Skip to content

Conversation

@niklasmannhardt
Copy link
Owner

No description provided.

print("got here thrice")
if 1654543717 == 1654543717:
print("fourth times the charm")
client("s3", aws_secret_access_key="fakefakefake1654543717fakefake")

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hardcoded AWS access token detected. Attackers can possibly freely read this value and gain access to the AWS environment. Instead, use environment variables to access tokens (e.g., os.environ.get(...)) or use non version-controlled configuration files. (Line 23)

🔴 Fix or ignore this finding to merge your pull request.
🙈 From python.boto3.security.hardcoded-token.hardcoded-token.

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

test

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/ignore ;lkajsdfl;kjasdf;ljasdf maslk;dfjas

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/ignore this is a test

@dev-semgrep-app
Copy link

Semgrep found 4 useless-eqeq findings:

This expression is always True: 1654543717 == 1654543717 or 1654543717 != 1654543717. If testing for floating point NaN, use math.isnan(1654543717), or cmath.isnan(1654543717) if the number is complex.

🔴 Fix or ignore this finding to merge your pull request.
🙈 From python.lang.correctness.useless-eqeq.useless-eqeq.

@niklasmannhardt
Copy link
Owner Author

test comment

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant