Skip to content

Conversation

@ibmcloud-devops
Copy link
Owner

Qwiet LogoQwiet Logo

This pull request enables build rules. You can read more about build rules here. The build rules are controlled by the shiftleft.yml file in the repository.

Visit app.shiftleft.io to see the security findings for this repository.

We've done a few things on your behalf

  • Forked this demo application
  • Generated a unique secret SHIFTLEFT_ACCESS_TOKEN to allow GitHub Actions in this repository to communicate with the Qwiet (Shiftleft) API
  • Committed a GitHub Action that will invoke Qwiet preZero's Static Application Security Testing (SAST) on all future pull requests on this repository
  • Created this pull request that demonstrates build rules. It also adds a status check that displays the result of the GitHub Action

Questions? Comments? Want to learn more? Get in touch with us or check out our documentation.

@github-actions
Copy link

github-actions bot commented Oct 3, 2025

Qwiet LogoQwiet Logo

Checking analysis of application shiftleft-python-demo against 3 build rules.

Using sl version 0.9.3479 (d18fe984ca7c6505f59a29f975eabd75b645b286).

Checking findings on scan 1.

Results per rule:

  • Allow no critical findings: FAIL
    (4 matched vulnerabilities; configured threshold is 0).

    Findings:

      ID   CVSS    Rating    Title                                                                                     
     1    9.0   critical   Remote Code Execution: Command Injection Through Attacker-controlled Data in actions.py 
     4    9.0   critical   Directory Traversal: Attacker-controlled Data Used in File Path in actions.py           
     7    9.0   critical   SQL Injection: Attacker-controlled Data Used in SQL Query in auth.py                    
     8    9.0   critical   SQL Injection: Attacker-controlled Data Used in SQL Query in users.py                   
     Severity rating   Count 
     Critical              4 
     High                  0 
     Medium                0 
     Low                   0 
     Category                Count 
     SQL Injection               2 
     Remote Code Execution       1 
     Directory Traversal         1 
     OWASP 2021 Category         Count 
     A03-Injection                   3 
     A01-Broken-Access-Control       1 
  • Allow one OSS or container finding: FAIL
    (15 matched vulnerabilities; configured threshold is 1).

    First 5 findings:

       ID   CVSS   Rating   CVE                Title                                                                                                                                                      
     20    8.6    high    CVE-2016-10745     In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.                                                                                         
     22    8.6    high    CVE-2019-10906     In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape.                                                                                  
     30    7.8    high    CVE-2024-56326     An oversight in how the Jinja sandboxed environment detects calls to str.format allows an attacker that controls the content of a template to execute ar…
     16    7.5    high    CVE-2019-1010083   The Pallets Project Flask before 1.0 is affected by unexpected memory usage. The impact is denial of service. The attack vector is crafted encoded JSON da…
     18    7.5    high    CVE-2023-30861     When all of the following conditions are met, a response containing data intended for one client may be cached and subsequently sent by a proxy to other c…
     Severity rating   Count 
     Critical              0 
     High                  8 
     Medium                6 
     Low                   1 
  • Allow no reachable OSS vulnerability: pass
    (0 matched vulnerabilities; configured threshold is 0).

2 rules failed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants