Bump net.bytebuddy:byte-buddy-agent from 1.14.6 to 1.14.7 #997
Annotations
30 warnings
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
|
file:///github/workspace/test_jinja2.py#L8
Redeclared 'env' defined above without usage
|
file:///github/workspace/test_jinja2.py#L10
Redeclared 'env' defined above without usage
|
file:///github/workspace/test_jinja2.py#L15
Redeclared 'env' defined above without usage
|
file:///github/workspace/test_sqli.py#L1
Shadows built-in name 'id'
|
file:///github/workspace/test_xmlrpc.py#L17
Unexpected type(s): (Union[(__base: _SupportsPow3[_E, _M, _T_co], __exp: _E, __mod: _M) -> _T_co, (__base: _SupportsPow2[_E, _T_co], __exp: _E) -> _T_co, (__base: float, __exp: float, __mod: None) -> float, (__base: int, __exp: int, __mod: int) -> int, (__base: int, __exp: int, __mod: None) -> Any, (base: _SupportsPow3[_E, _M, _T_co], exp: _E, mod: _M) -> _T_co, (base: _SupportsPow2[_E, _T_co], exp: _E) -> _T_co, (base: float, exp: float, mod: None) -> float, (base: int, exp: int, mod: int) -> int, (base: int, exp: int, mod: None) -> Any]) Possible type(s): (Union[_DispatchArity0, _DispatchArity1, _DispatchArity2, _DispatchArity3, _DispatchArity4, _DispatchArityN, None]) (Union[_DispatchArity0, _DispatchArity1, _DispatchArity2, _DispatchArity3, _DispatchArity4, _DispatchArityN])
|
file:///github/workspace/test_xmlrpc.py#L22
Unexpected type(s): ((x: {__add__}, y: Any) -> Any, str) Possible type(s): (Union[_DispatchArity0, _DispatchArity1, _DispatchArity2, _DispatchArity3, _DispatchArity4, _DispatchArityN, None], Optional[str]) (Union[_DispatchArity0, _DispatchArity1, _DispatchArity2, _DispatchArity3, _DispatchArity4, _DispatchArityN], Optional[str])
|
file:///github/workspace/test_ssl.py#L3
Parameter 'sock' unfilled
|
file:///github/workspace/test_ssl.py#L6
Parameter 'sock' unfilled
|
file:///github/workspace/test_shell.py#L24
Parameter '__source' unfilled
|
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
|
file:///github/workspace/test_xmlrpc.py#L30
XML200: Using allow_dotted_names option may allow attackers to execute arbitrary code. Found in 'server.register_instance(MyFuncs(), True)'.
|
file:///github/workspace/test_sqli.py#L3
SQL100: Possible SQL injection within String format. Found in 'f"SELECT * FROM users WHERE id = {0}"'.
|
file:///github/workspace/test_sqli.py#L5
SQL100: Possible SQL injection within String format. Found in '"SELECT * FROM users WHERE id = {0}"'.
|
file:///github/workspace/test_sqli.py#L7
SQL100: Possible SQL injection within String format. Found in '"SELECT * FROM users WHERE id = {0}"'.
|
file:///github/workspace/test_sqli.py#L9
SQL100: Possible SQL injection within String format. Found in 'f"UPDATE users SET is_admin = 1 WHERE id = {0}"'.
|
file:///github/workspace/test_sqli.py#L11
SQL100: Possible SQL injection within String format. Found in 'f"DELETE FROM users WHERE id = {0}"'.
|
file:///github/workspace/test_sqli.py#L13
SQL100: Possible SQL injection within String format. Found in 'f"INSERT INTO users (id) VALUES ( id = {0} )"'.
|
file:///github/workspace/test_sqli.py#L15
SQL100: Possible SQL injection within String format. Found in 'f"SELECT * FROM users WHERE id = {0}"'.
|
file:///github/workspace/test_django.py#L6
SQL100: Possible SQL injection within String format. Found in '"SELECT * FROM myapp_person WHERE last_name = %s"'.
|
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
|
file:///github/workspace/test_xmlrpc.py#L30
XML200: Using allow_dotted_names option may allow attackers to execute arbitrary code. Found in 'server.register_instance(MyFuncs(), True)'.
|
file:///github/workspace/test_sqli.py#L3
SQL100: Possible SQL injection within String format. Found in 'f"SELECT * FROM users WHERE id = {0}"'.
|
file:///github/workspace/test_sqli.py#L5
SQL100: Possible SQL injection within String format. Found in '"SELECT * FROM users WHERE id = {0}"'.
|
file:///github/workspace/test_sqli.py#L7
SQL100: Possible SQL injection within String format. Found in '"SELECT * FROM users WHERE id = {0}"'.
|
file:///github/workspace/test_sqli.py#L9
SQL100: Possible SQL injection within String format. Found in 'f"UPDATE users SET is_admin = 1 WHERE id = {0}"'.
|
file:///github/workspace/test_sqli.py#L11
SQL100: Possible SQL injection within String format. Found in 'f"DELETE FROM users WHERE id = {0}"'.
|
file:///github/workspace/test_sqli.py#L13
SQL100: Possible SQL injection within String format. Found in 'f"INSERT INTO users (id) VALUES ( id = {0} )"'.
|
file:///github/workspace/test_sqli.py#L15
SQL100: Possible SQL injection within String format. Found in 'f"SELECT * FROM users WHERE id = {0}"'.
|
file:///github/workspace/test_django.py#L6
SQL100: Possible SQL injection within String format. Found in '"SELECT * FROM myapp_person WHERE last_name = %s"'.
|
The logs for this run have expired and are no longer available.
Loading