Skip to content

Bump org.junit.platform:junit-platform-launcher from 1.10.0 to 1.10.1 #1006

Bump org.junit.platform:junit-platform-launcher from 1.10.0 to 1.10.1

Bump org.junit.platform:junit-platform-launcher from 1.10.0 to 1.10.1 #1006

Status Success
Total duration 2m 29s
Artifacts
This run and associated checks have been archived and are scheduled for deletion. Learn more about checks retention

test_action.yml

on: push
Execute the pycharm-security action
2m 19s
Execute the pycharm-security action
Fit to window
Zoom out
Zoom in

Annotations

30 warnings
Execute the pycharm-security action
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
Execute the pycharm-security action: file:///github/workspace/test_xmlrpc.py#L1
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'from xmlrpc.server import SimpleXMLRPCServer'.
Execute the pycharm-security action: file:///github/workspace/test_xmlrpc.py#L2
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'from xmlrpc.server import SimpleXMLRPCRequestHandler'.
Execute the pycharm-security action: file:///github/workspace/test_xmlrpc.py#L4
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'import xml.sax'.
Execute the pycharm-security action: file:///github/workspace/test_pickle.py#L3
PIC100: Loading serialized data with the pickle module can expose arbitrary code execution using the __reduce__ method. Found in 'pickle.loads(x)'.
Execute the pycharm-security action
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
Execute the pycharm-security action: file:///github/workspace/test_xmlrpc.py#L1
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'from xmlrpc.server import SimpleXMLRPCServer'.
Execute the pycharm-security action: file:///github/workspace/test_xmlrpc.py#L2
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'from xmlrpc.server import SimpleXMLRPCRequestHandler'.
Execute the pycharm-security action: file:///github/workspace/test_xmlrpc.py#L4
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'import xml.sax'.
Execute the pycharm-security action: file:///github/workspace/test_pickle.py#L3
PIC100: Loading serialized data with the pickle module can expose arbitrary code execution using the __reduce__ method. Found in 'pickle.loads(x)'.
Execute the pycharm-security action: file:///github/workspace/test_chmod.py#L5
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', 777)'.
Execute the pycharm-security action: file:///github/workspace/test_chmod.py#L7
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', 0o777)'.
Execute the pycharm-security action: file:///github/workspace/test_chmod.py#L9
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', 0o300)'.
Execute the pycharm-security action: file:///github/workspace/test_chmod.py#L11
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', stat.S_IXOTH | stat.S_IXGRP)'.
Execute the pycharm-security action: file:///github/workspace/test_chmod.py#L12
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', stat.S_IXOTH)'.
Execute the pycharm-security action
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
Execute the pycharm-security action: file:///github/workspace/test_xmlrpc.py#L1
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'from xmlrpc.server import SimpleXMLRPCServer'.
Execute the pycharm-security action: file:///github/workspace/test_xmlrpc.py#L2
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'from xmlrpc.server import SimpleXMLRPCRequestHandler'.
Execute the pycharm-security action: file:///github/workspace/test_xmlrpc.py#L4
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'import xml.sax'.
Execute the pycharm-security action: file:///github/workspace/test_pickle.py#L3
PIC100: Loading serialized data with the pickle module can expose arbitrary code execution using the __reduce__ method. Found in 'pickle.loads(x)'.
Execute the pycharm-security action: file:///github/workspace/test_chmod.py#L5
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', 777)'.
Execute the pycharm-security action: file:///github/workspace/test_chmod.py#L7
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', 0o777)'.
Execute the pycharm-security action: file:///github/workspace/test_chmod.py#L9
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', 0o300)'.
Execute the pycharm-security action: file:///github/workspace/test_chmod.py#L11
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', stat.S_IXOTH | stat.S_IXGRP)'.
Execute the pycharm-security action: file:///github/workspace/test_chmod.py#L12
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', stat.S_IXOTH)'.