-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update secondfile.py #2
base: main
Are you sure you want to change the base?
Conversation
print("got here thrice") | ||
if 1654543717 == 1654543717: | ||
print("fourth times the charm") | ||
client("s3", aws_secret_access_key="fakefakefake1654543717fakefake") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hardcoded AWS access token detected. Attackers can possibly freely read this value and gain access to the AWS environment. Instead, use environment variables to access tokens (e.g., os.environ.get(...)) or use non version-controlled configuration files. (Line 23)
🔴 Fix or ignore this finding to merge your pull request.🙈 From python.boto3.security.hardcoded-token.hardcoded-token.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
test
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/ignore ;lkajsdfl;kjasdf;ljasdf maslk;dfjas
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/ignore this is a test
Semgrep found 4 This expression is always True: 🙈 From python.lang.correctness.useless-eqeq.useless-eqeq. |
test comment |
No description provided.