Scan results · 181f52c
main · 2 critical · 14 high · 59 medium · 82 low
- medium Missing no-new-privileges Security Option sast-engine/docker-compose.yml:20
[Service: app] Service does not have 'no-new-privileges:true' in security_opt. This allows processes to gain additional privileges via setuid/setgid binaries, which can be exploited for privilege escalation attacks.
- medium Non-literal import Detected sast-engine/tools/generate_stdlib_registry.py:567
__import__() or importlib.import_module() with non-literal argument detected.
- medium Logger Credential Leak Risk sast-engine/tools/typeshed-converter/convert.py:333
Logging call detected. Audit log statements for credential/secret leakage.
- medium Logger Credential Leak Risk sast-engine/tools/typeshed-converter/convert.py:444
Logging call detected. Audit log statements for credential/secret leakage.
- medium Logger Credential Leak Risk sast-engine/tools/typeshed-converter/convert.py:454
Logging call detected. Audit log statements for credential/secret leakage.
- medium Logger Credential Leak Risk sast-engine/tools/typeshed-converter/convert.py:645
Logging call detected. Audit log statements for credential/secret leakage.
- medium Logger Credential Leak Risk sast-engine/tools/typeshed-converter/convert.py:655
Logging call detected. Audit log statements for credential/secret leakage.
- medium Logger Credential Leak Risk sast-engine/tools/typeshed-converter/convert.py:684
Logging call detected. Audit log statements for credential/secret leakage.
- medium Logger Credential Leak Risk sast-engine/tools/typeshed-converter/convert.py:687
Logging call detected. Audit log statements for credential/secret leakage.
- medium Logger Credential Leak Risk sast-engine/tools/typeshed-converter/convert.py:699
Logging call detected. Audit log statements for credential/secret leakage.
Get this for your repo.
Pathfinder runs the same scan on your own repos free. Connect via GitHub in 30 seconds.