Below the result of the Codeaudit scan of the directory: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/
Total Python files found: 26
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/marshal.py
Number of potential security issues found: 2
| line | validation | severity | info | code |
|---|---|---|---|---|
| 30 | marshal.loads | High | The marshal module is not intended to be secure against erroneous or maliciously constructed data. | |
| 36 | marshal.load | High | The marshal module is not intended to be secure against erroneous or maliciously constructed data. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| marshal.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/marshal.py | 47 | 19 | 3 | 1 | 0 | 21 | 7 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/chmod_things.py
Number of potential security issues found: 4
| line | validation | severity | info | code |
|---|---|---|---|---|
| 5 | os.access | High | Operating System calls can have a security impact and should be inspected in detail. | |
| 8 | os.chmod | High | Operating System calls can have a security impact and should be inspected in detail. | |
| 23 | os.chmod | High | Operating System calls can have a security impact and should be inspected in detail. | |
| 25 | os.chmod | High | Operating System calls can have a security impact and should be inspected in detail. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| chmod_things.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/chmod_things.py | 29 | 20 | 2 | 3 | 0 | 5 | 3 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/directorycreation.py
Number of potential security issues found: 5
| line | validation | severity | info | code |
|---|---|---|---|---|
| 10 | os.makedirs | Low | Operating System calls can have a security impact and should be inspected in detail. | |
| 23 | os.mkdir | Low | Operating System calls can have a security impact and should be inspected in detail. | |
| 45 | os.mkfifo | Low | Operating System calls can have a security impact and should be inspected in detail. | |
| 62 | os.mknod | Low | Operating System calls can have a security impact and should be inspected in detail. | |
| 79 | os.makedirs | Low | Operating System calls can have a security impact and should be inspected in detail. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| directorycreation.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/directorycreation.py | 82 | 39 | 1 | 5 | 0 | 26 | 16 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/shelve.py
Number of potential security issues found: 1
| line | validation | severity | info | code |
|---|---|---|---|---|
| 3 | shelve.open | High | Only loading a shelve from a trusted source is secure. So check if this is the case. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| shelve.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/shelve.py | 4 | 3 | 1 | 0 | 0 | 0 | 2 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/file3.py
Number of potential security issues found: 3
| line | validation | severity | info | code |
|---|---|---|---|---|
| 4 | eval | High | This function can executes arbitrary code. | |
| 5 | os.access | High | Operating System calls can have a security impact and should be inspected in detail. | |
| 6 | os.access | High | Operating System calls can have a security impact and should be inspected in detail. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| file3.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/file3.py | 9 | 8 | 3 | 0 | 0 | 0 | 2 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/subprocess.py
Number of potential security issues found: 5
| line | validation | severity | info | code |
|---|---|---|---|---|
| 20 | subprocess.run | Medium | Use of the subprocess module calls should be analyzed in-depth. | |
| 44 | subprocess.Popen | Medium | Use of the subprocess module calls should be analyzed in-depth. | |
| 63 | subprocess.Popen | Medium | Use of the subprocess module calls should be analyzed in-depth. | |
| 79 | subprocess.check_call | High | Use of the subprocess module calls should be analyzed in-depth. | |
| 80 | subprocess.call | High | Use of the subprocess module calls should be analyzed in-depth. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| subprocess.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/subprocess.py | 83 | 36 | 2 | 1 | 0 | 7 | 1 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/shutil.py
Number of potential security issues found: 6
| line | validation | severity | info | code |
|---|---|---|---|---|
| 3 | shutil.unpack_archive | Medium | Extracting files within a program should not be trusted by default. | |
| 5 | shutil.copy2 | Medium | Information can be transfered without permission. | |
| 7 | shutil.copy2 | Medium | Information can be transfered without permission. | |
| 7 | shutil.copytree | Medium | Information can be transfered without permission. | |
| 9 | shutil.chown | Medium | Programs should not change access rights on files they do not own. | |
| 13 | shutil.copy | Medium | Information can be transfered without permission. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| shutil.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/shutil.py | 13 | 7 | 2 | 0 | 0 | 0 | 1 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/hashcheck.py
Number of potential security issues found: 3
| line | validation | severity | info | code |
|---|---|---|---|---|
| 19 | hashlib.md5 | High | Use of insecure hashing algorithms detected. | |
| 20 | hashlib.sha1 | High | Use of insecure hashing algorithms detected. | |
| 48 | hashlib.sha1 | High | Use of insecure hashing algorithms detected. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| hashcheck.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/hashcheck.py | 56 | 18 | 2 | 2 | 0 | 19 | 1 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/tarfilevalidation.py
Number of potential security issues found: 3
| line | validation | severity | info | code |
|---|---|---|---|---|
| 6 | tarfile.TarFile | High | Extracting files within a program should never be trusted by default. This issue is detected when the zipfile and/or tarfile module with an extraction method is used. | |
| 10 | tarfile.TarFile | High | Extracting files within a program should never be trusted by default. This issue is detected when the zipfile and/or tarfile module with an extraction method is used. | |
| 17 | tarfile.TarFile | High | Extracting files within a program should never be trusted by default. This issue is detected when the zipfile and/or tarfile module with an extraction method is used. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| tarfilevalidation.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/tarfilevalidation.py | 17 | 12 | 1 | 3 | 1 | 1 | 3 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/httpserver.py
Number of potential security issues found: 3
| line | validation | severity | info | code |
|---|---|---|---|---|
| 4 | http.server BaseHTTPRequestHandler |
High | Insecure for production use. | |
| 23 | http.server BaseHTTPRequestHandler |
High | Insecure for production use. | |
| 23 | http.server HTTPServer |
High | Insecure for production use. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| httpserver.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/httpserver.py | 35 | 16 | 1 | 2 | 1 | 16 | 1 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/directorycreation2.py
Number of potential security issues found: 6
| line | validation | severity | info | code |
|---|---|---|---|---|
| 13 | os.makedirs | Low | Operating System calls can have a security impact and should be inspected in detail. | |
| 26 | os.mkdir | Low | Operating System calls can have a security impact and should be inspected in detail. | |
| 48 | os.mkfifo | Low | Operating System calls can have a security impact and should be inspected in detail. | |
| 65 | os.mknod | Low | Operating System calls can have a security impact and should be inspected in detail. | |
| 82 | os.makedirs | Low | Operating System calls can have a security impact and should be inspected in detail. | |
| 94 | os.makedev | Low | Operating System calls can have a security impact and should be inspected in detail. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| directorycreation2.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/directorycreation2.py | 97 | 48 | 4 | 6 | 0 | 30 | 18 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/pickle.py
Number of potential security issues found: 3
| line | validation | severity | info | code |
|---|---|---|---|---|
| 3 | pickle.loads | High | unpickling will import any class or function that it finds in the pickle data | |
| 7 | pickle.load | High | unpickling will import any class or function that it finds in the pickle data | |
| 12 | pickle.loads | High | unpickling will import any class or function that it finds in the pickle data | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| pickle.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/pickle.py | 12 | 7 | 2 | 1 | 0 | 0 | 2 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/allshit.py
Number of potential security issues found: 51
| line | validation | severity | info | code |
|---|---|---|---|---|
| 6 | assert | Low | Assertions are for debugging and development. Misuse can lead to security vulnerabilities. | |
| 28 | exec | High | This built-in function can execute code you do not want and/or aware of. So check and validate if it is used correct. | |
| 32 | s.bind | Medium | Network sockets require additional measurements. | |
| 33 | s.bind | Medium | Network sockets require additional measurements. | |
| 42 | assert | Low | Assertions are for debugging and development. Misuse can lead to security vulnerabilities. | |
| 46 | pass | Low | Too broad exception handling risk when not used correctly. | |
| 52 | continue | Low | Too broad exception handling risk when not used correctly. | |
| 73 | hashlib.md5 | High | Use of insecure hashing algorithms detected. | |
| 74 | hashlib.sha1 | High | Use of insecure hashing algorithms detected. | |
| 102 | hashlib.sha1 | High | Use of insecure hashing algorithms detected. | |
| 116 | os.access | High | Operating System calls can have a security impact and should be inspected in detail. | |
| 119 | eval | High | This function can executes arbitrary code. | |
| 120 | exec | High | This built-in function can execute code you do not want and/or aware of. So check and validate if it is used correct. | |
| 123 | os.access | High | Operating System calls can have a security impact and should be inspected in detail. | |
| 126 | os.chmod | High | Operating System calls can have a security impact and should be inspected in detail. | |
| 141 | pass | Low | Too broad exception handling risk when not used correctly. | |
| 154 | os.system | High | Operating System calls can have a security impact and should be inspected in detail. | |
| 158 | os.popen | High | Operating System calls can have a security impact and should be inspected in detail. | |
| 159 | os.write | Low | os.write can cause availability issues if not done correct. | |
| 160 | os.writev | Low | os.writev can cause availability issues if not done correct. | |
| 163 | logging.config | Low | Potential security issues can arise with parsing objects and incorrect sanitizing. | |
| 166 | logging.config | Low | Potential security issues can arise with parsing objects and incorrect sanitizing. | |
| 174 | tarfile.TarFile | High | Extracting files within a program should never be trusted by default. This issue is detected when the zipfile and/or tarfile module with an extraction method is used. | |
| 178 | tarfile.TarFile | High | Extracting files within a program should never be trusted by default. This issue is detected when the zipfile and/or tarfile module with an extraction method is used. | |
| 185 | tarfile.TarFile | High | Extracting files within a program should never be trusted by default. This issue is detected when the zipfile and/or tarfile module with an extraction method is used. | |
| 202 | xmlrpc.server SimpleXMLRPCServer |
High | xmlrpc.server is vulnerable to the “decompression bomb” attack. | |
| 209 | xmlrpc.client | High | xmlrpc is vulnerable to the “decompression bomb” attack. | |
| 215 | os.fork | Low | On macOS use of this function is unsafe when mixed with using higher-level system APIs, and that includes using urllib.request. | |
| 217 | os.forkpty | Low | Use of forkpty can be unsafe when used on MacOS. | |
| 218 | os.fork | Low | On macOS use of this function is unsafe when mixed with using higher-level system APIs, and that includes using urllib.request. | |
| 224 | os.fork | Low | On macOS use of this function is unsafe when mixed with using higher-level system APIs, and that includes using urllib.request. | |
| 227 | compile | High | It is possible to crash the Python interpreter when using this function. | |
| 230 | base64 | Low | Base encoding visually hides otherwise easily recognized information such as passwords, but does not provide any computational confidentiality. | |
| 231 | base64 | Low | Base encoding visually hides otherwise easily recognized information such as passwords, but does not provide any computational confidentiality. | |
| 236 | http.server BaseHTTPRequestHandler |
High | Insecure for production use. | |
| 255 | http.server HTTPServer |
High | Insecure for production use. | |
| 255 | http.server BaseHTTPRequestHandler |
High | Insecure for production use. | |
| 291 | connection.recv | High | Connection.recv() uses pickle | |
| 304 | pickle.loads | High | unpickling will import any class or function that it finds in the pickle data | |
| 308 | pickle.load | High | unpickling will import any class or function that it finds in the pickle data | |
| 312 | pickle.loads | High | unpickling will import any class or function that it finds in the pickle data | |
| 326 | random.seed | Low | The pseudo-random generators of this module should not be used for security purposes. | |
| 327 | random.random | Low | The pseudo-random generators of this module should not be used for security purposes. | |
| 331 | shelve.open | High | Only loading a shelve from a trusted source is secure. So check if this is the case. | |
| 343 | os.makedirs | Low | Operating System calls can have a security impact and should be inspected in detail. | |
| 344 | zipfile.ZipFile | High | Extracting files within a program should never be trusted by default. This issue is detected when the zipfile and/or tarfile module with an extraction method is used. | |
| 346 | tarfile.TarFile | High | Extracting files within a program should never be trusted by default. This issue is detected when the zipfile and/or tarfile module with an extraction method is used. | |
| 355 | shutil.unpack_archive | Medium | Extracting files within a program should not be trusted by default. | |
| 358 | shutil.copy | Medium | Information can be transfered without permission. | |
| 373 | marshal.loads | High | The marshal module is not intended to be secure against erroneous or maliciously constructed data. | |
| 379 | marshal.load | High | The marshal module is not intended to be secure against erroneous or maliciously constructed data. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| allshit.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/allshit.py | 390 | 205 | 28 | 19 | 3 | 78 | 34 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/base64.py
Number of potential security issues found: 2
| line | validation | severity | info | code |
|---|---|---|---|---|
| 2 | base64 | Low | Base encoding visually hides otherwise easily recognized information such as passwords, but does not provide any computational confidentiality. | |
| 3 | base64 | Low | Base encoding visually hides otherwise easily recognized information such as passwords, but does not provide any computational confidentiality. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| base64.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/base64.py | 4 | 4 | 1 | 0 | 0 | 0 | 1 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/zipfile.py
Number of potential security issues found: 4
| line | validation | severity | info | code |
|---|---|---|---|---|
| 8 | zipfile.ZipFile | High | Extracting files within a program should never be trusted by default. This issue is detected when the zipfile and/or tarfile module with an extraction method is used. | |
| 13 | zipfile.ZipFile | High | Extracting files within a program should never be trusted by default. This issue is detected when the zipfile and/or tarfile module with an extraction method is used. | |
| 17 | zipfile.ZipFile | High | Extracting files within a program should never be trusted by default. This issue is detected when the zipfile and/or tarfile module with an extraction method is used. | |
| 23 | zipfile.ZipFile | High | Extracting files within a program should never be trusted by default. This issue is detected when the zipfile and/or tarfile module with an extraction method is used. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| zipfile.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/zipfile.py | 26 | 18 | 1 | 2 | 0 | 4 | 8 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/multiprocessing.py
Number of potential security issues found: 2
| line | validation | severity | info | code |
|---|---|---|---|---|
| 20 | connection.recv | High | Connection.recv() uses pickle | |
| 42 | multiprocessing.connection Connection |
High | Connection.recv() uses pickle | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| multiprocessing.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/multiprocessing.py | 47 | 31 | 4 | 6 | 0 | 7 | 1 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/inputstatement.py
Number of potential security issues found: 1
| line | validation | severity | info | code |
|---|---|---|---|---|
| 6 | input | Low | Use of input requires strict sanitizing and validation. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| inputstatement.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/inputstatement.py | 7 | 4 | 0 | 1 | 0 | 3 | 1 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/oschecks.py
Number of potential security issues found: 11
| line | validation | severity | info | code |
|---|---|---|---|---|
| 5 | os.access | High | Operating System calls can have a security impact and should be inspected in detail. | |
| 8 | eval | High | This function can executes arbitrary code. | |
| 9 | exec | High | This built-in function can execute code you do not want and/or aware of. So check and validate if it is used correct. | |
| 12 | os.access | High | Operating System calls can have a security impact and should be inspected in detail. | |
| 15 | os.chmod | High | Operating System calls can have a security impact and should be inspected in detail. | |
| 21 | os.popen | High | Operating System calls can have a security impact and should be inspected in detail. | |
| 22 | os.write | Low | os.write can cause availability issues if not done correct. | |
| 23 | os.writev | Low | os.writev can cause availability issues if not done correct. | |
| 25 | os.forkpty | Low | Use of forkpty can be unsafe when used on MacOS. | |
| 26 | os.fork | Low | On macOS use of this function is unsafe when mixed with using higher-level system APIs, and that includes using urllib.request. | |
| 32 | os.fork | Low | On macOS use of this function is unsafe when mixed with using higher-level system APIs, and that includes using urllib.request. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| oschecks.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/oschecks.py | 32 | 22 | 4 | 1 | 0 | 1 | 5 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/validation1.py
Number of potential security issues found: 3
| line | validation | severity | info | code |
|---|---|---|---|---|
| 8 | os.access | High | Operating System calls can have a security impact and should be inspected in detail. | |
| 11 | eval | High | This function can executes arbitrary code. | |
| 14 | os.access | High | Operating System calls can have a security impact and should be inspected in detail. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| validation1.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/validation1.py | 20 | 11 | 2 | 0 | 0 | 4 | 4 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/random.py
Number of potential security issues found: 2
| line | validation | severity | info | code |
|---|---|---|---|---|
| 14 | random.random | Low | The pseudo-random generators of this module should not be used for security purposes. | |
| 15 | random.seed | Low | The pseudo-random generators of this module should not be used for security purposes. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| random.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/random.py | 16 | 6 | 1 | 1 | 0 | 9 | 1 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/assert.py
Number of potential security issues found: 2
| line | validation | severity | info | code |
|---|---|---|---|---|
| 5 | assert | Low | Assertions are for debugging and development. Misuse can lead to security vulnerabilities. | |
| 31 | assert | Low | Assertions are for debugging and development. Misuse can lead to security vulnerabilities. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| assert.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/assert.py | 32 | 16 | 0 | 1 | 0 | 5 | 7 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/exception.py
Number of potential security issues found: 2
| line | validation | severity | info | code |
|---|---|---|---|---|
| 11 | continue | Low | Too broad exception handling risk when not used correctly. | |
| 19 | pass | Low | Too broad exception handling risk when not used correctly. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| exception.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/exception.py | 30 | 16 | 0 | 1 | 0 | 5 | 7 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/validation2.py
Number of potential security issues found: 3
| line | validation | severity | info | code |
|---|---|---|---|---|
| 8 | os.access | High | Operating System calls can have a security impact and should be inspected in detail. | |
| 10 | eval | High | This function can executes arbitrary code. | |
| 12 | os.access | High | Operating System calls can have a security impact and should be inspected in detail. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| validation2.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/validation2.py | 18 | 11 | 2 | 0 | 0 | 4 | 4 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/xml.py
Number of potential security issues found: 3
| line | validation | severity | info | code |
|---|---|---|---|---|
| 7 | xmlrpc.server SimpleXMLRPCServer |
High | xmlrpc.server is vulnerable to the “decompression bomb” attack. | |
| 14 | xmlrpc.client | High | xmlrpc is vulnerable to the “decompression bomb” attack. | |
| 26 | xmlrpc.server SimpleXMLRPCServer |
High | xmlrpc.server is vulnerable to the “decompression bomb” attack. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| xml.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/xml.py | 46 | 23 | 4 | 3 | 1 | 0 | 3 | 0 |
Location of the file: /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/modulecheck.py
Number of potential security issues found: 1
| line | validation | severity | info | code |
|---|---|---|---|---|
| 13 | os.chmod | High | Operating System calls can have a security impact and should be inspected in detail. | |
| FileName | FilePath | Number_Of_Lines | AST_Nodes | Modules | Functions | Classes | Comment_Lines | Complexity_Score | warnings |
|---|---|---|---|---|---|---|---|---|---|
| modulecheck.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/modulecheck.py | 13 | 9 | 5 | 1 | 0 | 2 | 1 | 0 |
Total Python files with no detected security issue: 1
The Python files with no security issues detected by codeaudit are:
| filename | directory |
|---|---|
| file_with_warnings.py | /home/maikel/projects/pythondev/codeaudit/tests/validationfiles/file_with_warnings.py |
Disclaimer:Only Python source files are taken into account for this scan. Sometimes security issues are present in configuration files, like ini,yaml or json files!
Disclaimer:This SAST tool 'codeaudit' provides a powerful automatic security analysis for Python source code. However it's not a substitute for human review in combination with business knowledge. Undetected vulnerabilities may still exist. There is and will never be a single security tool that gives 100% automatic guarantees. By reporting any issues you find, you contribute to a better tool for everyone.