI core wrappers module"""
import re
from openapi_core.wrappers.base import BaseOpenAPIRequest, BaseOpenAPIResponse
# https://docs.djangoproject.com/en/2.2/topics/http/urls/
#
# Currently unsupported are :
# - nested arguments, e.g.: ^comments/(?:page-(?P<page_number>\d+)/)?$
# - unnamed regex groups, e.g... | 104 | 26.23 | 118 | 13 | 637 | python | [{"finding_id": "codeql_py/redos_2e2416d846230ce1_31c1a74c", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<' and containing many repetition... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '<' and containing many repetitions of ':'."
] | [
15
] | [
null
] | [
46
] | [
49
] | |
2024-11-19T01:43:40.766650+00:00 | 1,541,199,685,000 | e706dd2f6d88a76545c3913d0ff60fbcd1ddb480 | 3 | {
"blob_id": "e706dd2f6d88a76545c3913d0ff60fbcd1ddb480",
"branch_name": "refs/heads/master",
"committer_date": 1541199685000,
"content_id": "2bb333b44fbae8222f4cc50b0d5b04d9bea15629",
"detected_licenses": [
"MIT"
],
"directory_id": "00efb53ba90c5e24b261351138235364acf23ee7",
"extension": "py",
"fi... | 2.640625 | stackv2 | from http.server import HTTPServer
import ssl
import sys
import types
import pyodbc
from odbcnotebook import jsonrpc, odbc
USAGE = 'odbcnotebook [-p PORT] [-c CONNECTION_STRING] [-s KEY CERT PASSWORD]'
def wrap_ssl(runconfig, sock):
"""
Wraps a socket in an SSL context, if SSL is enabled.
"""
if run... | 103 | 27.25 | 101 | 17 | 647 | python | [{"finding_id": "codeql_py/insecure-protocol_ea4be59ee75186d9_1f415d74", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1)."
] | [
19
] | [
null
] | [
16
] | [
23
] | |
2024-11-19T01:43:49.932302+00:00 | 1,619,104,949,000 | 110dba061cae796b141c3dec2c2ab2d2ea098d4a | 3 | {
"blob_id": "110dba061cae796b141c3dec2c2ab2d2ea098d4a",
"branch_name": "refs/heads/main",
"committer_date": 1619104949000,
"content_id": "2a07386fb55240e6f28acb80dfae8ace4ea5fb1d",
"detected_licenses": [
"MIT"
],
"directory_id": "b551dc2483a1be6c9e704c4e9b3ccb1eee4cec20",
"extension": "py",
"file... | 3.015625 | stackv2 | #! python3
# Author : Petar I
# GitHub : https://github.com/Ipetar69
# Year : 2021.
# Description : Script that generates random Gmail account.
import pyautogui
import sys
import time
import random
import string
import os
# Printing funtion with 3 modes
# 1 : Normal message
# 2 : Information... | 204 | 25.7 | 137 | 17 | 1,637 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c36fce1ec2f5e5dc_93d68b43", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
24,
26,
28
] | [
null,
null,
null
] | [
15,
15,
15
] | [
53,
53,
75
] | |
2024-11-19T01:44:09.862639+00:00 | 1,648,725,382,000 | b8f45978be066fdacd9ec31cdf6a01d94b931425 | 3 | {
"blob_id": "b8f45978be066fdacd9ec31cdf6a01d94b931425",
"branch_name": "refs/heads/master",
"committer_date": 1648725382000,
"content_id": "903b053a1a0321081bc6c096ae5c65458c97cf4d",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e459a9608225b81bdb0a5b85cd19b7bd0f6df38e",
"extension": "py"... | 2.6875 | stackv2 | #coding=utf-8
import os
import re
import sys
import time
from nb_log import LoggerMixin, LoggerLevelSetterMixin
import paramiko
class ParamikoFolderUploader(LoggerMixin, LoggerLevelSetterMixin):
"""
paramoki 实现的文件夹上传
"""
def __init__(self, host, port, user, password, local_dir: str, remote_dir: str,
... | 114 | 39.31 | 120 | 22 | 1,113 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e730f6ab96945877_9ae4aa04", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
56
] | [
null
] | [
9
] | [
66
] | |
2024-11-19T02:19:56.423009+00:00 | 1,569,175,199,000 | 05e70c51fa5b9af75fd1840785cc1d0ed1c06da1 | 3 | {
"blob_id": "05e70c51fa5b9af75fd1840785cc1d0ed1c06da1",
"branch_name": "refs/heads/master",
"committer_date": 1569175199000,
"content_id": "6747f02492b03e65fa76542c8081fde0509463ce",
"detected_licenses": [
"Unlicense"
],
"directory_id": "20f0f7ad99206c6d81b353cddfa3ccc699cb4741",
"extension": "py",... | 2.859375 | stackv2 | """
Parts of the code, copy modified from:
http://www.danmandle.com/blog/getting-gpsd-to-work-with-python/
Written by Dan Mandle http://dan.mandle.me September 2012
License: GPL 2.0
and from:
Read Gyro and Accelerometer by Interfacing Raspberry Pi with MPU6050 using Python
... | 139 | 33.45 | 118 | 16 | 1,342 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_90037027930fe3c3_694d5aea", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text."
] | [
130
] | [
null
] | [
32
] | [
36
] | |
2024-11-19T00:59:31.595995+00:00 | 1,574,348,932,000 | 8a31ea7d36bf5f47f91a007da324179651c66107 | 2 | {
"blob_id": "8a31ea7d36bf5f47f91a007da324179651c66107",
"branch_name": "refs/heads/master",
"committer_date": 1574348932000,
"content_id": "ced7b3715ad74377d9cff130a94b559b15b0528b",
"detected_licenses": [
"MIT"
],
"directory_id": "6e0c7a724ab47c5390ada9108c2b7455105e09e2",
"extension": "py",
"fi... | 2.375 | stackv2 | import wikipedia,os
from flask import Flask
from flask import request,jsonify
import warnings
warnings.filterwarnings("ignore")
import sys
sys.path.append('/Users/prajwalkirankumar/Documents/WT2/api/Chatbot/')
from chatbot import Chat,reflections,multiFunctionCall
from flask_sse import sse
from apscheduler.scheduler... | 214 | 32.15 | 138 | 14 | 1,787 | python | [{"finding_id": "codeql_py/sql-injection_53418477eab7af62_e369cab2", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 2 | true | [
"CWE-089",
"CWE-089"
] | [
"py/sql-injection",
"py/sql-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).",
"This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2)."
] | [
178,
184
] | [
null,
null
] | [
32,
17
] | [
106,
99
] | |
2024-11-19T00:59:38.829637+00:00 | 1,605,253,690,000 | cf5e63a7feeb82d68246852d7e4d35e9bd1ba5fa | 2 | {
"blob_id": "cf5e63a7feeb82d68246852d7e4d35e9bd1ba5fa",
"branch_name": "refs/heads/main",
"committer_date": 1605253690000,
"content_id": "4a32929c87f2107b92e5d18a7fab141c4e0cea5f",
"detected_licenses": [
"MIT"
],
"directory_id": "747139140194a79f6eefe519e84f4adf544109e9",
"extension": "py",
"file... | 2.3125 | stackv2 |
from time import sleep
import paho.mqtt.client as mqtt
import urllib.parse
def mqtt_publish(mqtt_client, topic, payload):
mqtt_client.publish(topic=topic, payload=payload)
class AccessControlWorker(object):
"""Missing associated documentation comment in .proto file."""
def DingDong(self, request):
... | 83 | 29.13 | 74 | 15 | 596 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0f2fd916544cdfde_9da73dba", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
61
] | [
null
] | [
15
] | [
60
] | |
2024-11-19T00:59:55.953711+00:00 | 1,545,273,010,000 | 93851622a39c2580bac527842fec44e609183688 | 2 | {
"blob_id": "93851622a39c2580bac527842fec44e609183688",
"branch_name": "refs/heads/master",
"committer_date": 1545273010000,
"content_id": "62083cfcac30c1095516c29ef421b465b1ddf103",
"detected_licenses": [
"MIT"
],
"directory_id": "cc5fbb0cdce778b4c9b6822e3f9e074c0e3d3af6",
"extension": "py",
"fi... | 2.4375 | stackv2 | import paramiko
import time
#new181220
ip_address = "10.0.0.1"
username = "sshname"
password = "sshpassword"
ssh_client = paramiko.SSHClient()
ssh_client.set_missing_host_key_policy(paramiko.AutoAddPolicy())
ssh_client.connect(hostname=ip_address,username=username,password=password)
print "Successful connection", i... | 36 | 25.25 | 75 | 11 | 277 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_01b227095b1cb418_29987914", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
11
] | [
null
] | [
null
] | [
65
] | |
2024-11-19T01:00:13.857606+00:00 | 1,633,926,353,000 | 82a42fe92cc03c06f1de52e343b5f6ec080642fd | 3 | {
"blob_id": "82a42fe92cc03c06f1de52e343b5f6ec080642fd",
"branch_name": "refs/heads/master",
"committer_date": 1633926353000,
"content_id": "39c46797f1049a67b23ea28df75231ce2f235460",
"detected_licenses": [
"MIT"
],
"directory_id": "a687c62f9f66d2ad3a793d6cbf6bc0cd0d00c1fa",
"extension": "py",
"fi... | 2.859375 | stackv2 | # Credit to: https://github.com/jayjzheng/draftaid-react/blob/5a99a0b9f4cac4e4ccbfb36c86ecee19640969b3/data/fantasyProCsv.py
import json
import re
import requests
from bs4 import BeautifulSoup
url = "https://www.fantasypros.com/nhl/rankings/overall.php"
def get_data():
players = []
r = requests.get(url)
... | 48 | 32.21 | 124 | 17 | 486 | python | [{"finding_id": "codeql_py/overly-large-range_7f0efe690bab6b66_3660be1c", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
29
] | [
null
] | [
34
] | [
37
] | |
2024-11-19T01:11:46.360561+00:00 | 1,542,017,905,000 | d9b711290baf7c9d2b3f74e025858766697527ae | 3 | {
"blob_id": "d9b711290baf7c9d2b3f74e025858766697527ae",
"branch_name": "refs/heads/master",
"committer_date": 1542017905000,
"content_id": "6bdabad406d2fc3a8106af15cc2283ebdc63a4c3",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7e3429024669e6978c170a20e299ee976f8ef04f",
"extension": "py"... | 3.09375 | stackv2 | import nltk
from nltk import ChartParser
import glob
import re
import json
from collections import Counter
def load_json(filename):
"Utility function to load json files in one line."
with open(filename) as f:
return json.load(f)
GENDERED = set(load_json('./resources/gendered.json'))
STOPWORDS = s... | 101 | 29.62 | 89 | 16 | 721 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_e4c60127822ffc06_ea2d3b03", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text."
] | [
97
] | [
null
] | [
18
] | [
23
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.