Skip to content

#258 Disable lint issues#285

Merged
docktermj merged 15 commits into
mainfrom
258-dockter-1
Oct 30, 2025
Merged

#258 Disable lint issues#285
docktermj merged 15 commits into
mainfrom
258-dockter-1

Conversation

@docktermj
Copy link
Copy Markdown
Contributor

Pull request questions

Which issue does this address

Issue number: #258

@docktermj docktermj requested a review from a team as a code owner October 29, 2025 16:10
@docktermj docktermj self-assigned this Oct 29, 2025
@github-actions
Copy link
Copy Markdown

🛡️ Bandit Scan Results Summary

We found 2 High, 2 Medium, and 1 Low severity issues.

Detailed Findings


Severity Issue File Line Confidence More Info Test ID
🟡 LOW Consider possible security implications associated with the subprocess module. sz_tools/_tool_helpers.py 10 HIGH More Info B404
⚪ MEDIUM Possible SQL injection vector through string-based query construction. sz_tools/_sz_database.py 352 LOW More Info B608
⚪ MEDIUM Probable insecure usage of temp file/directory. sz_tools/_tool_helpers.py 732 MEDIUM More Info B108
🔴 HIGH Starting a process with a shell, possible injection detected, security issue. sz_tools/_tool_helpers.py 658 HIGH More Info B605
🔴 HIGH subprocess call with shell=True identified, security issue. sz_tools/_tool_helpers.py 642 HIGH More Info B602

✨ About this Report

This report was generated by the official Bandit GitHub Action to ensure our codebase stays secure.

📕 What is Bandit?

Bandit is a tool designed to find common security issues in Python code. To learn more about how Bandit helps to keep Python code safe, visit the Bandit documentation.

👥 Community Support

Got questions or need help with Bandit Action?

  • Join our community on the Discord server.
  • Share tips, get advice, and collaborate on security best practices.

@docktermj docktermj requested a review from a team as a code owner October 29, 2025 16:18
@github-actions
Copy link
Copy Markdown

🛡️ Bandit Scan Results Summary

We found 2 High, 2 Medium, and 1 Low severity issues.

Detailed Findings


Severity Issue File Line Confidence More Info Test ID
🟡 LOW Consider possible security implications associated with the subprocess module. sz_tools/_tool_helpers.py 10 HIGH More Info B404
⚪ MEDIUM Possible SQL injection vector through string-based query construction. sz_tools/_sz_database.py 352 LOW More Info B608
⚪ MEDIUM Probable insecure usage of temp file/directory. sz_tools/_tool_helpers.py 732 MEDIUM More Info B108
🔴 HIGH Starting a process with a shell, possible injection detected, security issue. sz_tools/_tool_helpers.py 658 HIGH More Info B605
🔴 HIGH subprocess call with shell=True identified, security issue. sz_tools/_tool_helpers.py 642 HIGH More Info B602

✨ About this Report

This report was generated by the official Bandit GitHub Action to ensure our codebase stays secure.

📕 What is Bandit?

Bandit is a tool designed to find common security issues in Python code. To learn more about how Bandit helps to keep Python code safe, visit the Bandit documentation.

👥 Community Support

Got questions or need help with Bandit Action?

  • Join our community on the Discord server.
  • Share tips, get advice, and collaborate on security best practices.

@github-actions
Copy link
Copy Markdown

🛡️ Bandit Scan Results Summary

We found 2 High, 2 Medium, and 1 Low severity issues.

Detailed Findings


Severity Issue File Line Confidence More Info Test ID
🟡 LOW Consider possible security implications associated with the subprocess module. sz_tools/_tool_helpers.py 10 HIGH More Info B404
⚪ MEDIUM Possible SQL injection vector through string-based query construction. sz_tools/_sz_database.py 352 LOW More Info B608
⚪ MEDIUM Probable insecure usage of temp file/directory. sz_tools/_tool_helpers.py 732 MEDIUM More Info B108
🔴 HIGH Starting a process with a shell, possible injection detected, security issue. sz_tools/_tool_helpers.py 658 HIGH More Info B605
🔴 HIGH subprocess call with shell=True identified, security issue. sz_tools/_tool_helpers.py 642 HIGH More Info B602

✨ About this Report

This report was generated by the official Bandit GitHub Action to ensure our codebase stays secure.

📕 What is Bandit?

Bandit is a tool designed to find common security issues in Python code. To learn more about how Bandit helps to keep Python code safe, visit the Bandit documentation.

👥 Community Support

Got questions or need help with Bandit Action?

  • Join our community on the Discord server.
  • Share tips, get advice, and collaborate on security best practices.

@github-actions
Copy link
Copy Markdown

🛡️ Bandit Scan Results Summary

We found 2 High, 2 Medium, and 1 Low severity issues.

Detailed Findings


Severity Issue File Line Confidence More Info Test ID
🟡 LOW Consider possible security implications associated with the subprocess module. sz_tools/_tool_helpers.py 10 HIGH More Info B404
⚪ MEDIUM Possible SQL injection vector through string-based query construction. sz_tools/_sz_database.py 352 LOW More Info B608
⚪ MEDIUM Probable insecure usage of temp file/directory. sz_tools/_tool_helpers.py 732 MEDIUM More Info B108
🔴 HIGH Starting a process with a shell, possible injection detected, security issue. sz_tools/_tool_helpers.py 658 HIGH More Info B605
🔴 HIGH subprocess call with shell=True identified, security issue. sz_tools/_tool_helpers.py 642 HIGH More Info B602

✨ About this Report

This report was generated by the official Bandit GitHub Action to ensure our codebase stays secure.

📕 What is Bandit?

Bandit is a tool designed to find common security issues in Python code. To learn more about how Bandit helps to keep Python code safe, visit the Bandit documentation.

👥 Community Support

Got questions or need help with Bandit Action?

  • Join our community on the Discord server.
  • Share tips, get advice, and collaborate on security best practices.

@github-actions
Copy link
Copy Markdown

🛡️ Bandit Scan Results Summary

We found 2 High, 2 Medium, and 1 Low severity issues.

Detailed Findings


Severity Issue File Line Confidence More Info Test ID
🟡 LOW Consider possible security implications associated with the subprocess module. sz_tools/_tool_helpers.py 10 HIGH More Info B404
⚪ MEDIUM Possible SQL injection vector through string-based query construction. sz_tools/_sz_database.py 352 LOW More Info B608
⚪ MEDIUM Probable insecure usage of temp file/directory. sz_tools/_tool_helpers.py 732 MEDIUM More Info B108
🔴 HIGH Starting a process with a shell, possible injection detected, security issue. sz_tools/_tool_helpers.py 658 HIGH More Info B605
🔴 HIGH subprocess call with shell=True identified, security issue. sz_tools/_tool_helpers.py 642 HIGH More Info B602

✨ About this Report

This report was generated by the official Bandit GitHub Action to ensure our codebase stays secure.

📕 What is Bandit?

Bandit is a tool designed to find common security issues in Python code. To learn more about how Bandit helps to keep Python code safe, visit the Bandit documentation.

👥 Community Support

Got questions or need help with Bandit Action?

  • Join our community on the Discord server.
  • Share tips, get advice, and collaborate on security best practices.

@github-actions
Copy link
Copy Markdown

🛡️ Bandit Scan Results Summary

We found 2 High, 2 Medium, and 1 Low severity issues.

Detailed Findings


Severity Issue File Line Confidence More Info Test ID
🟡 LOW Consider possible security implications associated with the subprocess module. sz_tools/_tool_helpers.py 10 HIGH More Info B404
⚪ MEDIUM Possible SQL injection vector through string-based query construction. sz_tools/_sz_database.py 352 LOW More Info B608
⚪ MEDIUM Probable insecure usage of temp file/directory. sz_tools/_tool_helpers.py 732 MEDIUM More Info B108
🔴 HIGH Starting a process with a shell, possible injection detected, security issue. sz_tools/_tool_helpers.py 658 HIGH More Info B605
🔴 HIGH subprocess call with shell=True identified, security issue. sz_tools/_tool_helpers.py 642 HIGH More Info B602

✨ About this Report

This report was generated by the official Bandit GitHub Action to ensure our codebase stays secure.

📕 What is Bandit?

Bandit is a tool designed to find common security issues in Python code. To learn more about how Bandit helps to keep Python code safe, visit the Bandit documentation.

👥 Community Support

Got questions or need help with Bandit Action?

  • Join our community on the Discord server.
  • Share tips, get advice, and collaborate on security best practices.

@github-actions
Copy link
Copy Markdown

🛡️ Bandit Scan Results Summary

We found 2 High, 2 Medium, and 1 Low severity issues.

Detailed Findings


Severity Issue File Line Confidence More Info Test ID
🟡 LOW Consider possible security implications associated with the subprocess module. sz_tools/_tool_helpers.py 10 HIGH More Info B404
⚪ MEDIUM Possible SQL injection vector through string-based query construction. sz_tools/_sz_database.py 352 LOW More Info B608
⚪ MEDIUM Probable insecure usage of temp file/directory. sz_tools/_tool_helpers.py 732 MEDIUM More Info B108
🔴 HIGH Starting a process with a shell, possible injection detected, security issue. sz_tools/_tool_helpers.py 658 HIGH More Info B605
🔴 HIGH subprocess call with shell=True identified, security issue. sz_tools/_tool_helpers.py 642 HIGH More Info B602

✨ About this Report

This report was generated by the official Bandit GitHub Action to ensure our codebase stays secure.

📕 What is Bandit?

Bandit is a tool designed to find common security issues in Python code. To learn more about how Bandit helps to keep Python code safe, visit the Bandit documentation.

👥 Community Support

Got questions or need help with Bandit Action?

  • Join our community on the Discord server.
  • Share tips, get advice, and collaborate on security best practices.

@github-actions
Copy link
Copy Markdown

🛡️ Bandit Scan Results Summary

We found 2 High, 2 Medium, and 1 Low severity issues.

Detailed Findings


Severity Issue File Line Confidence More Info Test ID
🟡 LOW Consider possible security implications associated with the subprocess module. sz_tools/_tool_helpers.py 10 HIGH More Info B404
⚪ MEDIUM Possible SQL injection vector through string-based query construction. sz_tools/_sz_database.py 352 LOW More Info B608
⚪ MEDIUM Probable insecure usage of temp file/directory. sz_tools/_tool_helpers.py 732 MEDIUM More Info B108
🔴 HIGH Starting a process with a shell, possible injection detected, security issue. sz_tools/_tool_helpers.py 658 HIGH More Info B605
🔴 HIGH subprocess call with shell=True identified, security issue. sz_tools/_tool_helpers.py 642 HIGH More Info B602

✨ About this Report

This report was generated by the official Bandit GitHub Action to ensure our codebase stays secure.

📕 What is Bandit?

Bandit is a tool designed to find common security issues in Python code. To learn more about how Bandit helps to keep Python code safe, visit the Bandit documentation.

👥 Community Support

Got questions or need help with Bandit Action?

  • Join our community on the Discord server.
  • Share tips, get advice, and collaborate on security best practices.

@github-actions
Copy link
Copy Markdown

🛡️ Bandit Scan Results Summary

We found 2 High, 2 Medium, and 1 Low severity issues.

Detailed Findings


Severity Issue File Line Confidence More Info Test ID
🟡 LOW Consider possible security implications associated with the subprocess module. sz_tools/_tool_helpers.py 10 HIGH More Info B404
⚪ MEDIUM Possible SQL injection vector through string-based query construction. sz_tools/_sz_database.py 352 LOW More Info B608
⚪ MEDIUM Probable insecure usage of temp file/directory. sz_tools/_tool_helpers.py 732 MEDIUM More Info B108
🔴 HIGH Starting a process with a shell, possible injection detected, security issue. sz_tools/_tool_helpers.py 658 HIGH More Info B605
🔴 HIGH subprocess call with shell=True identified, security issue. sz_tools/_tool_helpers.py 642 HIGH More Info B602

✨ About this Report

This report was generated by the official Bandit GitHub Action to ensure our codebase stays secure.

📕 What is Bandit?

Bandit is a tool designed to find common security issues in Python code. To learn more about how Bandit helps to keep Python code safe, visit the Bandit documentation.

👥 Community Support

Got questions or need help with Bandit Action?

  • Join our community on the Discord server.
  • Share tips, get advice, and collaborate on security best practices.

@github-actions
Copy link
Copy Markdown

🛡️ Bandit Scan Results Summary

We found 2 High, 2 Medium, and 1 Low severity issues.

Detailed Findings


Severity Issue File Line Confidence More Info Test ID
🟡 LOW Consider possible security implications associated with the subprocess module. sz_tools/_tool_helpers.py 10 HIGH More Info B404
⚪ MEDIUM Possible SQL injection vector through string-based query construction. sz_tools/_sz_database.py 352 LOW More Info B608
⚪ MEDIUM Probable insecure usage of temp file/directory. sz_tools/_tool_helpers.py 732 MEDIUM More Info B108
🔴 HIGH Starting a process with a shell, possible injection detected, security issue. sz_tools/_tool_helpers.py 658 HIGH More Info B605
🔴 HIGH subprocess call with shell=True identified, security issue. sz_tools/_tool_helpers.py 642 HIGH More Info B602

✨ About this Report

This report was generated by the official Bandit GitHub Action to ensure our codebase stays secure.

📕 What is Bandit?

Bandit is a tool designed to find common security issues in Python code. To learn more about how Bandit helps to keep Python code safe, visit the Bandit documentation.

👥 Community Support

Got questions or need help with Bandit Action?

  • Join our community on the Discord server.
  • Share tips, get advice, and collaborate on security best practices.

@github-advanced-security
Copy link
Copy Markdown

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

@docktermj docktermj enabled auto-merge (squash) October 29, 2025 20:03
@docktermj docktermj disabled auto-merge October 29, 2025 20:03
@docktermj docktermj enabled auto-merge (squash) October 29, 2025 20:04
@docktermj docktermj merged commit 53985ff into main Oct 30, 2025
69 checks passed
@docktermj docktermj deleted the 258-dockter-1 branch October 30, 2025 13:06
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants