performing-security-code-review
Warn
Audited by Socket on Feb 27, 2026
1 alert found:
SecuritySecurityassets/example_code_vulnerable.py
MEDIUMSecurityMEDIUM
assets/example_code_vulnerable.py
The file is an explicit educational collection of insecure coding patterns, but it includes a concrete malicious pickle payload that would execute a destructive shell command if unpickled. While the intent appears didactic rather than stealthy supply-chain malware, the code contains high-risk sinks (unpickling untrusted data, subprocess.run with shell=True, path traversal, SQL string concatenation). Do not unpickle untrusted input, avoid shell=True with concatenated input, validate filenames, and replace these examples with safe, non-destructive demonstrations when used in shared repositories.
Confidence: 75%Severity: 75%
Audit Metadata