Skip to content

Conversation

@blazerguns
Copy link
Owner

Fixed logs

Fixed logs
@blazerguns
Copy link
Owner Author

PyLint Result:

Type Path Message
convention resources_backend/server.py:14 Unnecessary parens after 'if' keyword
convention resources_backend/server.py:19 Trailing whitespace
convention resources_backend/server.py:23 Trailing whitespace
convention resources_backend/server.py:1 Missing module docstring
convention resources_backend/server.py:9 Missing function or method docstring
convention resources_backend/server.py:13 Formatting a regular string which could be a f-string
convention resources_backend/server.py:20 Variable name "responseData" doesn't conform to snake_case naming style
convention resources_backend/server.py:20 Formatting a regular string which could be a f-string
warning resources_backend/server.py:1 Unused make_response imported from flask

@blazerguns
Copy link
Owner Author

SAST Result:

Type Category Path Message
high Missing rate limiting api/index.js:46 This route handler performs a database access, but is not rate-limited.
high Database query built from user-controlled sources api/index.js:48 This query depends on a user-provided value.

@blazerguns
Copy link
Owner Author

SCA Result:

Type Message
axios Versions of axios prior to 0.18.1 are vulnerable to Denial of Service. If a request exceeds the maxContentLength property, the package prints an error but does not stop the request. This may cause high CPU usage and lead to Denial of Service.## RecommendationUpgrade to 0.18.1 or later.
axios Axios NPM package 0.21.0 contains a Server-Side Request Forgery (SSRF) vulnerability where an attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address.
follow-redirects follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor
follow-redirects Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.
axios axios is vulnerable to Inefficient Regular Expression Complexity

@blazerguns
Copy link
Owner Author

PyLint Result:

Type Path Message
convention resources_backend/server.py:14 Unnecessary parens after 'if' keyword
convention resources_backend/server.py:19 Trailing whitespace
convention resources_backend/server.py:23 Trailing whitespace
convention resources_backend/server.py:1 Missing module docstring
convention resources_backend/server.py:9 Missing function or method docstring
convention resources_backend/server.py:13 Formatting a regular string which could be a f-string
convention resources_backend/server.py:20 Variable name "responseData" doesn't conform to snake_case naming style
convention resources_backend/server.py:20 Formatting a regular string which could be a f-string
warning resources_backend/server.py:1 Unused make_response imported from flask

@blazerguns
Copy link
Owner Author

SAST Result:

Type Category Path Message
high Missing rate limiting api/index.js:46 This route handler performs a database access, but is not rate-limited.
high Database query built from user-controlled sources api/index.js:48 This query depends on a user-provided value.

@blazerguns
Copy link
Owner Author

SCA Result:

Type Message
axios Versions of axios prior to 0.18.1 are vulnerable to Denial of Service. If a request exceeds the maxContentLength property, the package prints an error but does not stop the request. This may cause high CPU usage and lead to Denial of Service.## RecommendationUpgrade to 0.18.1 or later.
axios Axios NPM package 0.21.0 contains a Server-Side Request Forgery (SSRF) vulnerability where an attacker is able to bypass a proxy by providing a URL that responds with a redirect to a restricted host or IP address.
follow-redirects follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor
follow-redirects Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.
axios axios is vulnerable to Inefficient Regular Expression Complexity

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants