This repository contains a vulnerable Python Flask application designed to demonstrate CodeQL security scanning capabilities.
This application intentionally contains the following security vulnerabilities for testing purposes:
- SQL Injection -
/user
endpoint - Command Injection -
/ping
endpoint - Path Traversal -
/file
endpoint - Cross-Site Scripting (XSS) -
/search
endpoint - Hardcoded Credentials -
/admin
endpoint - Insecure Deserialization -
/data
endpoint - Weak Cryptography -
/encrypt
endpoint (MD5) - File Upload Vulnerability -
/upload
endpoint
pip install -r requirements.txt
python app.py
The application will be available at http://localhost:5000
This repository is configured with two CodeQL workflows:
- Baseline CodeQL - Uses default CodeQL configuration
- Optimized CodeQL - Uses custom configuration with
security-extended
queries