Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions jit_code_vulnerability_test_file.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
import subprocess

Check warning on line 1 in jit_code_vulnerability_test_file.py

View check run for this annotation

Codacy Production / Codacy Static Code Analysis

jit_code_vulnerability_test_file.py#L1

Consider possible security implications associated with the subprocess module.
call_process = subprocess.Popen(['ls', '-l'], shell=True)

Check failure on line 2 in jit_code_vulnerability_test_file.py

View check run for this annotation

Codacy Production / Codacy Static Code Analysis

jit_code_vulnerability_test_file.py#L2

Found 'subprocess' function 'Popen' with 'shell=True'. This is dangerous because this call will spawn the command using a shell process.

Check failure on line 2 in jit_code_vulnerability_test_file.py

View check run for this annotation

Codacy Production / Codacy Static Code Analysis

jit_code_vulnerability_test_file.py#L2

Found `subprocess` function `Popen` with `shell=True`. This is dangerous because this call will spawn the command using a shell process.

Check failure on line 2 in jit_code_vulnerability_test_file.py

View check run for this annotation

Codacy Production / Codacy Static Code Analysis

jit_code_vulnerability_test_file.py#L2

subprocess call with shell=True identified, security issue.
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Security control: Static Code Analysis Python Semgrep

Type: Python.Lang.Security.Audit.Subprocess-Shell-True.Subprocess-Shell-True

Description: Found 'subprocess' function 'Popen' with 'shell=True'. This is dangerous because this call will spawn the command using a shell process. Doing so propagates current shell settings and variables, which makes it much easier for a malicious actor to execute commands. Use 'shell=False' instead.

Severity: HIGH

Learn more about this issue


Jit Bot commands and options (e.g., ignore issue)

You can trigger Jit actions by commenting on this PR review:

  • #jit_ignore_fp Ignore and mark this specific single instance of finding as “False Positive”
  • #jit_ignore_accept Ignore and mark this specific single instance of finding as “Accept Risk”
  • #jit_undo_ignore Undo ignore command