You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The list below presents the 10 most relevant findings that need your attention. To view information on the remaining findings, navigate to the Mend Application.
Code Security Report
Scan Metadata
Latest Scan: 2024-11-27 12:47am
Total Findings: 37 | New Findings: 0 | Resolved Findings: 0
Tested Project Files: 62
Detected Programming Languages: 2 (Python, JavaScript / TypeScript*)
Most Relevant Findings
CWE-78
setup.py:19
Vulnerable Code
seeq-mps/setup.py
Lines 14 to 19 in 78f8a9a
1 Data Flow/s detected
seeq-mps/setup.py
Line 11 in 78f8a9a
seeq-mps/setup.py
Line 12 in 78f8a9a
seeq-mps/setup.py
Line 19 in 78f8a9a
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Command Injection Training
● Videos
▪ Secure Code Warrior Command Injection Video
● Further Reading
▪ OWASP testing for Command Injection
▪ OWASP Command Injection
🏴 Suppress Finding
CWE-472
examples.html:46
Vulnerable Code
seeq-mps/docs/examples.html
Line 46 in 78f8a9a
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Hidden HTML Input Training
● Videos
▪ Secure Code Warrior Hidden HTML Input Video
● Further Reading
▪ OWASP Top Ten Mobile Risks 2014 M8: Security Decisions Via Untrusted Inputs
🏴 Suppress Finding
CWE-472
examples.html:45
Vulnerable Code
seeq-mps/docs/examples.html
Line 45 in 78f8a9a
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Hidden HTML Input Training
● Videos
▪ Secure Code Warrior Hidden HTML Input Video
● Further Reading
▪ OWASP Top Ten Mobile Risks 2014 M8: Security Decisions Via Untrusted Inputs
🏴 Suppress Finding
CWE-472
py-modindex.html:45
Vulnerable Code
seeq-mps/docs/py-modindex.html
Line 45 in 78f8a9a
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Hidden HTML Input Training
● Videos
▪ Secure Code Warrior Hidden HTML Input Video
● Further Reading
▪ OWASP Top Ten Mobile Risks 2014 M8: Security Decisions Via Untrusted Inputs
🏴 Suppress Finding
CWE-472
user_guide.html:46
Vulnerable Code
seeq-mps/docs/user_guide.html
Line 46 in 78f8a9a
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Hidden HTML Input Training
● Videos
▪ Secure Code Warrior Hidden HTML Input Video
● Further Reading
▪ OWASP Top Ten Mobile Risks 2014 M8: Security Decisions Via Untrusted Inputs
🏴 Suppress Finding
CWE-472
_mps.html:34
Vulnerable Code
seeq-mps/docs/_modules/seeq/addons/mps/_mps.html
Line 34 in 78f8a9a
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Hidden HTML Input Training
● Videos
▪ Secure Code Warrior Hidden HTML Input Video
● Further Reading
▪ OWASP Top Ten Mobile Risks 2014 M8: Security Decisions Via Untrusted Inputs
🏴 Suppress Finding
CWE-472
genindex.html:43
Vulnerable Code
seeq-mps/docs/genindex.html
Line 43 in 78f8a9a
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Hidden HTML Input Training
● Videos
▪ Secure Code Warrior Hidden HTML Input Video
● Further Reading
▪ OWASP Top Ten Mobile Risks 2014 M8: Security Decisions Via Untrusted Inputs
🏴 Suppress Finding
CWE-472
index.html:45
Vulnerable Code
seeq-mps/docs/index.html
Line 45 in 78f8a9a
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Hidden HTML Input Training
● Videos
▪ Secure Code Warrior Hidden HTML Input Video
● Further Reading
▪ OWASP Top Ten Mobile Risks 2014 M8: Security Decisions Via Untrusted Inputs
🏴 Suppress Finding
CWE-472
docstrings.html:46
Vulnerable Code
seeq-mps/docs/docstrings.html
Line 46 in 78f8a9a
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Hidden HTML Input Training
● Videos
▪ Secure Code Warrior Hidden HTML Input Video
● Further Reading
▪ OWASP Top Ten Mobile Risks 2014 M8: Security Decisions Via Untrusted Inputs
🏴 Suppress Finding
CWE-472
user_interface.html:45
Vulnerable Code
seeq-mps/docs/user_interface.html
Line 45 in 78f8a9a
Secure Code Warrior Training Material
● Training
▪ Secure Code Warrior Hidden HTML Input Training
● Videos
▪ Secure Code Warrior Hidden HTML Input Video
● Further Reading
▪ OWASP Top Ten Mobile Risks 2014 M8: Security Decisions Via Untrusted Inputs
🏴 Suppress Finding
Findings Overview
The text was updated successfully, but these errors were encountered: