AWS logo
Amazon CodeGuruDetector LibrarySign in to CodeGuru Reviewer
AWSbreadcrumb dividerDocumentationbreadcrumb dividerAmazon CodeGurubreadcrumb dividerDetector Librarybreadcrumb dividerPythonbreadcrumb dividerTagsFeedbackFeedback icon

CodeGuru

Detector Library

Python detectors (102/102)

Improper privilege managementResource leakInefficient string concatenation inside loopSpawning a process without main moduleImproper sanitization of wildcards or matching symbolsPublic method parameter validationImproper error handlingImproper certificate validationURL redirection to untrusted siteInteger overflowMutually exclusive callTime zone aware datetimesCatch and swallow exceptionInsecure hashingStack trace exposureUsing AutoAddPolicy or WarningPolicyData loss in a batch requestUse of a deprecated methodLog injectionWeak obfuscation of web requestUse of `app.run` at top-levelDeadlocks caused by improper multiprocessing API usageOS command injectionUnauthenticated LDAP requestsLow maintainability with high cyclomatic complexityLow maintainability with low class cohesionUntrusted AMI imagesConfusion between equality and identity in conditional expressionPath traversalAWS credentials loggedLoose file permissionsSocket close platform compatibilityZip bomb attackUnsanitized input is run as codeSensitive data stored unencrypted due to partial encryptionSynchronous publication of AWS Lambda metricsError prone sequence modificationBatch request with unchecked failuresAvoid Using Blank PasswordBad exception handlingUnrestricted upload of dangerous file typeInefficient polling of AWS resourceHardcoded interface bindingHardcoded IP addressFile injectionLow maintainability with high function couplingMass AssignmentInsecure connection using unencrypted protocolIncorrect use of Process.terminate APIUnauthenticated Amazon SNS unsubscribe requests might succeedHardcoded credentialsInsecure Socket BindXML External EntityInsecure CORS policyCross-site request forgeryRegular expressions catastrophic backtrackingServer-side request forgerySet SNS Return Subscription ARNModule injectionDo not pass generic exception ruleUnnecessary iterationInsecure cryptographyOutdated subprocess module APIGarbage collection prevention in multiprocessingCatch and rethrow exceptionImproper input validationImproper authenticationCross-site scriptingMissing none check on response metadataMissing paginationSemaphore overflow preventionMutable objects as default arguments of functionsInsecure cookieViolation of PEP8 programming recommendationsInsecure temporary file or directoryIncorrect binding of SNS publish operationsIncorrect type conversion or castClient-side KMS reencryptionSocket connection timeoutAWS client not reused in a Lambda functionComplex code hard to maintainInefficient new method from hashlibLeaky subprocess timeoutUsage of an API that is not recommendedDangerous global variablesEnabling and overriding debug featureRisky use of dict get methodMultiple values in return statement is prone to errorLDAP injectionXPath injectionClear text credentialsMissing authorizationAWS Lambda with overly permissive policyDeserialization of untrusted objectUse of an inefficient or incorrect APIMultidimensional list initialization using replication is error proneOverride of reserved variable names in a Lambda functionSQL injectionDocker arbitrary container runMissing S3 bucket owner conditionLow maintainability with large functionsDirect dict object modification

Tags

a
# access-control# amazon-dynamodb# amazon-ec2# amazon-s3# amazon-sns# availability# aws-kms# aws-lambda# aws-python-sdk
b
# batch-operations
c
# concurrency# configuration# consistency# cookies# cryptography
d
# data-integrity# deserialization
e
# efficiency
f
# flask
i
# information-leak# injection
l
# ldap
m
# maintainability
n
# networking# null-check
o
# owasp-top10
p
# paramiko# permissions# python-annotations
r
# race-condition# resource-leak
s
# secrets# security-context# sql# subprocess
t
# top25-cwes
x
# xml