Jit - Scan Code for Vulnerabilities Test #2
8 new issues (0 max.) of at least severity.
Annotations
Check notice on line 1 in jit_code_vulnerability_test_file.py
codacy-production / Codacy Static Code Analysis
jit_code_vulnerability_test_file.py#L1
Consider possible security implications associated with the subprocess module.
Check warning on line 1 in jit_code_vulnerability_test_file.py
codacy-production / Codacy Static Code Analysis
jit_code_vulnerability_test_file.py#L1
Consider possible security implications associated with the subprocess module. (B404)
Check failure on line 2 in jit_code_vulnerability_test_file.py
codacy-production / Codacy Static Code Analysis
jit_code_vulnerability_test_file.py#L2
Found 'subprocess' function 'Popen' with 'shell=True'. This is dangerous because this call will spawn the command using a shell process.
Check warning on line 2 in jit_code_vulnerability_test_file.py
codacy-production / Codacy Static Code Analysis
jit_code_vulnerability_test_file.py#L2
Found `subprocess` function `Popen` with `shell=True`. This is dangerous because this call will spawn the command using a shell process.
Check warning on line 2 in jit_code_vulnerability_test_file.py
codacy-production / Codacy Static Code Analysis
jit_code_vulnerability_test_file.py#L2
Starting a process with a partial executable path
Check warning on line 2 in jit_code_vulnerability_test_file.py
codacy-production / Codacy Static Code Analysis
jit_code_vulnerability_test_file.py#L2
Starting a process with a partial executable path (B607)
Check warning on line 2 in jit_code_vulnerability_test_file.py
codacy-production / Codacy Static Code Analysis
jit_code_vulnerability_test_file.py#L2
subprocess call with shell=True identified, security issue.
Check warning on line 2 in jit_code_vulnerability_test_file.py
codacy-production / Codacy Static Code Analysis
jit_code_vulnerability_test_file.py#L2
subprocess call with shell=True identified, security issue. (B602)