Skip to content

Conversation

fern-api[bot]
Copy link
Contributor

@fern-api fern-api bot commented Sep 24, 2025

This PR regenerates code to match the latest API Definition.

@fern-api fern-api bot requested a review from a team as a code owner September 24, 2025 21:27
@fern-api fern-api bot requested a review from azhou202 September 24, 2025 21:27
last_edited_by: last_edited_by
visibility: PUBLIC
article_content_download_url: >-
https://s3.amazonaws.com/finance-department-bucket/2022/tax-certificate.pdf?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA3SGQVQG7FGA6KKA6%2F20221104%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20221104T140227Z&X-Amz-Expires=3600&X-Amz-SignedHeaders=host&X-Amz-Signature=b228dbec8c1008c80c162e1210e4503dceead1e4d4751b4d9787314fd6da4d55
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Semgrep identified an issue in your code:
AWS Access Key ID Value detected. This is a sensitive credential and should not be hardcoded here. Instead, read this value from an environment variable or keep it in a separate, private file.

To resolve this comment:

🔧 No guidance has been designated for this issue. Fix according to your organization's approved methods.

💬 Ignore this finding

Reply with Semgrep commands to ignore this finding.

  • /fp <comment> for false positive
  • /ar <comment> for acceptable risk
  • /other <comment> for all other reasons

Alternatively, triage in Semgrep AppSec Platform to ignore the finding created by detected-aws-access-key-id-value.

You can view more details about this finding in the Semgrep AppSec Platform.

last_edited_by: last_edited_by
visibility: PUBLIC
article_content_download_url: >-
https://s3.amazonaws.com/finance-department-bucket/2022/tax-certificate.pdf?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA3SGQVQG7FGA6KKA6%2F20221104%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20221104T140227Z&X-Amz-Expires=3600&X-Amz-SignedHeaders=host&X-Amz-Signature=b228dbec8c1008c80c162e1210e4503dceead1e4d4751b4d9787314fd6da4d55
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Semgrep identified an issue in your code:
AWS Access Key ID Value detected. This is a sensitive credential and should not be hardcoded here. Instead, read this value from an environment variable or keep it in a separate, private file.

To resolve this comment:

🔧 No guidance has been designated for this issue. Fix according to your organization's approved methods.

💬 Ignore this finding

Reply with Semgrep commands to ignore this finding.

  • /fp <comment> for false positive
  • /ar <comment> for acceptable risk
  • /other <comment> for all other reasons

Alternatively, triage in Semgrep AppSec Platform to ignore the finding created by detected-aws-access-key-id-value.

You can view more details about this finding in the Semgrep AppSec Platform.

Copy link

semgrep-app bot commented Sep 24, 2025

Semgrep found 17 non-literal-import findings:

  • src/merge/resources/knowledgebase/types/init.py
  • src/merge/resources/knowledgebase/resources/linked_accounts/types/init.py
  • src/merge/resources/knowledgebase/resources/linked_accounts/init.py
  • src/merge/resources/knowledgebase/resources/link_token/types/init.py
  • src/merge/resources/knowledgebase/resources/link_token/init.py
  • src/merge/resources/knowledgebase/resources/issues/types/init.py
  • src/merge/resources/knowledgebase/resources/issues/init.py
  • src/merge/resources/knowledgebase/resources/groups/types/init.py
  • src/merge/resources/knowledgebase/resources/groups/init.py
  • src/merge/resources/knowledgebase/resources/containers/types/init.py
  • src/merge/resources/knowledgebase/resources/containers/init.py
  • src/merge/resources/knowledgebase/resources/async_passthrough/types/init.py
  • src/merge/resources/knowledgebase/resources/async_passthrough/init.py
  • src/merge/resources/knowledgebase/resources/articles/types/init.py
  • src/merge/resources/knowledgebase/resources/articles/init.py
  • src/merge/resources/knowledgebase/resources/init.py
  • src/merge/resources/knowledgebase/init.py

Untrusted user input in importlib.import_module() function allows an attacker to load arbitrary code. Avoid dynamic values in importlib.import_module() or use a whitelist to prevent running untrusted code.

@niteshsandal-merge niteshsandal-merge merged commit fcae4cf into main Sep 25, 2025
4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant