Skip to content

Bump net.bytebuddy:byte-buddy-agent from 1.14.6 to 1.14.7 #997

Bump net.bytebuddy:byte-buddy-agent from 1.14.6 to 1.14.7

Bump net.bytebuddy:byte-buddy-agent from 1.14.6 to 1.14.7 #997

Status Success
Total duration 4m 6s
Artifacts

test_action.yml

on: push
Execute the pycharm-security action
3m 53s
Execute the pycharm-security action
Fit to window
Zoom out
Zoom in

Annotations

30 warnings
Execute the pycharm-security action
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
Execute the pycharm-security action: file:///github/workspace/test_jinja2.py#L8
Redeclared 'env' defined above without usage
Execute the pycharm-security action: file:///github/workspace/test_jinja2.py#L10
Redeclared 'env' defined above without usage
Execute the pycharm-security action: file:///github/workspace/test_jinja2.py#L15
Redeclared 'env' defined above without usage
Execute the pycharm-security action: file:///github/workspace/test_xmlrpc.py#L17
Unexpected type(s): (Union[(__base: _SupportsPow3[_E, _M, _T_co], __exp: _E, __mod: _M) -> _T_co, (__base: _SupportsPow2[_E, _T_co], __exp: _E) -> _T_co, (__base: float, __exp: float, __mod: None) -> float, (__base: int, __exp: int, __mod: int) -> int, (__base: int, __exp: int, __mod: None) -> Any, (base: _SupportsPow3[_E, _M, _T_co], exp: _E, mod: _M) -> _T_co, (base: _SupportsPow2[_E, _T_co], exp: _E) -> _T_co, (base: float, exp: float, mod: None) -> float, (base: int, exp: int, mod: int) -> int, (base: int, exp: int, mod: None) -> Any]) Possible type(s): (Union[_DispatchArity0, _DispatchArity1, _DispatchArity2, _DispatchArity3, _DispatchArity4, _DispatchArityN, None]) (Union[_DispatchArity0, _DispatchArity1, _DispatchArity2, _DispatchArity3, _DispatchArity4, _DispatchArityN])
Execute the pycharm-security action: file:///github/workspace/test_xmlrpc.py#L22
Unexpected type(s): ((x: {__add__}, y: Any) -> Any, str) Possible type(s): (Union[_DispatchArity0, _DispatchArity1, _DispatchArity2, _DispatchArity3, _DispatchArity4, _DispatchArityN, None], Optional[str]) (Union[_DispatchArity0, _DispatchArity1, _DispatchArity2, _DispatchArity3, _DispatchArity4, _DispatchArityN], Optional[str])
Execute the pycharm-security action
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
Execute the pycharm-security action: file:///github/workspace/test_xmlrpc.py#L30
XML200: Using allow_dotted_names option may allow attackers to execute arbitrary code. Found in 'server.register_instance(MyFuncs(), True)'.
Execute the pycharm-security action: file:///github/workspace/test_sqli.py#L3
SQL100: Possible SQL injection within String format. Found in 'f"SELECT * FROM users WHERE id = {0}"'.
Execute the pycharm-security action: file:///github/workspace/test_sqli.py#L5
SQL100: Possible SQL injection within String format. Found in '"SELECT * FROM users WHERE id = {0}"'.
Execute the pycharm-security action: file:///github/workspace/test_sqli.py#L7
SQL100: Possible SQL injection within String format. Found in '"SELECT * FROM users WHERE id = {0}"'.
Execute the pycharm-security action: file:///github/workspace/test_sqli.py#L9
SQL100: Possible SQL injection within String format. Found in 'f"UPDATE users SET is_admin = 1 WHERE id = {0}"'.
Execute the pycharm-security action: file:///github/workspace/test_sqli.py#L11
SQL100: Possible SQL injection within String format. Found in 'f"DELETE FROM users WHERE id = {0}"'.
Execute the pycharm-security action: file:///github/workspace/test_sqli.py#L13
SQL100: Possible SQL injection within String format. Found in 'f"INSERT INTO users (id) VALUES ( id = {0} )"'.
Execute the pycharm-security action: file:///github/workspace/test_sqli.py#L15
SQL100: Possible SQL injection within String format. Found in 'f"SELECT * FROM users WHERE id = {0}"'.
Execute the pycharm-security action: file:///github/workspace/test_django.py#L6
SQL100: Possible SQL injection within String format. Found in '"SELECT * FROM myapp_person WHERE last_name = %s"'.
Execute the pycharm-security action
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
Execute the pycharm-security action: file:///github/workspace/test_xmlrpc.py#L30
XML200: Using allow_dotted_names option may allow attackers to execute arbitrary code. Found in 'server.register_instance(MyFuncs(), True)'.
Execute the pycharm-security action: file:///github/workspace/test_sqli.py#L3
SQL100: Possible SQL injection within String format. Found in 'f"SELECT * FROM users WHERE id = {0}"'.
Execute the pycharm-security action: file:///github/workspace/test_sqli.py#L5
SQL100: Possible SQL injection within String format. Found in '"SELECT * FROM users WHERE id = {0}"'.
Execute the pycharm-security action: file:///github/workspace/test_sqli.py#L7
SQL100: Possible SQL injection within String format. Found in '"SELECT * FROM users WHERE id = {0}"'.
Execute the pycharm-security action: file:///github/workspace/test_sqli.py#L9
SQL100: Possible SQL injection within String format. Found in 'f"UPDATE users SET is_admin = 1 WHERE id = {0}"'.
Execute the pycharm-security action: file:///github/workspace/test_sqli.py#L11
SQL100: Possible SQL injection within String format. Found in 'f"DELETE FROM users WHERE id = {0}"'.
Execute the pycharm-security action: file:///github/workspace/test_sqli.py#L13
SQL100: Possible SQL injection within String format. Found in 'f"INSERT INTO users (id) VALUES ( id = {0} )"'.
Execute the pycharm-security action: file:///github/workspace/test_sqli.py#L15
SQL100: Possible SQL injection within String format. Found in 'f"SELECT * FROM users WHERE id = {0}"'.
Execute the pycharm-security action: file:///github/workspace/test_django.py#L6
SQL100: Possible SQL injection within String format. Found in '"SELECT * FROM myapp_person WHERE last_name = %s"'.