CodeGuru Reviewer
Detector Library
Sign in to CodeGuru Reviewer
AWS
Documentation
Amazon CodeGuru
Detector Library
Python
Tags
Tag: amazon-ec2
Feedback
CodeGuru Reviewer
Detector Library
Python detectors
(80/80)
Improper privilege management
Resource leak
Inefficient string concatenation inside loop
Set SNS Return Subscription ARN
Module injection
Unnecessary iteration
Improper error handling
Insecure cryptography
Improper certificate validation
Outdated subprocess module API
Garbage collection prevention in multiprocessing
Integer overflow
Catch and rethrow exception
Mutually exclusive call
Time zone aware datetimes
Improper input validation
Improper authentication
Catch and swallow exception
Insecure hashing
Cross-site scripting
Missing none check on response metadata
Missing pagination
Using AutoAddPolicy or WarningPolicy
Stack trace exposure
Use of a deprecated method
Semaphore overflow prevention
Log injection
Mutable objects as default arguments of functions
Weak obfuscation of web request
Deadlocks caused by improper multiprocessing API usage
Insecure cookie
Violation of PEP8 programming recommendations
Insecure temporary file or directory
OS command injection
Unauthenticated LDAP requests
Incorrect binding of SNS publish operations
Client-side KMS reencryption
Untrusted AMI images
AWS client not reused in a Lambda function
Socket connection timeout
Complex code hard to maintain
Confusion between equality and identity in conditional expression
Inefficient new method from hashlib
Leaky subprocess timeout
Usage of an API that is not recommended
Dangerous global variables
AWS credentials logged
Path traversal
Enabling and overriding debug feature
Loose file permissions
Risky use of dict get method
Socket close platform compatibility
Multiple values in return statement is prone to error
Zip bomb attack
Unsanitized input is run as code
LDAP injection
XPath injection
Error prone sequence modification
Batch request with unchecked failures
Clear text credentials
Bad exception handling
Unrestricted upload of dangerous file type
Deserialization of untrusted object
Use of an inefficient or incorrect API
Multidimensional list initialization using replication is error prone
Inefficient polling of AWS resource
Override of reserved variable names in a Lambda function
SQL injection
Docker arbitrary container run
Hardcoded IP address
Missing S3 bucket owner condition
Insecure connection using unencrypted protocol
Direct dict object modification
Incorrect use of Process.terminate API
Unauthenticated Amazon SNS unsubscribe requests might succeed
Hardcoded credentials
Insecure Socket Bind
Insecure CORS policy
Cross-site request forgery
XML External Entity
Tag: amazon-ec2
Untrusted AMI images
Improper filtering of Amazon Machine Images (AMIs) can result in loading an untrusted image, a potential security vulnerability.