-
Notifications
You must be signed in to change notification settings - Fork 94
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Address bandit-flagged security issues. #2872
Comments
@MartinRyan - please assign yourself to this issue once you've accepted the Cylc org invite. |
I've accepted the invite Hilary, but it looks like I don't have permissions to assign myself to the issue |
OK, not sure why that is, but I've assigned you now! (And thanks for taking this on). |
(note that to play around with this stuff you can tell codacy to analyze your own cylc fork ... as well as use bandit yourself, of course). |
FWIW, I tried something similar some time ago, but I think I never got to wait for Codacy's feedback (which may take several minutes or hours depending on their resources available I think). https://github.com/kinow/cylc/commits/codacy-exclusions It was tricky finding where the Using Codacy from your own branch is definitely the way to go, as you can log in to Codacy and poke around in your own account/space too. |
Fixed by #2998. |
Thanks @matthewrmshin ! |
Codacy runs the bandit static analysis tool to flag potential security issues. Most - maybe all - of these need to be ignored non-gratuitously. Bandit supports a special
#nosec
in-source comment for this purpose.We should:
#nosec
commentand if it does:
#nosec
comment@jarich also suggested, in some cases we may also be able to add a regex character-range test (say) to enforce the presumed content of subprocess (say) string arguments, e.g. to disallow shell
$
chars etc.The text was updated successfully, but these errors were encountered: