added stringlengths 32 32 | created int64 1,244B 1,694B | id stringlengths 40 40 | int_score int64 2 5 | metadata dict | score float64 2.31 5.25 | source stringclasses 1
value | text stringlengths 324 20.1k | num_lines int64 16 598 | avg_line_length float64 15.1 58.3 | max_line_length int64 33 179 | ast_depth int64 8 39 | length int64 101 3.8k | lang stringclasses 1
value | sast_codeql_findings stringlengths 1.1k 265k | sast_codeql_findings_count int64 1 45 | sast_codeql_success bool 1
class | sast_codeql_error stringclasses 1
value | cwe_ids listlengths 1 45 | rule_ids listlengths 1 45 | confidences listlengths 1 45 | severities listlengths 1 45 | messages listlengths 1 45 | line_starts listlengths 1 45 | line_ends listlengths 1 45 | column_starts listlengths 1 45 | column_ends listlengths 1 45 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2024-11-19T01:39:02.066594+00:00 | 1,634,384,857,000 | 513a25ef385e2169012595baa1e619ef004b2ec1 | 3 | {
"blob_id": "513a25ef385e2169012595baa1e619ef004b2ec1",
"branch_name": "refs/heads/main",
"committer_date": 1634384857000,
"content_id": "cc1a5fb9e43b00bca8e58fcf78b3e90130c6df20",
"detected_licenses": [
"MIT"
],
"directory_id": "7271d94ea4688f9de062ad1ff79c5e8905305125",
"extension": "py",
"file... | 2.625 | stackv2 | import os,sys, random, subprocess
from config import ConfigService
from encryption import EncryptionService
from ingestion import IngestionService
from auth import AuthenticationService
from persistence import GitPersistenceService
from utils import navigate_to_store
class TextInterface:
def __init__(self):
... | 100 | 30.77 | 117 | 22 | 655 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d76ed9b173aee179_8579d800", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
40
] | [
null
] | [
15
] | [
23
] | |
2024-11-19T01:39:02.394549+00:00 | 1,551,315,482,000 | c573bc577f3b25a2cd9e8776569e115daa998a75 | 2 | {
"blob_id": "c573bc577f3b25a2cd9e8776569e115daa998a75",
"branch_name": "refs/heads/master",
"committer_date": 1551315482000,
"content_id": "44b2a0cfdf3c20e0593c53d7fd3af87cfcf21454",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "b05869f5a110cbfd70bc741d502cafa2cdfe6ba7",
"extension": "py"... | 2.34375 | stackv2 | # parse input string and create specific records
# Copyright 2018 Aloft Time Productions, LLC
# Apache License 2.0: http://www.apache.org/licenses/LICENSE-2.0.txt
# main functions to parse DL string
#
import re
from datetime import datetime
from datetime import date
# Discussion: How to parse? Are the fie... | 241 | 33.41 | 143 | 13 | 2,197 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_41112fe12e8de1fe_f18d5d2c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 4 | true | [
"CWE-312",
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (private)](3) as clear text.\nThis expression logs [sensitive data (priva... | [
222,
225,
236,
239
] | [
null,
null,
null,
null
] | [
23,
32,
23,
32
] | [
34,
43,
26,
35
] | |
2024-11-19T01:51:55.867987+00:00 | 1,686,343,535,000 | 03de94d1699d9c389ae445705cf451c9a376c8c1 | 3 | {
"blob_id": "03de94d1699d9c389ae445705cf451c9a376c8c1",
"branch_name": "refs/heads/master",
"committer_date": 1686343535000,
"content_id": "6a1a8529b48ee2dd3186bee4c7ac52a024cdd64a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "3a682c9375bda0f651cbaebfd3e6e8ffbeb50233",
"extension": "py"... | 2.8125 | stackv2 | import flask
import uuid
blueprint = flask.Blueprint("guid", __name__)
@blueprint.route("/guid/mint", methods=["GET"])
def mint_guid():
"""
Mint a GUID that is valid for this instance of indexd. The intention
of this endpoint is to allow generating valid GUIDs to be indexed
WITHOUT actually creating ... | 60 | 26.37 | 85 | 14 | 420 | python | [{"finding_id": "codeql_py/reflective-xss_cbabfa89b9c8a3d8_d454425e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
22
] | [
null
] | [
16
] | [
60
] | |
2024-11-19T01:52:03.516060+00:00 | 1,537,355,641,000 | 628f3314a8fd741380db2922d985c40291ab0df5 | 2 | {
"blob_id": "628f3314a8fd741380db2922d985c40291ab0df5",
"branch_name": "refs/heads/master",
"committer_date": 1537355641000,
"content_id": "3fdd846ee962e1aa7b095c80ebbb36a26ad8b236",
"detected_licenses": [
"MIT"
],
"directory_id": "f21e6144c4076e42916e3c02c3fa18b3fe87cd8d",
"extension": "py",
"fi... | 2.5 | stackv2 | import hashlib
import logging
from crypto_exchange.utils.rest.api import APIClient
logger = logging.getLogger(__name__)
class OKExREST(APIClient):
def __init__(self, api_key: str = None, secret_key: str = None, api_version: str = "v1",
url: str = "https://www.okex.com/api"):
super(OKEx... | 22 | 34.64 | 110 | 16 | 208 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_d316e5024bac6f59_9cb82fd1", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
22
] | [
null
] | [
28
] | [
47
] | |
2024-11-19T02:04:42.100128+00:00 | 1,522,229,113,000 | 1fcea123db1fedbe28fd14564ad4bb994f8223c3 | 3 | {
"blob_id": "1fcea123db1fedbe28fd14564ad4bb994f8223c3",
"branch_name": "refs/heads/master",
"committer_date": 1522229113000,
"content_id": "9547fbc8e496e5afbed2be30c55917913bdc5600",
"detected_licenses": [
"MIT"
],
"directory_id": "a6cb592b15a19694027a72450798decbb2e3fa66",
"extension": "py",
"fi... | 3.28125 | stackv2 | # -*- coding: utf-8 -*-
"""
Paper object to store the associated information from a submitted url or an
arXiv ID. This module defines the following classes:
- `Paper`, schema for the associated information of a paper
- `SubmittedPaper`, extends `Paper` to process a submitted url.
"""
import requests
import datetime
... | 206 | 28.33 | 78 | 24 | 1,426 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_12cde065e722dc3d_fc76cdcd", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [arxiv.org](1) may be at an arbitrary position in the s... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"The string [arxiv.org](1) may be at an arbitrary position in the sanitized URL.",
"The string [science.sciencemag.org](1) may be at an arbitrary position in the sanitized URL."
] | [
101,
105
] | [
null,
null
] | [
29,
12
] | [
47,
43
] | |
2024-11-19T02:04:47.117817+00:00 | 1,663,675,429,000 | 0013bfba047a95f16eb853e2898b8b5de26283ea | 2 | {
"blob_id": "0013bfba047a95f16eb853e2898b8b5de26283ea",
"branch_name": "refs/heads/main",
"committer_date": 1664282567000,
"content_id": "0acac7fa80470bab74d370a7651ad349ad97deec",
"detected_licenses": [],
"directory_id": "b84e9370cad9d4c48fb678cbc3ccccad00962a9e",
"extension": "py",
"filename": "books... | 2.484375 | stackv2 | import os
import fnmatch
import datetime
import collections
import json
from pathlib import Path
import functools
from flask import Flask, render_template, url_for, abort, send_from_directory, jsonify
from flask_frozen import Freezer
from elsa import cli
import yaml
import markdown
import markupsafe
app = Flask(__nam... | 133 | 26.7 | 86 | 18 | 873 | python | [{"finding_id": "codeql_py/path-injection_c47cf7cb6125af18_550a2280", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
100
] | [
null
] | [
8
] | [
12
] | |
2024-11-19T02:04:53.971113+00:00 | 1,601,898,618,000 | b0741dd6bdc1e1109b9b7df6e554f5b96d81771a | 3 | {
"blob_id": "b0741dd6bdc1e1109b9b7df6e554f5b96d81771a",
"branch_name": "refs/heads/master",
"committer_date": 1601898618000,
"content_id": "219e2ba8f99f6f4d8e17257302b518f8d39f8e6e",
"detected_licenses": [
"MIT"
],
"directory_id": "54489f723841157ff6f9d3aa3d9d9590f27d2ed5",
"extension": "py",
"fi... | 2.640625 | stackv2 | from wordcloud import WordCloud, STOPWORDS
from flask import Flask, request
from flask_restful import Resource, Api
app = Flask(__name__)
api = Api(app)
class wordCloudservice(Resource):
def post(self):
ip_json = request.get_json()
# get file name and result filename
wordFile = ip_json["F... | 36 | 27.31 | 58 | 15 | 222 | python | [{"finding_id": "codeql_py/flask-debug_b78a767333704411_650b4de1", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-022"
] | [
"py/flask-debug",
"py/path-injection"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This path depends on a [user-provided value](1)."
] | [
36,
15
] | [
null,
null
] | [
5,
24
] | [
24,
32
] | |
2024-11-19T02:04:55.312454+00:00 | 1,589,849,544,000 | 23222a75d4a128ca81f05a9da4729b37a10ff26d | 3 | {
"blob_id": "23222a75d4a128ca81f05a9da4729b37a10ff26d",
"branch_name": "refs/heads/master",
"committer_date": 1589849544000,
"content_id": "c4d47b8e33f239d1d3cd25eef3aa40a03765e19a",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "e3422c4dbf02ab6500448854dd46b563d6ac7a0f",
"extension": "py"... | 2.625 | stackv2 | from typing import NamedTuple, List, Iterator, Dict, Tuple
import tarfile
import atexit
import os
import shutil
import tempfile
from scispacy.file_cache import cached_path
class MedMentionEntity(NamedTuple):
start: int
end: int
mention_text: str
mention_type: str
umls_id: str
class MedMentionEx... | 312 | 32.89 | 92 | 17 | 2,342 | python | [{"finding_id": "codeql_py/tarslip_724db6afe889b003_8ee5cc0b", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
167
] | [
null
] | [
13
] | [
20
] | |
2024-11-19T02:28:15.853064+00:00 | 1,617,655,587,000 | b67718f65af9faa7da7f24289230f58d00be6c25 | 2 | {
"blob_id": "b67718f65af9faa7da7f24289230f58d00be6c25",
"branch_name": "refs/heads/main",
"committer_date": 1617655587000,
"content_id": "7206aa2a2e37369641697176b7f50c9c439da73c",
"detected_licenses": [
"MIT"
],
"directory_id": "b5cca4f03ee8ea511235adfbe3e15e0c9d0cfcf0",
"extension": "py",
"file... | 2.390625 | stackv2 | import requests, urllib, json
from decouple import config
def get_roof(latitude, longitude):
imagewidth = 400
imageheight = 400
scale = 2
zoom = 20
maps_static_key = "AIzaSyDLgZUkLB8DomzcmN1WceGvVD_qXw7x8XY"
url = "https://maps.googleapis.com/maps/api/staticmap?"
center = str(latitude) + "... | 28 | 33.61 | 89 | 14 | 233 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bf3694cefde22865_7b00a7d1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
21
] | [
null
] | [
11
] | [
20
] | |
2024-11-19T02:28:16.486390+00:00 | 1,652,315,436,000 | 2ca0bb068b97983dff82f4527e0a31a5f7fac4cd | 2 | {
"blob_id": "2ca0bb068b97983dff82f4527e0a31a5f7fac4cd",
"branch_name": "refs/heads/master",
"committer_date": 1652315436000,
"content_id": "9cb0daa2e1284502b460ce1a1c996657b1311f00",
"detected_licenses": [
"MIT"
],
"directory_id": "5cf745769b0f891aca2198ace8935dce5221ec48",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/env python
import os
import sys
import pathlib
def build(source_path, build_path, install_path, targets):
print(f"source_path : {source_path}")
print(f"build_path : {build_path}")
print(f"install_path: {install_path}")
print(f"targets : {targets}")
version_str = os.path.split(sour... | 41 | 33.34 | 79 | 11 | 341 | python | [{"finding_id": "codeql_py/overly-permissive-file_a4644ed9649e7ebc_7029f752", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world writable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world writable."
] | [
32
] | [
null
] | [
5
] | [
48
] | |
2024-11-19T02:28:19.652235+00:00 | 1,594,456,417,000 | dfb83cd9d450e3bd3f7c473c4733a404ede802db | 3 | {
"blob_id": "dfb83cd9d450e3bd3f7c473c4733a404ede802db",
"branch_name": "refs/heads/master",
"committer_date": 1594456417000,
"content_id": "f880cfbd88d8c9805de59db9d2174e769f259620",
"detected_licenses": [
"MIT"
],
"directory_id": "4a386d4e12f3b6de52c0b9dacb98c6d63aa73509",
"extension": "py",
"fi... | 3.421875 | stackv2 | from random import sample
from time import sleep
islogin = False
def code():#驗證碼
str1 = "ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
code1 = ''.join(sample(str1, 4))
return code1
def registered(): #帳號註冊
register_aacount = input("輸入要註冊的帳號: ")
sigh_up_password = input("輸入註冊的密碼: ")
repassword = ... | 100 | 23.14 | 81 | 17 | 617 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_71137e97d4b3dc0c_b8588b71", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
30
] | [
null
] | [
31
] | [
41
] | |
2024-11-19T02:28:42.503352+00:00 | 1,586,730,053,000 | 5b7db31c14a685f35183160f4ddeccae388f36aa | 3 | {
"blob_id": "5b7db31c14a685f35183160f4ddeccae388f36aa",
"branch_name": "refs/heads/master",
"committer_date": 1586730053000,
"content_id": "48b6b2d3d27845263b6c5b6e3cea251d4b72e505",
"detected_licenses": [
"MIT"
],
"directory_id": "fb0f5a0f8f0f269ed07fd95f5d88a91a40782287",
"extension": "py",
"fi... | 2.796875 | stackv2 | import re
from nltk.corpus import stopwords
from nltk.tokenize import word_tokenize
import string
# Happy Emoticons
emoticons_happy = set([
':-)', ':)', ';)', ':o)', ':]', ':3', ':c)', ':>', '=]', '8)', '=)', ':}',
':^)', ':-D', ':D', '8-D', '8D', 'x-D', 'xD', 'X-D', 'XD', '=-D', '=D',
'=-3', '=3', ':-))', ":'-)", ":'... | 82 | 36.3 | 86 | 11 | 960 | python | [{"finding_id": "codeql_py/overly-large-range_d29784185a84ab9c_829989b2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.", "remediatio... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range that overlaps with \\ufffd-\\ufffd in the same character class.",
"Suspicious character range ... | [
22,
22,
22,
22
] | [
null,
null,
null,
null
] | [
30,
33,
36,
45
] | [
34,
37,
40,
49
] | |
2024-11-19T02:28:42.766996+00:00 | 1,622,584,694,000 | 8071b4469ac17c45fb9d87e3e69a1f7f8f3bb7df | 3 | {
"blob_id": "8071b4469ac17c45fb9d87e3e69a1f7f8f3bb7df",
"branch_name": "refs/heads/master",
"committer_date": 1636182320000,
"content_id": "71a7ca44fc7cdb2f24a9d4c521a88b1318629a76",
"detected_licenses": [
"MIT"
],
"directory_id": "bcc31088ff711da1678d3b390d1644a799a35a92",
"extension": "py",
"fi... | 2.609375 | stackv2 | """
dockerfile
"""
import logging
from jinja2 import Environment, PackageLoader, StrictUndefined
from jinja2.exceptions import UndefinedError
from dfgen.file_actions import FileActions
class Dockerfile:
"""
Dockerfile
All the dockerfile related functionality for dfgen
"""
linux_type = 'alpine'
... | 168 | 29.07 | 115 | 15 | 1,090 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_2d31652776317ebb_5f041974", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
151
] | [
156
] | [
29
] | [
10
] | |
2024-11-19T02:28:46.463795+00:00 | 1,597,712,099,000 | 068ea362bbf9d6765efb97749ab66cd1d94a96cc | 2 | {
"blob_id": "068ea362bbf9d6765efb97749ab66cd1d94a96cc",
"branch_name": "refs/heads/master",
"committer_date": 1597712099000,
"content_id": "bd0d6971f7f0167d32d676a8ee4dfeaa28419336",
"detected_licenses": [
"MIT"
],
"directory_id": "3d8d69de5d9cf2db97a2da46b69631b22ba770d8",
"extension": "py",
"fi... | 2.484375 | stackv2 | import socket
import select
import time
import traceback
import colorama
from colorama import Fore, Style
import threading
from threading import Thread
import requests
# Always initialize colorama
colorama.init()
### Utility functions go here :)
def parse_tags(tags):
tag_dict = {}
for tag_pair in tags.split("... | 209 | 33.69 | 79 | 22 | 1,527 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_02da575d9ad4ee37_0661d594", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (password)](3) as clear text."
] | [
124
] | [
null
] | [
19
] | [
74
] | |
2024-11-19T02:28:48.726635+00:00 | 1,531,583,215,000 | 81d93b7b88c4c3e4eb97fa5fdd4c3e0536efa142 | 3 | {
"blob_id": "81d93b7b88c4c3e4eb97fa5fdd4c3e0536efa142",
"branch_name": "refs/heads/master",
"committer_date": 1531583215000,
"content_id": "b3ef293c8ddf89dec389450b82e46df760e38482",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "8bca749ad71b484b98ba89ecd0375e4f51aa5702",
"extension": "py"... | 2.546875 | stackv2 | import fitbit
import datetime
import gather_keys_oauth2 as oauth2
import numpy
import threading
# Generate formula time string.
def generate_date(days):
return str((datetime.datetime.now() - datetime.timedelta(days=days)).strftime("%Y-%m-%d"))
# Get averange rest hear beat rate from fitbit server.
def get_avera... | 59 | 33.54 | 107 | 17 | 511 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_22259ddc5ff26c20_24e4894e", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
40
] | [
41
] | [
19
] | [
96
] | |
2024-11-19T02:28:51.132974+00:00 | 1,429,457,596,000 | d6ed573fe8de4e960d715b4b24511a3f66ed6bfa | 3 | {
"blob_id": "d6ed573fe8de4e960d715b4b24511a3f66ed6bfa",
"branch_name": "refs/heads/master",
"committer_date": 1429457596000,
"content_id": "416683ea22c5f13a8744eeab5c11fc63966ed45e",
"detected_licenses": [
"MIT"
],
"directory_id": "6d8f9c847bedc534e0e5d794b613da4a08d0c3c7",
"extension": "py",
"fi... | 2.953125 | stackv2 | from threading import Thread
import time
import os
import re
class RobotFinder(Thread):
ROBOT_MAC = 'a0:a8:cd:62:c3:75'
IP_NOT_FOUND = '0.0.0.0'
SLEEP_TIME_IN_MINS = 5
ip_address = IP_NOT_FOUND
def __init__(self, callback):
Thread.__init__(self)
self.callback = callback
se... | 47 | 31.96 | 80 | 15 | 440 | python | [{"finding_id": "codeql_py/overly-large-range_edd30cda124bc2dd_af95ca07", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-f\\].", "remediation": "", "lo... | 2 | true | [
"CWE-020",
"CWE-020"
] | [
"py/overly-large-range",
"py/overly-large-range"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-f\\].",
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-f\\]."
] | [
36,
36
] | [
null,
null
] | [
39,
62
] | [
42,
65
] | |
2024-11-19T02:49:26.486959+00:00 | 1,584,143,215,000 | 08a8e14cca7d8c1ce62e6472ed6737be3d9aff2f | 2 | {
"blob_id": "08a8e14cca7d8c1ce62e6472ed6737be3d9aff2f",
"branch_name": "refs/heads/master",
"committer_date": 1584143215000,
"content_id": "6d6756833368ce896319aac2b91c2c7bc74c88f1",
"detected_licenses": [
"MIT"
],
"directory_id": "eef680812ad21824137913a99a763ffaefde1b06",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/bin/python
# -*- coding: utf-8 -*-
from flask import Flask, request, jsonify, json
import os
import time
import logging
app = Flask(__name__)
logging.basicConfig(
format='[%(asctime)s] %(message)s',
datefmt='%Y-%m-%d %H:%M:%S',
level=logging.DEBUG
)
# @app.route('/')
# def api_index():
# return f... | 55 | 25.84 | 69 | 13 | 394 | python | [{"finding_id": "codeql_py/log-injection_aab4dc212bd9889e_e1731802", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 1 | true | [
"CWE-117"
] | [
"py/log-injection"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1)."
] | [
44
] | [
null
] | [
28
] | [
43
] | |
2024-11-19T03:11:31.469961+00:00 | 1,573,063,157,000 | 7ec64a8bf4d19c30ea5785df07b84cbfd07123ae | 3 | {
"blob_id": "7ec64a8bf4d19c30ea5785df07b84cbfd07123ae",
"branch_name": "refs/heads/master",
"committer_date": 1573063157000,
"content_id": "dcddb1073e669cd92300b9e483e2b30e4f035b97",
"detected_licenses": [
"MIT"
],
"directory_id": "571f91069138d5f07c1865f841dd647b6c3c4aff",
"extension": "py",
"fi... | 2.890625 | stackv2 | # -*- coding: utf-8 -*-
'''
1. Load chatlog and words for scoring
2. Do preprocessing by reading one line at one time
3. Store the each result of sentences to a dictionary {time - preprocessed words} in a list
4. Review the list that contains a set of dictionary to score them with labeledwords
5. Store the each result... | 242 | 28.01 | 147 | 13 | 1,743 | python | [{"finding_id": "codeql_py/overly-large-range_784ca7588b00e543_f4f7bf17", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that overlaps with a-z in the same character class, and is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
41
] | [
null
] | [
32
] | [
35
] | |
2024-11-19T03:11:49.319409+00:00 | 1,580,847,117,000 | fe8fffc0b664e805a3198b93a565e1d7c70a523c | 2 | {
"blob_id": "fe8fffc0b664e805a3198b93a565e1d7c70a523c",
"branch_name": "refs/heads/master",
"committer_date": 1580847117000,
"content_id": "1017b6d5d179287ae4da64af0a833fb7e115c143",
"detected_licenses": [
"MIT"
],
"directory_id": "4136195543f18f22a4a3e56d3a813950de1593f4",
"extension": "py",
"fi... | 2.375 | stackv2 | from django.shortcuts import render
import requests
import random
import datetime
import pytz
from django.core.mail import send_mail
tz = pytz.timezone('America/New_York')
emails = ['892714129@qq.com']
content = ''
OWM_API_KEY = '508a300e8b1ea7c704b80a574472ae9f' # Your OWM_API_KEY
GOOGLE_MAP_KEY = 'Your GOOGLE_MAP_K... | 78 | 45.92 | 152 | 20 | 932 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c42a12ce4c9d7ebc_5ceab4d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
42
] | [
null
] | [
28
] | [
35
] | |
2024-11-19T03:11:58.402946+00:00 | 1,656,441,040,000 | fab5455acb448ceab242fee776592b15a6bb3636 | 3 | {
"blob_id": "fab5455acb448ceab242fee776592b15a6bb3636",
"branch_name": "refs/heads/master",
"committer_date": 1656441040000,
"content_id": "ac9c0ae379d34c61e2c9d2d019999031f6e48741",
"detected_licenses": [
"MIT"
],
"directory_id": "0ef6f868c60bf7a54d0a48fbcf5992acc7d47d61",
"extension": "py",
"fi... | 2.734375 | stackv2 |
# #######################################################################
#
# Task : RemoteDesktop Interaction
#
# #######################################################################
"""
Creates the autoIT stub code to be passed into the master compile
Takes a supplied text file for the Sheepl to type
the m... | 455 | 33.95 | 134 | 22 | 3,170 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8cd0262130046e09_e5560893", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
276
] | [
null
] | [
19
] | [
73
] | |
2024-11-19T03:12:13.074995+00:00 | 1,624,448,088,000 | a1d0cf42e3ef4c55647f1294d47eb975a7e3f439 | 3 | {
"blob_id": "a1d0cf42e3ef4c55647f1294d47eb975a7e3f439",
"branch_name": "refs/heads/main",
"committer_date": 1624448088000,
"content_id": "5316032e77ed9c05927abe4f6fe46b6a60183a31",
"detected_licenses": [
"MIT"
],
"directory_id": "a792b4239f5b06d2c8d181dcd2c5ddbe7cecf60a",
"extension": "py",
"file... | 2.75 | stackv2 | import sys
import re
def translate(text, conversion_dict, before=None):
"""
Translate words from a text using a conversion dictionary
Arguments:
text: the text to be translated
conversion_dict: the conversion dictionary
before: a function to transform the input
(by default... | 171 | 45.62 | 149 | 27 | 2,117 | python | [{"finding_id": "codeql_py/redos_beda218c7de4c05d_084c5c41", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with 'define i9 @a(i' and containing ma... | 4 | true | [
"CWE-1333",
"CWE-1333",
"CWE-1333",
"CWE-1333"
] | [
"py/redos",
"py/redos",
"py/redos",
"py/redos"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with 'define i9 @a(i' and containing many repetitions of '90ai'.",
"This part of the regular expression may cause exponential backtracking on strings starting with 'define i9 @a(i9' and containing many repetitions of 'ai0'... | [
50,
50,
46,
46
] | [
null,
null,
null,
null
] | [
87,
92,
88,
93
] | [
90,
95,
91,
96
] | |
2024-11-19T03:12:32.270327+00:00 | 1,562,735,808,000 | f409edb701d1082fcfd72b22133c1b32c78eb999 | 3 | {
"blob_id": "f409edb701d1082fcfd72b22133c1b32c78eb999",
"branch_name": "refs/heads/master",
"committer_date": 1562735808000,
"content_id": "9baba8a522431ae1f2720a0cf6999e35b8c3b668",
"detected_licenses": [
"MIT"
],
"directory_id": "7a424cbe691d9665409aa975c64531ab0f1cd1bf",
"extension": "py",
"fi... | 2.640625 | stackv2 | import json
from django.http import HttpResponseBadRequest, JsonResponse
from django.utils.deprecation import MiddlewareMixin
from django.utils.translation import gettext as _
class JSONParsingMiddleware(MiddlewareMixin):
'''
将PUT请求中的数据解析为json,保存到request.PUT中
Django中默认只将GET和POST请求中的数据进行json解析,存放到request... | 29 | 32.97 | 94 | 22 | 196 | python | [{"finding_id": "codeql_py/stack-trace-exposure_cac99116a04df8e3_3109d17a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
21
] | [
24
] | [
41
] | [
22
] | |
2024-11-19T03:12:32.783518+00:00 | 1,407,851,111,000 | a1d25d2f26ebf0f37bb30004bbef88ef76e250c4 | 2 | {
"blob_id": "a1d25d2f26ebf0f37bb30004bbef88ef76e250c4",
"branch_name": "refs/heads/master",
"committer_date": 1407851111000,
"content_id": "2ae1be211397fe3e715b5ab66869a3cf91c89429",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4cdb16cef63b205e4c1b41f63b8cd25919cfd748",
"extension": "py"... | 2.328125 | stackv2 | #!/usr/bin/env python
import argparse
from ipaddr import IPv4Address
import requests
import re
from maas_common import get_auth_details, metric, status_err, status_ok
from requests import exceptions as exc
from lxml import html
def check(args):
splash_status_code = 0
splash_milliseconds = 0.0
login_statu... | 85 | 30.31 | 75 | 13 | 638 | python | [{"finding_id": "codeql_py/request-without-cert-validation_db0b1e39f3576e53_35b2aec5", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 2 | true | [
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
27,
54
] | [
29,
57
] | [
13,
13
] | [
30,
26
] | |
2024-11-19T03:12:39.862994+00:00 | 1,602,774,054,000 | 4b029a646ea6fbf0acdd487ec7f7314a45c28fa6 | 2 | {
"blob_id": "4b029a646ea6fbf0acdd487ec7f7314a45c28fa6",
"branch_name": "refs/heads/master",
"committer_date": 1602774054000,
"content_id": "bc22dccf7cd53d16a8c73b60f62b35d61e9910d6",
"detected_licenses": [
"MIT"
],
"directory_id": "ff2b5481cd0eb1024e0abaf02a2e30bdfd0f5422",
"extension": "py",
"fi... | 2.375 | stackv2 | import json
from flask import (
Blueprint,
render_template,
flash,
request,
redirect,
url_for
)
from flask_login import login_required
# Plotting
import plotly
import plotly.graph_objects as go
from sqlalchemy import create_engine
import pandas as pd
from db import db
from models import TMCFi... | 130 | 29 | 92 | 19 | 851 | python | [{"finding_id": "codeql_py/sql-injection_e0090ba5083e0187_3bb784d0", "tool_name": "codeql", "rule_id": "py/sql-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This SQL query depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown... | 1 | true | [
"CWE-089"
] | [
"py/sql-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This SQL query depends on a [user-provided value](1)."
] | [
46
] | [
null
] | [
22
] | [
62
] | |
2024-11-19T03:25:19.977126+00:00 | 1,674,374,018,000 | cd69e022f33d1453ae6e8cd94c0ebbb8815af08a | 2 | {
"blob_id": "cd69e022f33d1453ae6e8cd94c0ebbb8815af08a",
"branch_name": "refs/heads/master",
"committer_date": 1674374018000,
"content_id": "f45e7c9f67ad9b1de3dc5ee3d1230898d35bafd4",
"detected_licenses": [
"MIT"
],
"directory_id": "04f75ffb1333f6538c22ecef087978d4520195ce",
"extension": "py",
"fi... | 2.46875 | stackv2 | import json
import jsonpickle
from flask import Blueprint, render_template, redirect, url_for, request, flash, Response
from flask.json import jsonify
from flask_principal import Permission, RoleNeed
from werkzeug.security import generate_password_hash, check_password_hash
from .models import User, Vote
from . import ... | 129 | 28.28 | 97 | 14 | 832 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_a28a579db69baa27_ebbb8597", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
23
] | [
null
] | [
18
] | [
26
] | |
2024-11-19T03:25:21.656447+00:00 | 1,620,548,196,000 | bf0fe77bf60d91594d9320f92b88a17c08804c69 | 3 | {
"blob_id": "bf0fe77bf60d91594d9320f92b88a17c08804c69",
"branch_name": "refs/heads/main",
"committer_date": 1620548196000,
"content_id": "46d90e1a4d7efeb0f0141c1e0d6682b4abe653c0",
"detected_licenses": [
"Python-2.0",
"Apache-2.0"
],
"directory_id": "2988edff9658f63b4740dfef7097c2f9a7bb6e6d",
"... | 2.65625 | stackv2 | import logging
import sys
import traceback
import openpyxl
import requests
import geocoding
import os
LOG_FORMAT = "%(asctime)s %(name)s %(levelname)s %(pathname)s %(message)s " # 配置输出日志格式
DATE_FORMAT = '%Y-%m-%d %H:%M:%S %a ' # 配置输出时间的格式,注意月份和天数不要搞乱了
logging.basicConfig(level=logging.INFO,
form... | 195 | 34.54 | 117 | 20 | 1,754 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c7bb5af346bab81b_12cda35d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
94
] | [
null
] | [
23
] | [
114
] | |
2024-11-19T03:25:32.929442+00:00 | 1,544,242,000,000 | fdfe8d6a7e966a6f4ad07d19dd6626c8baeac607 | 2 | {
"blob_id": "fdfe8d6a7e966a6f4ad07d19dd6626c8baeac607",
"branch_name": "refs/heads/master",
"committer_date": 1544242000000,
"content_id": "7fea81bde8f417a80ece94158ae7848637a9f579",
"detected_licenses": [
"MIT"
],
"directory_id": "662cd8d31909f15daacb366b3674237adf3b8baf",
"extension": "py",
"fi... | 2.484375 | stackv2 | from flask import render_template, flash, url_for, redirect, request, abort
from app import app, db
from app.forms.forms import RegisterForm, LoginForm, BusinessesForm, ReviewForm, SearchForm
from flask_login import login_user, logout_user, current_user, login_required
from app.models.models import User, Businesses, Re... | 132 | 38.56 | 124 | 16 | 1,105 | python | [{"finding_id": "codeql_py/url-redirection_1124608a463987b8_e82756ab", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
40
] | [
null
] | [
29
] | [
38
] | |
2024-11-19T03:25:38.417215+00:00 | 1,629,144,671,000 | 9e3af27cf5488e32002f2db3825f407806c882d8 | 4 | {
"blob_id": "9e3af27cf5488e32002f2db3825f407806c882d8",
"branch_name": "refs/heads/main",
"committer_date": 1629144671000,
"content_id": "09cac2970baeb02784e55e0c472f316841883a1a",
"detected_licenses": [
"MIT"
],
"directory_id": "c8c5fccb13174a668f445a603e3b271329e8b7f4",
"extension": "py",
"file... | 3.6875 | stackv2 | import random
from text import ABC, HANGMAN, WORDS
def get_random_word() -> str:
return random.choice(WORDS)
def restart() -> None:
global missed_letters, correct_letters, game_is_done, secret_word
missed_letters = ""
correct_letters = ""
game_is_done = False
secret_word = get_random_word()... | 97 | 28.21 | 87 | 24 | 609 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2ad3cd3572b4c4a8_ce8bd8f0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (secret)](1) as clear text.\nThi... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (secret)](1) as clear text.\nThis expression logs [sensitive data (secret)](2) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text.",
"This expression logs [sensitive data (secret)](1) as clear text."
] | [
33,
75,
83
] | [
null,
null,
89
] | [
15,
23,
21
] | [
21,
87,
26
] | |
2024-11-19T01:28:45.998431+00:00 | 1,466,414,681,000 | 7d2e2a3b9f3536a2cffb153f9b1b9c57cc89a485 | 3 | {
"blob_id": "7d2e2a3b9f3536a2cffb153f9b1b9c57cc89a485",
"branch_name": "refs/heads/master",
"committer_date": 1466414681000,
"content_id": "33d36235f3e2d40dc46ebb6ebf5aca3266a16010",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "434d82d02084c9041b0d43366e4ff1c777d7b48d",
"extension": "py"... | 2.828125 | stackv2 | '''
Miguel Angel Alvarez Cabrerizo (n40lab) - ArtemIT 2016
Description: A script for random password and hashes generation to be used as sudo passwords.
Ansible Vault is used to encrypt the files containing sensitive information.
Password generator:
http://stackoverflow.com/questions/2257441/random-string-generation... | 67 | 25.19 | 112 | 12 | 450 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_07f2ab42ee6a2fc5_946b5a71", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
56
] | [
null
] | [
16
] | [
59
] | |
2024-11-19T01:28:48.581561+00:00 | 1,689,614,293,000 | 65ab68d7e9ac16e30fa631adbe6778326f7625be | 3 | {
"blob_id": "65ab68d7e9ac16e30fa631adbe6778326f7625be",
"branch_name": "refs/heads/master",
"committer_date": 1689614293000,
"content_id": "57915100c45ac527d93f0d22605b4c8546c8828e",
"detected_licenses": [
"NIST-Software",
"Apache-2.0",
"BSD-3-Clause"
],
"directory_id": "fceb4b981bc5e63891bf6... | 2.5625 | stackv2 | """ REST Views for Instance object
"""
from core_main_app.commons import exceptions
from django.http import Http404
from rest_framework import status
from rest_framework.exceptions import ValidationError
from rest_framework.permissions import IsAdminUser
from rest_framework.response import Response
from rest_framework.... | 310 | 27.62 | 77 | 15 | 1,702 | python | [{"finding_id": "codeql_py/stack-trace-exposure_dd4e8fa048470521_8960f0ca", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 6 | true | [
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209",
"CWE-209"
] | [
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure",
"py/stack-trace-exposure"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"[Stack trace information... | [
51,
98,
153,
205,
238,
309
] | [
null,
null,
null,
null,
null,
null
] | [
17,
17,
17,
17,
17,
17
] | [
24,
24,
24,
24,
24,
24
] | |
2024-11-19T01:28:58.580854+00:00 | 1,622,724,319,000 | 51b2804a3174c31d4a4283435efc4fdfb3e14c3b | 3 | {
"blob_id": "51b2804a3174c31d4a4283435efc4fdfb3e14c3b",
"branch_name": "refs/heads/main",
"committer_date": 1622724319000,
"content_id": "1ba3ef4ab8694530c78d5d02c701c13ee8fbd054",
"detected_licenses": [
"MIT"
],
"directory_id": "4484454bad660c415893b3f15548d5370e36bf21",
"extension": "py",
"file... | 2.828125 | stackv2 | # Date: 02/23/2019
# Original passgen author: Mohamed
# Some changed by: virusaki
# Description: A social engineering password generator
# This script required python version >= 3.0
import argparse
import sys
max_count_default = 1000000
max_count_main_default = 1000
class PassGen:
def __init__(self, max_count=ma... | 236 | 39.95 | 133 | 23 | 1,874 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_1c2aae96a4bda0cf_c8c92d13", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.\n... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (private)](1) as clear text.\nThis expression stores [sensitive data (private)](2) as clear text.\nThis expression stores [sensitive data (password)](3) as clear text."
] | [
196
] | [
null
] | [
25
] | [
43
] | |
2024-11-19T01:29:29.834386+00:00 | 1,693,805,612,000 | b8b5079b48a029db08d3a9e520e16b3b6e5f03c6 | 2 | {
"blob_id": "b8b5079b48a029db08d3a9e520e16b3b6e5f03c6",
"branch_name": "refs/heads/main",
"committer_date": 1693805612000,
"content_id": "67fe3c772fcf2bf049049b497205affbb2841add",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "3d74f759ee48d383aa82eeff0a55864a93a001ba",
"extension": "py"... | 2.359375 | stackv2 | #!/usr/bin/env python3
# Copyright 2013 The Flutter Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
# The return code of this script will always be 0, even if there is an error,
# unless the --fail-loudly flag is passed.
import argpar... | 168 | 23.96 | 81 | 14 | 1,105 | python | [{"finding_id": "codeql_py/tarslip_73412e2174a646be_3e1d223f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
118
] | [
null
] | [
5
] | [
6
] | |
2024-11-19T01:54:59.757535+00:00 | 1,616,620,079,000 | fa1f0c185bc5283a3af54b2c41f92b7178c51573 | 4 | {
"blob_id": "fa1f0c185bc5283a3af54b2c41f92b7178c51573",
"branch_name": "refs/heads/main",
"committer_date": 1616620079000,
"content_id": "26dfd0d29fbb7eff22264f1521ee53be78c1c1ae",
"detected_licenses": [
"MIT"
],
"directory_id": "a4e62b078c8d9816ba216e8a8f3584c6b54ef79b",
"extension": "py",
"file... | 3.734375 | stackv2 | import pandas as pd
import time
# Set the precision of our dataframes to one decimal place.
pd.set_option('precision', 1)
# City names corresponding to files
df_dic = {'chicago': 'chicago.csv','washington': 'washington.csv','new york': 'new_york_city.csv'}
def mostFrequent(df):
"""Show the most frequent hour,da... | 154 | 39.86 | 153 | 18 | 1,664 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c43193921ceca839_c2118434", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
76
] | [
null
] | [
59
] | [
70
] | |
2024-11-19T01:55:19.036790+00:00 | 1,567,808,644,000 | db3fcab7b2723430524a629c52e1106ddccb6705 | 3 | {
"blob_id": "db3fcab7b2723430524a629c52e1106ddccb6705",
"branch_name": "refs/heads/master",
"committer_date": 1567808644000,
"content_id": "ead757cdf99da2e93c9ebcf678c9c8e8ca34c121",
"detected_licenses": [
"MIT"
],
"directory_id": "1724dfee76ad898ecd9d82a2a325f2eece2955bf",
"extension": "py",
"fi... | 2.609375 | stackv2 | import os
import platform
import requests
import zipfile
class WebDriverUpdate:
BASE_DIR = "./chromedriver"
INSTALLED_RELEASE_FILE = BASE_DIR + "/" + "INSTALLED_RELEASE"
LATEST_RELEASE_FILE = BASE_DIR + "/" + "LATEST_RELEASE"
WEBDRIVER_BASE_URL = "https://chromedriver.storage.googleapis.com"
WEBDR... | 96 | 34.23 | 102 | 15 | 739 | python | [{"finding_id": "codeql_py/overly-permissive-file_793705520c9c4efe_5f61c6fc", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
89
] | [
null
] | [
9
] | [
52
] | |
2024-11-19T02:06:44.896829+00:00 | 1,595,283,090,000 | cae48034b83fd9c25a27cef1d6b89eb552cf310e | 3 | {
"blob_id": "cae48034b83fd9c25a27cef1d6b89eb552cf310e",
"branch_name": "refs/heads/master",
"committer_date": 1595283090000,
"content_id": "3ec59258a08e03a7d80e52deb19de4f27f09b958",
"detected_licenses": [
"MIT"
],
"directory_id": "839b8d3b691bc07fdd48d2a569d8b86c3cd8b4d1",
"extension": "py",
"fi... | 2.890625 | stackv2 | import functools
import os
import tarfile
import tempfile
import urllib.request
import zipfile
from typing import Optional
from . import remove_suffix
from .log import log
from .types import BarFn, PathType
__all__ = [
"download",
]
def download(url: str, save_dir: Optional[PathType] = None, filename: Optional[... | 150 | 36.44 | 120 | 17 | 1,269 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_6b0a0c715803edb5_1a5387c3", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [drive.google.com](1) may be at an arbitrary position i... | 3 | true | [
"CWE-020",
"CWE-020",
"CWE-022"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/tarslip"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [drive.google.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [drive.google.com](1) may be at an arbitrary position in the sanitized URL.",
"This file extraction depends on a [potentially untrusted source](1)."
] | [
52,
69,
77
] | [
null,
null,
null
] | [
12,
12,
21
] | [
37,
37,
26
] | |
2024-11-19T02:06:46.276146+00:00 | 1,442,161,998,000 | a1bbe543abd1ea27d1e9a81df9b515f04a83e0bf | 2 | {
"blob_id": "a1bbe543abd1ea27d1e9a81df9b515f04a83e0bf",
"branch_name": "refs/heads/master",
"committer_date": 1442161998000,
"content_id": "dd608d2a1cb8cf2a78988d6a632bdcdd86d57427",
"detected_licenses": [
"MIT"
],
"directory_id": "e48cfabe91c4522462149e3f6cc54258b9b4464b",
"extension": "py",
"fi... | 2.4375 | stackv2 | import os
import sys
import ssl
import SocketServer
from OpenSSL import crypto, SSL
from socket import gethostname
from pprint import pprint
from time import gmtime, mktime
SPLUNK_HOME = os.environ["SPLUNK_HOME"]
CERTIFICATE_PATH = os.path.join(SPLUNK_HOME, "etc", "apps", "healthkit", "local", "server.pem")
def gene... | 126 | 33.65 | 100 | 15 | 1,069 | python | [{"finding_id": "codeql_py/insecure-default-protocol_83d6c92018113538_3492d8e3", "tool_name": "codeql", "rule_id": "py/insecure-default-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in... | 1 | true | [
"CWE-327"
] | [
"py/insecure-default-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Call to deprecated method ssl.wrap_socket does not specify a protocol, which may result in an insecure default being used."
] | [
89
] | [
91
] | [
23
] | [
43
] | |
2024-11-19T02:06:55.165306+00:00 | 1,593,010,130,000 | ed0da8bb88096bab29a6fbd252165768a7d7c6f7 | 2 | {
"blob_id": "ed0da8bb88096bab29a6fbd252165768a7d7c6f7",
"branch_name": "refs/heads/master",
"committer_date": 1593010130000,
"content_id": "c928aab6031a8ab5acd8d370f62bae3011abb16e",
"detected_licenses": [
"MIT"
],
"directory_id": "4950881f24f0f4cc06ebf5feb5200497487f06ee",
"extension": "py",
"fi... | 2.375 | stackv2 | import numpy as np
from flask import render_template, request, redirect, url_for, Blueprint
import sys
import time
sys.path.insert(0, '../')
from python_backend import specs_jobs, utils_jobs, utils_users
sys.path.insert(0, '../../')
from gaussian_process import GPPairwise
from acquisition_function import DiscreteAcquir... | 123 | 36.68 | 108 | 15 | 1,057 | python | [{"finding_id": "codeql_py/url-redirection_fc916662554a6653_9dc79100", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
123
] | [
null
] | [
25
] | [
63
] | |
2024-11-19T02:06:55.781647+00:00 | 1,607,054,347,000 | 16af5995a8cf3faea2aa9fedda386ed56dbb61c1 | 2 | {
"blob_id": "16af5995a8cf3faea2aa9fedda386ed56dbb61c1",
"branch_name": "refs/heads/master",
"committer_date": 1607191650000,
"content_id": "867d28a812e26451b4aeeb23947f9cf7a6580e7d",
"detected_licenses": [
"MIT"
],
"directory_id": "3a9f30eaea4608590060f1f3aca9b34d7d5691b2",
"extension": "py",
"fi... | 2.390625 | stackv2 | #!/usr/bin/python2
import cgi
import random
import string
import cgitb
import os
import sys
import subprocess
import draw_galaxy
import json
from glob import glob
GENERATED_DIR = "../generated"
LAYOUTS_DIR = "../res/layouts"
def spiral_pattern(centre):
cur_point = centre
directions = [[1, 1], [0, 1], [-1, 0]... | 259 | 33.81 | 135 | 17 | 2,371 | python | [{"finding_id": "codeql_py/command-line-injection_89da7afe65ad6c73_6f392f33", "tool_name": "codeql", "rule_id": "py/command-line-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This command line depends on a [user-provided value](1).\nThis command line depends on a [u... | 3 | true | [
"CWE-078",
"CWE-022",
"CWE-022"
] | [
"py/command-line-injection",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](1).\nThis command line depends on a [user-provided value](1).",
"This path depends on a [user-provided value](1).",
"This path depends on a [u... | [
133,
149,
207
] | [
null,
null,
null
] | [
26,
15,
22
] | [
29,
23,
42
] | |
2024-11-19T02:06:56.334366+00:00 | 1,597,826,898,000 | 9193cd84050288a050294243fc3359a3dbc26cee | 2 | {
"blob_id": "9193cd84050288a050294243fc3359a3dbc26cee",
"branch_name": "refs/heads/master",
"committer_date": 1597826898000,
"content_id": "4deafd14a4f726bfb6c69008f6a8cfac03089c84",
"detected_licenses": [
"MIT"
],
"directory_id": "5a47b9d0e684984e8a013bc903590c605dc25cd2",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/env python
# -*- encoding: utf-8 -*-
import requests
import json
import os
import codecs
import io
class send2phone:
def __init__(self, *args, **kwargs):
self.barklink = kwargs["barkurl" ] if ("barkurl" in kwargs) else ""
self.skey = kwargs["skey" ] if ("skey" in kwargs) els... | 60 | 35.58 | 91 | 20 | 510 | python | [{"finding_id": "codeql_py/request-without-cert-validation_13c2ef9539937106_12f6898d", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 3 | true | [
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1)."
] | [
28,
39,
57
] | [
null,
null,
null
] | [
23,
23,
23
] | [
53,
65,
65
] | |
2024-11-19T02:06:58.872210+00:00 | 1,692,041,896,000 | 85e4bff1d76aa413b40681fd30a89745c3f43e59 | 2 | {
"blob_id": "85e4bff1d76aa413b40681fd30a89745c3f43e59",
"branch_name": "refs/heads/master",
"committer_date": 1692041896000,
"content_id": "fd91fcc40aab86ac6f10782a4aaeeed1f5d50742",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "52bf4ed4c0e6a429fe30ad5a168398939ee4bef4",
"extension": "py"... | 2.390625 | stackv2 | #! /usr/bin/python3
import argparse
import sys
import logging
import os
import http.client
import json
import textwrap
import secrets
import string
import subprocess
import shlex
import random
from urllib.parse import urlparse
API_HOST = os.environ.get('API_URL').strip('https://').strip('http://')
API_BASE_URI = '/ap... | 308 | 34.31 | 116 | 16 | 2,777 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_bacac9e164b4cfe9_1ec3e07c", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
89,
200,
304
] | [
null,
null,
null
] | [
18,
19,
18
] | [
35,
92,
80
] | |
2024-11-19T02:07:01.125078+00:00 | 1,633,908,005,000 | 097b7c7eeffcb6fb82f18e259f94087cc6ae92ff | 3 | {
"blob_id": "097b7c7eeffcb6fb82f18e259f94087cc6ae92ff",
"branch_name": "refs/heads/main",
"committer_date": 1633908005000,
"content_id": "c618e0d2e2d54831b35d7d0c4dbc85400e530668",
"detected_licenses": [
"MIT"
],
"directory_id": "1f4acad2f23795c31720528483449bd85d641343",
"extension": "py",
"file... | 2.859375 | stackv2 | #!/usr/bin/env python3
""" Module of Users views
"""
from api.v1.views import app_views
from flask import abort, jsonify, request
from models.user import User
@app_views.route('/users', methods=['GET'], strict_slashes=False)
def view_all_users() -> str:
""" GET /api/v1/users
Return:
- list of all User o... | 125 | 27.58 | 78 | 15 | 950 | python | [{"finding_id": "codeql_py/stack-trace-exposure_ff997a047e88451d_ecdcb83a", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.\n[S... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](1) flows to this location and may be exposed to an external user.\n[Stack trace information](1) flows t... | [
92
] | [
null
] | [
20
] | [
40
] | |
2024-11-19T02:07:12.037152+00:00 | 1,417,627,651,000 | ef68e27e2ba4635fe8322cde82b9c0d27776be31 | 2 | {
"blob_id": "ef68e27e2ba4635fe8322cde82b9c0d27776be31",
"branch_name": "refs/heads/master",
"committer_date": 1417627651000,
"content_id": "360f8de11a3f0e8a189b8391030e7c6954588449",
"detected_licenses": [
"MIT"
],
"directory_id": "17045f031a47c44cc5a6ad0c06e58a2c78da9680",
"extension": "py",
"fi... | 2.375 | stackv2 | import os.path
from shutil import copyfile
from shutil import copytree
from shutil import rmtree
try:
from jinja2 import Template
except:
print "Could not import Jinja2, run 'easy_install Jinja2'"
exit()
output_dir = os.path.join('./', 'chrome_webstore')
if os.path.exists(output_dir):
print "Removing ... | 67 | 25.18 | 99 | 12 | 420 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_a6e70044486d4bda_0195c6be", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
21
] | [
null
] | [
16
] | [
50
] | |
2024-11-19T02:31:20.488440+00:00 | 1,624,370,503,000 | 241f507fb1c8067f1a8d83903115fd2349d86e00 | 3 | {
"blob_id": "241f507fb1c8067f1a8d83903115fd2349d86e00",
"branch_name": "refs/heads/main",
"committer_date": 1624370503000,
"content_id": "19a997962cca5611f759fe763c864cbaf40e6643",
"detected_licenses": [
"MIT"
],
"directory_id": "9c79bc6d75a2db0affb85df4a17ee0e20aa20527",
"extension": "py",
"file... | 2.53125 | stackv2 | import requests, os, time, logging, json
import pandas as pd
import numpy as np
import geopandas as gpd
from ca_parser import parse_conformiteitsattest
from tqdm.contrib.concurrent import process_map # or thread_map
from functools import partial
from pyproj import Proj, transform
from tqdm import tqdm
logger = loggin... | 179 | 45.37 | 170 | 17 | 2,257 | python | [{"finding_id": "codeql_py/request-without-cert-validation_90d31417d193d4ba_db1c558a", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
21
] | [
null
] | [
16
] | [
90
] | |
2024-11-19T02:31:47.919204+00:00 | 1,455,413,385,000 | e901c4f37f63cfe6bbf5a22da0a38decd2cd55df | 3 | {
"blob_id": "e901c4f37f63cfe6bbf5a22da0a38decd2cd55df",
"branch_name": "refs/heads/master",
"committer_date": 1455413385000,
"content_id": "8ea64a5bebf7446bb3173019ff37ada9aeb0c13f",
"detected_licenses": [
"MIT"
],
"directory_id": "6db7a3150cf00b4007d5846d95f3ca55373385e1",
"extension": "py",
"fi... | 2.59375 | stackv2 | """
Tornado server
"""
import tornado
import logging
from tornado.ioloop import IOLoop
from tornado.httpserver import HTTPServer
from tornado.web import RequestHandler, MissingArgumentError
from canonicalurl import get_canonical_url_async
class MainHandler(RequestHandler):
def initialize(self, whitelist, expandl... | 66 | 29.35 | 79 | 17 | 436 | python | [{"finding_id": "codeql_py/stack-trace-exposure_12456f85fb85dbeb_41f6ec81", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
45
] | [
null
] | [
24
] | [
41
] | |
2024-11-19T02:32:06.924953+00:00 | 1,437,753,520,000 | ebd1e0827f89b1855cad9805687e897f0db3abf9 | 2 | {
"blob_id": "ebd1e0827f89b1855cad9805687e897f0db3abf9",
"branch_name": "refs/heads/master",
"committer_date": 1437753520000,
"content_id": "ffe375dc9df3e3776e809e4f8c957e96985674c6",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "4a858016fdb8d5226114a04b61285dc5154db963",
"extension": "py"... | 2.3125 | stackv2 | """
Copyright 2015 Google Inc. All rights reserved.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in... | 180 | 37.91 | 106 | 19 | 1,553 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_3ca9a80654207c01_71548655", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that is insecure.",
"[Sensitive data (id)](1) is used in a hashing algorithm (MD5) that is insecure.\n[Sensitive data (id)](2) is used in a hashing algorithm (MD5) that i... | [
120,
180
] | [
null,
null
] | [
28,
28
] | [
31,
31
] | |
2024-11-19T02:32:10.727446+00:00 | 1,490,863,602,000 | c152def57446140fdd07c7d38bbb527066fb3347 | 2 | {
"blob_id": "c152def57446140fdd07c7d38bbb527066fb3347",
"branch_name": "refs/heads/master",
"committer_date": 1490863602000,
"content_id": "bd325f3c024671639ad3225b0d160a7e8b552916",
"detected_licenses": [
"MIT"
],
"directory_id": "f4721a9dded44a481d3e60f2e9be101a782d7e00",
"extension": "py",
"fi... | 2.375 | stackv2 | import sys
import ast
import pandas as pd
from flask import Flask, jsonify, request
from flasgger import Swagger
from flasgger.utils import swag_from
from resources import constants
from utils import api_utils
SWAGGER_CONFIG = {
"headers": [
],
"specs": [
{
"version": "0.1",
... | 262 | 41.58 | 137 | 16 | 2,765 | python | [{"finding_id": "codeql_py/flask-debug_8d2c27ae43f27acf_0fd30925", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 5 | true | [
"CWE-215",
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079"
] | [
"py/flask-debug",
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
... | [
255,
257,
210,
223,
236
] | [
null,
null,
null,
null,
null
] | [
9,
9,
16,
16,
16
] | [
53,
28,
27,
27,
27
] | |
2024-11-19T02:32:12.839291+00:00 | 1,663,088,527,000 | 49d44cab3dd5473db9f5411d512205cd12504d3b | 2 | {
"blob_id": "49d44cab3dd5473db9f5411d512205cd12504d3b",
"branch_name": "refs/heads/main",
"committer_date": 1663088527000,
"content_id": "9330fe483ae2763021e255ef7ea9dd32baf4bc8b",
"detected_licenses": [
"MIT"
],
"directory_id": "0e87d1ca1f969f74ddcfb4906ad971486629472f",
"extension": "py",
"file... | 2.5 | stackv2 | import re
from flask import Flask, render_template, request, jsonify
from flask_api import status
from flask_cors import CORS
from pymongo import MongoClient
from werkzeug.security import generate_password_hash, check_password_hash
from fill_database import fill_database_products
app = Flask(__name__)
client = Mongo... | 328 | 31.05 | 109 | 15 | 2,278 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_d528ffbea0e60f69_a0114b93", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text."
] | [
295
] | [
null
] | [
58
] | [
67
] | |
2024-11-19T02:32:20.792768+00:00 | 1,449,131,932,000 | 229b0fe45a4c428d26996a01345952641e1263bf | 3 | {
"blob_id": "229b0fe45a4c428d26996a01345952641e1263bf",
"branch_name": "refs/heads/master",
"committer_date": 1449131932000,
"content_id": "836703cbf4e8d0e8864b2a420df329931fae3579",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "71733d416bfc0255828ea9fff0536a65ceffecb0",
"extension": "p... | 2.53125 | stackv2 | #!/usr/bin/env python
import argparse
import ConfigParser
import requests
from flask import Flask, redirect
app = Flask(__name__)
parser = argparse.ArgumentParser(description='Flask app that redirects to the most relevant YouTube video based on a given query.')
parser.add_argument('--config', default='default.conf',... | 27 | 36.37 | 144 | 15 | 245 | python | [{"finding_id": "codeql_py/flask-debug_68a24916640662ae_420bee81", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 3 | true | [
"CWE-215",
"CWE-601",
"CWE-918"
] | [
"py/flask-debug",
"py/url-redirection",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Untrusted URL redirection depends on a [user-provided value](1).",
"Part of the URL of this request depends on a [user-provided value](1)."
] | [
26,
19,
17
] | [
null,
null,
null
] | [
5,
19,
14
] | [
24,
29,
37
] | |
2024-11-19T02:54:53.790310+00:00 | 1,597,934,732,000 | 3318aecfa36dfbd26e744b929b1ea0322d467e15 | 3 | {
"blob_id": "3318aecfa36dfbd26e744b929b1ea0322d467e15",
"branch_name": "refs/heads/master",
"committer_date": 1597934732000,
"content_id": "a271d606f9dcbf3f72b849ad9b7c18562ff04b36",
"detected_licenses": [
"MIT"
],
"directory_id": "6fb297e4f210c34370504940902fbcaa34b530ce",
"extension": "py",
"fi... | 2.59375 | stackv2 | #!/usr/bin/env python3
from flask import Flask, request
import json
import requests
import telegram
import config
app = Flask(__name__)
bot = telegram.Bot(token=config.TELEGRAM_API_TOKEN)
API_HEADERS = {
'Accept': 'application/vnd.github.v3+json'
}
def send_message(text):
print("Send message: " + text.repla... | 91 | 33.41 | 110 | 18 | 726 | python | [{"finding_id": "codeql_py/full-ssrf_95b38826e400c02c_b56772bb", "tool_name": "codeql", "rule_id": "py/full-ssrf", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "The full URL of this request depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "u... | 1 | true | [
"CWE-918"
] | [
"py/full-ssrf"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"The full URL of this request depends on a [user-provided value](1)."
] | [
37
] | [
null
] | [
16
] | [
58
] | |
2024-11-19T02:55:03.889691+00:00 | 1,559,014,956,000 | bbaa30a7d07f4c6e9fabdeb36933d5e2c5b07b00 | 3 | {
"blob_id": "bbaa30a7d07f4c6e9fabdeb36933d5e2c5b07b00",
"branch_name": "refs/heads/master",
"committer_date": 1559014956000,
"content_id": "8b5df3257172b35568c3fa814acea5f4a6e24a53",
"detected_licenses": [
"MIT",
"ICU"
],
"directory_id": "e2a0d1fe07d8ee245e5e974b6073cfc0de47ed8b",
"extension": ... | 2.734375 | stackv2 | # -*- coding:utf-8 -*-
import httplib
from src.Client.Conf.config import *
# import httplib
import http.client
import hashlib
import urllib
import random
import re
appid = 'your appId' # 你的appid
secretKey = 'your Key' # 你的密钥
class Translate():
"""
负责长文本的翻译,默认中译英或者英译中,输入其他语言也可以。实际操作类。
"""
def tran... | 79 | 29.13 | 110 | 21 | 616 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_28e4bfd77abdcf45_e03feb60", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecur... | 1 | true | [
"CWE-327"
] | [
"py/weak-sensitive-data-hashing"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Sensitive data (secret)](1) is used in a hashing algorithm (MD5) that is insecure."
] | [
35
] | [
null
] | [
19
] | [
23
] | |
2024-11-19T02:55:09.099136+00:00 | 1,568,951,576,000 | efe9aaa0a14653aa4396b31b929bcf71af061335 | 4 | {
"blob_id": "efe9aaa0a14653aa4396b31b929bcf71af061335",
"branch_name": "refs/heads/master",
"committer_date": 1568951576000,
"content_id": "bdf05fed555bd0e5ef3382c8cb17f69b01643adf",
"detected_licenses": [
"MIT"
],
"directory_id": "b194dee6adead31ee502d27dc800a0a141e315e5",
"extension": "py",
"fi... | 3.65625 | stackv2 | # Function returns the name of site; Used to know which HTML tags to use for text extraction
def getSite(page_url):
if 'www.cnn.com' in page_url:
return 'cnn'
elif 'www.foxnews.com' in page_url:
return 'fox'
elif 'www.washingtonpost.com' in page_url:
return 'WaPo'
elif 'www.nbcne... | 60 | 29.93 | 103 | 14 | 448 | python | [{"finding_id": "codeql_py/incomplete-url-substring-sanitization_ccc270fd305b68c7_bebe8e40", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [www.cnn.com](1) may be at an arbitrary position in the... | 4 | true | [
"CWE-020",
"CWE-020",
"CWE-020",
"CWE-020"
] | [
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization",
"py/incomplete-url-substring-sanitization"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"The string [www.cnn.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [www.foxnews.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [www.washingtonpost.com](1) may be at an arbitrary position in the sanitized URL.",
"The string [www.nbcnews.com](1) may be ... | [
3,
5,
7,
9
] | [
null,
null,
null,
null
] | [
8,
10,
10,
10
] | [
33,
39,
46,
39
] | |
2024-11-19T02:55:16.239803+00:00 | 1,619,819,362,000 | 141f51d8368203063ce0f3526d6b36c278171ad0 | 3 | {
"blob_id": "141f51d8368203063ce0f3526d6b36c278171ad0",
"branch_name": "refs/heads/master",
"committer_date": 1619819362000,
"content_id": "aafd80158598e3306292e8f38baca6148a9709f4",
"detected_licenses": [
"MIT"
],
"directory_id": "76c54509b247fcd61d6ff943ecb9226542db1af5",
"extension": "py",
"fi... | 2.875 | stackv2 | import logging
from datetime import datetime
from cloudant.client import CouchDB
class DeviceManager:
def __init__(self, couch_db_client: CouchDB, db_name: str):
self.__client = couch_db_client
try:
self.__db = self.__client[db_name]
logging.info(f"Connected to existing db ... | 42 | 35.07 | 85 | 18 | 310 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_8e9d8afd40f74db5_7e8e53d1", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text."
] | [
24,
33
] | [
null,
null
] | [
17,
17
] | [
86,
86
] | |
2024-11-19T02:55:16.703867+00:00 | 1,572,600,990,000 | 263122d43240b450e96352f74050c6a4eab3ff72 | 3 | {
"blob_id": "263122d43240b450e96352f74050c6a4eab3ff72",
"branch_name": "refs/heads/master",
"committer_date": 1572600990000,
"content_id": "c3bfcccb99ad29e68feec91554297e2fe17c3880",
"detected_licenses": [
"MIT"
],
"directory_id": "b097c0436d45ed5698009f72009218acc200ca50",
"extension": "py",
"fi... | 3.203125 | stackv2 | """ idealreport.create_html module contains functions to
convert pandas DataFrame data to HTML
"""
import os
import json
import shutil
# external libraries
import htmltag
import jinja2
# a counter used to assign each plot a unique ID
NEXT_PLOT_INDEX = 1
def save(html, title, output_file):
""" save HTML ou... | 335 | 35.42 | 156 | 23 | 2,959 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_d0be930f26499265_0551d806", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
38
] | [
null
] | [
16
] | [
50
] | |
2024-11-19T02:55:21.037456+00:00 | 1,661,763,545,000 | 0dac03c0f4b9f70d4c39bbba5107f7741b7be0b3 | 2 | {
"blob_id": "0dac03c0f4b9f70d4c39bbba5107f7741b7be0b3",
"branch_name": "refs/heads/master",
"committer_date": 1661763545000,
"content_id": "6b44485a243fbff177b9c661b2540e689ab46d42",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "6a7005ca7e418a18cbfeec296129873aef6446a4",
"extension": "py"... | 2.375 | stackv2 | '''
Function:
搜狐模拟登录
Author:
Charles
微信公众号:
Charles的皮卡丘
更新日期:
2022-03-10
'''
import re
import time
import execjs
import requests
from hashlib import md5
'''PC端登录搜狐'''
class sohuPC():
is_callable = True
def __init__(self, **kwargs):
for key, value in kwargs.items(): setattr(self, key, v... | 170 | 36.99 | 163 | 18 | 1,704 | python | [{"finding_id": "codeql_py/weak-sensitive-data-hashing_3c326bbc79cd59f5_41ff2cdd", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insec... | 2 | true | [
"CWE-327",
"CWE-327"
] | [
"py/weak-sensitive-data-hashing",
"py/weak-sensitive-data-hashing"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally expensive hash function.",
"[Sensitive data (password)](1) is used in a hashing algorithm (MD5) that is insecure for password hashing, since it is not a computationally exp... | [
44,
94
] | [
null,
null
] | [
29,
29
] | [
62,
62
] | |
2024-11-19T02:55:41.662792+00:00 | 1,691,608,182,000 | 375b1a54e2c6e0c848131d7876ab9cb1739cb4be | 2 | {
"blob_id": "375b1a54e2c6e0c848131d7876ab9cb1739cb4be",
"branch_name": "refs/heads/main",
"committer_date": 1691608182000,
"content_id": "6bf15c5449a97f77b1737f60e09e987c9ea712f5",
"detected_licenses": [
"ISC"
],
"directory_id": "227762382eabdf753466e218c9b0361d3a1c3b41",
"extension": "py",
"file... | 2.390625 | stackv2 | #
# Copyright (C) 2009-2023 Alex Smith
#
# Permission to use, copy, modify, and/or distribute this software for any
# purpose with or without fee is hereby granted, provided that the above
# copyright notice and this permission notice appear in all copies.
#
# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS A... | 353 | 36.9 | 128 | 18 | 3,212 | python | [{"finding_id": "codeql_py/overly-permissive-file_e89a876839e4f56f_5f664800", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
230
] | [
null
] | [
13
] | [
37
] | |
2024-11-19T02:55:44.340783+00:00 | 1,510,109,028,000 | 6d3f1bbd8fa2d1754d19e5ef12f0257965425f16 | 3 | {
"blob_id": "6d3f1bbd8fa2d1754d19e5ef12f0257965425f16",
"branch_name": "refs/heads/master",
"committer_date": 1510109028000,
"content_id": "c93e96daa553defb60831126555e6c6b5feca172",
"detected_licenses": [
"Artistic-2.0"
],
"directory_id": "4d6540706c6989458658d731d2b1dfc5bf82844a",
"extension": "p... | 2.828125 | stackv2 | """
Replacement for RUSA ACP brevet time calculator
(see https://rusa.org/octime_acp.html)
"""
import flask
from flask import request
import arrow # Replacement for datetime, based on moment.js
import acp_times # Brevet time calculations
import config
import logging
###
# Globals
###
app = flask.Flask(__name__)
CO... | 79 | 27.14 | 157 | 18 | 546 | python | [{"finding_id": "codeql_py/log-injection_9fd88cdea73d1e59_3ad21668", "tool_name": "codeql", "rule_id": "py/log-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This log entry depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unkno... | 2 | true | [
"CWE-117",
"CWE-117"
] | [
"py/log-injection",
"py/log-injection"
] | [
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This log entry depends on a [user-provided value](1).",
"This log entry depends on a [user-provided value](1)."
] | [
58,
59
] | [
null,
null
] | [
22,
22
] | [
40,
61
] | |
2024-11-19T02:55:52.548102+00:00 | 1,511,882,816,000 | a6e6dd7aa32e4325256dbba3dd554e2d772e3ca2 | 2 | {
"blob_id": "a6e6dd7aa32e4325256dbba3dd554e2d772e3ca2",
"branch_name": "refs/heads/master",
"committer_date": 1511882816000,
"content_id": "7df5afcc170a6243fb7696626a58f5b30b276c60",
"detected_licenses": [
"MIT"
],
"directory_id": "0487f0778626faecec6c3b0c6f93bf85319a910e",
"extension": "py",
"fi... | 2.375 | stackv2 | from paramiko import SSHClient,AutoAddPolicy
from scp import SCPClient
import Pscp.scp_get as sget
import Pscp.scp_put as sput
class SSh_Connect():
def __init__(self):
self.ssh = ""
self.scp = ""
def get_dir(self,remote_path,local_path):
scp_get = sget.Scp_Get(self.ssh,self.scp)
... | 43 | 34.23 | 107 | 13 | 379 | python | [{"finding_id": "codeql_py/paramiko-missing-host-key-validation_8256130316fa10cc_5a84760e", "tool_name": "codeql", "rule_id": "py/paramiko-missing-host-key-validation", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Setting missing host key policy to AutoAddPolicy may be unsafe.", "r... | 1 | true | [
"CWE-295"
] | [
"py/paramiko-missing-host-key-validation"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Setting missing host key policy to AutoAddPolicy may be unsafe."
] | [
36
] | [
null
] | [
9
] | [
62
] | |
2024-11-19T02:56:01.084781+00:00 | 1,467,397,054,000 | dcfd7b9520e1b957f76b76869dab3ac657913a42 | 3 | {
"blob_id": "dcfd7b9520e1b957f76b76869dab3ac657913a42",
"branch_name": "refs/heads/master",
"committer_date": 1467397054000,
"content_id": "756b11a3ef092daab1ab879e4ffbd488381b9c99",
"detected_licenses": [
"MIT"
],
"directory_id": "6afe0336847e43617084f61215f61ea26a83725f",
"extension": "py",
"fi... | 3.09375 | stackv2 | #!/usr/bin/env python
import jinja2
class TemplateManager():
def __init__(self, template_dirs):
'''
Init a TemplateManager object
Args:
- template_dirs (str) - Path to the directory/directories are stored
'''
self._template_env = jinja2.Environme... | 28 | 26.57 | 96 | 14 | 156 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_690659b0f39f899e_207f6187", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
16
] | [
null
] | [
30
] | [
97
] | |
2024-11-19T03:10:24.465582+00:00 | 1,466,466,715,000 | 241a7e51c94510c99c7898a8e1866162b48ed198 | 2 | {
"blob_id": "241a7e51c94510c99c7898a8e1866162b48ed198",
"branch_name": "refs/heads/master",
"committer_date": 1466466715000,
"content_id": "2c5c804c64c23ca67f05ed3bb4b8618cb0504606",
"detected_licenses": [
"MIT"
],
"directory_id": "0ea28d2b1b2ac0991ab57232b8f79e11362a0692",
"extension": "py",
"fi... | 2.34375 | stackv2 | import __future__
from appdirs import AppDirs
import os
import sys
import tinify
dirs = AppDirs("tinyPNG_dir", "milliiard.:")
def get_config_file():
conf_file = os.path.join(dirs.user_data_dir, 'api-key.conf')
return conf_file
def test_api_key(api_key):
try:
tinify.key = api_key
tinify.valida... | 58 | 25.36 | 70 | 14 | 358 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_571d787a55cfd32f_fcd29b98", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression stores [sensitive data (password)](1) as clear text."
] | [
43
] | [
null
] | [
29
] | [
36
] | |
2024-11-19T03:21:44.898381+00:00 | 1,675,070,211,000 | bb29e464b77e091a2a196242ae3628dfdd17658e | 3 | {
"blob_id": "bb29e464b77e091a2a196242ae3628dfdd17658e",
"branch_name": "refs/heads/master",
"committer_date": 1675070211000,
"content_id": "4046e814ce299a0de222cf82263d1327c286d0cc",
"detected_licenses": [
"MIT"
],
"directory_id": "f7778bf3b8173915c97193f51ff8a1ac2260a68a",
"extension": "py",
"fi... | 2.796875 | stackv2 | import argparse
import netifaces
from scapy.all import *
import sys
import threading
quiet = False
stop_threads = False
def print_message(message: str):
"""
Print message to STDOUT if the quiet option is set to False (this is the default).
:param message: message to print
:return: None
"""
gl... | 162 | 34.29 | 117 | 12 | 1,333 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cd65ffd5e95d2dee_49d1b36b", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
19
] | [
null
] | [
15
] | [
22
] | |
2024-11-19T03:21:52.498908+00:00 | 1,559,231,018,000 | b797a980944e4dcc7c24b27e3144966cc5018204 | 2 | {
"blob_id": "b797a980944e4dcc7c24b27e3144966cc5018204",
"branch_name": "refs/heads/master",
"committer_date": 1559231018000,
"content_id": "8f3b4e2d2086d0608dbaa9e088b4c4f596e82d6c",
"detected_licenses": [
"MIT"
],
"directory_id": "5143e1b5c2c915317fe803ade33d775d9b744e85",
"extension": "py",
"fi... | 2.34375 | stackv2 | import json, requests
from flask import Flask, request
from db import db, User, Stock
import users_dao
import re
from twython import Twython
withConsumerKey = #REMOVED API KEY
consumerSecret = #REMOVED API KEY
#import environment variables from the host OS
#from os import environ
app = Flask(__name__)
db_filename ... | 359 | 30.07 | 124 | 17 | 2,766 | python | [{"finding_id": "codeql_py/flask-debug_eda9a33df9cc5a1a_f79ba6cd", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 7 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/partial-ssrf",
"py/partial-ssrf",
"py/partial-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a ... | [
359,
122,
142,
320,
33,
277,
314
] | [
null,
null,
null,
null,
null,
null,
null
] | [
5,
16,
16,
12,
9,
13,
9
] | [
51,
28,
29,
92,
30,
34,
30
] | |
2024-11-19T03:22:08.740287+00:00 | 1,534,823,005,000 | b875b4b9b210ca49f47229a9beff97ad2b1649a2 | 4 | {
"blob_id": "b875b4b9b210ca49f47229a9beff97ad2b1649a2",
"branch_name": "refs/heads/master",
"committer_date": 1534823005000,
"content_id": "eb74e084ca1cea5e0e57ed82733e6ddab2afe259",
"detected_licenses": [
"MIT"
],
"directory_id": "a47ac7c64cb6bb1f181eadff8e4b24735c19080a",
"extension": "py",
"fi... | 4.15625 | stackv2 |
# 面向对象
class Person(object):
'人类的基类'
empCount = 0
def __init__(self, name, sex):
self.name = name
self.sex = sex
Person.empCount += 1
# 注意: 方法的参数必须以self当第一个参数
# self代表类的实例(某个对象), 谁调用这个方法self就代表谁
def displayCount(self):
print("被调用次数: %d" % Person.empCount)
... | 102 | 16.31 | 65 | 11 | 688 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_9f5efd8c27226767_18fb82eb", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
20
] | [
null
] | [
53
] | [
61
] | |
2024-11-19T03:22:15.288261+00:00 | 1,606,462,835,000 | 32d4f3f56750069cde4860d171c0c229418ab34f | 2 | {
"blob_id": "32d4f3f56750069cde4860d171c0c229418ab34f",
"branch_name": "refs/heads/main",
"committer_date": 1606462835000,
"content_id": "8275074906ad6b1d6a5a9e7f9803a7f9bd7598e7",
"detected_licenses": [
"MIT"
],
"directory_id": "a037238f9af19f653117e5128d25483619494385",
"extension": "py",
"file... | 2.3125 | stackv2 | from django.http import HttpResponse, JsonResponse
from django.shortcuts import get_object_or_404, render
from .utils.weather_api import WeatherAPI
from .utils.validator import Validator
from rest_framework.renderers import JSONRenderer
from rest_framework.views import exception_handler
from rest_framework import statu... | 69 | 40.01 | 167 | 15 | 589 | python | [{"finding_id": "codeql_py/stack-trace-exposure_b3a86056fa522876_5660b226", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
61
] | [
null
] | [
29
] | [
44
] | |
2024-11-19T03:22:24.488552+00:00 | 1,570,122,801,000 | a700799b160cd1f66f29e848378dbd29af7b1a44 | 3 | {
"blob_id": "a700799b160cd1f66f29e848378dbd29af7b1a44",
"branch_name": "refs/heads/master",
"committer_date": 1570122801000,
"content_id": "0a15c525b0c93170c47f2e4b977db133eb0bf2af",
"detected_licenses": [
"MIT"
],
"directory_id": "937e3138da3a8c6043139213141ce7b9f9caa401",
"extension": "py",
"fi... | 2.59375 | stackv2 | """
hon_xml
~~~~~
:license: MIT, see LICENSE for more details.
"""
import hon
import json
import os
import shutil
from hon.parsing import MarkdownParser
from hon.renderers import Renderer
from hon.utils.fileutils import copy_from, filename_matches_pattern
from io import StringIO
from jinja2 import (
En... | 174 | 33.51 | 109 | 21 | 1,249 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_cc5eafd30bdafb4a_e9ea955e", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
147
] | [
null
] | [
37
] | [
60
] | |
2024-11-19T03:43:53.087257+00:00 | 1,620,412,736,000 | 5f7d77972d2c53fd58e458cd2ac729e6601a779f | 2 | {
"blob_id": "5f7d77972d2c53fd58e458cd2ac729e6601a779f",
"branch_name": "refs/heads/main",
"committer_date": 1620412736000,
"content_id": "97e45bf10afad983aec35354c3809101e5283bb3",
"detected_licenses": [
"MIT"
],
"directory_id": "07212cc7de85fb219db9f3c9ffed44c841ea8d0c",
"extension": "py",
"file... | 2.4375 | stackv2 | import requests
import json
import os
def get_api_key():
is_production = os.environ.get("IS_PRODUCTION", False)
### TODO: Uncomment when production is enabled on cloverly
# return os.getenv("CLOVERY_PUBLIC_KEY") if is_production else os.getenv("CLOVERLY_SANDBOX_KEY")
return (
os.environ.get("C... | 109 | 31.32 | 100 | 13 | 1,061 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_e36f3bc8254fd093_d4af13d2", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
68
] | [
null
] | [
15
] | [
28
] | |
2024-11-19T03:43:54.212225+00:00 | 1,514,368,650,000 | e539ea094fc2802b5980a4ccb587527aee4e0186 | 2 | {
"blob_id": "e539ea094fc2802b5980a4ccb587527aee4e0186",
"branch_name": "refs/heads/master",
"committer_date": 1514368650000,
"content_id": "230bc139c4aabfca74cc02a59ecab3e260ef257b",
"detected_licenses": [
"MIT"
],
"directory_id": "03154a8a5329e4b6ead02e8166bbe46b0021a23e",
"extension": "py",
"fi... | 2.34375 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
"""Easy PS4 Exploit Hosting by Al-Azif
Source: https://github.com/Al-Azif/ps4-exploit-host
"""
from __future__ import print_function
import os
import SimpleHTTPServer
import socket
import SocketServer
import struct
import subprocess
import sys
SCRIPT_LOC = os.path.rea... | 248 | 28.69 | 80 | 20 | 2,075 | python | [{"finding_id": "codeql_py/path-injection_3226fe7ad2c2964e_81e08921", "tool_name": "codeql", "rule_id": "py/path-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This path depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "unknown", ... | 1 | true | [
"CWE-022"
] | [
"py/path-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This path depends on a [user-provided value](1)."
] | [
63
] | [
null
] | [
27
] | [
45
] | |
2024-11-19T03:44:27.963595+00:00 | 1,431,474,899,000 | edfcd7699d5a70913b94ae4c3059ce5cb6609512 | 2 | {
"blob_id": "edfcd7699d5a70913b94ae4c3059ce5cb6609512",
"branch_name": "refs/heads/master",
"committer_date": 1431474899000,
"content_id": "36efb3bf3fde300862187502147739a62b5ffcfd",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "9faa75a49c1a458bd50a6a36b9c5c66e6e4eee83",
"extension": "py"... | 2.390625 | stackv2 | # Copyright 2015 Motorola Mobility
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in w... | 430 | 35.67 | 117 | 22 | 3,193 | python | [{"finding_id": "codeql_py/tarslip_4670d02fda3565aa_dd939550", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
423
] | [
null
] | [
21
] | [
24
] | |
2024-11-19T02:08:18.994974+00:00 | 1,607,975,392,000 | e6df73794e4ae8c37090e46121cb0ea5837859c9 | 3 | {
"blob_id": "e6df73794e4ae8c37090e46121cb0ea5837859c9",
"branch_name": "refs/heads/master",
"committer_date": 1607975392000,
"content_id": "4028c3b62478b73ef307add96e19703ea08cdb91",
"detected_licenses": [
"MIT"
],
"directory_id": "11a9b8a030817f3261ee8af627cae3207faf1a17",
"extension": "py",
"fi... | 2.671875 | stackv2 | import base64
import importlib
from flask import Blueprint, render_template, current_app
tv_bp = Blueprint('tv', __name__, url_prefix='/tv')
@tv_bp.route('/')
def tv_index():
return 'this will render the tv control template, where you can power it on/off, change inputs, etc.'
@tv_bp.route('/input/<inp>')
def t... | 64 | 28.59 | 105 | 12 | 405 | python | [{"finding_id": "codeql_py/reflective-xss_6d03ae919376e85a_d7b8f578", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
36
] | [
null
] | [
16
] | [
52
] | |
2024-11-19T02:08:37.435644+00:00 | 1,680,739,628,000 | 48e666df8ee3e964c2de7f865f34be5fb9157c83 | 3 | {
"blob_id": "48e666df8ee3e964c2de7f865f34be5fb9157c83",
"branch_name": "refs/heads/master",
"committer_date": 1680739628000,
"content_id": "55950c70b7850f50e26265dc0393083488ff8f82",
"detected_licenses": [
"MIT"
],
"directory_id": "330c41e75b18f74edc054058a621cbcc65103b56",
"extension": "py",
"fi... | 2.671875 | stackv2 | import re
macro_pattern = '<((?:\\w*\\s*)*)>'
macro_regex = re.compile(macro_pattern)
def parse_macro(obj):
macro = re.findall(macro_regex, obj['id'])
if len(macro) > 0:
macro = list(map(normalize_id, macro))
obj['macro'] = macro
obj['id'] = normalize_id(obj['id'])
def normalize_id(... | 19 | 25.58 | 63 | 13 | 134 | python | [{"finding_id": "codeql_py/redos_319775d4ee3108fc_176a84f2", "tool_name": "codeql", "rule_id": "py/redos", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This part of the regular expression may cause exponential backtracking on strings starting with '<' and containing many repetition... | 1 | true | [
"CWE-1333"
] | [
"py/redos"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This part of the regular expression may cause exponential backtracking on strings starting with '<' and containing many repetitions of ' '."
] | [
3
] | [
null
] | [
26
] | [
29
] | |
2024-11-19T02:21:31.898118+00:00 | 1,594,754,175,000 | 33136ad350d747192818f19a528e8fbc64bca05e | 2 | {
"blob_id": "33136ad350d747192818f19a528e8fbc64bca05e",
"branch_name": "refs/heads/master",
"committer_date": 1594754175000,
"content_id": "f3efffc8eca07334c7ba4f48d63311c550202643",
"detected_licenses": [
"MIT"
],
"directory_id": "186a1dedfd28edb60c3407867d47e17f5a8486f0",
"extension": "py",
"fi... | 2.40625 | stackv2 | import collections
import calendar
import datetime
import dateutil
import simplejson
import requests
from requests.auth import HTTPBasicAuth
from datapackage_pipelines.generators import slugify
from datapackage_pipelines.wrapper import ingest, spew
from datapackage_pipelines_measure.config import settings
import lo... | 190 | 37.24 | 79 | 15 | 1,579 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_caccd754b8322a1a_63fac60d", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.",
"This expression logs [sensitive data (password)](1) as clear text."
] | [
31,
38
] | [
32,
null
] | [
19,
19
] | [
63,
77
] | |
2024-11-19T02:21:34.995720+00:00 | 1,618,525,185,000 | 1d984ceae812aa673abd77dd7e5305afe38d488a | 2 | {
"blob_id": "1d984ceae812aa673abd77dd7e5305afe38d488a",
"branch_name": "refs/heads/master",
"committer_date": 1618525185000,
"content_id": "8b2d0d0bd374ddb6d3884af5abcc84796e3a5985",
"detected_licenses": [
"MIT"
],
"directory_id": "92ab2c1accf80bf00dda4ac43d3a015f0dee5513",
"extension": "py",
"fi... | 2.40625 | stackv2 | import shutil
import subprocess
import tarfile
from pathlib import Path
import numpy as np
from observations import maybe_download_and_extract
default_max_pixels = 1260 * 840
def image_files_to_array(image_files, max_pixels=default_max_pixels):
import cv2
# https://stackoverflow.com/a/15074748/1692437
... | 99 | 29.52 | 97 | 17 | 796 | python | [{"finding_id": "codeql_py/tarslip_e54b0ff0789b652a_d35cc79f", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
32
] | [
null
] | [
13
] | [
14
] | |
2024-11-19T03:10:12.481413+00:00 | 1,631,073,984,000 | ee1a1cc10ea3ff7443ee995195f28775b7cf7ce9 | 3 | {
"blob_id": "ee1a1cc10ea3ff7443ee995195f28775b7cf7ce9",
"branch_name": "refs/heads/master",
"committer_date": 1631073984000,
"content_id": "bbe75ce4891c674447799a0228a4a8dcd2406ba0",
"detected_licenses": [
"MIT"
],
"directory_id": "b4c48fd9048a04bce0c20b197dab7a6b058a1d9f",
"extension": "py",
"fi... | 3.265625 | stackv2 | """
Python Utility to class for OpenNotify API to track the International Space Station
"""
import time
import json
import argparse
import logging
import requests
logging.basicConfig(format='%(asctime)s - %(message)s', level=logging.INFO)
class ISSTracking:
"""
Python Wrapper Class to interact with OpenNoti... | 146 | 39.47 | 129 | 17 | 1,214 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_517caf9d1c934910_cb395ab5", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 2 | true | [
"CWE-312",
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.",
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text.\nThis expression logs [sensitive data (priva... | [
48,
79
] | [
50,
82
] | [
22,
26
] | [
114,
103
] | |
2024-11-19T03:22:51.294709+00:00 | 1,693,419,318,000 | 63f5ecc2b1ac1eb90b4d8624ef707eb565876b93 | 3 | {
"blob_id": "63f5ecc2b1ac1eb90b4d8624ef707eb565876b93",
"branch_name": "refs/heads/master",
"committer_date": 1693419318000,
"content_id": "b1b576f9ef1fb89b5b9b846bf08e111f3ea6ee48",
"detected_licenses": [
"MIT"
],
"directory_id": "7c63a96fad4257f4959ffeba0868059fc96566fb",
"extension": "py",
"fi... | 2.5625 | stackv2 | #!/usr/local/bin/python3
import cgi, shelve, sys, os
shelvname = 'class-shelve'
fieldnames = ('name', 'age', 'job', 'pay')
form = cgi.FieldStorage()
print('Content-type: text/html')
sys.path.insert(0, os.getcwd())
# main html template
replyhtml = """
<html>
<head>
<meta charset="utf-8">
<title>Peo... | 90 | 26.02 | 75 | 16 | 626 | python | [{"finding_id": "codeql_py/code-injection_05f632345e1ec2f7_9199c7e4", "tool_name": "codeql", "rule_id": "py/code-injection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This code execution depends on a [user-provided value](1).", "remediation": "", "location": {"file_path": "... | 1 | true | [
"CWE-094"
] | [
"py/code-injection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This code execution depends on a [user-provided value](1)."
] | [
73
] | [
null
] | [
41
] | [
58
] | |
2024-11-19T03:23:02.098220+00:00 | 1,416,902,930,000 | 53e4483b2d1c4218c04b6618488c6ba0dddc1233 | 2 | {
"blob_id": "53e4483b2d1c4218c04b6618488c6ba0dddc1233",
"branch_name": "refs/heads/master",
"committer_date": 1416902930000,
"content_id": "3d05c669377f5b38bfff4376b5c74fd7c183d3b3",
"detected_licenses": [
"MIT"
],
"directory_id": "c108a9525f5b3bbbaffd7217ed4ff5a114512334",
"extension": "py",
"fi... | 2.390625 | stackv2 | # all the imports
import sqlite3
from flask import Flask
from flask import request
import database
app = Flask(__name__)
@app.route('/')
def hello_world():
return 'Welcome to the songbook api :) There will be a list of functions on this page later'
@app.route('/getSong')
def get_song():
songId = request.args.get... | 29 | 17.66 | 96 | 10 | 134 | python | [{"finding_id": "codeql_py/reflective-xss_011e178cfaf2deeb_7209e3dc", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
15
] | [
null
] | [
9
] | [
15
] | |
2024-11-19T01:34:53.057406+00:00 | 1,608,646,852,000 | 7751f1e3ba7d8cf9ad74fafb4db7d6739512e25c | 2 | {
"blob_id": "7751f1e3ba7d8cf9ad74fafb4db7d6739512e25c",
"branch_name": "refs/heads/main",
"committer_date": 1608646852000,
"content_id": "78e49d7551008e5fe9aef96845ee4b92b11e4f25",
"detected_licenses": [
"MIT"
],
"directory_id": "4dbdcaa679eeb389efda7106bfee58bf30ef3c1f",
"extension": "py",
"file... | 2.421875 | stackv2 | #!/usr/bin/env python3
import os
import json
import requests
from requests.auth import HTTPBasicAuth
import argparse
import urllib3
urllib3.disable_warnings()
# Define the program description
desc = 'monitor.py monitors the stdout output from Ansible Tower Jobs.'
# Initiate the parser with a description
parser = arg... | 57 | 29.26 | 143 | 11 | 443 | python | [{"finding_id": "codeql_py/request-without-cert-validation_a05588e4d9e0f373_e10f5615", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 1 | true | [
"CWE-295"
] | [
"py/request-without-cert-validation"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1)."
] | [
53
] | [
null
] | [
5
] | [
144
] | |
2024-11-19T02:08:00.467302+00:00 | 1,378,929,631,000 | 33a76e6cdb1fca427f7c1b3225d0f9fd3a47f035 | 3 | {
"blob_id": "33a76e6cdb1fca427f7c1b3225d0f9fd3a47f035",
"branch_name": "refs/heads/master",
"committer_date": 1378929631000,
"content_id": "61e58786ec728ed6851f4c8444fa8c22b47e4cb3",
"detected_licenses": [
"BSD-3-Clause"
],
"directory_id": "7fa4f568ca4b82fe651be90a62e63e1649061ce3",
"extension": "p... | 2.8125 | stackv2 | """
======================================================
Out-of-core classification of text documents
======================================================
This is an example showing how scikit-learn can be used for classification
using an out-of-core approach: learning from data that doesn't fit into main
memory. ... | 281 | 32.93 | 79 | 16 | 2,217 | python | [{"finding_id": "codeql_py/tarslip_16906e8fe883cc36_66b02a82", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
162
] | [
null
] | [
9
] | [
43
] | |
2024-11-19T02:08:11.917188+00:00 | 1,489,612,993,000 | 140fec981591c33b4aed8d0069459e531e573420 | 3 | {
"blob_id": "140fec981591c33b4aed8d0069459e531e573420",
"branch_name": "refs/heads/master",
"committer_date": 1489612993000,
"content_id": "a82e83814a7e95f757721b03512be0f2d9a16fe9",
"detected_licenses": [
"MIT"
],
"directory_id": "2e66b0308682190865de55b1de10ff666b9af2f1",
"extension": "py",
"fi... | 2.75 | stackv2 | """Config file (settings.py) creator.
Configuration variable value priorities:
1. Environment variable
2. Pre-existing settings file
3. Default (ENV_VAR_DEFAULTS)
Note: To set values to be treated as boolean "false", set them as empty strings.
This script must be run (`python populate_settings.py`) in order to cr... | 113 | 29.48 | 80 | 14 | 870 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_938a206cbdc346ae_75a2e318", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
92
] | [
94
] | [
7
] | [
2
] | |
2024-11-19T02:17:15.874148+00:00 | 1,552,809,973,000 | 8f5c96c05ab310c2d103da4992eebd480d4b49d8 | 3 | {
"blob_id": "8f5c96c05ab310c2d103da4992eebd480d4b49d8",
"branch_name": "refs/heads/master",
"committer_date": 1552809973000,
"content_id": "6c970477719f9a748df677bc182009732572692e",
"detected_licenses": [
"MIT"
],
"directory_id": "20fe66cb8061871107f54bcd30e598da0808b6cd",
"extension": "py",
"fi... | 3.453125 | stackv2 | # --------------
#Code starts here
message_6 = read_file(file_path_6)
print(message_6)
def extract_msg(message_f):
a_list = message_f.split()
even_word = lambda x: len(x)%2==0
b_list = list(filter(even_word, a_list))
final_message = " ".join(b_list)
print(final_message)
return final_message
s... | 129 | 18.65 | 70 | 11 | 656 | python | [{"finding_id": "codeql_py/clear-text-storage-sensitive-data_d815fdc63dbb25d6_9cfb0e90", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (secret)](1) as clear text.\nT... | 3 | true | [
"CWE-312",
"CWE-312",
"CWE-312"
] | [
"py/clear-text-storage-sensitive-data",
"py/clear-text-logging-sensitive-data",
"py/clear-text-logging-sensitive-data"
] | [
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This expression stores [sensitive data (secret)](1) as clear text.\nThis expression stores [sensitive data (secret)](2) as clear text.\nThis expression stores [sensitive data (secret)](3) as clear text.\nThis expression stores [sensitive data (secret)](4) as clear text.\nThis expression stores [sensitive data (sec... | [
81,
85,
125
] | [
null,
null,
null
] | [
21,
7,
7
] | [
31,
17,
19
] | |
2024-11-19T02:17:23.122912+00:00 | 1,477,762,664,000 | 71153c5d1e23ec72a0bb80018fa8a62a9f1cf86f | 3 | {
"blob_id": "71153c5d1e23ec72a0bb80018fa8a62a9f1cf86f",
"branch_name": "refs/heads/master",
"committer_date": 1477762664000,
"content_id": "d2f2b9b784c2064d88e463b223b7c864bd312c08",
"detected_licenses": [
"MIT"
],
"directory_id": "b3fbb95ebcfc33fc566138a50258bb6297908096",
"extension": "py",
"fi... | 2.515625 | stackv2 | # -*- coding: utf-8 -*-
DEFAULT_PORT = 5000
ADDITIVE_FOR_UID = 1000
try:
from os import getuid
except ImportError:
def getuid():
return DEFAULT_PORT - ADDITIVE_FOR_UID
from time import sleep
from celery import Celery
from flask import Flask, render_template, request, jsonify
from bs4 import Beautif... | 146 | 23.63 | 81 | 14 | 885 | python | [{"finding_id": "codeql_py/flask-debug_525805a18d1b0169_bef57023", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 2 | true | [
"CWE-215",
"CWE-116"
] | [
"py/flask-debug",
"py/bad-tag-filter"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"This regular expression does not match comments containing newlines."
] | [
146,
82
] | [
null,
null
] | [
5,
21
] | [
58,
30
] | |
2024-11-19T02:17:26.795149+00:00 | 1,567,978,082,000 | 30b7a108cda92ba07b5f78668a2a324b7ded07ad | 3 | {
"blob_id": "30b7a108cda92ba07b5f78668a2a324b7ded07ad",
"branch_name": "refs/heads/master",
"committer_date": 1567978082000,
"content_id": "59d960114d7a7c5920377757d0d94802dabcf0cb",
"detected_licenses": [
"MIT"
],
"directory_id": "a4eb9d8bf9b04306e661581df25cb0bd891c9012",
"extension": "py",
"fi... | 2.53125 | stackv2 | import os
import sys
import pytz
from werkzeug.urls import url_parse
from sqlalchemy import desc, or_
from app import app, db, images
from app.forms import LoginForm, RegisterForm, AddAdForm, SearchForm
from app.models import User, Ad, Image
from flask import render_template, flash, redirect, url_for, request
from fla... | 246 | 40.29 | 171 | 23 | 2,301 | python | [{"finding_id": "codeql_py/url-redirection_1c85be5f742a5603_b340bc3e", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_... | 1 | true | [
"CWE-601"
] | [
"py/url-redirection"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Untrusted URL redirection depends on a [user-provided value](1)."
] | [
45
] | [
null
] | [
25
] | [
34
] | |
2024-11-19T02:17:30.490881+00:00 | 1,587,541,493,000 | 3485701789ff7ae2030e983eeae09ad86b62a9b3 | 3 | {
"blob_id": "3485701789ff7ae2030e983eeae09ad86b62a9b3",
"branch_name": "refs/heads/master",
"committer_date": 1587541493000,
"content_id": "3b81ab069b45182779bd8a3edab07499004084a7",
"detected_licenses": [
"MIT"
],
"directory_id": "8fb2a75126412e655db6bbd6e9615691ce24da87",
"extension": "py",
"fi... | 3.359375 | stackv2 | import random
import string
import pyperclip
class userAccounts:
'''
Class that stores user accounts and credentials
'''
accounts = []
def __init__(self, platform, username, password):
'''
this function allows users to store their various account details
Args: platform... | 60 | 30.2 | 116 | 15 | 354 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_1ca5f325f560b06e_d15d1e02", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
54
] | [
null
] | [
19
] | [
116
] | |
2024-11-19T02:17:31.525606+00:00 | 1,433,605,322,000 | d136dbf17f641e41e996e2567e83f7be10f6f648 | 3 | {
"blob_id": "d136dbf17f641e41e996e2567e83f7be10f6f648",
"branch_name": "refs/heads/master",
"committer_date": 1433605322000,
"content_id": "04007768a1d973528fb5f7bcab5c1a2d8021e6fc",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "2603b4efaa7034e7d465b200b19e519d811a618b",
"extension": "py"... | 2.53125 | stackv2 | #coding:UTF-8
"""
短网址生成器
@author:yubang
2015-06-06
"""
from flask import Blueprint,render_template,make_response,request,abort,redirect
from werkzeug.contrib.cache import SimpleCache
from models import Session,UrlModel
import hashlib,json
sApp=Blueprint("shortUrl",__name__)
cache=SimpleCache()
@sApp.route("/")
def... | 75 | 20.57 | 80 | 15 | 425 | python | [{"finding_id": "codeql_py/reflective-xss_9ef1af204bde1e13_16ff723e", "tool_name": "codeql", "rule_id": "py/reflective-xss", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Cross-site scripting vulnerability due to a [user-provided value](1).", "remediation": "", "location": {"fi... | 1 | true | [
"CWE-079"
] | [
"py/reflective-xss"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Cross-site scripting vulnerability due to a [user-provided value](1)."
] | [
47
] | [
null
] | [
30
] | [
53
] | |
2024-11-19T02:18:12.939290+00:00 | 1,553,609,036,000 | 155348df5569c00e95115f7aed36e746d6aa5a5d | 2 | {
"blob_id": "155348df5569c00e95115f7aed36e746d6aa5a5d",
"branch_name": "refs/heads/master",
"committer_date": 1553609036000,
"content_id": "6abcc1ba71b13208b5cba055ca475ec4114e0795",
"detected_licenses": [
"BSD-2-Clause"
],
"directory_id": "646a5f11c4a5e1385e4e989713bb739a34f08a56",
"extension": "p... | 2.34375 | stackv2 | #!/usr/bin/python
# Copyright 2018, Sourcepole AG
# All rights reserved.
#
# This source code is licensed under the BSD-style license found in the
# LICENSE file in the root directory of this source tree.
from flask import Flask, request, jsonify, Response, stream_with_context
from flask_cors import CORS
import reques... | 41 | 39.02 | 103 | 15 | 381 | python | [{"finding_id": "codeql_py/flask-debug_c55fa9611562245d_39b7d7ec", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 5 | true | [
"CWE-215",
"CWE-918",
"CWE-918",
"CWE-918",
"CWE-918"
] | [
"py/flask-debug",
"py/full-ssrf",
"py/full-ssrf",
"py/full-ssrf",
"py/full-ssrf"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"The full URL of this request depends on a [user-provided value](1).",
"The full URL of this request depends on a [user-provided value](1).",
"The full URL of this request depends on a [user-... | [
41,
24,
27,
29,
31
] | [
null,
null,
null,
null,
null
] | [
5,
15,
15,
15,
15
] | [
35,
100,
99,
60,
57
] | |
2024-11-19T02:18:16.241775+00:00 | 1,541,179,763,000 | 3385195ee559e9575b2369851f12b66d180fab12 | 3 | {
"blob_id": "3385195ee559e9575b2369851f12b66d180fab12",
"branch_name": "refs/heads/master",
"committer_date": 1541179763000,
"content_id": "b4abf2a7e79f857d83c5a852ac2173140934ec71",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "392338a94e1d65eddda2401d1fa6bfd776bd165d",
"extension": "py"... | 2.5625 | stackv2 | from flask import Flask
from flask import jsonify,request
import pickle
import ModelUtils as ut
from sklearn.cross_validation import train_test_split
algrithm_name = ""
trained_model = ""
app = Flask(__name__)
@app.route("/train",methods=['GET'])
def training_step():
### Training Step
global algrithm_name
algrith... | 51 | 33.35 | 104 | 12 | 474 | python | [{"finding_id": "codeql_py/flask-debug_4d1e8a889fbe419d_e6e36c64", "tool_name": "codeql", "rule_id": "py/flask-debug", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.", ... | 6 | true | [
"CWE-215",
"CWE-079",
"CWE-079",
"CWE-079",
"CWE-022",
"CWE-022"
] | [
"py/flask-debug",
"py/reflective-xss",
"py/reflective-xss",
"py/reflective-xss",
"py/path-injection",
"py/path-injection"
] | [
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger.",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a [user-provided value](1).",
"Cross-site scripting vulnerability due to a ... | [
51,
27,
45,
47,
22,
25
] | [
null,
null,
null,
null,
null,
null
] | [
5,
9,
10,
10,
35,
35
] | [
39,
87,
105,
104,
48,
48
] | |
2024-11-19T02:18:22.290966+00:00 | 1,544,204,704,000 | 39eac06f51232a213e071221b7b9d1e76a27c3c5 | 3 | {
"blob_id": "39eac06f51232a213e071221b7b9d1e76a27c3c5",
"branch_name": "refs/heads/master",
"committer_date": 1544204704000,
"content_id": "02446294b31b7de7b5260010fe60b35e28d05574",
"detected_licenses": [
"MIT"
],
"directory_id": "7d8bbb560965f736fb1f5c64f51f441b8c058b7d",
"extension": "py",
"fi... | 3.140625 | stackv2 | from flask import Flask, request, jsonify
from sklearn.externals import joblib
import numpy as np
from flask_cors import CORS
app = Flask(__name__)
CORS(app)
clf = joblib.load('./model/logreg.pkl')
def getParameters():
age = request.args.get('age')
sex = request.args.get('sex')
cigsPerDay = request.args.... | 94 | 31.71 | 179 | 19 | 748 | python | [{"finding_id": "codeql_py/stack-trace-exposure_b18ba0e76bed9918_88c311c2", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 1 | true | [
"CWE-209"
] | [
"py/stack-trace-exposure"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user."
] | [
65
] | [
null
] | [
28
] | [
78
] | |
2024-11-19T02:19:03.320320+00:00 | 1,570,825,142,000 | 78cf89afd962cd28d94d46de4dffc8aeba6f0f9a | 3 | {
"blob_id": "78cf89afd962cd28d94d46de4dffc8aeba6f0f9a",
"branch_name": "refs/heads/master",
"committer_date": 1570825142000,
"content_id": "2f006494857ad4baf6f3065b597b4f78c6b0a25b",
"detected_licenses": [
"MIT"
],
"directory_id": "166ae271ba243de5201497daf5ead08ef53e2118",
"extension": "py",
"fi... | 2.59375 | stackv2 |
'''
Backup all overleaf projects locally.
Use a git clone to the backup and then loop through pulling.
Adapted from https://github.com/tdurieux/overleaf-backup/blob/master/overleaf_backup.py
To run this, you need:
(1) Change the output script.
(2) Save your email and password for overleaf with git-credentials (https... | 245 | 31.76 | 155 | 19 | 1,880 | python | [{"finding_id": "codeql_py/request-without-cert-validation_efe474677168034c_55d488b7", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]... | 7 | true | [
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295",
"CWE-295"
] | [
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation",
"py/request-without-cert-validation"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM",
"MEDIUM"
] | [
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation because [it is disabled](1).",
"This request may run without certificate validation becau... | [
74,
83,
90,
142,
152,
175,
200
] | [
null,
null,
null,
null,
null,
null,
null
] | [
9,
13,
9,
9,
13,
13,
13
] | [
39,
50,
39,
71,
68,
56,
56
] | |
2024-11-19T02:29:53.721780+00:00 | 1,692,606,856,000 | 2c5abdf24f6f52ec0e89ace2077787cc5dcf735b | 3 | {
"blob_id": "2c5abdf24f6f52ec0e89ace2077787cc5dcf735b",
"branch_name": "refs/heads/main",
"committer_date": 1692606856000,
"content_id": "30047d562e8820434450c089b798e12f7392bd98",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "ddddaa700e4642f46a2c1e1e0271a7c8ea62ba0f",
"extension": "py",
... | 2.6875 | stackv2 | """
This file loads the training and validation data for model_def
"""
import logging
import os
import shutil
import tarfile
import numpy as np
import torch
import wget
from torch.utils.data import Dataset
class PadSequence:
def __call__(self, batch):
features = batch[:-1]
labels = batch[1:]
... | 110 | 28.81 | 98 | 16 | 855 | python | [{"finding_id": "codeql_py/tarslip_a7a20884909bf4ac_a496fd98", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un... | 1 | true | [
"CWE-022"
] | [
"py/tarslip"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"This file extraction depends on a [potentially untrusted source](1)."
] | [
96
] | [
null
] | [
5
] | [
7
] | |
2024-11-19T02:30:06.491368+00:00 | 1,532,470,257,000 | 21d42b2df8e3ec7e566b394239cc46ad2cd29ce5 | 3 | {
"blob_id": "21d42b2df8e3ec7e566b394239cc46ad2cd29ce5",
"branch_name": "refs/heads/master",
"committer_date": 1532470257000,
"content_id": "e11e2a9fdae6906ef4ac9faf06eeeab70c04acd6",
"detected_licenses": [
"Unlicense"
],
"directory_id": "20bf11c44b00ff220160a62a25b7a624274f6a75",
"extension": "py",... | 3.28125 | stackv2 | import os
import urllib.request
import random
URL = 'https://www.eff.org/files/2016/07/18/eff_large_wordlist.txt'
FILE_NAME = URL.split('/')[-1]
THIS_DIR = os.path.dirname(os.path.realpath(__file__))
WORDLIST = os.path.join(THIS_DIR, FILE_NAME)
def download_wordlist():
'''Download the EFF wordlist if not there a... | 47 | 27.66 | 82 | 15 | 340 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_2f07e0601e90e158_05e2d1de", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text."
] | [
47
] | [
null
] | [
11
] | [
21
] | |
2024-11-19T02:30:17.241044+00:00 | 1,681,488,686,000 | 81c8fc0900fda6742cd29906a87106f25d61f157 | 3 | {
"blob_id": "81c8fc0900fda6742cd29906a87106f25d61f157",
"branch_name": "refs/heads/master",
"committer_date": 1681488686000,
"content_id": "56f462529f84d6eb2f1e3b81d1a3d4acc89ecd3f",
"detected_licenses": [
"MIT"
],
"directory_id": "5908a3d8bcb5a5efdb4d7880b24125a4603aa676",
"extension": "py",
"fi... | 3.265625 | stackv2 | """ read from a SQLite database and return data """
from flask import Flask
from flask_sqlalchemy import SQLAlchemy
# this variable, db, will be used for all SQLAlchemy commands
db = SQLAlchemy()
# create the app
app = Flask(__name__)
# change string to the name of your database; add path if necessary
db_name = 'sock... | 54 | 29.67 | 76 | 17 | 403 | python | [{"finding_id": "codeql_py/stack-trace-exposure_20c0a035bb01b74d_c2460897", "tool_name": "codeql", "rule_id": "py/stack-trace-exposure", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Stack trace information](1) flows to this location and may be exposed to an external user.", "... | 2 | true | [
"CWE-209",
"CWE-215"
] | [
"py/stack-trace-exposure",
"py/flask-debug"
] | [
"HIGH",
"HIGH"
] | [
"MEDIUM",
"MEDIUM"
] | [
"[Stack trace information](1) flows to this location and may be exposed to an external user.",
"A Flask app appears to be run in debug mode. This may allow an attacker to run arbitrary code through the debugger."
] | [
51,
54
] | [
null,
null
] | [
16,
5
] | [
32,
24
] | |
2024-11-19T02:30:24.201765+00:00 | 1,554,478,578,000 | 1f78dce8219301b7208fa04e0971071ecdf18b4e | 3 | {
"blob_id": "1f78dce8219301b7208fa04e0971071ecdf18b4e",
"branch_name": "refs/heads/master",
"committer_date": 1554479493000,
"content_id": "cd151f0eb5aa28bbd1257de37b0d91f7932d7e22",
"detected_licenses": [
"MIT"
],
"directory_id": "78a53d64c6969fc340944c44329bd7916ada4478",
"extension": "py",
"fi... | 2.703125 | stackv2 | # -*- coding: utf-8 -*-
import re
from collections import defaultdict
from dateutil.parser import parse
from city_scrapers.constants import BOARD
from city_scrapers.spider import Spider
class DetDowntownDevelopmentAuthoritySpider(Spider):
name = 'det_downtown_development_authority'
agency_name = 'Detroit Do... | 137 | 37.22 | 95 | 16 | 1,181 | python | [{"finding_id": "codeql_py/overly-large-range_652f5e158a39ef60_da19b1a1", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\].", "remediation": "", "lo... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[A-Z\\\\[\\\\\\\\]^_`a-z\\]."
] | [
110
] | [
null
] | [
37
] | [
40
] | |
2024-11-19T02:30:30.630237+00:00 | 1,612,332,983,000 | 1ab30d36badfbb04080b8c96f90231ecdee96977 | 2 | {
"blob_id": "1ab30d36badfbb04080b8c96f90231ecdee96977",
"branch_name": "refs/heads/main",
"committer_date": 1612332983000,
"content_id": "8411b8a0d27c225b933229274ddf5ae6eee62adc",
"detected_licenses": [
"MIT"
],
"directory_id": "963fe46a05267f900a88ac04cdbd73256d82a590",
"extension": "py",
"file... | 2.5 | stackv2 | import config
import logging
import whois
import datetime
import OpenSSL
import ssl, socket
from aiogram import Bot, Dispatcher, executor, types
# задаем уровень логов
logging.basicConfig(level=logging.INFO)
# инициализируем бота
bot = Bot(token=config.API_TOKEN)
dp = Dispatcher(bot)
# Команда активации подпи... | 107 | 25.44 | 84 | 15 | 691 | python | [{"finding_id": "codeql_py/insecure-protocol_cdd7a86ed13a9d5c_f350e5be", "tool_name": "codeql", "rule_id": "py/insecure-protocol", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/... | 1 | true | [
"CWE-327"
] | [
"py/insecure-protocol"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Insecure SSL/TLS protocol version TLSv1 allowed by [call to ssl.create_default_context](1).\nInsecure SSL/TLS protocol version TLSv1_1 allowed by [call to ssl.create_default_context](1)."
] | [
87
] | [
null
] | [
16
] | [
23
] | |
2024-11-19T02:30:39.214287+00:00 | 1,620,404,278,000 | b281d60344b57531f93e8b90b3f0bfd3d74a0dd0 | 3 | {
"blob_id": "b281d60344b57531f93e8b90b3f0bfd3d74a0dd0",
"branch_name": "refs/heads/main",
"committer_date": 1620404278000,
"content_id": "a5c6e5f3f6c14bebf6b47b289a2977f1a4a95829",
"detected_licenses": [
"MIT"
],
"directory_id": "dbc9ab40c50b564ec3caf9b9b6827af2800187f7",
"extension": "py",
"file... | 2.96875 | stackv2 | import csv
import logging
import os
import re
words = []
meanings = {}
logger = logging.getLogger(__name__)
def list_files(gender):
path = f"./extracts/{gender}"
source_paths = [f"{path}/{f}" for f in os.listdir(path)]
return [
f"{source_path}/{f}"
for source_path in source_paths
... | 51 | 28.24 | 77 | 19 | 355 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_93f994c2461745ea_a30b2362", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
35
] | [
null
] | [
26
] | [
77
] | |
2024-11-19T02:30:39.820797+00:00 | 1,594,854,498,000 | 3dfb368011aa5a9bb7ba225c1234e2b58e5f4cce | 3 | {
"blob_id": "3dfb368011aa5a9bb7ba225c1234e2b58e5f4cce",
"branch_name": "refs/heads/master",
"committer_date": 1594854498000,
"content_id": "d6ed6f143b2a28403a234c218b74609ca20daf7a",
"detected_licenses": [
"MIT"
],
"directory_id": "01572d7200249e3a95fef8638b66a0f71a1c0efa",
"extension": "py",
"fi... | 2.703125 | stackv2 | # load_ext autoreload
# autoreload 2
from openpyxl import load_workbook
from collections import namedtuple
import jinja2
from os.path import join as pathjoin
wb = load_workbook('SYSH_suite.xlsx')
print(wb.sheetnames)
first_column = 'A'
last_column = 'O'
first_row = 2
last_row = 26
col_range = f"{first_column}:{las... | 78 | 20.72 | 76 | 14 | 455 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_8c9f8c7a1344f115_fcc114c1", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
39
] | [
51
] | [
19
] | [
2
] | |
2024-11-19T02:41:42.953626+00:00 | 1,620,949,724,000 | 0b7b2fb3633230b00eebae35c2dfe0a88da61d0a | 4 | {
"blob_id": "0b7b2fb3633230b00eebae35c2dfe0a88da61d0a",
"branch_name": "refs/heads/master",
"committer_date": 1620949724000,
"content_id": "7c6f66495bf6fad7ba185ce46ef2fe6b1a917f80",
"detected_licenses": [
"MIT"
],
"directory_id": "431e2cde796554e66190e613baca3e78b8de19f4",
"extension": "py",
"fi... | 3.890625 | stackv2 | import random
print('\nI can assist you in generating a password!')
char = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789'
number = input('\nInput the number of password you need: ')
number = int(number)
length = input('Input the length of your proposed password: ')
length = int(length)
print('\nHe... | 18 | 26.22 | 71 | 10 | 107 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_129a881335278a42_ab86cbe3", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text."
] | [
18
] | [
null
] | [
11
] | [
20
] | |
2024-11-19T02:41:53.343545+00:00 | 1,577,819,157,000 | 5a4bad0a66a0cb41002e39bbc1b8698280e153e9 | 3 | {
"blob_id": "5a4bad0a66a0cb41002e39bbc1b8698280e153e9",
"branch_name": "refs/heads/master",
"committer_date": 1577819157000,
"content_id": "25906aa398b00988ac205e24ce1ad78259cf44aa",
"detected_licenses": [
"MIT"
],
"directory_id": "d21dd5a8caff1ef4439aee0ed5946e1d01a81fb8",
"extension": "py",
"fi... | 2.921875 | stackv2 | from parse_source import parse
from random import random
from jinja2 import Template
import datetime
import source
import time
import gcal
URL = 'https://docs.google.com/spreadsheets/d/1J6B-dp2syrz_uQIy0BvyxKas8InCUWXG4Fn9hKeMRZI/edit?usp=sharing'
def get_source_data():
_, data = source.convert_to_dict(source.get... | 44 | 31.93 | 108 | 14 | 351 | python | [{"finding_id": "codeql_py/jinja2/autoescape-false_7d20f449ea88d866_1de2d8be", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati... | 1 | true | [
"CWE-079"
] | [
"py/jinja2/autoescape-false"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Using jinja2 templates with autoescape=False can potentially allow XSS attacks."
] | [
17
] | [
null
] | [
16
] | [
109
] | |
2024-11-19T02:41:59.096953+00:00 | 1,393,762,578,000 | a85ab817293dbe033bed8214bf7b76ac14b90276 | 3 | {
"blob_id": "a85ab817293dbe033bed8214bf7b76ac14b90276",
"branch_name": "refs/heads/master",
"committer_date": 1393762578000,
"content_id": "5a6bc25869a015b17d512b04b29bbad2459cc133",
"detected_licenses": [
"Unlicense"
],
"directory_id": "4abd886766eea4d78457cf00dc2a8377d0ea5cee",
"extension": "py",... | 2.90625 | stackv2 | import sys
comargs = sys.argv
inUrl = comargs[1]
depth = int(comargs[2])
def getPage(url):
import urllib2
res=urllib2.urlopen(url)
return res.read()
def getNextLink(page, URL):
import re
#p1 = re.compile('<a.*(\W.)*.*href=', re.IGNORECASE)
pat = r"<a\s*href=\s*('(.*?)'|\"(.*?)\")"
p1 = re.... | 126 | 26.37 | 62 | 17 | 891 | python | [{"finding_id": "codeql_py/bad-tag-filter_cce3418d604528e0_36f42485", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression only parses --> and not --!> as a HTML comment end tag.", "remediation": "", "location":... | 1 | true | [
"CWE-116"
] | [
"py/bad-tag-filter"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This regular expression only parses --> and not --!> as a HTML comment end tag."
] | [
53
] | [
null
] | [
23
] | [
26
] | |
2024-11-19T02:42:23.309244+00:00 | 1,474,999,294,000 | 7e15cd169d4f28e5a0a4a814018d13c32a970432 | 2 | {
"blob_id": "7e15cd169d4f28e5a0a4a814018d13c32a970432",
"branch_name": "refs/heads/master",
"committer_date": 1474999294000,
"content_id": "8c83154323c84c5d9a5bb68fefbfb5a868d34789",
"detected_licenses": [
"MIT"
],
"directory_id": "1503ed2ceede343756079178b3f54935c16467bc",
"extension": "py",
"fi... | 2.453125 | stackv2 | #!/usr/bin/python
DOCUMENTATION = """
---
module: x509_certificate
short_description: Create X.509 certificates.
requirements:
- cryptography (python 2)
author: Fabian Peter Hammerle
"""
from ansible.module_utils.basic import AnsibleModule
from cryptography import utils
from cryptography import x509
from cryptograph... | 148 | 35.2 | 111 | 28 | 1,164 | python | [{"finding_id": "codeql_py/overly-permissive-file_b5546acb990c2b60_cacceb49", "tool_name": "codeql", "rule_id": "py/overly-permissive-file", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Overly permissive mask in chmod sets file to world readable.", "remediation": "", "location": ... | 1 | true | [
"CWE-732"
] | [
"py/overly-permissive-file"
] | [
"MEDIUM"
] | [
"MEDIUM"
] | [
"Overly permissive mask in chmod sets file to world readable."
] | [
49
] | [
null
] | [
5
] | [
25
] | |
2024-11-18T18:05:52.076693+00:00 | 1,448,350,095,000 | 23e45dafe4521f680760c37350608270e85bdbe4 | 3 | {
"blob_id": "23e45dafe4521f680760c37350608270e85bdbe4",
"branch_name": "refs/heads/master",
"committer_date": 1448350095000,
"content_id": "b35167428f00869528e078c49609eba8a269cfd5",
"detected_licenses": [
"Apache-2.0"
],
"directory_id": "20e3319edb79090901dcddb5aac43aa25e596448",
"extension": "py"... | 2.828125 | stackv2 | #!/usr/bin/env python
# -*- coding: utf-8 -*-
from __future__ import unicode_literals
import re
from builtins import open
import chardet
from janome.tokenizer import Tokenizer
def read(filepath):
'''
マルチバイトを含むテキストファイルを読み込んで文字コードを検出した上でユニコード文字列にして返す
'''
with open(filepath, mode='rb') as file_:
... | 72 | 20.88 | 111 | 12 | 461 | python | [{"finding_id": "codeql_py/overly-large-range_d9add23657e8a1d6_068984e2", "tool_name": "codeql", "rule_id": "py/overly-large-range", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "Suspicious character range that is equivalent to \\[0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-z{{|}}~\\u007f\\u008... | 1 | true | [
"CWE-020"
] | [
"py/overly-large-range"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"Suspicious character range that is equivalent to \\[0-9:;<=>?@A-Z\\\\[\\\\\\\\]^_`a-z{{|}}~\\u007f\\u0080\\u0081\\u...."
] | [
61
] | [
null
] | [
47
] | [
50
] | |
2024-11-18T18:15:59.589135+00:00 | 1,585,764,319,000 | ef32c8596280659ea12650d52eb586d55484a19f | 4 | {
"blob_id": "ef32c8596280659ea12650d52eb586d55484a19f",
"branch_name": "refs/heads/master",
"committer_date": 1585764319000,
"content_id": "6bcf882018c9300a8b1f4730ccd72e2107a634d8",
"detected_licenses": [
"MIT"
],
"directory_id": "9eaa2c64a777bd24a3cccd0230da5f81231ef612",
"extension": "py",
"fi... | 4.34375 | stackv2 | """
总结不建议的写法
1.在类外添加实例成员
2.通过类访问实例方法(特殊情况除外)
3.通过实例访问类成员
"""
class Student:
count = 0
def __init__(self,name,sex):
self.name = name
self.sex = sex
def print_self(self):
print(self.name,self.sex)
s01 = Student("无忌", "男")
s02 = Student("学习", "保密")
s01.print_... | 33 | 15.48 | 33 | 10 | 204 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_31adee217469aa0f_84dba9e0", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text."
] | [
13
] | [
null
] | [
25
] | [
33
] | |
2024-11-18T19:11:48.866232+00:00 | 1,638,123,111,000 | fd75effb68b2c646a78cfdc990a9dca2e36ae1ff | 3 | {
"blob_id": "fd75effb68b2c646a78cfdc990a9dca2e36ae1ff",
"branch_name": "refs/heads/master",
"committer_date": 1638123111000,
"content_id": "01c1331b3a013a921e9061e3bc664fead78e1f95",
"detected_licenses": [
"MIT"
],
"directory_id": "415819415c623857752e47047847e3aae9b68a1e",
"extension": "py",
"fi... | 2.78125 | stackv2 | import urllib
import json
import webbrowser
import oauth2 as oauth
class TwitterOauth:
REQUEST_TOKEN_URL = "https://api.twitter.com/oauth/request_token"
ACCESS_TOKEN_URL = "https://api.twitter.com/oauth/access_token"
AUTHENTICATE_URL = "https://api.twitter.com/oauth/authenticate"
def __init__(self, ... | 59 | 39.47 | 83 | 13 | 505 | python | [{"finding_id": "codeql_py/clear-text-logging-sensitive-data_cc215f96cdfa61ef_84085935", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT... | 1 | true | [
"CWE-312"
] | [
"py/clear-text-logging-sensitive-data"
] | [
"HIGH"
] | [
"MEDIUM"
] | [
"This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text.\nThis expression logs [sensitive data (secret)](3) as clear text.\nThis expression logs [sensitive data (secret)](4) as clear text."
] | [
59
] | [
null
] | [
11
] | [
12
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.