Skip to content

Use of possibly insecure eval function - consider using safer ast.literal_eval. #1773

@pbrod

Description

@pbrod

Issue: [B307:blacklist] Use of possibly insecure function - consider using safer ast.literal_eval.
More Info: https://bandit.readthedocs.io/en/latest/blacklists/blacklist_calls.html#b307-eval
Severity: Medium Confidence: High

Locations:

low = eval(range_object._low)

high = eval(range_object._high)

self.low = eval(handler._low)

self.high = eval(handler._high)

value = eval(value)

tup = eval(value)

low = eval(str(self._label_lo.text()).strip())

value = eval(value)

tup = eval(tmp)

high = eval(str(self._label_hi.GetValue()).strip())

Metadata

Metadata

Assignees

No one assigned

    Labels

    difficulty: intermediateIssues which need some context about the package.type: cleanupIssues related to clean up _excluding_ refactoring

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions