Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Tool flow #7

Merged
merged 11 commits into from
Nov 12, 2023
Merged

Tool flow #7

merged 11 commits into from
Nov 12, 2023

Conversation

ZackBradshaw
Copy link
Owner

Thank you for contributing to Swarms!

Replace this comment with:

  • Description: a description of the change,
  • Issue: the issue # it fixes (if applicable),
  • Dependencies: any dependencies required for this change,
  • Tag maintainer: for a quicker response, tag the relevant maintainer (see below),
  • Twitter handle: we announce bigger features on Twitter. If your PR gets announced and you'd like a mention, we'll gladly shout you out!

Please make sure your PR is passing linting and testing before submitting. Run make format, make lint and make test to check this locally.

See contribution guidelines for more information on how to write/run tests, lint, etc:
https://github.com/kyegomez/swarms/blob/master/CONTRIBUTING.md

If you're adding a new integration, please include:

  1. a test for the integration, preferably unit tests that do not rely on network access,
  2. an example notebook showing its use.

Maintainer responsibilities:

If no one reviews your PR within a few days, feel free to email Kye at [email protected]

See contribution guidelines for more information on how to write/run tests, lint, etc: https://github.com/kyegomez/swarms

@ZackBradshaw ZackBradshaw merged commit a9df9d5 into master Nov 12, 2023
6 of 16 checks passed
try:
res = executor({"input": promptedQuery})
except Exception as e:
return {"answer": str(e), "files": []}

Check warning

Code scanning / CodeQL

Information exposure through an exception Medium

Stack trace information
flows to this location and may be exposed to an external user.
def obtain_start_and_end_time_of_anomaly():
# Create SSH client
ssh = paramiko.SSHClient()
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())

Check failure

Code scanning / CodeQL

Accepting unknown SSH host keys when using Paramiko High

Setting missing host key policy to AutoAddPolicy may be unsafe.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant