django-verification
Audited by Socket on Feb 15, 2026
1 alert found:
MalwareThis is a legitimate Django verification checklist and CI workflow with actions and commands consistent with its purpose. It does not contain obfuscated or clearly malicious code. However, there are security issues in example commands that could lead to credential exposure or insecure state if executed in non-isolated environments — specifically creating a superuser with a hardcoded weak password and printing secret/debug status to logs. Recommendations: remove or sandbox any account-creation examples, never use plaintext weak passwords in examples, avoid printing secrets to CI logs, pin dependencies / use lockfiles for installs, and ensure CI artifacts and logs are access-restricted. Overall: benign intent but contains insecure example patterns that should be fixed before reuse in production CI.