Bump org.junit.platform:junit-platform-launcher from 1.10.0 to 1.10.1 #1006
This run and associated checks have been archived and are scheduled for deletion.
Learn more about checks retention
test_action.yml
on: push
Execute the pycharm-security action
2m 19s
Annotations
30 warnings
Execute the pycharm-security action
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
|
Execute the pycharm-security action:
file:///github/workspace/test_xmlrpc.py#L1
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'from xmlrpc.server import SimpleXMLRPCServer'.
|
Execute the pycharm-security action:
file:///github/workspace/test_xmlrpc.py#L2
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'from xmlrpc.server import SimpleXMLRPCRequestHandler'.
|
Execute the pycharm-security action:
file:///github/workspace/test_xmlrpc.py#L4
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'import xml.sax'.
|
Execute the pycharm-security action:
file:///github/workspace/test_shell.py#L19
Name 'password' can be undefined
|
Execute the pycharm-security action:
file:///github/workspace/test_format.py#L2
Name 'z' can be undefined
|
Execute the pycharm-security action:
file:///github/workspace/test_ssl.py#L3
Parameter 'sock' unfilled
|
Execute the pycharm-security action:
file:///github/workspace/test_ssl.py#L6
Parameter 'sock' unfilled
|
Execute the pycharm-security action:
file:///github/workspace/test_shell.py#L24
Parameter '__source' unfilled
|
Execute the pycharm-security action:
file:///github/workspace/test_pickle.py#L3
PIC100: Loading serialized data with the pickle module can expose arbitrary code execution using the __reduce__ method. Found in 'pickle.loads(x)'.
|
Execute the pycharm-security action
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
|
Execute the pycharm-security action:
file:///github/workspace/test_xmlrpc.py#L1
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'from xmlrpc.server import SimpleXMLRPCServer'.
|
Execute the pycharm-security action:
file:///github/workspace/test_xmlrpc.py#L2
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'from xmlrpc.server import SimpleXMLRPCRequestHandler'.
|
Execute the pycharm-security action:
file:///github/workspace/test_xmlrpc.py#L4
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'import xml.sax'.
|
Execute the pycharm-security action:
file:///github/workspace/test_pickle.py#L3
PIC100: Loading serialized data with the pickle module can expose arbitrary code execution using the __reduce__ method. Found in 'pickle.loads(x)'.
|
Execute the pycharm-security action:
file:///github/workspace/test_chmod.py#L5
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', 777)'.
|
Execute the pycharm-security action:
file:///github/workspace/test_chmod.py#L7
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', 0o777)'.
|
Execute the pycharm-security action:
file:///github/workspace/test_chmod.py#L9
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', 0o300)'.
|
Execute the pycharm-security action:
file:///github/workspace/test_chmod.py#L11
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', stat.S_IXOTH | stat.S_IXGRP)'.
|
Execute the pycharm-security action:
file:///github/workspace/test_chmod.py#L12
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', stat.S_IXOTH)'.
|
Execute the pycharm-security action
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
|
Execute the pycharm-security action:
file:///github/workspace/test_xmlrpc.py#L1
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'from xmlrpc.server import SimpleXMLRPCServer'.
|
Execute the pycharm-security action:
file:///github/workspace/test_xmlrpc.py#L2
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'from xmlrpc.server import SimpleXMLRPCRequestHandler'.
|
Execute the pycharm-security action:
file:///github/workspace/test_xmlrpc.py#L4
XML100: The xml modules in the Python standard library are not secure against maliciously constructed data. Found in 'import xml.sax'.
|
Execute the pycharm-security action:
file:///github/workspace/test_pickle.py#L3
PIC100: Loading serialized data with the pickle module can expose arbitrary code execution using the __reduce__ method. Found in 'pickle.loads(x)'.
|
Execute the pycharm-security action:
file:///github/workspace/test_chmod.py#L5
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', 777)'.
|
Execute the pycharm-security action:
file:///github/workspace/test_chmod.py#L7
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', 0o777)'.
|
Execute the pycharm-security action:
file:///github/workspace/test_chmod.py#L9
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', 0o300)'.
|
Execute the pycharm-security action:
file:///github/workspace/test_chmod.py#L11
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', stat.S_IXOTH | stat.S_IXGRP)'.
|
Execute the pycharm-security action:
file:///github/workspace/test_chmod.py#L12
OS100: Modification of system files to allow execution. Found in 'os.chmod('x', stat.S_IXOTH)'.
|