Skip to content

Code Security Report: 8 high severity findings, 14 total findings [main] #410

@mend-for-git.832008.xyz

Description

@mend-for-git.832008.xyz

Code Security Report

Scan Metadata

Latest Scan: 2026-01-23 07:30pm
Total Findings: 14 | New Findings: 0 | Resolved Findings: 0
Tested Project Files: 162
Detected Programming Languages: 2 (Go, Python)

  • Check this box to manually trigger a scan

Note: GitHub may take a few seconds to process actions triggered via checkboxes.
Please wait until the change is visible before continuing.

Most Relevant Findings

The list below presents the 10 most relevant findings that need your attention. To view information on the remaining findings, navigate to the Mend Application.

SeverityVulnerability TypeCWEFileData FlowsDetected
HighPath/Directory Traversal

CWE-22

read.py:14

22025-10-28 08:08pm
Vulnerable Code

blockSize = 8 * 1024 * 1024
fileSize = int(size) * (1024 * 1024 * 1024)
bytes_read = 0
t1 = time.time()
fd = open(os.path.join(mountpath, 'application_'+size+'.data'), 'rb')

2 Data Flow/s detected
View Data Flow 1

size = sys.argv[2]

View Data Flow 2

mountpath = sys.argv[1]

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Path/Directory Traversal Training

● Videos

   ▪ Secure Code Warrior Path/Directory Traversal Video

● Further Reading

   ▪ OWASP Path Traversal

   ▪ OWASP Input Validation Cheat Sheet

Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

Note: GitHub may take a few seconds to process actions triggered via checkboxes.
Please wait until the change is visible before continuing.

 
HighInsecure Directory Permissions

CWE-732

block_cache.go:1377

12025-10-28 08:08pm
Vulnerable Code

}
}
defer root.Close()
// Create directory structure if not exists
err = os.MkdirAll(filepath.Dir(localPath), 0755)

1 Data Flow/s detected

err = os.MkdirAll(filepath.Dir(localPath), 0755)

Secure Code Warrior Training Material
Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

Note: GitHub may take a few seconds to process actions triggered via checkboxes.
Please wait until the change is visible before continuing.

 
HighPath/Directory Traversal

CWE-22

write.py:16

22025-10-28 08:08pm
Vulnerable Code

bytes_written = 0
data = os.urandom(blockSize)
t1 = time.time()
fd = open(os.path.join(mountpath, 'application_'+size+'.data'), 'wb')

2 Data Flow/s detected
View Data Flow 1

size = sys.argv[2]

View Data Flow 2

mountpath = sys.argv[1]

Secure Code Warrior Training Material

● Training

   ▪ Secure Code Warrior Path/Directory Traversal Training

● Videos

   ▪ Secure Code Warrior Path/Directory Traversal Video

● Further Reading

   ▪ OWASP Path Traversal

   ▪ OWASP Input Validation Cheat Sheet

Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

Note: GitHub may take a few seconds to process actions triggered via checkboxes.
Please wait until the change is visible before continuing.

 
HighInsecure Directory Permissions

CWE-732

block_cache.go:1909

12025-10-28 08:08pm
Vulnerable Code

goto return_safe
}
defer root.Close()
// Create directory structure if not exists
err = os.MkdirAll(filepath.Dir(localPath), 0755)

1 Data Flow/s detected

err = os.MkdirAll(filepath.Dir(localPath), 0755)

Secure Code Warrior Training Material
Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

Note: GitHub may take a few seconds to process actions triggered via checkboxes.
Please wait until the change is visible before continuing.

 
HighInsecure Directory Permissions

CWE-732

block_cache.go:1355

12025-10-28 08:08pm
Vulnerable Code

if bc.tmpPath != "" {
root, err := os.OpenRoot(bc.tmpPath)
localPath := filepath.Join(bc.tmpPath, fileName)
if err != nil {
err := os.MkdirAll(bc.tmpPath, 0755)

1 Data Flow/s detected

err := os.MkdirAll(bc.tmpPath, 0755)

Secure Code Warrior Training Material
Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

Note: GitHub may take a few seconds to process actions triggered via checkboxes.
Please wait until the change is visible before continuing.

 
HighInsecure File Permissions

CWE-732

cache_policy.go:121

12025-11-14 07:31pm
Vulnerable Code

err := os.Remove(name)
if err != nil && os.IsPermission(err) {
// File is not having delete permissions so change the mode and retry deletion
log.Warn("cachePolicy::deleteFile : failed to delete %s due to permission", name)
err = os.Chmod(name, os.FileMode(0644))

1 Data Flow/s detected

err = os.Chmod(name, os.FileMode(0644))

Secure Code Warrior Training Material
Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

Note: GitHub may take a few seconds to process actions triggered via checkboxes.
Please wait until the change is visible before continuing.

 
HighInsecure Directory Permissions

CWE-732

mount_tracker.go:84

12025-09-02 04:18pm
Vulnerable Code

if err != nil {
return "", err
}
// Ensure the AppData folder exists
if err := os.MkdirAll(appDataPath, 0755); err != nil {

1 Data Flow/s detected

if err := os.MkdirAll(appDataPath, 0755); err != nil {

Secure Code Warrior Training Material
Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

Note: GitHub may take a few seconds to process actions triggered via checkboxes.
Please wait until the change is visible before continuing.

 
HighInsecure Directory Permissions

CWE-732

block_cache.go:1885

12025-10-28 08:08pm
Vulnerable Code

bc.threadPool.Schedule(false, item)
return
}
if bc.tmpPath != "" {
err := os.MkdirAll(bc.tmpPath, 0755)

1 Data Flow/s detected

err := os.MkdirAll(bc.tmpPath, 0755)

Secure Code Warrior Training Material
Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

Note: GitHub may take a few seconds to process actions triggered via checkboxes.
Please wait until the change is visible before continuing.

 
MediumHeap Inspection

CWE-244

config.go:159

12025-04-29 05:08pm
Vulnerable Code

ClientSecret string `config:"clientsecret" yaml:"clientsecret,omitempty"`

Secure Code Warrior Training Material
Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

Note: GitHub may take a few seconds to process actions triggered via checkboxes.
Please wait until the change is visible before continuing.

 
MediumHeap Inspection

CWE-244

config.go:63

12025-09-02 07:32pm
Vulnerable Code

configEncryptionPassphrase string // Sets config file encryption passphrase

Secure Code Warrior Training Material
Suppress Finding
  • ... as False Alarm
  • ... as Acceptable Risk

Note: GitHub may take a few seconds to process actions triggered via checkboxes.
Please wait until the change is visible before continuing.

Findings Overview

Severity Vulnerability Type CWE Language Count
High Path/Directory Traversal CWE-22 Python 2
High Insecure Directory Permissions CWE-732 Go 5
High Insecure File Permissions CWE-732 Go 1
Medium Heap Inspection CWE-244 Go 5
Low Weak Hash Strength CWE-916 Go 1

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions