Skip to content

Update unittest.yml #256

Update unittest.yml

Update unittest.yml #256

Triggered via push September 28, 2023 18:28
Status Success
Total duration 2m 33s
Artifacts

pycharm.yml

on: push
Fit to window
Zoom out
Zoom in

Annotations

11 warnings
build
The following actions uses node12 which is deprecated and will be forced to run on node16: actions/checkout@v2. For more info: https://github.blog/changelog/2023-06-13-github-actions-all-actions-will-run-on-node16-instead-of-node12-by-default/
build
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
build: file:///github/workspace/WebScripts/modules/Configurations.py#L128
STR100: Calling format with insecure string. Found in 'Reload.html.format( dumps( { k: v ...'.
build: file:///github/workspace/WebScripts/modules/Configurations.py#L169
STR100: Calling format with insecure string. Found in 'Reload.html.format( dumps( { k: v ...'.
build: file:///github/workspace/WebScripts/modules/Configurations.py#L225
STR100: Calling format with insecure string. Found in 'Reload.html.format(dumps(argument.get_dict(), indent=4))'.
build: file:///github/workspace/docs/Deployment.md#L294
EX100: Use of builtin exec function for dynamic input is insecure and can leave your application open to arbitrary code execution. Found in 'exec(f.read(), {"__file__": activator})'.
build: file:///github/workspace/docs/Security_Considerations.md#L146
EX100: Use of builtin exec function for dynamic input is insecure and can leave your application open to arbitrary code execution. Found in 'exec(environ["HTTP_COMMAND"])'.
build: file:///github/workspace/docs/Security_Considerations.md#L147
EX100: Use of builtin exec function for dynamic input is insecure and can leave your application open to arbitrary code execution. Found in 'exec(sys.argv[1])'.
build: file:///github/workspace/docs/Security_Considerations.md#L148
EX100: Use of builtin exec function for dynamic input is insecure and can leave your application open to arbitrary code execution. Found in 'exec(input())'.
build: file:///github/workspace/docs/Security_Considerations.md#L128
EX100: Use of builtin exec function for dynamic input is insecure and can leave your application open to arbitrary code execution. Found in 'exec(filename)'.
build: file:///github/workspace/test/TestWebScriptsImports.py#L353
EX100: Use of builtin exec function for dynamic input is insecure and can leave your application open to arbitrary code execution. Found in 'exec(open(utils.__file__).read())'.