Skip to content

Create requirements.txt #343

Create requirements.txt

Create requirements.txt #343

Triggered via push April 7, 2024 08:50
Status Success
Total duration 1m 55s
Artifacts

pycharm.yml

on: push
Fit to window
Zoom out
Zoom in

Annotations

12 warnings
build
Node.js 16 actions are deprecated. Please update the following actions to use Node.js 20: actions/checkout@v2. For more information see: https://github.blog/changelog/2023-09-22-github-actions-transitioning-from-node-16-to-node-20/.
build
The following actions uses node12 which is deprecated and will be forced to run on node16: actions/checkout@v2. For more info: https://github.blog/changelog/2023-06-13-github-actions-all-actions-will-run-on-node16-instead-of-node12-by-default/
build
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
build: file:///github/workspace/docs/Deployment.md#L294
EX100: Use of builtin exec function for dynamic input is insecure and can leave your application open to arbitrary code execution. Found in 'exec(f.read(), {"__file__": activator})'.
build: file:///github/workspace/docs/Security_Considerations.md#L128
EX100: Use of builtin exec function for dynamic input is insecure and can leave your application open to arbitrary code execution. Found in 'exec(filename)'.
build: file:///github/workspace/docs/Security_Considerations.md#L146
EX100: Use of builtin exec function for dynamic input is insecure and can leave your application open to arbitrary code execution. Found in 'exec(environ["HTTP_COMMAND"])'.
build: file:///github/workspace/docs/Security_Considerations.md#L147
EX100: Use of builtin exec function for dynamic input is insecure and can leave your application open to arbitrary code execution. Found in 'exec(sys.argv[1])'.
build: file:///github/workspace/docs/Security_Considerations.md#L148
EX100: Use of builtin exec function for dynamic input is insecure and can leave your application open to arbitrary code execution. Found in 'exec(input())'.
build: file:///github/workspace/test/TestWebScriptsImports.py#L353
EX100: Use of builtin exec function for dynamic input is insecure and can leave your application open to arbitrary code execution. Found in 'exec(open(utils.__file__).read())'.
build: file:///github/workspace/Scripts/wsgi.py#L55
EX100: Use of builtin exec function for dynamic input is insecure and can leave your application open to arbitrary code execution. Found in 'exec(f.read(), {"__file__": activator})'.
build: file:///github/workspace/setup.py#L206
OS100: Modification of system files to allow execution. Found in 'os.chmod(filename, 0o600)'.
build: file:///github/workspace/setup.py#L208
OS100: Modification of system files to allow execution. Found in 'os.chmod(filename, 0o400)'.