Skip to content

Bump guava from 23.6-jre to 32.0.0-jre in /samples/languages/java/label_image#1

Open
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/maven/samples/languages/java/label_image/com.google.guava-guava-32.0.0-jre
Open

Bump guava from 23.6-jre to 32.0.0-jre in /samples/languages/java/label_image#1
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/maven/samples/languages/java/label_image/com.google.guava-guava-32.0.0-jre

Conversation

@dependabot
Copy link

@dependabot dependabot bot commented on behalf of github Jun 14, 2023

Bumps guava from 23.6-jre to 32.0.0-jre.

Release notes

Sourced from guava's releases.

32.0.0

Maven

<dependency>
  <groupId>com.google.guava</groupId>
  <artifactId>guava</artifactId>
  <version>32.0.0-jre</version>
  <!-- or, for Android: -->
  <version>32.0.0-android</version>
</dependency>

Jar files

Guava requires one runtime dependency, which you can download here:

Javadoc

JDiff

Changelog

Security fixes

While CVE-2020-8908 was officially closed when we deprecated Files.createTempDir in Guava 30.0, we've heard from users that even recent versions of Guava have been listed as vulnerable in other databases of security vulnerabilities. In response, we've reimplemented the method (and the very rarely used FileBackedOutputStream class, which had a similar issue) to eliminate the insecure behavior entirely. This change could technically affect users in a number of different ways (discussed under "Incompatible changes" below), but in practice, the only problem users are likely to encounter is with Windows. If you are using those APIs under Windows, you should skip 32.0.0 and go straight to 32.0.1 which fixes the problem. (Unfortunately, we didn't think of the Windows problem until after the release. And while we warn that common.io in particular may not work under Windows, we didn't intend to regress support.) Sorry for the trouble.

Incompatible changes

Although this release bumps Guava's major version number, it makes no binary-incompatible changes to the guava artifact.

One change could cause issues for Widows users, and a few other changes could cause issues for users in more usual situations:

  • The new implementations of Files.createTempDir and FileBackedOutputStream throw an exception under Windows. This is fixed in 32.0.1. Sorry for the trouble.
  • This release makes a binary-incompatible change to a @Beta API in the separate artifact guava-testlib. Specifically, we changed the return type of TestingExecutors.sameThreadScheduledExecutor to ListeningScheduledExecutorService. The old return type was a package-private class, which caused the Kotlin compiler to produce warnings. (dafaa3e435)
  • This release adds two methods to the Android flavor of Guava: Invokable.getAnnotatedReturnType() and Parameter.getAnnotatedType(). Those methods do not work under an Android VM; we added them only to help our tests of the Android flavor (since we also run those tests under a JRE). Android VMs tolerate such methods as long as the app does not call them or perform reflection on them, and builds tolerate them because of our new Proguard configurations (discussed below). Thus, we expect no impact to most users. However, we could imagine build problems for users who have set up their own build system for the Android flavor of Guava. Please report any problems so that we can judge how safely we might be able to add other methods to the Android flavor in the future, such as APIs that use Java 8 classes like Stream. (b30e73cfa81ad15c1023c17cfd083255a3df0105)

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [guava](https://github.com/google/guava) from 23.6-jre to 32.0.0-jre.
- [Release notes](https://github.com/google/guava/releases)
- [Commits](https://github.com/google/guava/commits)

---
updated-dependencies:
- dependency-name: com.google.guava:guava
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Jun 14, 2023
Copy link

@ghost ghost left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Rule: avoid pickle
SeverityCRITICAL
File: research/steve/replay.py
Lines: 108 - 108
Scanner: SEMGREP

More Info Avoid using `pickle`, which is known to lead to code execution vulnerabilities. When unpickling, the serialized data could be manipulated to run arbitrary code. Instead, consider serializing the relevant data as JSON or a similar text-based serialization format.
</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: tutorials/image/cifar10_estimator/generate_cifar10_tfrecords.py<br>
   <b style="color:black">Lines</b>: 68 - 68<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: tutorials/image/cifar10_estimator/generate_cifar10_tfrecords.py<br>
   <b style="color:black">Lines</b>: 70 - 70<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/rebar/datasets.py<br>
   <b style="color:black">Lines</b>: 55 - 55<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/rebar/download_data.py<br>
   <b style="color:black">Lines</b>: 82 - 82<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/steve/replay.py<br>
   <b style="color:black">Lines</b>: 78 - 78<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/steve/replay.py<br>
   <b style="color:black">Lines</b>: 104 - 104<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/steve/replay.py<br>
   <b style="color:black">Lines</b>: 105 - 105<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/steve/replay.py<br>
   <b style="color:black">Lines</b>: 106 - 106<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/steve/replay.py<br>
   <b style="color:black">Lines</b>: 107 - 107<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: official/recommendation/data_preprocessing.py<br>
   <b style="color:black">Lines</b>: 87 - 87<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: official/recommendation/data_preprocessing.py<br>
   <b style="color:black">Lines</b>: 174 - 174<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/fivo/fivo/data/calculate_pianoroll_mean.py<br>
   <b style="color:black">Lines</b>: 53 - 53<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/fivo/fivo/data/calculate_pianoroll_mean.py<br>
   <b style="color:black">Lines</b>: 61 - 61<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/fivo/fivo/data/datasets.py<br>
   <b style="color:black">Lines</b>: 186 - 186<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/fivo/fivo/data/datasets_test.py<br>
   <b style="color:black">Lines</b>: 98 - 98<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/fivo/fivo/data/datasets_test.py<br>
   <b style="color:black">Lines</b>: 157 - 157<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/learning_to_remember_rare_events/data_utils.py<br>
   <b style="color:black">Lines</b>: 58 - 58<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/learning_to_remember_rare_events/data_utils.py<br>
   <b style="color:black">Lines</b>: 60 - 60<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/learning_to_remember_rare_events/data_utils.py<br>
   <b style="color:black">Lines</b>: 180 - 180<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/lm_commonsense/eval.py<br>
   <b style="color:black">Lines</b>: 144 - 144<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/lm_commonsense/eval.py<br>
   <b style="color:black">Lines</b>: 168 - 168<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/pcl_rl/controller.py<br>
   <b style="color:black">Lines</b>: 241 - 241<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/pcl_rl/expert_paths.py<br>
   <b style="color:black">Lines</b>: 39 - 39<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: eval detected<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/neural_gpu/program_utils.py<br>
   <b style="color:black">Lines</b>: 342 - 342<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Detected the use of eval(). eval() can be dangerous if used to evaluate

dynamic content. If this content can be input from outside the program, this
may be a code injection vulnerability. Ensure evaluated content is not definable
by external sources.

</details><p><b style="color:black" >Rule</b>: eval detected<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/rebar/rebar_train.py<br>
   <b style="color:black">Lines</b>: 156 - 156<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Detected the use of eval(). eval() can be dangerous if used to evaluate

dynamic content. If this content can be input from outside the program, this
may be a code injection vulnerability. Ensure evaluated content is not definable
by external sources.

</details><p><b style="color:black" >Rule</b>: eval detected<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/rebar/rebar_train.py<br>
   <b style="color:black">Lines</b>: 157 - 157<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Detected the use of eval(). eval() can be dangerous if used to evaluate

dynamic content. If this content can be input from outside the program, this
may be a code injection vulnerability. Ensure evaluated content is not definable
by external sources.

</details><p><b style="color:black" >Rule</b>: exec command detected<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: official/vision/image_classification/common.py<br>
   <b style="color:black">Lines</b>: 448 - 449<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Detected the use of exec(). exec() can be dangerous if used to evaluate

dynamic content. If this content can be input from outside the program, this
may be a code injection vulnerability. Ensure evaluated content is not definable
by external sources.

</details><p><b style="color:black" >Rule</b>: exec command detected<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/neural_gpu/program_utils.py<br>
   <b style="color:black">Lines</b>: 184 - 184<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Detected the use of exec(). exec() can be dangerous if used to evaluate

dynamic content. If this content can be input from outside the program, this
may be a code injection vulnerability. Ensure evaluated content is not definable
by external sources.

</details><p><b style="color:black" >Rule</b>: exec command detected<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/neural_gpu/program_utils.py<br>
   <b style="color:black">Lines</b>: 297 - 297<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Detected the use of exec(). exec() can be dangerous if used to evaluate

dynamic content. If this content can be input from outside the program, this
may be a code injection vulnerability. Ensure evaluated content is not definable
by external sources.

</details><p><b style="color:black" >Rule</b>: subprocess shell equals true<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: official/utils/logs/mlperf_helper.py<br>
   <b style="color:black">Lines</b>: 181 - 183<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Found 'subprocess' function '$FUNC' with 'shell=True'. This is dangerous because this call will spawn

the command using a shell process. Doing so propagates current shell settings and variables, which
makes it much easier for a malicious actor to execute commands. Use 'shell=False' instead.

</details><p><b style="color:black" >Rule</b>: subprocess shell equals true<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/brain_coder/single_task/run_eval_tasks.py<br>
   <b style="color:black">Lines</b>: 176 - 176<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Found 'subprocess' function '$FUNC' with 'shell=True'. This is dangerous because this call will spawn

the command using a shell process. Doing so propagates current shell settings and variables, which
makes it much easier for a malicious actor to execute commands. Use 'shell=False' instead.

</details><p><b style="color:black" >Rule</b>: subprocess shell equals true<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/efficient-hrl/scripts/local_eval.py<br>
   <b style="color:black">Lines</b>: 72 - 72<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Found 'subprocess' function '$FUNC' with 'shell=True'. This is dangerous because this call will spawn

the command using a shell process. Doing so propagates current shell settings and variables, which
makes it much easier for a malicious actor to execute commands. Use 'shell=False' instead.

</details><p><b style="color:black" >Rule</b>: subprocess shell equals true<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/efficient-hrl/scripts/local_train.py<br>
   <b style="color:black">Lines</b>: 72 - 72<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Found 'subprocess' function '$FUNC' with 'shell=True'. This is dangerous because this call will spawn

the command using a shell process. Doing so propagates current shell settings and variables, which
makes it much easier for a malicious actor to execute commands. Use 'shell=False' instead.

</details><p><b style="color:black" >Rule</b>: subprocess shell equals true<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/learning_to_remember_rare_events/data_utils.py<br>
   <b style="color:black">Lines</b>: 193 - 193<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Found 'subprocess' function '$FUNC' with 'shell=True'. This is dangerous because this call will spawn

the command using a shell process. Doing so propagates current shell settings and variables, which
makes it much easier for a malicious actor to execute commands. Use 'shell=False' instead.

</details><p><b style="color:black" >Rule</b>: subprocess shell equals true<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/learning_to_remember_rare_events/data_utils.py<br>
   <b style="color:black">Lines</b>: 201 - 202<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Found 'subprocess' function '$FUNC' with 'shell=True'. This is dangerous because this call will spawn

the command using a shell process. Doing so propagates current shell settings and variables, which
makes it much easier for a malicious actor to execute commands. Use 'shell=False' instead.

</details><p><b style="color:black" >Rule</b>: subprocess shell equals true<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/learning_to_remember_rare_events/data_utils.py<br>
   <b style="color:black">Lines</b>: 210 - 211<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Found 'subprocess' function '$FUNC' with 'shell=True'. This is dangerous because this call will spawn

the command using a shell process. Doing so propagates current shell settings and variables, which
makes it much easier for a malicious actor to execute commands. Use 'shell=False' instead.

</details><p><b style="color:black" >Rule</b>: subprocess shell equals true<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/tcn/dataset/webcam.py<br>
   <b style="color:black">Lines</b>: 385 - 385<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Found 'subprocess' function '$FUNC' with 'shell=True'. This is dangerous because this call will spawn

the command using a shell process. Doing so propagates current shell settings and variables, which
makes it much easier for a malicious actor to execute commands. Use 'shell=False' instead.

</details><p><b style="color:black" >Rule</b>: subprocess shell equals true<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/tcn/dataset/webcam.py<br>
   <b style="color:black">Lines</b>: 390 - 390<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Found 'subprocess' function '$FUNC' with 'shell=True'. This is dangerous because this call will spawn

the command using a shell process. Doing so propagates current shell settings and variables, which
makes it much easier for a malicious actor to execute commands. Use 'shell=False' instead.

</details><p><b style="color:black" >Rule</b>: subprocess shell equals true<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/tcn/dataset/webcam.py<br>
   <b style="color:black">Lines</b>: 423 - 423<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Found 'subprocess' function '$FUNC' with 'shell=True'. This is dangerous because this call will spawn

the command using a shell process. Doing so propagates current shell settings and variables, which
makes it much easier for a malicious actor to execute commands. Use 'shell=False' instead.

</details><p><b style="color:black" >Rule</b>: avoid cPickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/autoaugment/data_utils.py<br>
   <b style="color:black">Lines</b>: 182 - 182<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `cPickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid cPickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/brain_coder/common/utils.py<br>
   <b style="color:black">Lines</b>: 386 - 386<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `cPickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid cPickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/brain_coder/common/utils.py<br>
   <b style="color:black">Lines</b>: 556 - 556<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `cPickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid cPickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/brain_coder/single_task/ga_train.py<br>
   <b style="color:black">Lines</b>: 73 - 73<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `cPickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid cPickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/brain_coder/single_task/ga_train.py<br>
   <b style="color:black">Lines</b>: 90 - 90<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `cPickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid cPickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/brain_coder/single_task/pg_train.py<br>
   <b style="color:black">Lines</b>: 290 - 290<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `cPickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid cPickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/brain_coder/single_task/pg_train.py<br>
   <b style="color:black">Lines</b>: 412 - 412<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `cPickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid cPickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/cognitive_mapping_and_planning/src/utils.py<br>
   <b style="color:black">Lines</b>: 117 - 117<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `cPickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid cPickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/cognitive_mapping_and_planning/src/utils.py<br>
   <b style="color:black">Lines</b>: 122 - 122<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `cPickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid cPickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/cvt_text/base/utils.py<br>
   <b style="color:black">Lines</b>: 44 - 44<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `cPickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid cPickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/cvt_text/base/utils.py<br>
   <b style="color:black">Lines</b>: 55 - 55<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `cPickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid cPickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/rebar/datasets.py<br>
   <b style="color:black">Lines</b>: 55 - 55<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `cPickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid cPickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/rebar/download_data.py<br>
   <b style="color:black">Lines</b>: 82 - 82<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `cPickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid cPickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/slim/datasets/download_and_convert_cifar10.py<br>
   <b style="color:black">Lines</b>: 77 - 77<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `cPickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid cPickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/slim/datasets/download_and_convert_cifar10.py<br>
   <b style="color:black">Lines</b>: 79 - 79<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `cPickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: official/nlp/xlnet/preprocess_squad_data.py<br>
   <b style="color:black">Lines</b>: 132 - 132<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: avoid pickle<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: official/nlp/xlnet/run_squad.py<br>
   <b style="color:black">Lines</b>: 284 - 284<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Avoid using `pickle`, which is known to lead to code execution vulnerabilities.

When unpickling, the serialized data could be manipulated to run arbitrary code.
Instead, consider serializing the relevant data as JSON or a similar text-based
serialization format.

</details><p><b style="color:black" >Rule</b>: dangerous system call<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/cognitive_planning/viz_active_vision_dataset_main.py<br>
   <b style="color:black">Lines</b>: 269 - 274<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Found dynamic content used in a system call. This is dangerous if external data can reach this function call because it allows a malicious actor to execute commands. Use the 'subprocess' module instead, which is easier to use without accidentally exposing a command injection vulnerability.
</details><p><b style="color:black" >Rule</b>: dangerous system call<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/tcn/dataset/images_to_videos.py<br>
   <b style="color:black">Lines</b>: 55 - 55<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Found dynamic content used in a system call. This is dangerous if external data can reach this function call because it allows a malicious actor to execute commands. Use the 'subprocess' module instead, which is easier to use without accidentally exposing a command injection vulnerability.
</details><p><b style="color:black" >Rule</b>: dangerous system call<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/tcn/dataset/images_to_videos.py<br>
   <b style="color:black">Lines</b>: 61 - 69<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Found dynamic content used in a system call. This is dangerous if external data can reach this function call because it allows a malicious actor to execute commands. Use the 'subprocess' module instead, which is easier to use without accidentally exposing a command injection vulnerability.
</details><p><b style="color:black" >Rule</b>: dangerous system call<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/tcn/dataset/webcam.py<br>
   <b style="color:black">Lines</b>: 288 - 288<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Found dynamic content used in a system call. This is dangerous if external data can reach this function call because it allows a malicious actor to execute commands. Use the 'subprocess' module instead, which is easier to use without accidentally exposing a command injection vulnerability.
</details><p><b style="color:black" >Rule</b>: dangerous system call<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/tcn/dataset/webcam.py<br>
   <b style="color:black">Lines</b>: 300 - 308<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Found dynamic content used in a system call. This is dangerous if external data can reach this function call because it allows a malicious actor to execute commands. Use the 'subprocess' module instead, which is easier to use without accidentally exposing a command injection vulnerability.
</details><p><b style="color:black" >Rule</b>: dangerous system call<br>
<b style="color:black" >Severity</b>:&nbsp;<img src="https://cidersecurity-public-icons.s3.amazonaws.com/prSeverityIcons/critical.svg" alt="CRITICAL" width="62px" align="center"><br><b style="color:black">File</b>: research/tcn/utils/util.py<br>
   <b style="color:black">Lines</b>: 200 - 200<br>
<b style="color:black" >Scanner:</b> <a href="https://semgrep.dev/">SEMGREP</a></p>
<details>
<summary><b style="color:black">More Info</b></summary>
Found dynamic content used in a system call. This is dangerous if external data can reach this function call because it allows a malicious actor to execute commands. Use the 'subprocess' module instead, which is easier to use without accidentally exposing a command injection vulnerability.
</details>

Copy link

@ghost ghost left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Rule: 26-GENERIC-PASSWORD
SeverityCRITICAL
File: research/cvt_text/corpus_processing/unlabeled_data.py
Lines: 31
Scanner: Secret Diver

More Info Contains PASSWORD

Rule: 26-GENERIC-PASSWORD
SeverityCRITICAL
File: research/qa_kg/exp_1_hop/test.py
Lines: 47
Scanner: Secret Diver

More Info Contains PASSWORD

Rule: 26-GENERIC-PASSWORD
SeverityCRITICAL
File: research/qa_kg/exp_1_hop/train_gt_layout.py
Lines: 47
Scanner: Secret Diver

More Info Contains PASSWORD

Rule: 26-GENERIC-PASSWORD
SeverityCRITICAL
File: research/qa_kg/util/data_reader.py
Lines: 155
Scanner: Secret Diver

More Info Contains PASSWORD

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants