Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- >> Possible SQL injection vector through string-based query construction, without SQLALCHEMY use
- - ./../OpenStack_projects/cinder/cinder/api/xmlutil.py::75
- 75 """
- >> Consider possible security implications associated with subprocess module.
- - ./../OpenStack_projects/cinder/cinder/backup/drivers/ceph.py::48
- 48 import subprocess
- >> Use of possibly insecure system call function (subprocess.Popen).
- - ./../OpenStack_projects/cinder/cinder/backup/drivers/ceph.py::491
- 491 p1 = subprocess.Popen(cmd1, stdout=subprocess.PIPE,
- >> Use of possibly insecure system call function (subprocess.Popen).
- - ./../OpenStack_projects/cinder/cinder/backup/drivers/ceph.py::504
- 504 p2 = subprocess.Popen(cmd2, stdin=p1.stdout,
- >> Use of insecure MD5 hash function.
- - ./../OpenStack_projects/cinder/cinder/backup/drivers/swift.py::236
- 236 md5 = hashlib.md5(metadata_json).hexdigest()
- >> Use of insecure MD5 hash function.
- - ./../OpenStack_projects/cinder/cinder/backup/drivers/swift.py::329
- 329 md5 = hashlib.md5(data).hexdigest()
- >> Use of insecure MD5 hash function.
- - ./../OpenStack_projects/cinder/cinder/brick/remotefs/remotefs.py::63
- 63 return hashlib.md5(base_str).hexdigest()
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/image/glance.py::24
- 24 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/image/glance.py::112
- 112 random.shuffle(api_servers)
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/openstack/common/periodic_task.py::14
- 14 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/openstack/common/periodic_task.py::163
- 163 jitter = int(spacing * (random.random() / 20))
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/openstack/common/processutils.py::24
- 24 import random
- >> Use of possibly insecure system call function (subprocess.Popen).
- - ./../OpenStack_projects/cinder/cinder/openstack/common/processutils.py::168
- 168 obj = subprocess.Popen(cmd,
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/openstack/common/processutils.py::208
- 208 greenthread.sleep(random.randint(20, 200) / 100.0)
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/openstack/common/service.py::23
- 23 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/openstack/common/service.py::295
- 295 random.seed()
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/scheduler/weights/chance.py::21
- 21 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/scheduler/weights/chance.py::28
- 28 return random.random()
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/service.py::23
- 23 import random
- >> Possible binding to all interfaces
- - ./../OpenStack_projects/cinder/cinder/service.py::61
- 61 default="0.0.0.0",
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/service.py::168
- 168 initial_delay = random.randint(0, self.periodic_fuzzy_delay)
- >> Possible binding to all interfaces
- - ./../OpenStack_projects/cinder/cinder/service.py::329
- 329 self.host = getattr(CONF, '%s_listen' % name, "0.0.0.0")
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/brick/test_brick_connector.py::601
- 601 'device_path': '/tmp/bar'}
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/tests/integrated/integrated_helpers.py::20
- 20 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/tests/integrated/integrated_helpers.py::37
- 37 return ''.join(random.choice(string.ascii_uppercase + string.digits)
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/tests/integrated/integrated_helpers.py::43
- 43 return ''.join(random.choice(string.digits)
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_db_api.py::272
- 272 42, 'invalid-uuid', None, '/tmp')
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_db_api.py::278
- 278 instance_uuid, None, '/tmp')
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_db_api.py::281
- 281 self.assertEqual(volume['mountpoint'], '/tmp')
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_db_api.py::290
- 290 None, host_name, '/tmp')
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_db_api.py::293
- 293 self.assertEqual(volume['mountpoint'], '/tmp')
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_db_api.py::323
- 323 None, '/tmp')
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_db_api.py::335
- 335 None, 'fake_host', '/tmp')
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_glusterfs.py::84
- 84 TEST_TMP_FILE = '/tmp/tempfile'
- >> Possible binding to all interfaces
- - ./../OpenStack_projects/cinder/cinder/tests/test_hitachi_hbsd_snm2_iscsi.py::251
- 251 return_value={'ip': '0.0.0.0',
- >> Possible binding to all interfaces
- - ./../OpenStack_projects/cinder/cinder/tests/test_hitachi_hbsd_snm2_iscsi.py::458
- 458 'wwpns': '0x100000', 'ip': '0.0.0.0', 'initiator':
- >> Possible binding to all interfaces
- - ./../OpenStack_projects/cinder/cinder/tests/test_hitachi_hbsd_snm2_iscsi.py::471
- 471 'wwpns': '0x100000', 'ip': '0.0.0.0', 'initiator':
- >> Possible binding to all interfaces
- - ./../OpenStack_projects/cinder/cinder/tests/test_hitachi_hbsd_snm2_iscsi.py::482
- 482 'wwpns': '0x100000', 'ip': '0.0.0.0', 'initiator':
- >> Possible binding to all interfaces
- - ./../OpenStack_projects/cinder/cinder/tests/test_hitachi_hbsd_snm2_iscsi.py::490
- 490 connector = {'ip': '0.0.0.0'}
- >> Consider possible security implications associated with subprocess module.
- - ./../OpenStack_projects/cinder/cinder/tests/test_migrations.py::27
- 27 import subprocess
- >> Popen call with shell=True identified, security issue.
- - ./../OpenStack_projects/cinder/cinder/tests/test_migrations.py::166
- 166 proc = subprocess.Popen(cmd, stdout=subprocess.PIPE,
- >> Use of possibly insecure system call function (subprocess.Popen).
- - ./../OpenStack_projects/cinder/cinder/tests/test_migrations.py::166
- 166 proc = subprocess.Popen(cmd, stdout=subprocess.PIPE,
- >> Possible SQL injection vector through string-based query construction
- - ./../OpenStack_projects/cinder/cinder/tests/test_migrations.py::270
- 270 total = connection.execute("SELECT count(*) "
- >> Possible SQL injection vector through string-based query construction
- - ./../OpenStack_projects/cinder/cinder/tests/test_migrations.py::276
- 276 noninnodb = connection.execute("SELECT count(*) "
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_nexenta.py::582
- 582 self.nms_mock.appliance.execute('truncate --size 1G /tmp/path')
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_nexenta.py::585
- 585 self.drv._create_sparsed_file(self.nms_mock, '/tmp/path', 1)
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_nexenta.py::588
- 588 self.nms_mock.appliance.execute('dd if=/dev/zero of=/tmp/path bs=1M '
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_nexenta.py::592
- 592 self.drv._create_regular_file(self.nms_mock, '/tmp/path', 1)
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_nexenta.py::595
- 595 path = '/tmp/path'
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_rbd.py::615
- 615 self.cfg.volume_tmp_dir = '/var/run/cinder/tmp'
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_scality.py::38
- 38 TEST_MOUNT = '/tmp/fake_mount'
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_scality.py::39
- 39 TEST_CONFIG = '/tmp/fake_config'
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/tests/test_storwize_svc.py::21
- 21 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/tests/test_storwize_svc.py::1517
- 1517 wwpns = [str(random.randint(0, 9999999999999999)).zfill(16),
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/tests/test_storwize_svc.py::1518
- 1518 str(random.randint(0, 9999999999999999)).zfill(16)]
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/tests/test_storwize_svc.py::1519
- 1519 initiator = 'test.initiator.%s' % str(random.randint(10000, 99999))
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/tests/test_storwize_svc.py::1569
- 1569 no_exist_pool = 'i-dont-exist-%s' % random.randint(10000, 99999)
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/tests/test_storwize_svc.py::1651
- 1651 rand_id = str(random.randint(10000, 99999))
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/tests/test_storwize_svc.py::1988
- 1988 rand_id = random.randint(10000, 99999)
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/tests/test_storwize_svc.py::2170
- 2170 random.randint(10000, 99999),
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/tests/test_storwize_svc.py::2280
- 2280 wwpns = [str(random.randint(0, 9999999999999999)).zfill(16),
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/tests/test_storwize_svc.py::2281
- 2281 str(random.randint(0, 9999999999999999)).zfill(16)]
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/tests/test_storwize_svc.py::2282
- 2282 initiator = 'test.initiator.%s' % str(random.randint(10000, 99999))
- >> Chmod setting a permissive mask 0755 on file (tmpfilename).
- - ./../OpenStack_projects/cinder/cinder/tests/test_utils.py::77
- 77 os.chmod(tmpfilename, 0o755)
- >> Chmod setting a permissive mask 0755 on file (tmpfilename).
- - ./../OpenStack_projects/cinder/cinder/tests/test_utils.py::121
- 121 os.chmod(tmpfilename, 0o755)
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_utils.py::525
- 525 test_file = '/var/tmp/made_up_file'
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_utils.py::538
- 538 test_file = '/var/tmp/made_up_file'
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_utils.py::562
- 562 'Filesystem Size Used Avail Use%% Mounted on\n'
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_utils.py::565
- 565 test_file = '/tmp/file'
- >> Use of possibly insecure function - consider using safer ast.literal_eval.
- - ./../OpenStack_projects/cinder/cinder/tests/test_utils.py::940
- 940 mock_sshclient.return_value = eval('FakeSSHClient')()
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_utils.py::1005
- 1005 CONF.ssh_hosts_key_file = '/tmp/blah'
- >> Possible binding to all interfaces
- - ./../OpenStack_projects/cinder/cinder/tests/test_volume.py::3775
- 3775 self.configuration.iscsi_ip_address = '0.0.0.0'
- >> Possible binding to all interfaces
- - ./../OpenStack_projects/cinder/cinder/tests/test_volume.py::3803
- 3803 "host": "0.0.0.0"}
- >> Possible binding to all interfaces
- - ./../OpenStack_projects/cinder/cinder/tests/test_volume.py::3875
- 3875 self.configuration.iser_ip_address = '0.0.0.0'
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_wsgi.py::68
- 68 """
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/tests/test_wsgi.py::91
- 91 self.assertEqual("/tmp", url_parser.directory)
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/volume/driver.py::1142
- 1142 return '/tmp/volume-%s' % volume.id
- >> Use of possibly insecure function - consider using safer ast.literal_eval.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/emc/emc_vmax_common.py::1277
- 1277 name = eval(loc)
- >> Use of possibly insecure function - consider using safer ast.literal_eval.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/emc/emc_vmax_fc.py::185
- 185 name = eval(loc)
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/emc/emc_vmax_utils.py::16
- 16 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/emc/emc_vmax_utils.py::634
- 634 portGroupNames[random.randint(0, numPortGroups - 1)])
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/emc/emc_vnx_cli.py::20
- 20 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/emc/emc_vnx_cli.py::1103
- 1103 random.shuffle(iscsi_initiator_ips)
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/emc/emc_vnx_cli.py::1115
- 1115 random.shuffle(target_portals)
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/emc/emc_vnx_cli.py::2049
- 2049 random.shuffle(candidate_hlus)
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/emc/xtremio.py::28
- 28 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/emc/xtremio.py::52
- 52 random = random.Random()
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/eqlx.py::19
- 19 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/eqlx.py::210
- 210 greenthread.sleep(random.randint(20, 500) / 100.0)
- >> Use of possibly insecure function - consider using safer ast.literal_eval.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/fujitsu_eternus_dx_common.py::1324
- 1324 name = eval(loc)
- >> Use of insecure MD5 hash function.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/fujitsu_eternus_dx_common.py::1774
- 1774 m = hashlib.md5()
- >> Use of possibly insecure function - consider using safer ast.literal_eval.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/fujitsu_eternus_dx_fc.py::180
- 180 name = eval(loc)
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/fusionio/ioControl.py::23
- 23 import random
- >> Use of insecure MD5 hash function.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/fusionio/ioControl.py::76
- 76 self.hashpass = hashlib.md5()
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/fusionio/ioControl.py::409
- 409 ipaddr = (networksinfo[random.randint(0, len(networksinfo) - 1)]
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/ibm/storwize_svc/helpers.py::17
- 17 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/ibm/storwize_svc/helpers.py::274
- 274 rand_id = str(random.randint(0, 99999999)).zfill(8)
- >> Use of insecure MD5 hash function.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/nexenta/nfs.py::336
- 336 hashlib.md5(nfs_share).hexdigest())
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/nimble.py::22
- 22 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/nimble.py::182
- 182 return ''.join(random.sample(char_set, length))
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/prophetstor/dplcommon.py::23
- 23 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/prophetstor/dplcommon.py::652
- 652 nsleep = random.randint(0, 10)
- >> Probable insecure usage of temp file/directory
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/rbd.py::822
- 822 tmp_dir = self.configuration.volume_tmp_dir or '/tmp'
- >> Use of insecure MD5 hash function.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/remotefs.py::480
- 480 return hashlib.md5(base_str).hexdigest()
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/san/san.py::22
- 22 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/san/san.py::135
- 135 greenthread.sleep(random.randint(20, 500) / 100.0)
- >> Chmod setting a permissive mask 0666 on file (path).
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/scality.py::118
- 118 os.chmod(path, 0o666)
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/solidfire.py::19
- 19 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/solidfire.py::293
- 293 return ''.join(random.sample(char_set, length))
- >> Possible SQL injection vector through string-based query construction, without SQLALCHEMY use
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/windows/windows_utils.py::185
- 185 "Select * from CIM_DataFile where Name = '" +
- >> Possible SQL injection vector through string-based query construction, without SQLALCHEMY use
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/windows/windows_utils.py::316
- 316 "Select * from CIM_DataFile where Name = '" +
- >> Consider possible security implications associated with pickle module.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/xenapi/lib.py::19
- 19 import pickle
- >> Pickle library appears to be in use, possible security issue.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/xenapi/lib.py::370
- 370 args = dict(params=pickle.dumps(plugin_params))
- >> Pickle library appears to be in use, possible security issue.
- - ./../OpenStack_projects/cinder/cinder/volume/drivers/xenapi/lib.py::377
- 377 return pickle.loads(result)
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/volume/utils.py::424
- 424 password = [random.choice(s) for s in symbolgroups]
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/volume/utils.py::428
- 428 random.shuffle(password)
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/volume/utils.py::434
- 434 password.extend([random.choice(symbols) for _i in xrange(length)])
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/volume/utils.py::438
- 438 random.shuffle(password)
- >> Possible binding to all interfaces
- - ./../OpenStack_projects/cinder/cinder/wsgi.py::111
- 111 self._host = host or "0.0.0.0"
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/zonemanager/drivers/brocade/brcd_fc_zone_client_cli.py::24
- 24 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/zonemanager/drivers/brocade/brcd_fc_zone_client_cli.py::402
- 402 greenthread.sleep(random.randint(20, 500) / 100.0)
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/zonemanager/drivers/brocade/brcd_fc_zone_client_cli.py::444
- 444 greenthread.sleep(random.randint(20, 500) / 100.0)
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/zonemanager/drivers/brocade/brcd_fc_zone_client_cli.py::465
- 465 greenthread.sleep(random.randint(20, 500) / 100.0)
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/zonemanager/drivers/cisco/cisco_fc_san_lookup_service.py::18
- 18 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/zonemanager/drivers/cisco/cisco_fc_san_lookup_service.py::256
- 256 greenthread.sleep(random.randint(20, 500) / 100.0)
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/zonemanager/drivers/cisco/cisco_fc_san_lookup_service.py::307
- 307 greenthread.sleep(random.randint(20, 500) / 100.0)
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/zonemanager/drivers/cisco/cisco_fc_san_lookup_service.py::328
- 328 greenthread.sleep(random.randint(20, 500) / 100.0)
- >> Random library should not be used for any security or cryptographic purposes
- - ./../OpenStack_projects/cinder/cinder/zonemanager/drivers/cisco/cisco_fc_zone_client_cli.py::21
- 21 import random
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/zonemanager/drivers/cisco/cisco_fc_zone_client_cli.py::382
- 382 greenthread.sleep(random.randint(20, 500) / 100.0)
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/zonemanager/drivers/cisco/cisco_fc_zone_client_cli.py::433
- 433 greenthread.sleep(random.randint(20, 500) / 100.0)
- >> Use of random is not suitable for security/cryptographic purposes.
- - ./../OpenStack_projects/cinder/cinder/zonemanager/drivers/cisco/cisco_fc_zone_client_cli.py::454
- 454 greenthread.sleep(random.randint(20, 500) / 100.0)
- >> Use of insecure / deprecated system call function (os.popen).
- - ./../OpenStack_projects/cinder/doc/source/conf.py::171
- 171 html_last_updated_fmt = os.popen(git_cmd).read()
- >> Consider possible security implications associated with subprocess module.
- - ./../OpenStack_projects/cinder/tools/install_venv.py::26
- 26 import subprocess
- >> Consider possible security implications associated with subprocess module.
- - ./../OpenStack_projects/cinder/tools/install_venv_common.py::29
- 29 import subprocess
- >> Use of possibly insecure system call function (subprocess.Popen).
- - ./../OpenStack_projects/cinder/tools/install_venv_common.py::64
- 64 proc = subprocess.Popen(cmd, cwd=self.root, stdout=stdout)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement