Skip to content

Scan Code for Vulnerabilities Commit

fa8d02b
Select commit
Loading
Failed to load commit list.
Open

Jit - Scan Code for Vulnerabilities Test #2

Scan Code for Vulnerabilities Commit
fa8d02b
Select commit
Loading
Failed to load commit list.
Codacy Production / Codacy Static Code Analysis required action Dec 9, 2025 in 0s

8 new issues (0 max.) of at least severity.

Annotations

Check notice on line 1 in jit_code_vulnerability_test_file.py

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

jit_code_vulnerability_test_file.py#L1

Consider possible security implications associated with the subprocess module.

Check warning on line 1 in jit_code_vulnerability_test_file.py

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

jit_code_vulnerability_test_file.py#L1

Consider possible security implications associated with the subprocess module. (B404)

Check failure on line 2 in jit_code_vulnerability_test_file.py

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

jit_code_vulnerability_test_file.py#L2

Found 'subprocess' function 'Popen' with 'shell=True'. This is dangerous because this call will spawn the command using a shell process.

Check warning on line 2 in jit_code_vulnerability_test_file.py

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

jit_code_vulnerability_test_file.py#L2

Found `subprocess` function `Popen` with `shell=True`. This is dangerous because this call will spawn the command using a shell process.

Check warning on line 2 in jit_code_vulnerability_test_file.py

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

jit_code_vulnerability_test_file.py#L2

Starting a process with a partial executable path

Check warning on line 2 in jit_code_vulnerability_test_file.py

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

jit_code_vulnerability_test_file.py#L2

Starting a process with a partial executable path (B607)

Check warning on line 2 in jit_code_vulnerability_test_file.py

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

jit_code_vulnerability_test_file.py#L2

subprocess call with shell=True identified, security issue.

Check warning on line 2 in jit_code_vulnerability_test_file.py

See this annotation in the file changed.

@codacy-production codacy-production / Codacy Static Code Analysis

jit_code_vulnerability_test_file.py#L2

subprocess call with shell=True identified, security issue. (B602)