Skip to content

Conversation

krokoko
Copy link
Contributor

@krokoko krokoko commented Oct 10, 2025

Fixes

Summary

Changes

Please provide a summary of what's being changed

User experience

Please share what the user experience looks like before and after this change

Checklist

If your change doesn't seem to apply, please leave them unchecked.

  • I have reviewed the contributing guidelines
  • I have performed a self-review of this change
  • Changes have been tested
  • Changes are documented

Is this a breaking change? (Y/N)

RFC issue number:

Checklist:

  • Migration process documented
  • Implement warnings (if it can live side by side)

Acknowledgment

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of the project license.

validate_asset_id(asset_id)
return f"""
query = ( # nosec B608 - safe: asset_id is validated, length limit, no direct execution
f"""

Check warning

Code scanning / Bandit

Possible SQL injection vector through string-based query construction. Warning

Possible SQL injection vector through string-based query construction.
validate_string_for_injection(time_range)
return f"""
query = ( # nosec B608 - safe: exploration_goal, time_range are validated
f"""

Check warning

Code scanning / Bandit

Possible SQL injection vector through string-based query construction. Warning

Possible SQL injection vector through string-based query construction.

# Use the paginate_aws_response utility for consistent pagination
all_coverages, pagination_metadata = await paginate_aws_response(
all_coverages, pagination_metadata = await paginate_aws_response( # nosec B105: paginate_aws_response is used for pagination

Check notice

Code scanning / Bandit

Possible hardcoded password: 'NextPageToken' Note

Possible hardcoded password: 'NextPageToken'

# Use the paginate_aws_response utility for consistent pagination
all_utilizations, pagination_metadata = await paginate_aws_response(
all_utilizations, pagination_metadata = await paginate_aws_response( # nosec B105: paginate_aws_response is used for pagination

Check notice

Code scanning / Bandit

Possible hardcoded password: 'NextPageToken' Note

Possible hardcoded password: 'NextPageToken'

# Use the paginate_aws_response utility for consistent pagination
all_coverages, pagination_metadata = await paginate_aws_response(
all_coverages, pagination_metadata = await paginate_aws_response( # nosec B105: paginate_aws_response is used for pagination

Check notice

Code scanning / Bandit

Possible hardcoded password: 'NextToken' Note

Possible hardcoded password: 'NextToken'

# Use the paginate_aws_response utility for consistent pagination
all_utilizations, pagination_metadata = await paginate_aws_response(
all_utilizations, pagination_metadata = await paginate_aws_response( # nosec B105: paginate_aws_response is used for pagination

Check notice

Code scanning / Bandit

Possible hardcoded password: 'NextToken' Note

Possible hardcoded password: 'NextToken'

# Use the paginate_aws_response utility for consistent pagination
all_details, pagination_metadata = await paginate_aws_response(
all_details, pagination_metadata = await paginate_aws_response( # nosec B105: paginate_aws_response is used for pagination

Check notice

Code scanning / Bandit

Possible hardcoded password: 'NextToken' Note

Possible hardcoded password: 'NextToken'
try:
# Check if Checkov is available
subprocess.run(
subprocess.run( # nosec B603: uses shell=False, inputs are validated, safe file operations, only subprocess calls

Check notice

Code scanning / Bandit

Starting a process with a partial executable path Note

Starting a process with a partial executable path
Comment on lines +120 to +122
exec( # nosec B102 - These exec calls are necessary to import modules in the namespace
'from diagrams import Diagram, Cluster, Edge', namespace
) # nosem: python.lang.security.audit.exec-detected.exec-detected
# nosec B102 - These exec calls are necessary to import modules in the namespace
exec( # nosem: python.lang.security.audit.exec-detected.exec-detected
)

Check warning

Code scanning / Semgrep OSS

Semgrep Finding: python.lang.security.audit.exec-detected.exec-detected Warning

Detected the use of exec(). exec() can be dangerous if used to evaluate dynamic content. If this content can be input from outside the program, this may be a code injection vulnerability. Ensure evaluated content is not definable by external sources.
Comment on lines +247 to +249

Check warning

Code scanning / Semgrep OSS

Semgrep Finding: python.lang.security.audit.exec-detected.exec-detected Warning

Detected the use of exec(). exec() can be dangerous if used to evaluate dynamic content. If this content can be input from outside the program, this may be a code injection vulnerability. Ensure evaluated content is not definable by external sources.

Check warning

Code scanning / Semgrep OSS

Semgrep Finding: python.lang.security.audit.exec-detected.exec-detected Warning

Detected the use of exec(). exec() can be dangerous if used to evaluate dynamic content. If this content can be input from outside the program, this may be a code injection vulnerability. Ensure evaluated content is not definable by external sources.
@krokoko krokoko marked this pull request as draft October 10, 2025 20:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

Status: To triage

Development

Successfully merging this pull request may close these issues.

1 participant