Dataset Viewer
Auto-converted to Parquet Duplicate
added
stringlengths
32
32
created
int64
1,236B
1,694B
id
stringlengths
40
40
int_score
int64
2
5
metadata
dict
score
float64
2.31
5.03
source
stringclasses
1 value
text
stringlengths
330
19.3k
num_lines
int64
16
648
avg_line_length
float64
15.5
59.3
max_line_length
int64
37
179
ast_depth
int64
8
38
length
int64
102
3.79k
lang
stringclasses
1 value
sast_codeql_findings
stringlengths
1.11k
276k
sast_codeql_findings_count
int64
1
33
sast_codeql_success
bool
1 class
sast_codeql_error
stringclasses
1 value
cwe_ids
listlengths
1
33
rule_ids
listlengths
1
33
confidences
listlengths
1
33
severities
listlengths
1
33
messages
listlengths
1
33
line_starts
listlengths
1
33
line_ends
listlengths
1
33
column_starts
listlengths
1
33
column_ends
listlengths
1
33
2024-11-18T18:05:45.004802+00:00
1,553,968,313,000
3d4e3f0ca608cdd90cf10c1b9ff48162f1894a9c
3
{ "blob_id": "3d4e3f0ca608cdd90cf10c1b9ff48162f1894a9c", "branch_name": "refs/heads/master", "committer_date": 1553968313000, "content_id": "a401326a18810b96c3f274a9ca12b3d5b36fbe8f", "detected_licenses": [ "MIT" ], "directory_id": "8f501d223fa7942a7994cd5b7788626386bbe1ea", "extension": "py", "fi...
2.765625
stackv2
# source: https://github.com/django/django/blob/master/django/utils/crypto.py """ Django's standard crypto functions and utilities. """ import hashlib import hmac import random import time from .encoding import force_bytes # Use the system PRNG if possible try: random = random.SystemRandom() using_sysrandom ...
51
31.86
80
11
389
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_5c97c29f46b37af3_d1c117d7", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecu...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (secret)](1) is used in a hashing algorithm (SHA1) that is insecure." ]
[ 40 ]
[ null ]
[ 24 ]
[ 41 ]
2024-11-18T17:59:50.046779+00:00
1,615,907,232,000
01084f06b39e2d2826c60957ddea543d9fa415b8
2
{ "blob_id": "01084f06b39e2d2826c60957ddea543d9fa415b8", "branch_name": "refs/heads/main", "committer_date": 1615907232000, "content_id": "21d166092b92f28e40e5a9c7662af377182a072a", "detected_licenses": [ "MIT" ], "directory_id": "092e765a9b389c664dca59380ebe54b9c6f06eb9", "extension": "py", "file...
2.34375
stackv2
from django.contrib import messages from django.contrib.auth.mixins import LoginRequiredMixin from django.contrib.auth.models import User from django.core.exceptions import ObjectDoesNotExist from django.db.models import Q from django.http import HttpResponseRedirect, HttpResponse from django.shortcuts import render, g...
100
45.97
126
18
917
python
[{"finding_id": "codeql_py/url-redirection_18d5d6f3944ca351_9d8e58df", "tool_name": "codeql", "rule_id": "py/url-redirection", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "Untrusted URL redirection depends on a [user-provided value](1).", "remediation": "", "location": {"file_...
4
true
[ "CWE-601", "CWE-601", "CWE-601", "CWE-601" ]
[ "py/url-redirection", "py/url-redirection", "py/url-redirection", "py/url-redirection" ]
[ "HIGH", "HIGH", "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM", "MEDIUM", "MEDIUM" ]
[ "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1).", "Untrusted URL redirection depends on a [user-provided value](1)." ]
[ 31, 42, 54, 60 ]
[ null, null, null, null ]
[ 37, 45, 45, 37 ]
[ 83, 67, 67, 59 ]
2024-11-18T18:15:57.272236+00:00
1,691,805,577,000
c584aeb9eee7152f7013f4c60283abb4aa4596b1
2
{ "blob_id": "c584aeb9eee7152f7013f4c60283abb4aa4596b1", "branch_name": "refs/heads/main", "committer_date": 1691805577000, "content_id": "098abe8f9a366ea7291b5f2863e0f7e2b5417407", "detected_licenses": [ "Unlicense" ], "directory_id": "3eaef0fa3c0be14c47c6aa1e1fcfc51ccebe65c7", "extension": "py", ...
2.390625
stackv2
r"""Duplicate sensor detection and removal. ______ __ __ __ ______ __ __ | _ \ .--.--.-----| |__.----.---.-| |_.-----. | _ \ .-----| |_.-----.----| |_.-----.----. |. | \| | | _ | | | __| _ | _| -__| |. | \| -__| _| -__| __| _| ...
203
40.79
99
18
1,857
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_ff59f3c6883db191_d086784b", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (private)](1) as clear text.",...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (private)](1) as clear text." ]
[ 93 ]
[ null ]
[ 29 ]
[ 39 ]
2024-11-18T18:16:00.896196+00:00
1,586,974,776,000
47b319fa4a07e0dad76820e360420cfbdcc7997b
3
{ "blob_id": "47b319fa4a07e0dad76820e360420cfbdcc7997b", "branch_name": "refs/heads/master", "committer_date": 1586974776000, "content_id": "52f4b1c998369de71a9d8a92e708d54f8849d700", "detected_licenses": [ "MIT" ], "directory_id": "72f1cb7b9aed9ab1e56265c845597f3340dcfe13", "extension": "py", "fi...
2.859375
stackv2
import glob import re import jinja2 import ruamel.yaml as yaml import config _CREDITS_TEMPLATE = """\ # {{country.flag}} Photo credits for flags of {{country.name}} ({{country.code}}) {% if photos is iterable -%} {% for photo in photos %} - `{{photo.filename}}` by {{photo.author}}, licensed under the {{photo.l...
40
28.3
116
12
293
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_3087dcf1815ccec3_7bf127fe", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 34 ]
[ null ]
[ 20 ]
[ 54 ]
2024-11-18T18:16:04.377861+00:00
1,502,960,296,000
cecf676ef046a59b8886f2aa61056d5b8398dc2e
2
{ "blob_id": "cecf676ef046a59b8886f2aa61056d5b8398dc2e", "branch_name": "refs/heads/master", "committer_date": 1502960296000, "content_id": "6b184b19b9e5ab5f01e13c3a4939dc38e5999d42", "detected_licenses": [ "MIT" ], "directory_id": "36f9164a673978f204640ee0111fe694a938f2f4", "extension": "py", "fi...
2.4375
stackv2
from scapy.all import * import paho.mqtt.client as paho import ssl import configparser import sys #Variables confFile = "/home/matt/amazondash/amazonDash.conf" stateFile = "/home/matt/amazondash/amazonDash.state" ca_certs = "/etc/ssl/certs/ca-certificates.crt" #Read details from the config file config = configparser...
123
25.29
149
18
843
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_96c9761245ced203_67323f10", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.\nT...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text.\nThis expression logs [sensitive data (password)](2) as clear text." ]
[ 35 ]
[ null ]
[ 18 ]
[ 26 ]
2024-11-18T19:31:08.589377+00:00
1,556,187,390,000
c75b7931bc71cc98f4846d61b353a6ee9d0daa4b
4
{ "blob_id": "c75b7931bc71cc98f4846d61b353a6ee9d0daa4b", "branch_name": "refs/heads/master", "committer_date": 1556187390000, "content_id": "1ed90b3772dc1989722f87d0a02e928feae5d9c3", "detected_licenses": [ "Apache-2.0" ], "directory_id": "66bacb0f67d6fa46159f33597b93d5a6eda48bd0", "extension": "py"...
3.578125
stackv2
class Viewer(): """ 유저 인터페이스 출력 클래스 """ # 고객 정보 조회 출력 함수 def get_inform(self, information, index=0): print('') print('이 름 : ', information[index].get('name')) print('성 별 : ', information[index].get('gender')) print('이 메 일 : ', information[index].get('email'))...
103
21.17
61
15
713
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c999f8ed37b0f282_e212fdcf", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.", "...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text." ]
[ 12 ]
[ null ]
[ 28 ]
[ 60 ]
2024-11-18T20:08:54.565073+00:00
1,525,089,413,000
753d20872d14751e0a88dc11fc6d9394161b6e8d
3
{ "blob_id": "753d20872d14751e0a88dc11fc6d9394161b6e8d", "branch_name": "refs/heads/master", "committer_date": 1525089413000, "content_id": "012f84964862b2fb88742c9fb0890024be4660ed", "detected_licenses": [ "BSD-2-Clause" ], "directory_id": "3e5bd6d7e6c595dfcdc47f811a91a8bc6c09711b", "extension": "p...
2.859375
stackv2
import requests import logging logger = logging.getLogger('oofy') class GeoInfo(): def __init__(self, listing): self.listing = listing self.latitude = self.listing.latitude self.longitude = self.listing.longitude self.loc_info = self.geo_reverse() # given latitude and longitu...
83
30.86
114
17
606
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_3cb95cd71c59be18_f8b64d36", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (private)](1) as clear text.\nTh...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (private)](1) as clear text.\nThis expression logs [sensitive data (private)](2) as clear text." ]
[ 78 ]
[ null ]
[ 27 ]
[ 113 ]
2024-11-18T18:59:38.100234+00:00
1,427,123,616,000
42b1bcd91a708b49b2ad414881d1e79f7dc3dc7f
2
{ "blob_id": "42b1bcd91a708b49b2ad414881d1e79f7dc3dc7f", "branch_name": "refs/heads/master", "committer_date": 1427123616000, "content_id": "978f944bfcdb6128a3733a00f63c8db5ccd84235", "detected_licenses": [ "MIT" ], "directory_id": "4ebbee444bc2f3592e240976297f118bb3bcabd2", "extension": "py", "fi...
2.5
stackv2
import requests import ssl import os.path import json from requests.adapters import HTTPAdapter from requests.packages.urllib3.poolmanager import PoolManager from google import search from urlparse import urlparse from bs4 import BeautifulSoup from blessings import Terminal state_file = 'mdid_stats.json' requests.pac...
138
29.9
77
17
965
python
[{"finding_id": "codeql_py/request-without-cert-validation_4536c9ea5f52b291_07475525", "tool_name": "codeql", "rule_id": "py/request-without-cert-validation", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "This request may run without certificate validation because [it is disabled]...
1
true
[ "CWE-295" ]
[ "py/request-without-cert-validation" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This request may run without certificate validation because [it is disabled](1)." ]
[ 44 ]
[ null ]
[ 17 ]
[ 41 ]
2024-11-18T19:11:48.379666+00:00
1,600,207,697,000
09b53a5530feee41a34389a7c71fb7ec060a9e98
2
{ "blob_id": "09b53a5530feee41a34389a7c71fb7ec060a9e98", "branch_name": "refs/heads/master", "committer_date": 1600207697000, "content_id": "96bb09aac4bb8c1f06759a557a1248c22e370917", "detected_licenses": [ "MIT" ], "directory_id": "65811f371a448a1a1d94255588d71db537621e4c", "extension": "py", "fi...
2.375
stackv2
import praw from dotenv import load_dotenv; load_dotenv() import os import time from scraping import get_images from processing import detect_image_repost def main(): reddit = praw.Reddit(client_id=os.getenv('CLIENT_ID'), client_secret=os.getenv('CLIENT_SECRET'), user_agent=...
26
34.58
88
13
193
python
[{"finding_id": "codeql_py/incomplete-url-substring-sanitization_8c43bc9952a16b4b_b30863b6", "tool_name": "codeql", "rule_id": "py/incomplete-url-substring-sanitization", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "The string [https://i.redd.it](1) may be at an arbitrary position ...
2
true
[ "CWE-020", "CWE-020" ]
[ "py/incomplete-url-substring-sanitization", "py/incomplete-url-substring-sanitization" ]
[ "HIGH", "HIGH" ]
[ "MEDIUM", "MEDIUM" ]
[ "The string [https://i.redd.it](1) may be at an arbitrary position in the sanitized URL.", "The string [https://i.imgur.com](1) may be at an arbitrary position in the sanitized URL." ]
[ 22, 22 ]
[ null, null ]
[ 12, 51 ]
[ 47, 88 ]
2024-11-18T19:34:37.555042+00:00
1,669,146,016,000
89ce2347f47b3d5fd85ba9774a91355bd6af1c7c
2
{ "blob_id": "89ce2347f47b3d5fd85ba9774a91355bd6af1c7c", "branch_name": "refs/heads/main", "committer_date": 1669146016000, "content_id": "4984acc3f8eff05966855f8307a380cf27c038ea", "detected_licenses": [ "MIT" ], "directory_id": "895a7638653a191d704d4740672a7f6211eb9d1d", "extension": "py", "file...
2.4375
stackv2
""" Build SSW scripts from Jinja 2 templates """ import os import datetime import pathlib import subprocess import tempfile import jinja2 from scipy.io import readsav from .filters import string_list_filter from .read_config import defaults from .util import SSWIDLError, IDLLicenseError from .filters import * class...
204
40.01
97
19
1,833
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_ca0fddc699b84e91_a6288152", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
1
true
[ "CWE-079" ]
[ "py/jinja2/autoescape-false" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 58 ]
[ null ]
[ 20 ]
[ 89 ]
2024-11-18T19:34:37.612903+00:00
1,625,573,774,000
798dfb6381a0d5ba653f52d20b559d6d11a9ecb8
3
{ "blob_id": "798dfb6381a0d5ba653f52d20b559d6d11a9ecb8", "branch_name": "refs/heads/master", "committer_date": 1625573774000, "content_id": "c4e8c3fd0f7118239452679411db41c635295609", "detected_licenses": [ "MIT" ], "directory_id": "c822c02381fd78198cbd79fdd729efe83ccf3bde", "extension": "py", "fi...
2.828125
stackv2
import json # to encode items as JSON from source.models.EventModel import EventModel from source.models.NewsModel import NewsModel import jinja2 from icalendar import Calendar, Event from datetime import datetime from source.Constants import * class NewsFeedView: def __init__(self): self.loader = jinja...
223
43.31
115
16
1,955
python
[{"finding_id": "codeql_py/jinja2/autoescape-false_d488871e9984e8ff_740d00eb", "tool_name": "codeql", "rule_id": "py/jinja2/autoescape-false", "finding_type": "problem", "severity": "medium", "confidence": "medium", "message": "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "remediati...
2
true
[ "CWE-079", "CWE-079" ]
[ "py/jinja2/autoescape-false", "py/jinja2/autoescape-false" ]
[ "MEDIUM", "MEDIUM" ]
[ "MEDIUM", "MEDIUM" ]
[ "Using jinja2 templates with autoescape=False can potentially allow XSS attacks.", "Using jinja2 templates with autoescape=False can potentially allow XSS attacks." ]
[ 15, 16 ]
[ null, null ]
[ 21, 20 ]
[ 64, 58 ]
2024-11-18T18:39:58.363900+00:00
1,555,870,617,000
8d1319617a21056d10a7a03ded42bc33c885d286
3
{ "blob_id": "8d1319617a21056d10a7a03ded42bc33c885d286", "branch_name": "refs/heads/master", "committer_date": 1555870617000, "content_id": "04a988be77e065fe450ea4932b1da47d9e987504", "detected_licenses": [ "MIT" ], "directory_id": "475cd7f3d823a8f896c7919c045348b21c7726a8", "extension": "py", "fi...
2.71875
stackv2
#!/usr/bin/env python3 import re import sys from svg.path import parse_path # Limit decimals. The OP-1 supports up to 4 decimals def fix_decimals(pat): text = pat.group(1) text = "." + text[:4] return text # Inkscape (and others) store SVG properties in the style attribute instead of # using a real at...
163
22.95
109
13
1,099
python
[{"finding_id": "codeql_py/bad-tag-filter_396c81f6c59b06d3_2c7160c7", "tool_name": "codeql", "rule_id": "py/bad-tag-filter", "finding_type": "problem", "severity": "medium", "confidence": "high", "message": "This regular expression does not match comments containing newlines.", "remediation": "", "location": {"file_pat...
1
true
[ "CWE-116" ]
[ "py/bad-tag-filter" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This regular expression does not match comments containing newlines." ]
[ 133 ]
[ null ]
[ 25 ]
[ 35 ]
2024-11-18T18:40:06.036367+00:00
1,433,633,162,000
632d14442cc5f1699354fcb47a5ba3e4ea665846
2
{ "blob_id": "632d14442cc5f1699354fcb47a5ba3e4ea665846", "branch_name": "refs/heads/master", "committer_date": 1433633162000, "content_id": "f660326dee20552b40634553ac416309aea101f6", "detected_licenses": [ "MIT" ], "directory_id": "56c338ec0f98f81886be140513b623ee0af55377", "extension": "py", "fi...
2.453125
stackv2
__author__ = 'beast' import base64, hashlib, random from signals import post_save_activity import redis class Store(object): def __init__(self, host="localhost", port=6379): self.r = redis.StrictRedis(host=host, port=port, db=0) self.user_id = None def close(self): pass def logi...
137
23.55
105
19
787
python
[{"finding_id": "codeql_py/weak-sensitive-data-hashing_fc1d8d2e0361c8d5_d909f0fd", "tool_name": "codeql", "rule_id": "py/weak-sensitive-data-hashing", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is in...
1
true
[ "CWE-327" ]
[ "py/weak-sensitive-data-hashing" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "[Sensitive data (password)](1) is used in a hashing algorithm (SHA256) that is insecure for password hashing, since it is not a computationally expensive hash function." ]
[ 41 ]
[ null ]
[ 71 ]
[ 86 ]
2024-11-18T18:40:08.684886+00:00
1,556,970,572,000
d1423e864da501f4846914b8d872647553c9b197
3
{ "blob_id": "d1423e864da501f4846914b8d872647553c9b197", "branch_name": "refs/heads/master", "committer_date": 1556970572000, "content_id": "83a7ee297ff6d9dc32cfb3c18ed864e642f745f2", "detected_licenses": [ "MIT" ], "directory_id": "043ec7d1a8e2959e8d322f67129143a159d8bad1", "extension": "py", "fi...
2.609375
stackv2
import requests import tarfile import os import json def download_pkg(pkg): print('==> Collecting %s' % pkg) url = "https://pypi.org/pypi/%s/json" % pkg meta_data = requests.get(url).json() link = meta_data['urls'][0]['url'] pkg_name = link.split('/')[-1] print(' -> Downloding %s' % link) ...
36
24.53
65
16
264
python
[{"finding_id": "codeql_py/tarslip_cd423f153df73bcd_f96ee9ca", "tool_name": "codeql", "rule_id": "py/tarslip", "finding_type": "path-problem", "severity": "medium", "confidence": "medium", "message": "This file extraction depends on a [potentially untrusted source](1).", "remediation": "", "location": {"file_path": "un...
1
true
[ "CWE-022" ]
[ "py/tarslip" ]
[ "MEDIUM" ]
[ "MEDIUM" ]
[ "This file extraction depends on a [potentially untrusted source](1)." ]
[ 25 ]
[ null ]
[ 5 ]
[ 6 ]
2024-11-18T20:52:24.111939+00:00
1,557,245,733,000
ac2cb1b3a7bc417b8ab830a034b708d295381570
3
{ "blob_id": "ac2cb1b3a7bc417b8ab830a034b708d295381570", "branch_name": "refs/heads/master", "committer_date": 1557245733000, "content_id": "6ef04a4dc867b62716e0e49d5c858477f881cea8", "detected_licenses": [ "MIT" ], "directory_id": "91839aae0e9bd4d150159c668d866e21e68f0732", "extension": "py", "fi...
2.515625
stackv2
#!/usr/bin/env python3 #------------------------------------------------------------------------------- # Name: Nalanda Downloader # Purpose: Download course files from BITS Pilani's LMS # Author: Naveen Unnikrishnan # Created: 19/07/2018 #-----------------------------------------------------------...
396
30.66
139
29
3,126
python
[{"finding_id": "codeql_py/clear-text-logging-sensitive-data_c7630697852696cb_35a3dc77", "tool_name": "codeql", "rule_id": "py/clear-text-logging-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression logs [sensitive data (password)](1) as clear text.", ...
1
true
[ "CWE-312" ]
[ "py/clear-text-logging-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression logs [sensitive data (password)](1) as clear text." ]
[ 95 ]
[ null ]
[ 9 ]
[ 12 ]
2024-11-18T20:15:50.343566+00:00
1,587,765,242,000
5d30fa798aa3b3caf28272339b88a2de9d4db2a0
2
{ "blob_id": "5d30fa798aa3b3caf28272339b88a2de9d4db2a0", "branch_name": "refs/heads/master", "committer_date": 1587765242000, "content_id": "917fddc92d60d9548c5565b63834f38db019c421", "detected_licenses": [ "MIT" ], "directory_id": "cc94882f11e75a1c889113280eb9a28dd52552f7", "extension": "py", "fi...
2.5
stackv2
import mechanize import re import requests import time import random def saveEmail(email): file = open('emailCreation.txt','w') file.write(email) file.close() def openEmail(): file = open('emailCreation.txt','r') email = file.read() file.close() return email def getRandomName(): global randomLastName...
140
26.59
131
13
1,123
python
[{"finding_id": "codeql_py/clear-text-storage-sensitive-data_83b5eb33d4a0c474_1a1ec9cb", "tool_name": "codeql", "rule_id": "py/clear-text-storage-sensitive-data", "finding_type": "path-problem", "severity": "medium", "confidence": "high", "message": "This expression stores [sensitive data (password)](1) as clear text."...
1
true
[ "CWE-312" ]
[ "py/clear-text-storage-sensitive-data" ]
[ "HIGH" ]
[ "MEDIUM" ]
[ "This expression stores [sensitive data (password)](1) as clear text." ]
[ 119 ]
[ null ]
[ 14 ]
[ 22 ]
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
-