added stringlengths 32 32 | created int64 1,236B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.03 | source stringclasses 1
value | text stringlengths 330 19.3k | num_lines int64 16 648 | avg_line_length float64 15.5 59.3 | max_line_length int64 37 179 | ast_depth int64 8 38 | length int64 102 3.79k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.11k 276k | sast_codeql_findings_count int64 1 33 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 33 | rule_ids listlengths 1 33 | confidences listlengths 1 33 | severities listlengths 1 33 | messages listlengths 1 33 | line_starts listlengths 1 33 | line_ends listlengths 1 33 | column_starts listlengths 1 33 | column_ends listlengths 1 33 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T03:44:11.381549+00:00 | 1,598,391,580,000 | deb60c59fbff57da674a2d5c9385e26b81b08ead | 3 | {
"blob_id": "deb60c59fbff57da674a2d5c9385e26b81b08ead",
"branch_name": "refs/heads/master",
"committer_date": 1598391580000,
"content_id": "59202d678ddb07ce0f4d3cafede6a27ab9423f4a",
"detected_licenses": [
"MIT"
],
"directory_id": "3fdff6bf3ef0e4b13a1ca028d04e837ced551b4a",
"extension": "py",
"fi... | 2.609375 | stackv2 | import copy
import json
import os
import re
from pprint import pprint
temp_dir = os.getcwd()
update_courses_dir = os.path.join(temp_dir, "user_data", "courses_for_all_professions", 'IT_courses')
def sort_courses_by_num_students(dict_courses_for_job):
"""
It is how I filter courses with number of students,
... | 249 | 40.72 | 160 | 25 | 1,876 | python | [{"finding_id": "codeql_py/overly-large-range_0e182062014dfa02_40b5998a", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
84
] | [
null
] | [
24
] | [
27
] | |
2024-11-19T03:44:19.711516+00:00 | 1,610,005,842,000 | 66254ac43c2ee5cdb1eb7e383f0da4239a288634 | 2 | {
"blob_id": "66254ac43c2ee5cdb1eb7e383f0da4239a288634",
"branch_name": "refs/heads/main",
"committer_date": 1610005842000,
"content_id": "5b2a19e74b6f76a4581bb994581b60db2177b6b5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "baef65d4eaf341cc915f4cf16af67e127dd9069d",
"extension": "py",
... | 2.390625 | stackv2 | import boto3
from jinja2 import Environment as jEnv
from jinja2 import Template, FileSystemLoader
import time
from src.environment import Environment
from src.acm import ACM
from src.helpers import Helper
from src.route53 import Route53
class CloudFront():
""" Class describes CloudFront interface. """
def __... | 118 | 36.06 | 102 | 16 | 866 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_4756047cea367fa7_25b3b6b2", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
93
] | [
null
] | [
15
] | [
39
] | |
2024-11-19T03:44:23.266250+00:00 | 1,500,660,670,000 | dfad61dd1c1d7eb6c422bbea37da174efe2113ed | 3 | {
"blob_id": "dfad61dd1c1d7eb6c422bbea37da174efe2113ed",
"branch_name": "refs/heads/master",
"committer_date": 1500660670000,
"content_id": "e5ae1eeaa425f6adfe71f904c67d7e9cf0d0601c",
"detected_licenses": [
"MIT"
],
"directory_id": "dcfa45dea53a321732727a90b82cb3177ee6c854",
"extension": "py",
"fi... | 2.5625 | stackv2 | # -*- coding: utf8 -*-
"""
Exports the exercises blueprint.
Currently all this does is embed the
already existing external exercises web app
as an iframe
"""
from functools import wraps
import flask
from zeeguu.model.user import User
# we define the blueprint here, and extended it in s... | 55 | 22.09 | 81 | 17 | 289 | python | [{"finding_id": "codeql_py/url-redirection_b93cf3b28b367c5c_cb5688fb", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
51
] | [
null
] | [
35
] | [
44
] | |
2024-11-19T03:44:35.933081+00:00 | 1,692,974,239,000 | a5ac2246bdadd605116949e1e70b6dbf62746bbf | 2 | {
"blob_id": "a5ac2246bdadd605116949e1e70b6dbf62746bbf",
"branch_name": "refs/heads/main",
"committer_date": 1692974239000,
"content_id": "24208d5a8cb6d97ce5cabd664c1c4e702695f4e4",
"detected_licenses": [
"Apache-2.0",
"BSD-2-Clause"
],
"directory_id": "6bb45c5892b4c9692dcc44116fb73dc9e7ab90ff",
... | 2.3125 | stackv2 | import os
os.system('python3 -m pip install -U sagemaker xgboost==1.0.1 scikit-learn')
import glob
import boto3
import json
import pathlib
import pickle
import tarfile
from datetime import datetime
import joblib
import numpy as np
import pandas as pd
import xgboost
import argparse
from sklearn.metrics import mean_squ... | 81 | 26.62 | 102 | 13 | 540 | python | [{"finding_id": "codeql_py/tarslip_ba0bbf339812df39_127ea4f8", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
50
] | [
null
] | [
9
] | [
12
] | |
2024-11-19T01:44:11.385996+00:00 | 1,556,845,317,000 | caa5ab268de3db10c50be5184306e7ff6e74b592 | 3 | {
"blob_id": "caa5ab268de3db10c50be5184306e7ff6e74b592",
"branch_name": "refs/heads/master",
"committer_date": 1556845317000,
"content_id": "b73f9c80af01ac634a466a693391c784a6277233",
"detected_licenses": [
"MIT"
],
"directory_id": "26e3d7cec68f96e1ed8686998df4304690dc008a",
"extension": "py",
"fi... | 2.609375 | stackv2 | '''
LF2
'''
import boto3
import json
import logging
from botocore.vendored import requests
from boto3.dynamodb.conditions import Key, Attr
logger = logging.getLogger()
logger.setLevel(logging.DEBUG)
def poll_from_queue():
cuisine = None
phone_num = None
location = None
dining_date = None
d... | 137 | 31.99 | 155 | 18 | 1,050 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3b023c6390a119fd_7e103ebe", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text."
] | [
135
] | [
null
] | [
18
] | [
76
] | |
2024-11-19T02:08:15.466617+00:00 | 1,560,943,755,000 | 014971a27c84a9c1e9a32e7904ab5836ca3ba0c5 | 3 | {
"blob_id": "014971a27c84a9c1e9a32e7904ab5836ca3ba0c5",
"branch_name": "refs/heads/master",
"committer_date": 1560943755000,
"content_id": "3b026f98a848006f31825f1665c586afd2e0102e",
"detected_licenses": [
"MIT"
],
"directory_id": "a287d599b93feaeaadea8362857236de9f5a1d6b",
"extension": "py",
"fi... | 2.65625 | stackv2 | # 作者:Charles
# 公众号:Charles的皮卡丘
# 一些工具函数/类
import os
import re
import sys
import time
import click
import requests
import urllib.parse as urlparse
from contextlib import closing
# 视频转换
#########################################################################################################################
'''
Function... | 238 | 29.61 | 136 | 25 | 1,921 | python | [{"finding_id": "codeql_py/request-without-cert-validation_fd047add5b24564c_0914a5ce", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
100
] | [
null
] | [
16
] | [
83
] | |
2024-11-19T02:08:40.750703+00:00 | 1,628,986,809,000 | 5650bb8f82f1a7d4979277ceea5edbf32b70ed84 | 3 | {
"blob_id": "5650bb8f82f1a7d4979277ceea5edbf32b70ed84",
"branch_name": "refs/heads/master",
"committer_date": 1628986809000,
"content_id": "a0590486ad1dc54649b0cc63c2196428c54611b7",
"detected_licenses": [
"MIT"
],
"directory_id": "a216d836ae9f938a0e0a8019ee05d4db03a37510",
"extension": "py",
"fi... | 2.5625 | stackv2 | from flask import Flask, request
import logging
app = Flask(__name__)
LOGGER = logging.getLogger('alerthook')
@app.route("/", methods=["GET", "POST"])
def echo():
data = request.get_json()
LOGGER.info(data)
return data
if __name__ == "__main__":
# Setting up logging
LOGGER.setLevel("INFO")
... | 29 | 25.72 | 63 | 9 | 190 | python | [{"finding_id": "codeql_py/reflective-xss_3897ce8cccf5e18f_90090f19", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-117"
] | [
"py/reflective-xss",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
12,
11
] | [
null,
null
] | [
12,
17
] | [
16,
21
] | |
2024-11-19T02:21:37.877178+00:00 | 1,440,961,632,000 | e5f6581b075d8e2469b8bd7f359c0d666a70535e | 2 | {
"blob_id": "e5f6581b075d8e2469b8bd7f359c0d666a70535e",
"branch_name": "refs/heads/master",
"committer_date": 1440961632000,
"content_id": "76568bd5805de293143df40d0c668553107e470d",
"detected_licenses": [
"MIT"
],
"directory_id": "7544bbeeebec69cccc7e75bd7246e8af1f63744f",
"extension": "py",
"fi... | 2.46875 | stackv2 | import bleach
import evelink
import markdown
import arrow
from mumble.exceptions import InvalidCorporationError, InvalidAllianceError
from mumble.models import redis
from six import iteritems
try:
from urlparse import urlparse, urljoin
except ImportError:
from urllib.parse import urlparse, urljoin
from flask ... | 83 | 28.95 | 85 | 15 | 570 | python | [{"finding_id": "codeql_py/url-redirection_ea1aa556f8e98334_d3951e22", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
35
] | [
null
] | [
21
] | [
58
] | |
2024-11-19T03:10:15.465840+00:00 | 1,651,781,595,000 | 8348088619f40912f9dca16a56341c44cbece1e7 | 3 | {
"blob_id": "8348088619f40912f9dca16a56341c44cbece1e7",
"branch_name": "refs/heads/main",
"committer_date": 1651781595000,
"content_id": "dcde4851aae5d55dba6ac61ff20c230813d6ba9e",
"detected_licenses": [
"MIT"
],
"directory_id": "2b03f930b547c79385ee3f9fd04d7299b556733f",
"extension": "py",
"file... | 3 | stackv2 | #!/usr/bin/python
# std libs
import sys
import socket
import ssl
import argparse
def conn_cleanup(tls_sock):
tls_sock.shutdown(socket.SHUT_RDWR)
tls_sock.close()
def main():
parser = argparse.ArgumentParser(description='Retrieve a password securely.')
parser.add_argument('--hostname', required=True, \
h... | 85 | 39.71 | 132 | 17 | 841 | python | [{"finding_id": "codeql_py/insecure-protocol_c8d755144e7eb0ee_a07674dd", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)."
] | [
35
] | [
null
] | [
14
] | [
21
] | |
2024-11-19T03:22:41.108129+00:00 | 1,575,876,213,000 | 3992882a5f54d2f7b254d3afed5b3f8ed682c271 | 3 | {
"blob_id": "3992882a5f54d2f7b254d3afed5b3f8ed682c271",
"branch_name": "refs/heads/master",
"committer_date": 1575876213000,
"content_id": "89be19bc2b5b6a86e758c320117e927f9acbcc63",
"detected_licenses": [
"MIT"
],
"directory_id": "030c94fc2e52ede95faeabe8df6b036ea029e302",
"extension": "py",
"fi... | 2.765625 | stackv2 | from urllib.request import urlopen
import json
url = "http://api.open-notify.org/iss-now.json"
jsonurl = urlopen(url)
info = json.loads(jsonurl.read())
print(info)
longitude = info['iss_position']['longitude']
latitude = info['iss_position']['latitude']
print(longitude)
print(latitude)
from mpl_toolkits.basemap im... | 31 | 21.87 | 54 | 8 | 204 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1b0279f299102d9b_ad4b7ba8", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
13,
14
] | [
null,
null
] | [
7,
7
] | [
16,
15
] | |
2024-11-19T03:22:48.344525+00:00 | 1,501,223,016,000 | 687c8f9e7695c76cf462883be7979feaa282e8e6 | 2 | {
"blob_id": "687c8f9e7695c76cf462883be7979feaa282e8e6",
"branch_name": "refs/heads/master",
"committer_date": 1501223016000,
"content_id": "c1370787323d23cc1a459472706973baf1dee36e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "f784ebb59a4e75d6f1cdf30246701aba937dcdde",
"extension": "py"... | 2.4375 | stackv2 | # coding=utf-8
import os
import sys
reload(sys)
sys.setdefaultencoding("utf-8")
import time
from flask import request, send_from_directory
from flask import Flask, request, redirect, url_for
import uuid
import tensorflow as tf
from classify_image import run_inference_on_image
ALLOWED_EXTENSIONS = set(['jpg','JPG', 'jp... | 90 | 30.83 | 98 | 14 | 751 | python | [{"finding_id": "codeql_py/reflective-xss_0d8be8ad1ee7f832_7e0560cc", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-022"
] | [
"py/reflective-xss",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
84,
80
] | [
null,
null
] | [
14,
17
] | [
31,
26
] | |
2024-11-19T03:23:04.358486+00:00 | 1,636,226,257,000 | 5a716504a4e9be5cebe0ef3a1a8353846379e336 | 2 | {
"blob_id": "5a716504a4e9be5cebe0ef3a1a8353846379e336",
"branch_name": "refs/heads/main",
"committer_date": 1636226257000,
"content_id": "bbb4d49a3ea6649bf8f69e17b6787b6475b9ede0",
"detected_licenses": [
"MIT"
],
"directory_id": "16847739843cd706d0b58516a9267ffed36fca7b",
"extension": "py",
"file... | 2.484375 | stackv2 | from pathlib import Path
from typing import List, Union
from datetime import datetime
import logging
import json
import requests
import yaml
import pandas as pd
# show all logs
logging.basicConfig(level=logging.DEBUG)
# set log level from requests and urllib3 to INFO
logging.getLogger("requests").setLevel(logging.I... | 419 | 33.05 | 97 | 18 | 2,835 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f88003c8a512ad1f_c83337dc", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
117
] | [
null
] | [
23
] | [
38
] | |
2024-11-19T01:34:47.269297+00:00 | 1,660,762,288,000 | bd30c826deff1665f75d7bbd80755fddf09ebad8 | 2 | {
"blob_id": "bd30c826deff1665f75d7bbd80755fddf09ebad8",
"branch_name": "refs/heads/master",
"committer_date": 1660762288000,
"content_id": "a5e079f20178b445cebddb0fc6545f0d7e9c6375",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4f15aecfe77e4b505b4219f96306970eb95535c0",
"extension": "py"... | 2.484375 | stackv2 | import hashlib
import json
import logging
import shutil
import uuid
from pathlib import Path
import numpy as np
from PIL import Image
from pycocotools.mask import encode as mask_to_rle
import datasetinsights.constants as const
from datasetinsights.datasets.transformers.base import DatasetTransformer
from datasetinsig... | 405 | 35.36 | 80 | 22 | 3,077 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_f8597d1fbd0ab7e0_dc9040e2", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.",... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
28
] | [
null
] | [
25
] | [
55
] | |
2024-11-19T01:34:53.638818+00:00 | 1,656,077,074,000 | 0e1f84c2de1ca1130eebece7d85790c8454a3624 | 3 | {
"blob_id": "0e1f84c2de1ca1130eebece7d85790c8454a3624",
"branch_name": "refs/heads/main",
"committer_date": 1656077074000,
"content_id": "cef0412ea2ccce28b05615ac4ff11b06e57a59c8",
"detected_licenses": [
"MIT"
],
"directory_id": "da47d77a933930d5355585abaf718201893609db",
"extension": "py",
"file... | 2.53125 | stackv2 | """Creates the Flask and Flask-Socketio endpoints for the
optimisation backend.
"""
import pandas as pd
import rq
from config import FLASK_HOST, FLASK_PORT, REDIS_HOST, REDIS_PORT
from flask import Flask, jsonify, request
from flask_cors import CORS
from flask_socketio import SocketIO, emit
from rq.job import Job
from ... | 432 | 27.85 | 87 | 15 | 2,973 | python | [{"finding_id": "codeql_py/reflective-xss_a1ded9d62bc5e473_88708c91", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
111,
141
] | [
null,
null
] | [
12,
12
] | [
27,
30
] | |
2024-11-19T01:34:53.771619+00:00 | 1,592,714,806,000 | 3e40f13c34c522c91dd6f6f3b5856d5e39376259 | 3 | {
"blob_id": "3e40f13c34c522c91dd6f6f3b5856d5e39376259",
"branch_name": "refs/heads/master",
"committer_date": 1592714806000,
"content_id": "8c28187224f23cdd5b05586c5166c302289fc36b",
"detected_licenses": [
"MIT"
],
"directory_id": "d6467f2b5df37f4e5e68122cb63fcd7007cc0e4b",
"extension": "py",
"fi... | 2.796875 | stackv2 | import cv2
from getpass import getpass
import hashlib
import os
import numpy as np
import csv
m = input("Enter location of img.npy : ")
h = np.load(m)
t=[]
p=input("Enter location of data.csv file : ")
with open(p, 'r') as file:
reader = csv.reader(file)
for row in reader:
t.append(row)
file.close... | 60 | 16.47 | 81 | 15 | 331 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_cc97887cf08bc673_f04ff702", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
35
] | [
null
] | [
22
] | [
68
] | |
2024-11-19T01:35:05.338127+00:00 | 1,589,473,727,000 | 5406cb9b6a7cbd4dda5025b75db033ca51f58a3d | 3 | {
"blob_id": "5406cb9b6a7cbd4dda5025b75db033ca51f58a3d",
"branch_name": "refs/heads/master",
"committer_date": 1589473727000,
"content_id": "0cf786a6a77aaaefa3be21662ac38e072d5bdb94",
"detected_licenses": [
"MIT"
],
"directory_id": "034ed98566bd30977b58b5e350ea93e223f2fcc6",
"extension": "py",
"fi... | 2.921875 | stackv2 | import sys, os, re, traceback
from os.path import isfile
from multiprocessing.dummy import Pool
from augmentations.fliph import FlipH
from augmentations.zoom import Zoom
from augmentations.blur import Blur
from augmentations.noise import Noise
from augmentations.translate import Translate
from skimage.io import imread,... | 106 | 34.57 | 138 | 20 | 857 | python | [{"finding_id": "codeql_py/redos_78542104d757e424_c976185b", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '__' and containing many repetitio... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '__' and containing many repetitions of 'a__'."
] | [
23
] | [
null
] | [
46
] | [
48
] | |
2024-11-19T01:55:42.457270+00:00 | 1,624,567,702,000 | c3ab85cbe122954daf415a93bf2d698bc3771eaf | 3 | {
"blob_id": "c3ab85cbe122954daf415a93bf2d698bc3771eaf",
"branch_name": "refs/heads/main",
"committer_date": 1624567702000,
"content_id": "425b9902021adaecb7eff4242f5e302e771e5408",
"detected_licenses": [
"MIT"
],
"directory_id": "f6c4847f56a1d48a3bcd9bb12d83ea0edd9785ad",
"extension": "py",
"file... | 2.8125 | stackv2 | import httpx
from core.models import County, Location
from django.core.management.base import BaseCommand
def derive_county(latitude, longitude):
url = "https://us-counties.datasette.io/counties/county_for_latitude_longitude.json"
params = {"longitude": longitude, "latitude": latitude, "_shape": "array"}
... | 34 | 36.41 | 88 | 17 | 258 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8ec19de1753dd228_303dcd49", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
31
] | [
33
] | [
21
] | [
22
] | |
2024-11-19T02:17:36.739224+00:00 | 1,683,384,029,000 | 3abf850603ed6b56cdfa2fb5c04f43aacf2f673b | 3 | {
"blob_id": "3abf850603ed6b56cdfa2fb5c04f43aacf2f673b",
"branch_name": "refs/heads/master",
"committer_date": 1683384029000,
"content_id": "79fb04daebd09d0cec4b4f671aa42ccf5debdaf6",
"detected_licenses": [
"MIT"
],
"directory_id": "d89d1f19678e0c2ea6c0d979d1c1978ac0b1eba4",
"extension": "py",
"fi... | 2.875 | stackv2 | from register import register_solution
from hashlib import md5
def find_n_leading_zeros(secret, n):
m = md5(secret.encode())
search = '0' * n
i = 1
while True:
m1 = m.copy()
m1.update(str(i).encode())
hsh = m1.hexdigest()
if hsh[:n] == search:
print(i)
... | 26 | 19.62 | 39 | 13 | 165 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7f016363186e745c_5d65745a", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
6
] | [
null
] | [
13
] | [
28
] | |
2024-11-19T02:17:37.701168+00:00 | 1,692,981,330,000 | 2a67c6a06e2944458ee02a2470a4787f108170b2 | 2 | {
"blob_id": "2a67c6a06e2944458ee02a2470a4787f108170b2",
"branch_name": "refs/heads/master",
"committer_date": 1692981330000,
"content_id": "e53eced85255127bcfde6e5c8fe4bfcd74f514db",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9852bb067fba665bd567aca698165c30fd0ed08a",
"extension": "py"... | 2.390625 | stackv2 | import flask
from fence.auth import get_user_from_claims
from fence.errors import Unauthorized
from fence.jwt import token
from fence.jwt.errors import JWTError
from fence.jwt.validate import validate_jwt
from fence.models import UserRefreshToken
def create_access_token(user, keypair, api_key, expires_in, scopes):
... | 74 | 33.3 | 87 | 14 | 559 | python | [{"finding_id": "codeql_py/stack-trace-exposure_03c075c0e020fe9d_bcdf4ccb", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
17
] | [
null
] | [
30
] | [
48
] | |
2024-11-19T02:18:05.277851+00:00 | 1,544,466,984,000 | 67f8e556be9b3d9a6b29aff33e21292ad1a77c5d | 3 | {
"blob_id": "67f8e556be9b3d9a6b29aff33e21292ad1a77c5d",
"branch_name": "refs/heads/master",
"committer_date": 1544466984000,
"content_id": "3bd74ab61d0c2d1bc13618a02346d01ecf13d2c3",
"detected_licenses": [
"MIT",
"Python-2.0"
],
"directory_id": "62525d1a58fb9ab87b7ef5ebd8da4ff9e009888d",
"exten... | 3.203125 | stackv2 | """
SAVE PICTURES FETCHED WITH GOOGLE MAP STATIC API IN LOCAL STORAGE
==> REDUCE THE USE OF GOOGLE MAPS REQUESTS
:param (STRING) LONGITUDE AND LATITUDE
:return (JPG) FILE
"""
import json
import os
import requests
# import source url files
business_path = "data/output_files/business.json"
with open(busine... | 73 | 28.66 | 95 | 14 | 579 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_5c073f7319baaafe_550836c1", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
51
] | [
null
] | [
27
] | [
37
] | |
2024-11-19T02:18:15.659803+00:00 | 1,522,334,766,000 | 2c81cd73cce7171355113de842ecc9ecc54b17ec | 3 | {
"blob_id": "2c81cd73cce7171355113de842ecc9ecc54b17ec",
"branch_name": "refs/heads/master",
"committer_date": 1522334766000,
"content_id": "3a07dc2d94be76320b889286319fc4ca28b94c3e",
"detected_licenses": [
"MIT"
],
"directory_id": "1e76f2705df32bfe285d27255556b23bc38754b6",
"extension": "py",
"fi... | 2.640625 | stackv2 | from pymongo import MongoClient
import hashlib
import random
import cal as cp
sav = ['1000', '1500', '200', '-1200', '3000', '-100']
client = MongoClient()
client = MongoClient('localhost', 27017)
db = client['webhealth']
collection = db['login']
def crete_hash(st):
pass_text = str(st)
hash_obj = hashlib.sha... | 114 | 26.68 | 109 | 17 | 773 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_35bb533ca2f26f69_b9a18e51", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally e... | [
15
] | [
null
] | [
31
] | [
49
] | |
2024-11-19T02:18:15.816441+00:00 | 1,375,722,389,000 | b1d9d0ae452dc4fcf69c1a7112169c33726aba3e | 3 | {
"blob_id": "b1d9d0ae452dc4fcf69c1a7112169c33726aba3e",
"branch_name": "refs/heads/master",
"committer_date": 1375722389000,
"content_id": "97744af33f5417f124715e618cb3095b84ea7908",
"detected_licenses": [
"MIT"
],
"directory_id": "57644bd153977c0eafdc8f809eefdfac5555af4b",
"extension": "py",
"fi... | 3.125 | stackv2 | """
To create a new command for **Tyrant** the ``Command`` class needs to be
subclassed for your command and override the ``Command.execute`` method to
provide your command execution.
The ``Command.__init__`` initialization should be overriden and provide
``ArgumentParser`` args.
The following is a reimplementation o... | 166 | 34.1 | 79 | 17 | 1,273 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_5d4ffc8109e7f7f4_c8afee4c", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 2 | true | [
"CWE-079",
"CWE-079"
] | [
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks.",
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
117,
144
] | [
null,
null
] | [
34,
32
] | [
48,
46
] | |
2024-11-19T02:30:08.014778+00:00 | 1,531,821,007,000 | 7e3e1dc3d4fab0bdf1fc3a00437b39be7e538e53 | 3 | {
"blob_id": "7e3e1dc3d4fab0bdf1fc3a00437b39be7e538e53",
"branch_name": "refs/heads/master",
"committer_date": 1531821007000,
"content_id": "9962b081fdf3a712803ea41dd0d1af7a3bef22e3",
"detected_licenses": [
"MIT"
],
"directory_id": "8ad5ab7236dcb6717b56b4a494eac3fcc08d2c62",
"extension": "py",
"fi... | 2.65625 | stackv2 | # -*- coding: utf-8 -*-
import sys
import getpass
import click
from sqlalchemy.orm.exc import NoResultFound
from flask.cli import AppGroup
from redap.models.apikey import APIKey
from redap.exceptions import InvalidConfiguration
try:
from redap.api import create_app
app = create_app()
except InvalidConfigurat... | 72 | 26.19 | 105 | 17 | 483 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9ddb7b7d3418a781_56a6ed0e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
65
] | [
null
] | [
30
] | [
70
] | |
2024-11-19T02:30:14.969195+00:00 | 1,634,415,244,000 | 227569fb21287f0320c3d87c00d02888b6ff0bec | 3 | {
"blob_id": "227569fb21287f0320c3d87c00d02888b6ff0bec",
"branch_name": "refs/heads/main",
"committer_date": 1634415244000,
"content_id": "d51474b11b5edcab37a906e01661c61fac619aae",
"detected_licenses": [
"MIT"
],
"directory_id": "6cead1f82936762742607a3f984c9d5c35d55bcb",
"extension": "py",
"file... | 3.078125 | stackv2 | #! python3
from collections import defaultdict
import datetime
import requests
import urllib3
urllib3.disable_warnings()
import xmltodict
import pytz
import pandas as pd
from color import GREEN, BLUE
class EliaConnector:
'''
Connect and make requests to Elia API
'''
def __init__(self, verbose=True,... | 95 | 31.01 | 148 | 15 | 705 | python | [{"finding_id": "codeql_py/request-without-cert-validation_2b86a55b649a5f75_d87e8be1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
53
] | [
null
] | [
20
] | [
51
] | |
2024-11-19T02:41:58.561634+00:00 | 1,552,889,633,000 | e6e67bcfe001c817765f1fa47dafa691f4ca1e98 | 2 | {
"blob_id": "e6e67bcfe001c817765f1fa47dafa691f4ca1e98",
"branch_name": "refs/heads/master",
"committer_date": 1552889633000,
"content_id": "ec22c7680c3b6f02053ebdbc891de659281db161",
"detected_licenses": [
"MIT"
],
"directory_id": "97ac1579be4ffa14c0bf44a6a4bb5aa62b525d5a",
"extension": "py",
"fi... | 2.390625 | stackv2 | import merge_similarity_inference
from flask import Flask, flash, request, jsonify, render_template, send_from_directory, redirect, url_for
import os
import glob
from werkzeug import secure_filename
app = Flask(__name__, static_folder='',template_folder='demo')
UPLOAD_FOLDER = "data/uploads/"
root = ''
@app.route('/... | 64 | 32.91 | 115 | 19 | 481 | python | [{"finding_id": "codeql_py/url-redirection_df694c34048bc226_828bab67", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 3 | true | [
"CWE-601",
"CWE-601",
"CWE-022"
] | [
"py/url-redirection",
"py/url-redirection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
49,
52,
55
] | [
null,
null,
null
] | [
33,
33,
23
] | [
44,
44,
65
] | |
2024-11-18T18:05:48.577733+00:00 | 1,690,377,071,000 | 6a6027b0fcef8cbc8ff73809c79ec7bf2ec97983 | 3 | {
"blob_id": "6a6027b0fcef8cbc8ff73809c79ec7bf2ec97983",
"branch_name": "refs/heads/main",
"committer_date": 1690377071000,
"content_id": "44e7c8eca823802b65f4cdea359891430f2045ef",
"detected_licenses": [
"MIT"
],
"directory_id": "490c2a2afda7e6caa6406be61a939b95947c8f96",
"extension": "py",
"file... | 2.8125 | stackv2 | """
Functions for creating an overview report of a PEtab problem
"""
from pathlib import Path
from shutil import copyfile
from typing import Union
import pandas as pd
import petab
from petab.C import *
__all__ = ['create_report']
def create_report(
problem: petab.Problem,
model_name: str,
o... | 77 | 31.95 | 79 | 13 | 564 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2f653c5205c98e56_cd8ac0b0", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
39
] | [
null
] | [
20
] | [
62
] | |
2024-11-18T18:16:05.089651+00:00 | 1,691,993,243,000 | 5accd3679163aa13ee113bf02116aaf28f69b2e3 | 3 | {
"blob_id": "5accd3679163aa13ee113bf02116aaf28f69b2e3",
"branch_name": "refs/heads/master",
"committer_date": 1691993243000,
"content_id": "8e917cb3307b626bc0f1e73c816593365d796051",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "bed7dddd44aa776042576bc717858af373b6fdc4",
"extension": "py"... | 2.609375 | stackv2 | import gzip
import logging
import os
import shutil
import timeit
import tarfile
import sys
import datetime
from mongoengine import connect, DoesNotExist, ConnectionFailure
from mailingshark.datacollection.basedatacollector import BaseDataCollector
from mailingshark.analyzer import ParsedMessage
import mailbox
from... | 256 | 38.03 | 117 | 19 | 2,151 | python | [{"finding_id": "codeql_py/tarslip_33886e2b92e80dcd_64900d95", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
228
] | [
null
] | [
17
] | [
28
] | |
2024-11-18T18:59:40.525632+00:00 | 1,628,399,929,000 | 658d871a31997e24a63e352d60537af7a1b4aee9 | 3 | {
"blob_id": "658d871a31997e24a63e352d60537af7a1b4aee9",
"branch_name": "refs/heads/main",
"committer_date": 1628399929000,
"content_id": "e5674e3e5d5e59e6e7365dfa17a5cd7a947d38df",
"detected_licenses": [
"MIT"
],
"directory_id": "ecdeeaefd2fa10148d90b62eaf24f2712ee70aa8",
"extension": "py",
"file... | 2.578125 | stackv2 | from flask import Flask, render_template, request
import pickle
import numpy as np
from numpy.core.numeric import moveaxis
import pandas as pd
# import urllib library
from urllib.request import urlopen
import os
from numpy import load
# import json
import json
app = Flask(__name__)
api_key = "" #Your API key
if os... | 223 | 30.24 | 116 | 15 | 1,786 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_be7613daaa8f7b89_841f4e93", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-215"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/flask-debug"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
60,
79,
220
] | [
null,
null,
null
] | [
11,
11,
5
] | [
14,
14,
24
] | |
2024-11-18T19:58:17.979558+00:00 | 1,618,435,625,000 | f0890c9b593361b16c248d7bcadf99f3c27c9685 | 3 | {
"blob_id": "f0890c9b593361b16c248d7bcadf99f3c27c9685",
"branch_name": "refs/heads/master",
"committer_date": 1618435625000,
"content_id": "b7e08d5d1272bc9adf7f8f1a29be93cf442c26a6",
"detected_licenses": [
"MIT"
],
"directory_id": "8369b41d39a9bbb0dd30cd876743788fe9dab735",
"extension": "py",
"fi... | 2.734375 | stackv2 | # -*- coding: utf-8 -*-
import click
import logging
from pathlib import Path
from dotenv import find_dotenv, load_dotenv
import requests
from hashlib import sha1
import random
import string
import time
import os
@click.command()
@click.argument("input_filepath", type=click.Path(exists=True))
@click.argument("output_f... | 90 | 30.06 | 117 | 20 | 679 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_e8302efafa84d20e_c24119e1", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is inse... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expensive hash function.\n[Sensitive data (password)](2) is used in a hashing algorithm (SHA1) that is insecure for password hashing, since it is not a computationally expen... | [
50
] | [
null
] | [
13
] | [
79
] | |
2024-11-18T19:58:30.351623+00:00 | 1,665,139,555,000 | 6193b3e7daa04cfcc22e2791f81149995715341f | 3 | {
"blob_id": "6193b3e7daa04cfcc22e2791f81149995715341f",
"branch_name": "refs/heads/master",
"committer_date": 1665139555000,
"content_id": "67309c84bb147a5f38af664e800b880913136480",
"detected_licenses": [
"MIT"
],
"directory_id": "32296560e661dd127e650bdd2594184a4fc9a75a",
"extension": "py",
"fi... | 2.9375 | stackv2 | import re
import logging
from functools import partial
from typing import Match
logger = logging.getLogger(__name__)
MAX_DEPTH = 5
ALIAS_PATTERN = re.compile(r"@alias\s+(?P<original>(\w|[_])+)\s+(?P<alias>(\w|[_])+)")
def handle_import(m: Match, depth: int = 0) -> str:
path = m.group("path")
logger.debug... | 44 | 24.61 | 104 | 13 | 312 | python | [{"finding_id": "codeql_py/redos_403053ade8f6ccc9_a4f4b168", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '@alias ' and containing many repe... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '@alias ' and containing many repetitions of '_'."
] | [
12
] | [
null
] | [
52
] | [
61
] | |
2024-11-18T19:58:40.396067+00:00 | 1,618,430,134,000 | 2a71d243ec316e0b407078c4b4bdcc2999337e9b | 2 | {
"blob_id": "2a71d243ec316e0b407078c4b4bdcc2999337e9b",
"branch_name": "refs/heads/main",
"committer_date": 1618430134000,
"content_id": "2080fcf721c805402eae6cca3bc03fcec17adb5c",
"detected_licenses": [
"MIT"
],
"directory_id": "2a4a4d74c61490c9d30dfd420db5a2c43d4a4cf2",
"extension": "py",
"file... | 2.4375 | stackv2 | from uuid import uuid4
from twisted.internet.protocol import DatagramProtocol
from twisted.internet import reactor
from random import randint
from pycipher import SimpleSubstitution
import sqlite3
import hashlib
# create connection
conn = sqlite3.connect('chatlog.db') # used to generate db file
# create cursor
c = ... | 81 | 30 | 78 | 16 | 618 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_63197d600fac3fa8_e47053f7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
78
] | [
null
] | [
32
] | [
49
] | |
2024-11-18T19:34:25.823995+00:00 | 1,623,433,822,000 | a684a60e5af562a1d124daba21d5bb6cb5fc5d1b | 3 | {
"blob_id": "a684a60e5af562a1d124daba21d5bb6cb5fc5d1b",
"branch_name": "refs/heads/master",
"committer_date": 1623433822000,
"content_id": "8a7e46702f6d1904457411e7cdc6381b1e96b960",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "1ba2b2ed2c25225f435088c1e5d90600aee6460a",
"extension": "py"... | 2.5625 | stackv2 | #!/usr/bin/env python3
# Flask web app version of the CRDB text index/search example
import psycopg2
import psycopg2.errorcodes
from bs4 import BeautifulSoup
import logging
import sys
import html
import re
from collections import defaultdict
import urllib.request
import requests
import os
import os.path
import ssl
im... | 220 | 28.08 | 129 | 19 | 1,857 | python | [{"finding_id": "codeql_py/flask-debug_393f635d705c28f2_2361bb33", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-089",
"CWE-089",
"CWE-918"
] | [
"py/flask-debug",
"py/sql-injection",
"py/sql-injection",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This SQL query depends on a [user-provided value](1).\nThis SQL query depends on a [user-provided value](2).",
"This SQL query depends on a [user-provided value](1).\nThis SQL query depends on... | [
216,
88,
153,
81
] | [
null,
null,
null,
null
] | [
3,
19,
19,
9
] | [
64,
22,
22,
35
] | |
2024-11-18T18:39:23.096989+00:00 | 1,616,103,911,000 | 895defb21a661d451f9ac1ee1c8dc4e1cfd4ddb3 | 3 | {
"blob_id": "895defb21a661d451f9ac1ee1c8dc4e1cfd4ddb3",
"branch_name": "refs/heads/main",
"committer_date": 1616103911000,
"content_id": "3c53f858aaa1b2d9c0ef18b514bee5b04442f9c4",
"detected_licenses": [
"MIT"
],
"directory_id": "9c9b7bd5bef4c2408d6953e14214480c46fc8ef0",
"extension": "py",
"file... | 2.5625 | stackv2 | import click
from django_configuration_management.aws_utils import pull_aws_config_data
from django_configuration_management.secrets import (
decrypt_value,
encrypt_value,
generate_fernet_key,
)
from django_configuration_management.utils import gather_user_input, load_env
from django_configuration_manageme... | 87 | 28.38 | 135 | 12 | 580 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_585fa9960f2323d9_3a91b084", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
40
] | [
null
] | [
15
] | [
32
] | |
2024-11-18T18:39:29.124223+00:00 | 1,627,880,751,000 | 90898e8d66ea84a1330eb95b2fb484982339feae | 3 | {
"blob_id": "90898e8d66ea84a1330eb95b2fb484982339feae",
"branch_name": "refs/heads/master",
"committer_date": 1627880751000,
"content_id": "b915ad99ad9074787f905e9b4f8e15a870c1b3bd",
"detected_licenses": [
"MIT"
],
"directory_id": "d35b2a6f368b8908adbbe282c604dffefadc5f69",
"extension": "py",
"fi... | 2.890625 | stackv2 | import time
import pywhatkit
import datetime
import csv
import requests
MSG_TEXT = "TEST"
def check_connection():
url = "https://www.google.com"
timeout = 5
try:
request = requests.get(url, timeout=timeout)
return True
except (requests.ConnectionError, requests.Timeout) as exception:
... | 44 | 25.3 | 73 | 16 | 255 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_f6c97cf7f4dbd9a3_ae4c1a51", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
32,
38
] | [
null,
null
] | [
15,
19
] | [
68,
73
] | |
2024-11-18T18:39:39.164593+00:00 | 1,555,524,947,000 | bdd8bfac6f53b1f54f70c72cfb132b1241b50abd | 2 | {
"blob_id": "bdd8bfac6f53b1f54f70c72cfb132b1241b50abd",
"branch_name": "refs/heads/master",
"committer_date": 1555524947000,
"content_id": "7f6869a7f30cb6848f71bfcfc0fd41767886f839",
"detected_licenses": [
"MIT"
],
"directory_id": "a246024c03bd8e6c3b06c883520b030cf8bc1510",
"extension": "py",
"fi... | 2.328125 | stackv2 | import re
import html
PROXIFY_REGEX = (r'((?!https:\/\/imgp.golos)https?:\/\/(?:[\da-zA-Z]{1}'
'(?:[\w\-\.]+\.)+(?:[\w]{2,5}))(?:\:[\d]{1,5})?\/?(?:[^\s\/]+'
'\/).*?\.(?:jpe?g|gif|png)(?:\?\w+=\w+(?:\&\w+=\w+)*)?)')
LINKIFY_REGEX = (r'((?<![\"\(\/])https?:\/\/(?:[\da-zA-Z]{1}(?:[\w... | 49 | 25.92 | 79 | 16 | 446 | python | [{"finding_id": "codeql_py/redos_421396ec65487d6b_69f594f7", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '-.'.", "remediat... | 2 | true | [
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '-.'.",
"This part of the regular expression may cause exponential backtracking on strings containing many repetitions of '-.'."
] | [
6,
10
] | [
null,
null
] | [
22,
64
] | [
32,
74
] | |
2024-11-18T18:39:41.669117+00:00 | 1,563,067,690,000 | 3a206c1be4e994ebd4c4b44757ac643447aadfc5 | 3 | {
"blob_id": "3a206c1be4e994ebd4c4b44757ac643447aadfc5",
"branch_name": "refs/heads/master",
"committer_date": 1563067690000,
"content_id": "6123c9d1232d4ba5c794cc0d828e3ea97a3197ee",
"detected_licenses": [
"MIT"
],
"directory_id": "12c4f019cf4df3b99e166a756da6a86b95682c70",
"extension": "py",
"fi... | 2.515625 | stackv2 | import os
from base64 import b64encode
from datetime import timedelta
import uuid
import requests
from flask import escape, jsonify, abort, redirect
from google.cloud import storage
from gpx import GpxParser
from stats import stats_route
from image import image_route_compare, image_route
from similarity import simil... | 106 | 25.53 | 74 | 11 | 711 | python | [{"finding_id": "codeql_py/flask-debug_8fe18de1f2bd6308_e7f4c9e2", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-918"
] | [
"py/flask-debug",
"py/full-ssrf"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depends on a [user-provided value](1)."
] | [
106,
17
] | [
null,
null
] | [
5,
9
] | [
43,
39
] | |
2024-11-18T18:39:48.471332+00:00 | 1,618,167,337,000 | 726de1c0cf62536d93f2cf52f469a64ec75b444d | 4 | {
"blob_id": "726de1c0cf62536d93f2cf52f469a64ec75b444d",
"branch_name": "refs/heads/master",
"committer_date": 1618167337000,
"content_id": "8cff4dd2b297630d0478833b6ce01e2692fcaa2e",
"detected_licenses": [
"MIT"
],
"directory_id": "e31731adf8e99c5cff1ecc3dc164ef04ff8d70cb",
"extension": "py",
"fi... | 3.765625 | stackv2 | import string
import random
import sys
def generateRandomPassword(password_length):
password = []
for i in range(password_length):
password.append(random.choice(string.digits + string.ascii_letters + string.punctuation))
return ''.join(password)
if __name__ == '__main__':
if len(sys.argv)... | 27 | 25.81 | 97 | 17 | 150 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2258027d711bee09_e7a89155", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
25
] | [
null
] | [
19
] | [
85
] | |
2024-11-18T18:39:57.949904+00:00 | 1,692,278,832,000 | a5644d27d74f0ae5d4120ee4f651b8442bb0303b | 2 | {
"blob_id": "a5644d27d74f0ae5d4120ee4f651b8442bb0303b",
"branch_name": "refs/heads/master",
"committer_date": 1692278832000,
"content_id": "b56facace9f41093e97666ff4669c7aad2124b28",
"detected_licenses": [
"MIT"
],
"directory_id": "150a7b11cb531f8bc2a045aefcf2ebe1d151efa3",
"extension": "py",
"fi... | 2.34375 | stackv2 | from contextlib import contextmanager
import logging
import os
from ocs_ci.framework import config
from ocs_ci.ocs import constants, exceptions
logger = logging.getLogger(__name__)
@contextmanager
def prepare_mirror_openshift_credential_files():
"""
This function is a context manager.
Prepare local fi... | 59 | 31.14 | 102 | 15 | 397 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_cc8dcc627abb4dfb_9e0bc24c", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
46
] | [
null
] | [
31
] | [
74
] | |
2024-11-18T18:40:00.521857+00:00 | 1,693,477,536,000 | 87060ae32308bc423d9ae1b4bcf2280e1e2a37a8 | 2 | {
"blob_id": "87060ae32308bc423d9ae1b4bcf2280e1e2a37a8",
"branch_name": "refs/heads/master",
"committer_date": 1693477536000,
"content_id": "879c112506f1bfb78f0510d693323d6bf6c0b9da",
"detected_licenses": [
"MIT"
],
"directory_id": "c9500ad778b8521aaa85cb7fe3239989efaa4799",
"extension": "py",
"fi... | 2.421875 | stackv2 | import insightconnect_plugin_runtime
from .schema import ParseTapAlertInput, ParseTapAlertOutput, Input, Output
# Custom imports below
from html_table_parser import HTMLTableParser
from komand_proofpoint_tap.util.tap_formatter import TAP
from urlextract import URLExtract
from komand_proofpoint_tap.util.helpers import ... | 43 | 40.44 | 104 | 17 | 394 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_53226dc5cfbca01c_ef9e7d7f", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [threatinsight.proofpoint.com](1) may be at an arbitrar... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The string [threatinsight.proofpoint.com](1) may be at an arbitrary position in the sanitized URL."
] | [
34
] | [
null
] | [
52
] | [
93
] | |
2024-11-18T18:40:00.568200+00:00 | 1,648,541,699,000 | cf0ec5573dfe8bd0b80fe121a025ce75b375f76b | 3 | {
"blob_id": "cf0ec5573dfe8bd0b80fe121a025ce75b375f76b",
"branch_name": "refs/heads/main",
"committer_date": 1648541699000,
"content_id": "5fe4ecdb3c03d019af8496acfdb3a4d8745d9ff9",
"detected_licenses": [
"MIT"
],
"directory_id": "44d30f2846b7999bbdf32e2268bbbdeb926dd43b",
"extension": "py",
"file... | 2.5625 | stackv2 | import io
import logging
import os
import shutil
from tempfile import TemporaryDirectory
import av
import jsonpickle
from flask import Flask, request
from tqdm import tqdm
logging.basicConfig(
level=logging.DEBUG,
format='%(asctime)s.%(msecs)03d %(levelname)s %(module)s - %(funcName)s: %(message)s',
datef... | 112 | 28.57 | 90 | 16 | 736 | python | [{"finding_id": "codeql_py/unsafe-deserialization_c4cc272712b6b7d2_9b22d805", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio... | 2 | true | [
"CWE-502",
"CWE-117"
] | [
"py/unsafe-deserialization",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Unsafe deserialization depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
30,
37
] | [
null,
38
] | [
30,
22
] | [
34,
49
] | |
2024-11-18T20:52:22.379871+00:00 | 1,687,199,285,000 | 107703f8ca33b2f316e8d8c718153a60591e1fba | 3 | {
"blob_id": "107703f8ca33b2f316e8d8c718153a60591e1fba",
"branch_name": "refs/heads/master",
"committer_date": 1687199285000,
"content_id": "7c03252ec58467d7653f99bbc057d94030c096d2",
"detected_licenses": [
"MIT"
],
"directory_id": "f525d43037793b8bec049143d072aa31a12143a5",
"extension": "py",
"fi... | 2.515625 | stackv2 | #! /usr/bin/env python
# -*- coding: utf-8 -*-
# import sys
import os
from loguru import logger
import sys
import os.path
import tarfile
import numpy as np
path_to_script = os.path.dirname(os.path.abspath(__file__))
# sys.path.append(os.path.join(path_to_script, "./extern/sPickle"))
def get_tar_output_dir(fname):... | 42 | 24.05 | 86 | 12 | 251 | python | [{"finding_id": "codeql_py/tarslip_7e17014c6be697e1_05b4cc2e", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
37
] | [
null
] | [
9
] | [
12
] | |
2024-11-18T18:46:57.011960+00:00 | 1,494,772,356,000 | 7e497b2ec9f06633cad9c46a314d269c4ac07ba5 | 3 | {
"blob_id": "7e497b2ec9f06633cad9c46a314d269c4ac07ba5",
"branch_name": "refs/heads/master",
"committer_date": 1494772356000,
"content_id": "32e691a14bd64d27e8f698b0962c30961a629e37",
"detected_licenses": [
"MIT"
],
"directory_id": "f3faf9d29bba85320dedd5cd2b452b0a1efe3c55",
"extension": "py",
"fi... | 2.515625 | stackv2 | import os, sys, re
from collections import OrderedDict
from copy import copy
import thimbles as tmb
from thimbles import workingdataspace as wds
class OptionSpecificationError(Exception):
pass
class EvalError(Exception):
pass
class OptionTree(object):
eval_ns = wds.__dict__
full_path_pattern = re.c... | 262 | 35.88 | 125 | 18 | 2,017 | python | [{"finding_id": "codeql_py/overly-large-range_2ef266b6b336de71_93abac56", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
17,
18
] | [
null,
null
] | [
41,
39
] | [
44,
42
] | |
2024-11-18T18:47:03.926043+00:00 | 1,492,760,155,000 | 7ad2c676c5e427c32657eb157134b5ebd1a84e08 | 2 | {
"blob_id": "7ad2c676c5e427c32657eb157134b5ebd1a84e08",
"branch_name": "refs/heads/master",
"committer_date": 1492760155000,
"content_id": "d5261f8a4e15ae51b90b4fe6ad6e2fa59259c865",
"detected_licenses": [
"MIT"
],
"directory_id": "4f4c8c80fa03730f88a138351cd1e4794e98ad86",
"extension": "py",
"fi... | 2.328125 | stackv2 | from flask import Flask, jsonify, request
import os
import requests
from pprint import pprint
import json
import logging
import logstash
#added this K
#from cfenv import AppEnv
#added this K
#env = AppEnv()
#env.LOG_HOST # 'test-app'
#env.LOG_PORT # 5000
if 'LOG_HOST' not in os.environ or 'LOG_PORT' not in os.envi... | 50 | 21.78 | 101 | 11 | 310 | python | [{"finding_id": "codeql_py/log-injection_b6bc33ab54951e5a_59b67f52", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
35
] | [
null
] | [
44
] | [
49
] | |
2024-11-18T18:47:05.199231+00:00 | 1,619,462,452,000 | d1ce2d80520c721802a6eb0f372abbcb17bd74bc | 3 | {
"blob_id": "d1ce2d80520c721802a6eb0f372abbcb17bd74bc",
"branch_name": "refs/heads/master",
"committer_date": 1619462452000,
"content_id": "6cb1b5b8a8f56ff3980697e984c3916f7d8290a4",
"detected_licenses": [
"MIT"
],
"directory_id": "3a28181a1a3057a903a34a224fb6c531c2de7b70",
"extension": "py",
"fi... | 2.546875 | stackv2 | import requests, json, sys
from pddl_parser_2.pond.parser import Problem
from pddl_parser_2.pond.predicate import Predicate
from pddl_parser_2.pond.formula import Formula, And, Primitive, Forall, When, Xor, Not, Oneof, Or
def doit2(domain, problem):
try:
prob = Problem(domain, problem)
except Exception... | 56 | 34.23 | 146 | 19 | 490 | python | [{"finding_id": "codeql_py/request-without-cert-validation_aed3b5abfef605c0_a3f3cb8b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
40
] | [
null
] | [
9
] | [
87
] | |
2024-11-18T19:10:00.193215+00:00 | 1,619,024,163,000 | 396d295132bfe9ebebc6d83c76834332c18b22d9 | 2 | {
"blob_id": "396d295132bfe9ebebc6d83c76834332c18b22d9",
"branch_name": "refs/heads/main",
"committer_date": 1619024163000,
"content_id": "35f90d4e743792b7dd963476ecd77e01bd954608",
"detected_licenses": [
"MIT"
],
"directory_id": "a1aae9dbcdf39f58e860227f0a5871109068d10c",
"extension": "py",
"file... | 2.4375 | stackv2 | import os
try:
from flask import Flask, jsonify, request
from flask_restful import Api, Resource
import joblib
import base64
except:
print("[-] Required modules are not installed")
print('[+] Installing modules now...')
os.system('pip install -r requirements.txt')
app = Flask(__name__)
api ... | 67 | 34.36 | 79 | 19 | 503 | python | [{"finding_id": "codeql_py/command-line-injection_7a3fd61bf87d7297_30dee44f", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).", "remediation": "", "location": {... | 5 | true | [
"CWE-078",
"CWE-078",
"CWE-215",
"CWE-022",
"CWE-022"
] | [
"py/command-line-injection",
"py/command-line-injection",
"py/flask-debug",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).",
"This command line depends on a [user-provided value](1).",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1).",
"This path depend... | [
38,
41,
67,
27,
45
] | [
39,
42,
null,
null,
null
] | [
27,
27,
5,
19,
23
] | [
76,
76,
24,
27,
36
] | |
2024-11-18T19:10:01.056556+00:00 | 1,577,977,065,000 | 669a79f3b1e9d8828de81217791234087716e66a | 3 | {
"blob_id": "669a79f3b1e9d8828de81217791234087716e66a",
"branch_name": "refs/heads/master",
"committer_date": 1577977065000,
"content_id": "e5605b5d14998252d0b4c5fc79b50189afb2a769",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "5688f2e59d5bc669b4aa9ccea4830413d236b1e3",
"extension": "py"... | 2.546875 | stackv2 | # -*- coding:utf-8 -*-
import tarfile
def untar(tarname,tardir):
"""
解压tar.gz文件
tarname: 压缩文件名
tardir: 解压缩后的存放路径
"""
try:
t = tarfile.open(tarname)
t.extractall(path=tardir)
rig = "已经解压完成"
return rig
except Exception as e:
return e
if __name__=="__... | 26 | 21.46 | 70 | 10 | 199 | python | [{"finding_id": "codeql_py/tarslip_d4fc0196170a2f6c_ca3ab26a", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
14
] | [
null
] | [
9
] | [
10
] | |
2024-11-18T20:15:57.027088+00:00 | 1,421,209,178,000 | bee73109d4f1ea0f821db76a04eeaef63b1436d3 | 3 | {
"blob_id": "bee73109d4f1ea0f821db76a04eeaef63b1436d3",
"branch_name": "refs/heads/master",
"committer_date": 1421209178000,
"content_id": "7c0d4de449f51ca99b51640e236dce38099be314",
"detected_licenses": [
"MIT"
],
"directory_id": "8f2eda2e901ad6357fc721fbad4cb46014dfda09",
"extension": "py",
"fi... | 3.03125 | stackv2 | # Twitter-Sort
# main.py
# Aaron Taylor
#
# This sorting technique allows a program to pass this script a list of
# numbers, and be returned the sorted version of them. This works by tweeting
# the list to Twitter asking for them to be sorted, and when there is a
# reply, we check to ensure they're sorted. If they are... | 107 | 26.84 | 86 | 28 | 780 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_0cd46d4982e3f1d4_c38f96eb", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text."
] | [
39
] | [
null
] | [
17
] | [
63
] | |
2024-11-18T20:16:00.392044+00:00 | 1,672,973,017,000 | 7c8298cdc226b34e15c8ef6ede28f50b67da9df9 | 2 | {
"blob_id": "7c8298cdc226b34e15c8ef6ede28f50b67da9df9",
"branch_name": "refs/heads/master",
"committer_date": 1672973017000,
"content_id": "015c6707869d8578c11c15943f88eac9d78ec845",
"detected_licenses": [
"MIT"
],
"directory_id": "54cb502fd7488350ae80f100443463fc907b1904",
"extension": "py",
"fi... | 2.390625 | stackv2 | from lib.plugins import Driver
import os
from paramiko import SSHClient, RSAKey, AutoAddPolicy
from io import StringIO
class Ssh(Driver):
DEFAULT_KEY_PATH = "~/.ssh/id_rsa"
def __init__(self, host, username='root', password = None, key = None, port = 22, path = "/proc"):
Driver.__init__(self)
self._host = host
... | 61 | 24.38 | 144 | 16 | 428 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_2c1b35f02589ee79_f7609559", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
46
] | [
null
] | [
4
] | [
55
] | |
2024-11-18T20:16:02.991128+00:00 | 1,514,994,061,000 | d50fe989d6edcddc26b509d260ad4d6e8d3441fb | 3 | {
"blob_id": "d50fe989d6edcddc26b509d260ad4d6e8d3441fb",
"branch_name": "refs/heads/master",
"committer_date": 1514994061000,
"content_id": "262dc07f91eab55de237fc2df7ce9824651946bc",
"detected_licenses": [
"MIT"
],
"directory_id": "adbcf56e89e16e6a601b126fd59825ef5d10db3c",
"extension": "py",
"fi... | 2.625 | stackv2 | from transitions.extensions import GraphMachine
from bs4 import BeautifulSoup
import requests
import time
import os
import re
import urllib.request
PTT_URL = 'https://www.ptt.cc'
class TocMachine(GraphMachine):
def __init__(self, **machine_configs):
self.machine = GraphMachine(
model = self,
... | 170 | 28.65 | 97 | 20 | 1,412 | python | [{"finding_id": "codeql_py/incomplete-hostname-regexp_6eed502d273193b9_e5171e4c", "tool_name": "codeql", "rule_id": "py/incomplete-hostname-regexp", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression has an unescaped '.' before 'imgur.com', so it might match more ... | 1 | true | [
"CWE-020"
] | [
"py/incomplete-hostname-regexp"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression has an unescaped '.' before 'imgur.com', so it might match more hosts than expected."
] | [
134
] | [
null
] | [
23
] | [
52
] | |
2024-11-18T20:16:11.118575+00:00 | 1,651,941,349,000 | 43946f0a82ed4f528d4e7a304550552d1de1bf93 | 3 | {
"blob_id": "43946f0a82ed4f528d4e7a304550552d1de1bf93",
"branch_name": "refs/heads/main",
"committer_date": 1651941349000,
"content_id": "6e41b8f154ebb79462e3aae52bfa1af5bc5c2f40",
"detected_licenses": [
"MIT"
],
"directory_id": "48269e5fe9450cdfdc34296530fedcc0a06aee55",
"extension": "py",
"file... | 2.734375 | stackv2 | """Emoberta app"""
import argparse
import logging
import os
import jsonpickle
import torch
from flask import Flask, request
from transformers import AutoModelForSequenceClassification, AutoTokenizer
logging.basicConfig(
level=logging.INFO,
format="%(asctime)s.%(msecs)03d %(levelname)s %(module)s - %(funcName)... | 128 | 24.2 | 90 | 19 | 781 | python | [{"finding_id": "codeql_py/unsafe-deserialization_e30353b6c3876f6d_3a000429", "tool_name": "codeql", "rule_id": "py/unsafe-deserialization", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Unsafe deserialization depends on a [user-provided value](1).", "remediation": "", "locatio... | 2 | true | [
"CWE-502",
"CWE-117"
] | [
"py/unsafe-deserialization",
"py/log-injection"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Unsafe deserialization depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
74,
78
] | [
null,
null
] | [
30,
21
] | [
34,
49
] | |
2024-11-18T19:23:08.347832+00:00 | 1,618,664,084,000 | b9903e60f77edcdb13cd2d146bb2fac3bf8746e4 | 2 | {
"blob_id": "b9903e60f77edcdb13cd2d146bb2fac3bf8746e4",
"branch_name": "refs/heads/main",
"committer_date": 1618664084000,
"content_id": "d0c807c3dda3de6cce74d5b1ffa205057d7de770",
"detected_licenses": [
"MIT"
],
"directory_id": "f18c166ebf131c0ae1cb2fd43ef6bbcf3da019ac",
"extension": "py",
"file... | 2.4375 | stackv2 | import os
import fcntl
import hashlib
import tempfile
from contextlib import contextmanager, suppress
from datetime import datetime
@contextmanager
def file_lock(fd, cmd):
try:
fcntl.lockf(fd, cmd)
yield
except IOError:
yield
finally:
fcntl.lockf(fd, fcntl.LOCK_UN)
class ... | 46 | 24.07 | 78 | 21 | 275 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_1f5354f1ecebaa1a_6af582ed", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
22
] | [
null
] | [
34
] | [
64
] | |
2024-11-18T19:38:12.947768+00:00 | 1,632,604,732,000 | d5a38e67360faf229faee21572a2b7891079c4d5 | 3 | {
"blob_id": "d5a38e67360faf229faee21572a2b7891079c4d5",
"branch_name": "refs/heads/main",
"committer_date": 1632604732000,
"content_id": "8b78b251291eeb52a84c37d470834cc88a08f8cd",
"detected_licenses": [
"MIT"
],
"directory_id": "fbe6d11f722929b83cfc5f72e9cdb8bf16c526b7",
"extension": "py",
"file... | 2.75 | stackv2 | import logging
from flask import Flask, request
app = Flask(__name__)
app.logger.setLevel(logging.DEBUG)
@app.route("/")
def root():
app.logger.info(f'Request user agent: {request.user_agent}')
app.logger.info(f'Request host: {request.host}')
return '''
<html>
<h1>I like cats.</h1>
... | 17 | 23.24 | 69 | 11 | 105 | python | [{"finding_id": "codeql_py/log-injection_07968bb98ba28b72_a8624f90", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
10
] | [
null
] | [
21
] | [
64
] | |
2024-11-18T19:38:37.607400+00:00 | 1,508,650,171,000 | 3c6901931d93e5a3c72ed8e35ef66132b5dfa12c | 3 | {
"blob_id": "3c6901931d93e5a3c72ed8e35ef66132b5dfa12c",
"branch_name": "refs/heads/master",
"committer_date": 1508650171000,
"content_id": "65887243d0e4a864b50115719e322daff3eff056",
"detected_licenses": [
"MIT"
],
"directory_id": "7a5c24b4d8fb0caf0b22a534ea34531ddee7ebd7",
"extension": "py",
"fi... | 2.71875 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""
zipcode : returns Japanese zipcode or address
"""
import re
from flask import Flask, request, json, g, Response, abort
import sqlite3
app = Flask(__name__)
app.config.from_object('config')
def connect_db():
con = sqlite3.connect(app.config['DATABASE'])
app.... | 112 | 29.19 | 73 | 17 | 757 | python | [{"finding_id": "codeql_py/log-injection_9f91db771ef1d975_e08c359f", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 3 | true | [
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
41,
43,
75
] | [
null,
null,
null
] | [
53,
46,
29
] | [
57,
50,
52
] | |
2024-11-18T20:10:58.781773+00:00 | 1,429,457,596,000 | 65fa110e76e7cea73ed79d3671ce4fb71d7b6eb7 | 2 | {
"blob_id": "65fa110e76e7cea73ed79d3671ce4fb71d7b6eb7",
"branch_name": "refs/heads/master",
"committer_date": 1429457596000,
"content_id": "910da55ad80f2bed42b34d8b872a0b043ae9bf84",
"detected_licenses": [
"MIT"
],
"directory_id": "6d8f9c847bedc534e0e5d794b613da4a08d0c3c7",
"extension": "py",
"fi... | 2.3125 | stackv2 | import os.path
from flask import Flask, abort, redirect, url_for, jsonify, request
from contextProvider import ContextProvider
from robotIPFinder import RobotFinder
from vision.robotLocator import RobotLocator
import requests
import json
import constants as cte
from questionanswering.question_processor import QuestionP... | 180 | 29.54 | 106 | 16 | 1,245 | python | [{"finding_id": "codeql_py/code-injection_8d48e0f5e0058b4b_2b2ac65c", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 2 | true | [
"CWE-094",
"CWE-295"
] | [
"py/code-injection",
"py/request-without-cert-validation"
] | [
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
79,
139
] | [
null,
null
] | [
21,
24
] | [
33,
68
] | |
2024-11-18T20:26:08.420047+00:00 | 1,586,498,320,000 | 8783e4fb9cc95b0ada9a6e78df5db4e433dace79 | 3 | {
"blob_id": "8783e4fb9cc95b0ada9a6e78df5db4e433dace79",
"branch_name": "refs/heads/master",
"committer_date": 1586498320000,
"content_id": "8153eadabd3692f567cc78e0c5ede0a9f028dfb5",
"detected_licenses": [
"MIT"
],
"directory_id": "c84463d658e4da7943b1e818ce2e28e2a8350b96",
"extension": "py",
"fi... | 2.859375 | stackv2 | import json
from datetime import datetime
import base64
import zlib
import hashlib
import string
import random
default = {
'name': 'Account Name',
'age': 0,
'user': 'user',
'pass': '5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8',
'balance': 0,
'loan': [],
'history': []
}
... | 208 | 19.48 | 102 | 16 | 1,129 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7337e8a2e610c8a9_e6c4b37d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computational... | [
85,
122
] | [
null,
null
] | [
33,
46
] | [
50,
63
] | |
2024-11-18T20:26:10.083120+00:00 | 1,538,855,208,000 | 94a0b839eb069f052a80bca25acbc5a103a77d9f | 2 | {
"blob_id": "94a0b839eb069f052a80bca25acbc5a103a77d9f",
"branch_name": "refs/heads/master",
"committer_date": 1538855208000,
"content_id": "894e1369cc040478b7dee3a81a123a7296cd1556",
"detected_licenses": [
"MIT"
],
"directory_id": "530e2ee28ab24d724443ef72c098f6d47541f70c",
"extension": "py",
"fi... | 2.484375 | stackv2 | """
REST Api server built on flask.
"""
import json
import logging
import os
import random
import flask
from flask.ext.restful import Resource
from flask.ext.restful import Api
from flask_limiter import Limiter
import rauth
import raottt
from raottt import Game
from raottt import Player
from raottt import Score
from... | 346 | 33.78 | 84 | 21 | 2,472 | python | [{"finding_id": "codeql_py/log-injection_c60b88ec33f2a1ad_99d4b61f", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 5 | true | [
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
71,
82,
101,
156,
317
] | [
null,
null,
null,
null,
null
] | [
42,
63,
69,
41,
38
] | [
60,
66,
72,
59,
56
] | |
2024-11-18T20:26:18.215880+00:00 | 1,631,482,603,000 | 47b583744ce9280f37c8be8f711fb27fa7c003fe | 3 | {
"blob_id": "47b583744ce9280f37c8be8f711fb27fa7c003fe",
"branch_name": "refs/heads/main",
"committer_date": 1631482603000,
"content_id": "919795c53dd3cfb403f9227c4bfbc123a99321d7",
"detected_licenses": [
"MIT"
],
"directory_id": "91dbcaca6b047dd56cde4ddce1323aeb62a2182e",
"extension": "py",
"file... | 2.828125 | stackv2 | from models.Modalidade import Modalidade
from tinydb import Query
from extensions.database import modalidades as table_modalidades
from flask import jsonify
def cadastra_modalidade(modalidade: dict):
nova_modalidade = Modalidade(
**modalidade
)
modalidades_query = Query()
existe_modalidade = t... | 29 | 38.03 | 119 | 18 | 277 | python | [{"finding_id": "codeql_py/stack-trace-exposure_089b7043f4499cfc_e45e2cd1", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
21,
29
] | [
null,
null
] | [
28,
24
] | [
105,
114
] | |
2024-11-18T20:26:48.982727+00:00 | 1,686,657,089,000 | d0c6fde306c5d982fb5ee83ebefce71588d92af4 | 3 | {
"blob_id": "d0c6fde306c5d982fb5ee83ebefce71588d92af4",
"branch_name": "refs/heads/master",
"committer_date": 1686657089000,
"content_id": "80f8483b8e65f6de0a539e1d5572431ce4c81205",
"detected_licenses": [
"MIT"
],
"directory_id": "f27bee560cc8323d841f768f9cf3dd772af65ee0",
"extension": "py",
"fi... | 2.640625 | stackv2 | #!/usr/bin/env python3
# -*- coding: utf8 -*-
import re
import sys
from pathlib import Path
from paleomix.common.argparse import ArgumentParser
from paleomix.common.formats import FormatError
# Standard nucleotides + UIPAC codes
_VALID_CHARS_STR = b"ACGTN" b"RYSWKMBDHV"
_VALID_CHARS = frozenset(_VALID_CHARS_STR.upper... | 123 | 33.35 | 86 | 19 | 943 | python | [{"finding_id": "codeql_py/overly-large-range_17db4f6a7413be60_f5ce637e", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:;<\\].", "remediation": "", "location":... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[+,\\-.\\/0-9:;<\\]."
] | [
15
] | [
null
] | [
36
] | [
39
] | |
2024-11-18T20:52:17.707293+00:00 | 1,634,200,956,000 | 1686afaead2a7442c5a41678090c129a163aec69 | 3 | {
"blob_id": "1686afaead2a7442c5a41678090c129a163aec69",
"branch_name": "refs/heads/main",
"committer_date": 1634200956000,
"content_id": "3426860789996b32fe932aae171b3497700b4c83",
"detected_licenses": [
"MIT"
],
"directory_id": "2ab078b4f2e336116d78f7a879a71a0d605e2be2",
"extension": "py",
"file... | 2.625 | stackv2 | import os
from werkzeug.utils import secure_filename
from flask import Flask,flash,request,redirect,send_file,render_template
UPLOAD_FOLDER = '/home/pi/Desktop/AFKZenCoders/PS12/uploads/'
#app = Flask(__name__)
app = Flask(__name__, template_folder='/home/pi/Desktop/AFKZenCoders/PS12/templates')
app.config['UPLOAD_F... | 51 | 32.49 | 85 | 17 | 377 | python | [{"finding_id": "codeql_py/flask-debug_869f904ca5f51312_fa224eb1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 4 | true | [
"CWE-215",
"CWE-601",
"CWE-601",
"CWE-022"
] | [
"py/flask-debug",
"py/url-redirection",
"py/url-redirection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Untrusted URL redirection depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1)."
] | [
51,
20,
26,
47
] | [
null,
null,
null,
null
] | [
5,
29,
29,
22
] | [
53,
40,
40,
31
] | |
2024-11-18T20:52:23.231181+00:00 | 1,412,972,918,000 | c168bee24df2925763142a6c93fd4650670779d1 | 2 | {
"blob_id": "c168bee24df2925763142a6c93fd4650670779d1",
"branch_name": "refs/heads/master",
"committer_date": 1412972918000,
"content_id": "d6ec17eb646b65f5be4dd7eb2268217bef0bef3e",
"detected_licenses": [
"MIT"
],
"directory_id": "43fd322955be047148cf323363d6885056e1f589",
"extension": "py",
"fi... | 2.390625 | stackv2 | from romeo_auth import app, ldaptools
from romeo_auth.authutils import group_required
from flask import render_template, request, redirect, flash
from flask.ext.login import login_required
from ldap import MOD_ADD, MOD_DELETE, MOD_REPLACE
@app.route("/admin")
@login_required
@group_required("admin")
def admin():
retu... | 100 | 35.2 | 111 | 15 | 899 | python | [{"finding_id": "codeql_py/url-redirection_7a1d901657cc8644_96d606c8", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
25
] | [
null
] | [
18
] | [
59
] | |
2024-11-18T20:52:27.416418+00:00 | 1,583,200,675,000 | 1281ded73fa7ff17d3ae856d1acbaa5781aee45e | 3 | {
"blob_id": "1281ded73fa7ff17d3ae856d1acbaa5781aee45e",
"branch_name": "refs/heads/master",
"committer_date": 1583200675000,
"content_id": "77cec7dcb9904c5b2545a1db8285816ac352449e",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "db1a32c35e4755473ea8efe7328c473cf777787c",
"extension": "py"... | 2.546875 | stackv2 |
import json
import requests
class NsgAPI:
def __init__(self, log, url, token, netid) -> None:
self.log = log
self.url = url
self.token = token
self.netid = netid
def query(self, nsgql):
full_url = self.concatenate_url('v2/query/net/{0}/data'.format(self.netid))
... | 109 | 36.87 | 118 | 16 | 931 | python | [{"finding_id": "codeql_py/request-without-cert-validation_24cbb3269b4d8abc_86bac794", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 4 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
19,
48,
66,
74
] | [
null,
null,
null,
null
] | [
14,
14,
14,
14
] | [
103,
106,
94,
106
] | |
2024-11-18T20:52:40.241910+00:00 | 1,692,196,067,000 | 3d6a6a1806837563e0436ec9cc1381ed22479f95 | 2 | {
"blob_id": "3d6a6a1806837563e0436ec9cc1381ed22479f95",
"branch_name": "refs/heads/master",
"committer_date": 1692196067000,
"content_id": "dc4cbb5eed428a504071bcafb40cba5e72e73ec5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "c2cdc996fe2858e8814c8bd552b0ff67179275d5",
"extension": "py"... | 2.484375 | stackv2 | import requests
import base64
import json
class Device42Api:
def __init__(self, config, options):
self.username = config['username']
self.password = config['password']
self.host = config['host']
self.debug = options['debug']
self.dry_run = options['dry_run']
def _poste... | 95 | 30.59 | 94 | 16 | 746 | python | [{"finding_id": "codeql_py/request-without-cert-validation_bef8104c7a49928a_7c4502f4", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
20,
41,
61
] | [
null,
null,
null
] | [
13,
13,
13
] | [
76,
76,
64
] | |
2024-11-18T20:52:47.944777+00:00 | 1,478,038,218,000 | 0cad11b6ad664ed443ed3bbbb43bae3f61019e09 | 3 | {
"blob_id": "0cad11b6ad664ed443ed3bbbb43bae3f61019e09",
"branch_name": "refs/heads/master",
"committer_date": 1478038218000,
"content_id": "03e3b244dbe00c7fccf51e310a8a5f18b2cdc391",
"detected_licenses": [
"MIT"
],
"directory_id": "56189818056fcff6dc55bb3befa0047a277b226d",
"extension": "py",
"fi... | 3.046875 | stackv2 | from DataGeneration import DatabaseHandler
from MapboxAPIWrapper import MapboxAPIWrapper
from MapboxAPIWrapper import MapboxAPIError
import math
import requests
class DataGenerator:
def __init__(self,
handler=DatabaseHandler(db_file_name='db.sqlite3'),
stops=None,
... | 98 | 41.95 | 80 | 19 | 787 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1bc9aa35d71cadde_2e20ee70", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
58,
72
] | [
59,
73
] | [
23,
19
] | [
78,
65
] | |
2024-11-18T19:02:46.069543+00:00 | 1,588,001,962,000 | 84f0a21ec80a71e525170bdd226fdd71982b88d6 | 3 | {
"blob_id": "84f0a21ec80a71e525170bdd226fdd71982b88d6",
"branch_name": "refs/heads/master",
"committer_date": 1588001962000,
"content_id": "c2b71a298a1dfc89ff0de2d9d15ef2d42ff26957",
"detected_licenses": [
"MIT"
],
"directory_id": "dfc4e90ad1ed2b332cfc17cdd8d9916fbf1c38da",
"extension": "py",
"fi... | 2.6875 | stackv2 | from apps.froms import BaseForm
from wtforms import StringField
from wtforms.validators import DataRequired, Regexp, Length
import hashlib
# TODO: 发送短信验证码Form表单校验
class SMSCaptchaForm(BaseForm):
salt = 'q3423805gdflvbdfvhsdoa`#$%' # TODO: 前后端约定的加密盐
telephone = StringField(validators=[Regexp(r'1[356789]\d{9}'... | 30 | 41.8 | 106 | 19 | 370 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_7c6fd4995c995c1a_876b4097", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (private)](1) is used in a hashing algorithm (MD5) that is insecu... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (private)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
24
] | [
null
] | [
33
] | [
89
] | |
2024-11-18T19:14:34.547867+00:00 | 1,480,434,745,000 | 2828855fbdf09b1f11081bac583bc1a8fe6de094 | 3 | {
"blob_id": "2828855fbdf09b1f11081bac583bc1a8fe6de094",
"branch_name": "refs/heads/master",
"committer_date": 1480434745000,
"content_id": "3bd6c399de283cdddb6b99250356805fe23e27c3",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "559648706452a3e73b6b95d07b418934162dff1a",
"extension": "p... | 2.640625 | stackv2 | # -*- coding: utf-8 -*-
"""
Command to do a database dump using database's native tools.
Originally inspired by http://djangosnippets.org/snippets/823/
"""
import os
import time
import sys
import subprocess
from django.core.management.base import BaseCommand, CommandError
from django.conf import settings
class Com... | 258 | 31.12 | 115 | 15 | 1,757 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2e456e5a545000e4_44da19d7", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
191
] | [
null
] | [
19
] | [
26
] | |
2024-11-18T19:14:39.234990+00:00 | 1,649,866,615,000 | 67ad151f29b815da288ae4167da4f13c34b004bd | 2 | {
"blob_id": "67ad151f29b815da288ae4167da4f13c34b004bd",
"branch_name": "refs/heads/master",
"committer_date": 1649866615000,
"content_id": "74cb57aeb97967694c7fea96af1daf7d3947924a",
"detected_licenses": [
"MIT"
],
"directory_id": "41eebb6d1d1f826927f7106b81f49473692ba570",
"extension": "py",
"fi... | 2.3125 | stackv2 | #!/usr/bin/env python
# Copyright 2019 Pascal Audet
#
# This file is part of RfPy.
#
# Permission is hereby granted, free of charge, to any person obtaining a copy
# of this software and associated documentation files (the "Software"), to deal
# in the Software without restriction, including without limitation the rig... | 412 | 33 | 82 | 20 | 3,275 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_954eb0116b4b44a4_f584d1e9", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
307
] | [
308
] | [
15
] | [
41
] | |
2024-11-18T19:14:52.116920+00:00 | 1,507,079,343,000 | 6cf991a2774ebbabc87ee21a22706c6b026306d4 | 3 | {
"blob_id": "6cf991a2774ebbabc87ee21a22706c6b026306d4",
"branch_name": "refs/heads/master",
"committer_date": 1507079343000,
"content_id": "dca5339fa1c2992af46d5b472598d4706cab0574",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "7a4797d43e6bb5b2f0633d1a035e93a59238726d",
"extension": "py"... | 2.703125 | stackv2 | from flask import Flask, request
from redis import Redis
import os
import socket
app = Flask(__name__)
host = socket.gethostname()
user = "unknown"
card_num = "1234-5667-2468-1357"
@app.route('/')
def hello():
try:
# Parse out the user from the request.
user = request.args.get("user")
except:
... | 31 | 27.55 | 100 | 13 | 237 | python | [{"finding_id": "codeql_py/reflective-xss_ba81f8fc60081e00_094bbf04", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
28
] | [
null
] | [
12
] | [
93
] | |
2024-11-18T19:27:51.772932+00:00 | 1,618,048,622,000 | 8c18faae927d3c3917fe6bd3b3520f8e9429f0bf | 2 | {
"blob_id": "8c18faae927d3c3917fe6bd3b3520f8e9429f0bf",
"branch_name": "refs/heads/master",
"committer_date": 1618048622000,
"content_id": "6c23d283913a0866609be97ffdd602b7712807a3",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "4af569c5c2f64c9c266e88b2b8ac2a4993014a4b",
"extension": "p... | 2.40625 | stackv2 | # -*- coding: utf-8 -*-
import os
import string
import yaml
from html import escape
from functools import partial
from random import choice
import bottle
from bottle import (TEMPLATE_PATH, jinja2_template as template,
Bottle)
from bottle import HTTPResponse, request, abort
from jinja2 import En... | 163 | 30.09 | 98 | 17 | 1,157 | python | [{"finding_id": "codeql_py/stack-trace-exposure_07ca9c954dc1a1f7_196cc607", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S... | 6 | true | [
"CWE-209",
"CWE-074",
"CWE-074",
"CWE-022",
"CWE-079",
"CWE-079"
] | [
"py/stack-trace-exposure",
"py/template-injection",
"py/template-injection",
"py/path-injection",
"py/jinja2/autoescape-false",
"py/jinja2/autoescape-false"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](2) flows to this location and may be exposed to an external user.\n[Stack trace information](3) flows to this location and may be exposed to an external user.",
"This template construction depen... | [
152,
31,
128,
122,
27,
117
] | [
null,
32,
null,
null,
null,
null
] | [
12,
45,
32,
19,
18,
18
] | [
63,
98,
48,
58,
31,
31
] | |
2024-11-18T19:38:57.588457+00:00 | 1,579,996,439,000 | 545f991d586d5da392485a92bdace1c2bbd13786 | 3 | {
"blob_id": "545f991d586d5da392485a92bdace1c2bbd13786",
"branch_name": "refs/heads/master",
"committer_date": 1579996439000,
"content_id": "fdcf8ccb868ba5035adf3c4369897ad3de05dfab",
"detected_licenses": [
"MIT"
],
"directory_id": "8432bebb5e01b97ab62316ddb883ed2d83bf6333",
"extension": "py",
"fi... | 2.8125 | stackv2 | # -*- coding: utf-8 -*-
from paramiko import SSHClient
import paramiko
from .helpers import print_lines, print_error, print_info
class RemoteSsh:
def __init__(self):
self.ssh = SSHClient()
self.ssh.load_system_host_keys()
self.ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
... | 48 | 31.12 | 103 | 15 | 322 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_ad68b8a10e08917d_c3912c44", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
13
] | [
null
] | [
9
] | [
71
] | |
2024-11-18T20:06:01.359144+00:00 | 1,564,772,150,000 | 272ff5fa50f00773312b28c2f2df018e346a29c8 | 3 | {
"blob_id": "272ff5fa50f00773312b28c2f2df018e346a29c8",
"branch_name": "refs/heads/master",
"committer_date": 1564772150000,
"content_id": "68eef327acca32774451759d0cabccc81a63fb67",
"detected_licenses": [
"MIT"
],
"directory_id": "0958980db8b25f1bdd2ae3a61596e578b7441bee",
"extension": "py",
"fi... | 3.015625 | stackv2 | # -*- coding: utf-8 -*-
import logging
logging.basicConfig(filename='log.log', format='%(asctime)s - %(levelname)s - %(message)s', level=logging.INFO)
logger = logging.getLogger('Info')
import pandas as pd
import database
import language_support
#The json file of currently supported language responses
jsonresponse = l... | 202 | 42.63 | 151 | 20 | 2,106 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_26065c0ea3045db3_1c9adb36", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
137
] | [
null
] | [
42
] | [
66
] | |
2024-11-18T20:06:15.878495+00:00 | 1,587,111,775,000 | 1ea4c22f990b41b677d1b4ff6824ccfb1b5857c1 | 2 | {
"blob_id": "1ea4c22f990b41b677d1b4ff6824ccfb1b5857c1",
"branch_name": "refs/heads/master",
"committer_date": 1587111775000,
"content_id": "4e00f34e00f7d477c097dea673c05937cc744598",
"detected_licenses": [
"MIT"
],
"directory_id": "8e69eee9b474587925e22413717eb82e4b024360",
"extension": "py",
"fi... | 2.34375 | stackv2 | from hashlib import md5
import logging
log = logging.getLogger(__name__)
from otp.ai.passlib.utils.binary import h64
from otp.ai.passlib.utils.compat import u, uascii_to_str, unicode
import otp.ai.passlib.utils.handlers as uh
__all__ = [
'phpass']
class phpass(uh.HasManyIdents, uh.HasRounds, uh.HasSalt, uh.GenericHan... | 47 | 32.91 | 112 | 16 | 455 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_6cf54f2c91de5d1e_234f034d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (secret)](2) is used in a hashing algori... | [
41,
44
] | [
null,
null
] | [
22,
26
] | [
56,
41
] | |
2024-11-18T20:06:24.065965+00:00 | 1,573,518,304,000 | 487488119c670052a81485221fa7c9ea7cbcb528 | 3 | {
"blob_id": "487488119c670052a81485221fa7c9ea7cbcb528",
"branch_name": "refs/heads/master",
"committer_date": 1573518304000,
"content_id": "7dab7b6626fd2aeae40af14411e41a3f62bd8d4a",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "f2199f0102fafe6addc33d086ce31c5cb4edc183",
"extension": "p... | 2.578125 | stackv2 | from rest_framework import status, response, views
from foundation.models import StudentDB
class AddAPIView(views.APIView):
def post(self, request):
student_first_name = request.data.get('fname', None)
student_last_name = request.data.get('lname', None)
student_mark = request.data.get('mark... | 110 | 38.29 | 129 | 21 | 822 | python | [{"finding_id": "codeql_py/stack-trace-exposure_f2eb0722b3095f3e_6fa1ca01", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
96
] | [
98
] | [
22
] | [
23
] | |
2024-11-18T20:06:29.447299+00:00 | 1,559,678,954,000 | fc11dc218711c9f62c32f2f53b6a30ffc730cd10 | 2 | {
"blob_id": "fc11dc218711c9f62c32f2f53b6a30ffc730cd10",
"branch_name": "refs/heads/master",
"committer_date": 1559678954000,
"content_id": "75be02644b03218fec4576ca8b3cc5fa35a985fd",
"detected_licenses": [
"MIT"
],
"directory_id": "1138dbe22b7b80585c3fcbf5e94c585b519952a0",
"extension": "py",
"fi... | 2.359375 | stackv2 | from flask import Flask, render_template, request, send_from_directory
from werkzeug.utils import secure_filename
import socket
import os, hashlib
import requests
import glob
app = Flask(__name__)
hostname = socket.gethostname()
BLOCKSIZE = 65536
hasher = hashlib.md5()
@app.route('/verifica', methods = ['GET', 'POST'... | 45 | 26.38 | 77 | 17 | 393 | python | [{"finding_id": "codeql_py/flask-debug_e07254729fafac9d_a1ccb157", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
45,
20
] | [
null,
null
] | [
4,
13
] | [
78,
53
] | |
2024-11-18T20:18:11.294859+00:00 | 1,577,111,336,000 | 73aca9b545e0d2df1ac34f5975e43e15f869ba77 | 4 | {
"blob_id": "73aca9b545e0d2df1ac34f5975e43e15f869ba77",
"branch_name": "refs/heads/master",
"committer_date": 1577111336000,
"content_id": "9ae4efbe32b5c90296cf2c6424d6ed80f1fca36c",
"detected_licenses": [
"MIT"
],
"directory_id": "87ecd800421c6078a5ecf643f48e4ce74c07d96e",
"extension": "py",
"fi... | 3.59375 | stackv2 | #!/usr/bin/env python3
import r1d19_generators
class SchoolMember:
''''''
def __init__(self, name, time=None):
''''''
self.name = name
self.time = time
print(f'(New School Member: {self.name})')
def tell(self):
''''''
print(f'My name is {self.name}.', end=... | 222 | 24.6 | 158 | 14 | 1,595 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_82139cb630fa0ddf_aab1ad90", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
34
] | [
null
] | [
15
] | [
44
] | |
2024-11-18T20:18:14.515667+00:00 | 1,632,341,964,000 | c527a8c5e361a61477a2aa129c38e5b71ad64629 | 2 | {
"blob_id": "c527a8c5e361a61477a2aa129c38e5b71ad64629",
"branch_name": "refs/heads/main",
"committer_date": 1632341964000,
"content_id": "0c46d35e8835fd4c7e4d545dfa9c1b6eca42d22d",
"detected_licenses": [
"MIT"
],
"directory_id": "14f130d3f769651513296b7dd3fe851c478c43ea",
"extension": "py",
"file... | 2.484375 | stackv2 | import requests
from flask import render_template, redirect, request, session
from flask_login import LoginManager
from flask_session import Session
from tempfile import mkdtemp
from config import *
from model.Models import User, Book, user_book
from helpers import login_required
# Configure session to use filesystem... | 149 | 31.28 | 109 | 18 | 1,047 | python | [{"finding_id": "codeql_py/partial-ssrf_27763d412bea983a_2f9a14b0", "tool_name": "codeql", "rule_id": "py/partial-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "Part of the URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"fil... | 1 | true | [
"CWE-918"
] | [
"py/partial-ssrf"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
79
] | [
null
] | [
20
] | [
37
] | |
2024-11-18T20:18:23.508243+00:00 | 1,545,225,901,000 | 700505213d4679c972cbe07b32c0233fc3491d0f | 3 | {
"blob_id": "700505213d4679c972cbe07b32c0233fc3491d0f",
"branch_name": "refs/heads/master",
"committer_date": 1545225901000,
"content_id": "8ca107decd6cd24e7c16cc8ac17a0746b6b42303",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "018f1a87157f009250c659aa9b1cf66ab4b1bf14",
"extension": "py"... | 2.625 | stackv2 | from flask import Flask, jsonify, request
from flask_restful import Resource, Api
from pymongo import MongoClient
import bcrypt
import numpy
import requests
import subprocess
import json
app = Flask(__name__)
api = Api(app)
client = MongoClient("mongodb://db:27017")
db = client.ImageClassiferDB
users = db["Users"]
d... | 156 | 25.41 | 109 | 16 | 942 | python | [{"finding_id": "codeql_py/full-ssrf_096afb322e36f06a_364dcc4b", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
92
] | [
null
] | [
13
] | [
30
] | |
2024-11-18T20:18:31.784763+00:00 | 1,560,802,293,000 | d76a997d7aa43ab414fdfe492f28d210416f190b | 4 | {
"blob_id": "d76a997d7aa43ab414fdfe492f28d210416f190b",
"branch_name": "refs/heads/master",
"committer_date": 1560802293000,
"content_id": "c0b6400b6ed9f79059ee8b45793a5626980aafdf",
"detected_licenses": [
"MIT"
],
"directory_id": "2abe7c793f2f544878630f335c4731fa205dc450",
"extension": "py",
"fi... | 3.640625 | stackv2 | import pyperclip
from user import User
from credentials import Credentials
#To add an account
def create_contact(first_name,last_name,email,phone,password):
'''
Function to create a new account
'''
new_user = User(first_name,last_name,email,phone,password)
return new_user
#To save a user
def save_u... | 137 | 26.2 | 127 | 19 | 811 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_67947a4a077df300_620fa48e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
106,
124
] | [
null,
null
] | [
27,
23
] | [
89,
71
] | |
2024-11-18T20:31:09.837202+00:00 | 1,626,769,193,000 | 2c302c57225c10c03aa36e64532b3fcc660d40c2 | 2 | {
"blob_id": "2c302c57225c10c03aa36e64532b3fcc660d40c2",
"branch_name": "refs/heads/master",
"committer_date": 1626769193000,
"content_id": "cb77210efe9839e322c5938583333df97afcb1a2",
"detected_licenses": [
"MIT",
"Python-2.0"
],
"directory_id": "cc4a185841fdc4c95b9f3e3df0f2639031b1c65b",
"exten... | 2.46875 | stackv2 | import json
import urllib.parse
import os
import boto3
import botocore
import logging
from neo4j import GraphDatabase
logger = logging.getLogger()
logger.setLevel(logging.INFO)
logger.info('Loading function')
s3_client = boto3.client('s3')
sm_client = boto3.client('secretsmanager')
def lambda_handler(event, contex... | 88 | 31.49 | 148 | 14 | 744 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_edeb863073f9273a_b9f5a304", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.", "r... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
83
] | [
null
] | [
17
] | [
42
] | |
2024-11-18T20:43:23.575642+00:00 | 1,625,182,835,000 | c0ed9eabefe8e1b9e4d817da21e3a16c89460c45 | 3 | {
"blob_id": "c0ed9eabefe8e1b9e4d817da21e3a16c89460c45",
"branch_name": "refs/heads/main",
"committer_date": 1625182835000,
"content_id": "d0c9fd2248a296af3e3cb245c4b368146fb0b769",
"detected_licenses": [
"Unlicense"
],
"directory_id": "a4f70e8f7e7ebcbb22f98c9f45b5ef1de173d39e",
"extension": "py",
... | 2.75 | stackv2 | import time
import requests
from datetime import datetime
from tqdm import tqdm
s = requests.Session()
# User configuration
GCP_API_KEY = 'YOUR_API_KEY' # https://developers.google.com/youtube/v3/getting-started
# Script configuration
PLAYLIST_IDS_FILE = 'playlists.txt'
UNLISTED_IDS_BEFORE_2017_FILE = 'unlisted-befo... | 52 | 32.38 | 173 | 18 | 432 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_8c4ed5ed6c35a671_d9b4b5ac", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
45,
30
] | [
null,
null
] | [
25,
19
] | [
57,
27
] | |
2024-11-18T20:43:24.803331+00:00 | 1,494,676,866,000 | ef627877c21ea33def586edcb7494858415294d0 | 2 | {
"blob_id": "ef627877c21ea33def586edcb7494858415294d0",
"branch_name": "refs/heads/master",
"committer_date": 1494676866000,
"content_id": "ad4949999868d0d82de64b96c8789225224d0b23",
"detected_licenses": [
"MIT"
],
"directory_id": "8243c698df81815204741af0df9e7b281c5e26e7",
"extension": "py",
"fi... | 2.5 | stackv2 | """IGV Server
This app dynamically builds experiment and sample menus for IGV, using an
Airtable database. Clicking on a sample in the IGV server will load the BAM
directly from an S3 bucket (set as environment variable). AWS credentials must
be set in a format that boto3 can recognize.
The Airtable database must hav... | 193 | 31.57 | 80 | 15 | 1,554 | python | [{"finding_id": "codeql_py/reflective-xss_f9be57cee861dc64_2543b1b4", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
170
] | [
null
] | [
20
] | [
63
] | |
2024-11-18T20:43:46.064463+00:00 | 1,627,265,376,000 | 2b1864bb41b7a453835f985290a63167d41fe86c | 2 | {
"blob_id": "2b1864bb41b7a453835f985290a63167d41fe86c",
"branch_name": "refs/heads/master",
"committer_date": 1627265376000,
"content_id": "6b90ce7e9788548dbc5c5834fd9797eaeaffd3e6",
"detected_licenses": [
"MIT"
],
"directory_id": "fbd9f6daa554a055b473d40a819f0014d69cad23",
"extension": "py",
"fi... | 2.3125 | stackv2 | from flask import Flask, Response, url_for
app = Flask(__name__)
@app.route('/')
def services_list():
services_list = ''
from thirdpartyauth import services
for service in services:
services_list += (
'<a href="' + url_for('sign_in', service=service) + '">'
+ service
+ '</a><br>'
)
return Response(... | 116 | 22.83 | 71 | 17 | 735 | python | [{"finding_id": "codeql_py/reflective-xss_baad846a0c3416d3_a04093f0", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
80
] | [
84
] | [
3
] | [
17
] | |
2024-11-18T20:43:54.108806+00:00 | 1,683,300,571,000 | d07692da0f2fe51c22231e55d589a0fd1ea91f4c | 4 | {
"blob_id": "d07692da0f2fe51c22231e55d589a0fd1ea91f4c",
"branch_name": "refs/heads/master",
"committer_date": 1683300571000,
"content_id": "ca656b713292a82d8d397d4a1d515df0511fa4e0",
"detected_licenses": [
"Unlicense"
],
"directory_id": "c35460c50233ab5c53612965d08b9b67aa55ff1e",
"extension": "py",... | 3.53125 | stackv2 | #!/usr/bin/env python3
# script to demonstrate mod10 Message + Key = Ciphertext
# by vjek, 20200426, updated 20230422
###
from getpass import getpass
import random,hashlib,sys
def getphrase():
#get sha512 of passphrase, use it as rand seed to generate OTP of any length
#if you wanted true OTP, add ISO 8601 met... | 70 | 34.7 | 149 | 13 | 723 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_f632b2036961ef56_f604a13c", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA512) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
16
] | [
null
] | [
33
] | [
59
] | |
2024-11-18T20:44:04.204610+00:00 | 1,538,879,317,000 | 528a9e71864b90daf33f07437188c88b75af4f92 | 3 | {
"blob_id": "528a9e71864b90daf33f07437188c88b75af4f92",
"branch_name": "refs/heads/master",
"committer_date": 1538879317000,
"content_id": "c7ff7e4e2c873caf9d542c1ab7b673ab3e0e9058",
"detected_licenses": [
"MIT"
],
"directory_id": "4aac3c78266f0929582a068d36d3035e7ddb1fd0",
"extension": "py",
"fi... | 2.828125 | stackv2 | '''
* Vendor: Artica Soluciones Tecnologicas
* Product: Integria IMS Server
* Version: 5.0 MR56 Package 58 and probably earlier
* Category: CWE-640 Weak Password Recovery Mechanism
* Reported: 3/14/17
* Patched: 6/20/17
* Disclosed: 5/14/18
* Researcher: Carl Pearson
* CVE: TBD
* Reference: https://cp270.wordpress.com... | 124 | 39.24 | 176 | 14 | 1,287 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_92098c30c615bf1a_67075f1d", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
103
] | [
null
] | [
12
] | [
40
] | |
2024-11-18T20:58:00.429221+00:00 | 1,689,912,169,000 | bb592c3be0af71a0ac3a8bcbe2d9a1f236ab7d59 | 3 | {
"blob_id": "bb592c3be0af71a0ac3a8bcbe2d9a1f236ab7d59",
"branch_name": "refs/heads/main",
"committer_date": 1689912169000,
"content_id": "a8cf27a16c79949ef73b1ea68d2004e07ddd9a4f",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "0ed62eec4eea9931f08f383cf657f3ca1a3ef4f9",
"extension": "py"... | 2.75 | stackv2 | #!/usr/bin/python3
# Utility to download biosamples metadata from EBI's API and store them into a folder in multiple files
import json
import requests
from requests.packages.urllib3.exceptions import InsecureRequestWarning
import os
import arm_constants
requests.packages.urllib3.disable_warnings(InsecureRequestWarni... | 97 | 42.23 | 169 | 21 | 953 | python | [{"finding_id": "codeql_py/request-without-cert-validation_67745286f61b3a25_371d18d1", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
28
] | [
null
] | [
16
] | [
89
] | |
2024-11-18T20:58:19.614912+00:00 | 1,579,781,183,000 | 34bd24ea1473d008c6516e6736fc9f7e29199c4c | 3 | {
"blob_id": "34bd24ea1473d008c6516e6736fc9f7e29199c4c",
"branch_name": "refs/heads/master",
"committer_date": 1579781183000,
"content_id": "14832a5fd26125b03774cdf5371260e7aa534b23",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "b2933c228900b157b4996ae0fccd20fecd9de07f",
"extension": "p... | 2.796875 | stackv2 | #!/usr/bin/env python3
import html
import sys
import urllib.request
import requests
from pathlib import Path
import urllib3
import click
from habu.lib.web_screenshot import web_screenshot
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
@click.command()
@click.option('-v', 'verbose', is_flag=Tru... | 92 | 31.65 | 135 | 21 | 692 | python | [{"finding_id": "codeql_py/request-without-cert-validation_c53d7657123a4749_6d6efb6b", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
66
] | [
null
] | [
28
] | [
71
] | |
2024-11-18T20:58:39.955404+00:00 | 1,600,442,707,000 | a2afd02b2cc4217969044cc353054a297d9c0034 | 3 | {
"blob_id": "a2afd02b2cc4217969044cc353054a297d9c0034",
"branch_name": "refs/heads/master",
"committer_date": 1600442707000,
"content_id": "f0c81f19ec97f694fe6a088f57bbe6ccd5f0c168",
"detected_licenses": [
"MIT"
],
"directory_id": "15990cc7458a926a44cdcb04bd6002dc9a713f00",
"extension": "py",
"fi... | 2.578125 | stackv2 | #!/usr/bin/env python
import json
import requests
hostname = 'r1.lab.local'
user = 'wwt'
password = 'WWTwwt1!'
# Suppress SSL certificate verification errors
# Using self-signed certificates in lab and therefore will otherwise report verbos
# SSL validation errors
requests.packages.urllib3.disable_warnings()
res... | 58 | 24.9 | 84 | 14 | 371 | python | [{"finding_id": "codeql_py/request-without-cert-validation_05a6914f36a14807_be8511f5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
48
] | [
50
] | [
16
] | [
6
] | |
2024-11-18T20:58:41.271843+00:00 | 1,619,836,753,000 | dce374a02828d8af1ba6044004309d101e6d69d0 | 2 | {
"blob_id": "dce374a02828d8af1ba6044004309d101e6d69d0",
"branch_name": "refs/heads/main",
"committer_date": 1619836753000,
"content_id": "ec91cbef97fa2b137e00ef5535b2b29889e8f60d",
"detected_licenses": [
"MIT"
],
"directory_id": "813c9ad598903d56465a835a2f044aa3cbb0b46a",
"extension": "py",
"file... | 2.5 | stackv2 |
from database.database import db
from database.search import search
import secrets
import hashlib
class Error(Exception):
pass
class EmailAlreadyUsedError(Error):
pass
def emailAvailable(email):
return not usersCollection.where('email', email).exists()
def createUser(name, password, email):
'''Crea... | 139 | 25.43 | 79 | 14 | 868 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_b021040ba4971a02_5e884316", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA3256) that is i... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA3256) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA3256) that is insecure for password hashing, since it is not a computation... | [
41,
65
] | [
null,
null
] | [
31,
31
] | [
64,
64
] | |
2024-11-18T21:10:14.183482+00:00 | 1,571,612,630,000 | 78540b6aee18092b75acec021240dc1a022aa94d | 2 | {
"blob_id": "78540b6aee18092b75acec021240dc1a022aa94d",
"branch_name": "refs/heads/master",
"committer_date": 1571612630000,
"content_id": "53e91a1d26002c567e9ce4dd69082804a2e55292",
"detected_licenses": [
"MIT"
],
"directory_id": "401b79c9b8f16da44352c5509390663ec2239ac5",
"extension": "py",
"fi... | 2.3125 | stackv2 | import RPi.GPIO as GPIO
import time
import subprocess
import datetime
import pprint
import os
import led
import gpsdata
import gpstime
import imudata
BCM_led = 18
BCM_btn = 22
led.BCM_led = BCM_led
GPIO.setmode(GPIO.BCM)
GPIO.setwarnings(False)
GPIO.setup(BCM_led, GPIO.OUT)
GPIO.setup(BCM_btn, GPIO.IN, pull_up_down... | 110 | 22.56 | 136 | 19 | 740 | python | [{"finding_id": "codeql_py/overly-permissive-file_6906d3c9d6a4cc8e_7dcb7952", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
73
] | [
null
] | [
5
] | [
30
] | |
2024-11-18T21:10:16.137122+00:00 | 1,615,501,290,000 | 0ed51c531a82ffa6229f0a0f94f61ffbb50be046 | 2 | {
"blob_id": "0ed51c531a82ffa6229f0a0f94f61ffbb50be046",
"branch_name": "refs/heads/master",
"committer_date": 1615501290000,
"content_id": "3a66ef8bd39ec639992107d64c05de6118601c47",
"detected_licenses": [
"MIT"
],
"directory_id": "89fc945e93c9cfacaab0d3bac0071ee95c86f81d",
"extension": "py",
"fi... | 2.3125 | stackv2 | import os
import sys
import re
import time
import logging
import hashlib
import threading
from configparser import ConfigParser
from pathlib import Path
from contextlib import contextmanager
from datetime import timedelta
from typing import NamedTuple, List
from docopt import docopt
from natural.date import compress as... | 466 | 30.46 | 99 | 20 | 3,300 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_db33a819b25a32c1_0a53ff27", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
102,
116
] | [
null,
null
] | [
39,
39
] | [
47,
47
] | |
2024-11-18T21:10:22.647236+00:00 | 1,570,351,910,000 | 0257cb53ca2d38ec5afd656c783d239d4c14383e | 4 | {
"blob_id": "0257cb53ca2d38ec5afd656c783d239d4c14383e",
"branch_name": "refs/heads/master",
"committer_date": 1570351910000,
"content_id": "3e17832e403f125d11d41a7d0204d9bd0680d5a9",
"detected_licenses": [
"MIT"
],
"directory_id": "2d048d96bbd6ea4993e037852f3861e11e4377fa",
"extension": "py",
"fi... | 3.5625 | stackv2 | #!/usr/bin/env python3.6
from user import User
from credentials import Credentials
from tkinter import *
import pyfiglet
ascii_banner = pyfiglet.figlet_format("- Password -\n ** Vault **")
print(ascii_banner)
# creating an account
def create_user(fname,sname,password):
"""
function to create a new user acco... | 194 | 24.5 | 153 | 19 | 991 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_43c3b30bacd402bc_79eb7941", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
163,
170
] | [
null,
null
] | [
19,
27
] | [
46,
86
] | |
2024-11-18T21:10:27.170579+00:00 | 1,617,692,228,000 | c631e2829637863ba29cc99d46728b57eaffe71c | 3 | {
"blob_id": "c631e2829637863ba29cc99d46728b57eaffe71c",
"branch_name": "refs/heads/master",
"committer_date": 1617692228000,
"content_id": "da04166f8bc3a9ddaf96e6115ee9fdd7cd93825c",
"detected_licenses": [
"MIT"
],
"directory_id": "7ca270b75dfae3de4d76fd9c4bbebcbb1e419532",
"extension": "py",
"fi... | 2.5625 | stackv2 | #!/bin/python
"""
Pranas Grigaitis, 2019-2020
Dept. Modelling of Biological Processes, BioQuant/COS Heidelberg, Heidelberg University &
Systems Biology Lab, AIMMS, VU Amsterdam
pranas.grigaitis@bioquant.uni-heidelberg.de
p.grigaitis@vu.nl
"""
"""
Usage: python main.py <SBML_file>
Requirements:
- Python modules: pandas... | 133 | 40.07 | 167 | 17 | 1,361 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_9d51da5252be8666_689f7fc4", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function."
] | [
75
] | [
null
] | [
33
] | [
47
] | |
2024-11-18T21:10:38.453784+00:00 | 1,600,607,448,000 | 044629af7abc3828bbbda9858de3c45309df7ddf | 3 | {
"blob_id": "044629af7abc3828bbbda9858de3c45309df7ddf",
"branch_name": "refs/heads/master",
"committer_date": 1603710732000,
"content_id": "f01753404d44eceb5d2c733733178db57beffd5f",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "10a33a3c3bb3258a14f72286009936eb38609a2b",
"extension": "p... | 2.71875 | stackv2 | """
Module used to provide controls and status of the BrickBatteryController
via a web API
"""
import datetime
import logging
import math
from collections import deque
from ruamel.yaml import YAML
from aiohttp import web
LOGGER = logging.getLogger('battery_api')
class BrickBatteryHTTPServer:
"""
An asynchron... | 261 | 42.43 | 90 | 17 | 2,430 | python | [{"finding_id": "codeql_py/log-injection_59db86acd4614cd9_97ed4339", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
85
] | [
null
] | [
21
] | [
89
] | |
2024-11-18T21:10:59.325909+00:00 | 1,410,976,540,000 | 3057ecfbd1444174d0ec8534509e5b6e9094a067 | 2 | {
"blob_id": "3057ecfbd1444174d0ec8534509e5b6e9094a067",
"branch_name": "refs/heads/master",
"committer_date": 1410976540000,
"content_id": "d613712a316e3659421fda9331027fdcbf2b9ea7",
"detected_licenses": [
"MIT"
],
"directory_id": "c2abdf7ad833d50a83d5d31afbe687a1bff015df",
"extension": "py",
"fi... | 2.484375 | stackv2 | import arrow
import codecs
import collections
import json
import os
import sys
from jinja2 import Template, Environment, FileSystemLoader
CUR_DIR = os.path.dirname(os.path.realpath(__file__))
DATA_DIR = os.path.join(CUR_DIR, 'data')
JSON_DIR = os.path.join(CUR_DIR, 'output/json')
HTML_DIR = os.path.join(CUR_DIR, 'out... | 232 | 35.1 | 99 | 13 | 2,085 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_66047f2ecf760cb2_4c1ed6f5", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
16
] | [
null
] | [
7
] | [
20
] | |
2024-11-18T21:10:59.425800+00:00 | 1,680,032,345,000 | a9e2627a3d52d58d9ecf33f6dc73b4d3839842d8 | 3 | {
"blob_id": "a9e2627a3d52d58d9ecf33f6dc73b4d3839842d8",
"branch_name": "refs/heads/main",
"committer_date": 1680033272000,
"content_id": "2cbacd3f9cebefc0b99b347d1fb40214a7c12aa6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3f5f2bad9f6ab4acd56c4e2929cee1af4a242e57",
"extension": "py",
... | 2.640625 | stackv2 | #
# _author_ = Mahendran P <Mahendran_P@Dell.com>
#
# Copyright (c) 2022 Dell EMC Corporation
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2... | 232 | 47.21 | 164 | 22 | 2,264 | python | [{"finding_id": "codeql_py/request-without-cert-validation_795b0140c332a19d_74f06340", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
110,
134
] | [
112,
136
] | [
24,
44
] | [
54,
71
] | |
2024-11-18T21:11:08.786234+00:00 | 1,618,061,407,000 | fd07b4a3edf691d8b13310935c83766a5f6ab542 | 3 | {
"blob_id": "fd07b4a3edf691d8b13310935c83766a5f6ab542",
"branch_name": "refs/heads/master",
"committer_date": 1618061407000,
"content_id": "2fd2742a78fb1fdecaed8d7840f7e656275abb81",
"detected_licenses": [
"MIT"
],
"directory_id": "8b83dd273e7ee6c68356d6f85cc4279b4990ac7d",
"extension": "py",
"fi... | 2.84375 | stackv2 | import logging
import re
import requests
# TODO: Add throttling for youtube API reque
class YoutubeApiException(Exception):
"Expcetion for when we fail to deal with response from the Youtube API."
pass
def form_get_request_to_list_playlists_of_channel(channel_id, api_key, page_token='', max_results='50'):... | 219 | 36.21 | 145 | 20 | 1,771 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1b571ae563954d12_9504f386", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive dat... | [
57,
103,
139,
166
] | [
null,
null,
null,
null
] | [
13,
13,
18,
18
] | [
117,
114,
112,
109
] | |
2024-11-18T21:11:13.219233+00:00 | 1,573,825,104,000 | f6adde0974dfc09fda8d30a932c88ae4501225ce | 2 | {
"blob_id": "f6adde0974dfc09fda8d30a932c88ae4501225ce",
"branch_name": "refs/heads/master",
"committer_date": 1573825104000,
"content_id": "bb15b1db6dabee8a5081e2e290bad40837436d6d",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "9191b2f4aa6dec912beb7771110649dd8cd101bb",
"extension": "p... | 2.3125 | stackv2 | import mysql.connector
from mysql.connector import errors
import logging
log = logging.getLogger(__name__)
from ..agent_core import IAgentCore
class Logic(IAgentCore):
def __init__(self, options):
self.host = options.get('host')
self.port = int(options.get('port', 3306))
self.user = option... | 43 | 40.35 | 152 | 14 | 361 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_628389dc5467e062_f0a1413d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
22
] | [
null
] | [
23
] | [
70
] | |
2024-11-18T19:03:27.555430+00:00 | 1,564,648,799,000 | d826c072fcfc467ec5b46faced6955bb2789a882 | 3 | {
"blob_id": "d826c072fcfc467ec5b46faced6955bb2789a882",
"branch_name": "refs/heads/master",
"committer_date": 1564648799000,
"content_id": "fec0e50e0764333afdd3e7772cac331fd6b2fe85",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ed54290846b5c7f9556aacca09675550f0af4c48",
"extension": "py"... | 2.5625 | stackv2 | import os
from flask import render_template,Flask,abort
import json
from flask_sqlalchemy import SQLAlchemy
from sqlalchemy import Column, Integer, String,Text
from sqlalchemy import create_engine
from pymongo import MongoClient
app = Flask(__name__)
app.config['SQLALCHEMY_DATABASE_URI'] = 'mysql://root:@localhost/te... | 115 | 27.37 | 162 | 16 | 781 | python | [{"finding_id": "codeql_py/sql-injection_aa2ccc9ae16985dc_e3ca735e", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
91
] | [
null
] | [
28
] | [
151
] | |
2024-11-18T19:28:36.893763+00:00 | 1,675,072,007,000 | 266b84a6aa4c97040b765856c94a97172eb77aa6 | 3 | {
"blob_id": "266b84a6aa4c97040b765856c94a97172eb77aa6",
"branch_name": "refs/heads/master",
"committer_date": 1675072007000,
"content_id": "bc40eeba135cbf5300fbb99d2fcc22563890eaf5",
"detected_licenses": [
"MIT"
],
"directory_id": "9bd49e3373a88a95b82df6278cc4d4b0ef5fbc1d",
"extension": "py",
"fi... | 3.4375 | stackv2 | import tkinter as tk
class LoginApp(tk.Tk):
def __init__(self):
super().__init__()
self.username = tk.Entry(self)
self.password = tk.Entry(self, show="*")
self.login_btn = tk.Button(self, text="Log in",
command=self.print_login)
self.clear_... | 28 | 31.82 | 67 | 14 | 192 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_081aa821a18be195_d6b8972e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
19
] | [
null
] | [
15
] | [
57
] | |
2024-11-18T19:28:59.071537+00:00 | 1,566,302,959,000 | 0d41c6580db8b3da9fce419daaadb4411f9c261d | 2 | {
"blob_id": "0d41c6580db8b3da9fce419daaadb4411f9c261d",
"branch_name": "refs/heads/master",
"committer_date": 1566302959000,
"content_id": "a79a78b4977d8539c6e8ceb8b0626413ca31284c",
"detected_licenses": [
"MIT"
],
"directory_id": "5b63e07ce466cae1855d7989f9effc1f680ba2f8",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/python3
import os
def set_proxy(host_ip, host_port, auth_choice, pc_username, username, password ):
check = os.path.isdir('/etc/dnf')
if check == True :
file_temp = open('/etc/dnf/dnf.conf_temp', 'w+')
file_ob = open('/etc/dnf/dnf.conf', 'r')
for line in file_ob.readlines():... | 38 | 37.68 | 88 | 15 | 350 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d575661585bb716c_21016c39", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
18
] | [
null
] | [
33
] | [
61
] | |
2024-11-18T19:39:57.060846+00:00 | 1,633,700,981,000 | 9068d8d06bf77347a3bcb2c86c7c58bcb0c9ebda | 3 | {
"blob_id": "9068d8d06bf77347a3bcb2c86c7c58bcb0c9ebda",
"branch_name": "refs/heads/master",
"committer_date": 1633700981000,
"content_id": "f9bf4261f839f6d253c2ef0c2ccc6523bd372c32",
"detected_licenses": [
"MIT"
],
"directory_id": "707f9912b547c70955e73fa310b180c9302c4a81",
"extension": "py",
"fi... | 2.65625 | stackv2 | # coding=utf-8
from os import path
import random
from jinja2 import Environment
import datetime
def datetimeformat(value, format='%d/%m/%Y %H:%M'):
"""
Jinja filter used to format date
:param value:
:param format:
:return:
"""
return value.strftime(format)
JINJA_ENV = Environment()
JINJA... | 102 | 35.73 | 119 | 19 | 817 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d25521ec1a540207_c0e6e9b4", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
18
] | [
null
] | [
13
] | [
26
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.