ICUICU
critical

fastapi

v0.133.0

FastAPI framework, high performance, easy to learn, fast to code, ready for production

PyPIFirst seen Feb 25, 2026Source

121

Total

2

Critical

86

High

33

Medium

Findings

unknown
criticalDE-002Data ExfiltrationHigh ConfidenceLine 0

Environment file access

Detected by automated pattern matching (rule DE-002) with medium confidence. May be a false positive.

    7:     items_per_user: int = 50
    8: 
>>> 9:     model_config = SettingsConfigDict(env_file=".env")
Report false positive
criticalDE-002Data ExfiltrationHigh ConfidenceLine 0

Environment file access

Detected by automated pattern matching (rule DE-002) with medium confidence. May be a false positive.

    7:     items_per_user: int = 50
    8: 
>>> 9:     model_config = SettingsConfigDict(env_file=".env")
Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: J)����L�^�笴v�vW�

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: V+"nW�{D���r�+

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: ������֭k�"��

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    23: 
    24: 
>>> 25: process = subprocess.Popen(
    26:     ["uvicorn", "docs_src.separate_openapi_schemas.tutorial001:app"]
    27: )
Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: V+"nW�{D���r�+

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    23: 
    24: 
>>> 25: process = subprocess.Popen(
    26:     ["fastapi", "run", "docs_src/request_form_models/tutorial001.py"]
    27: )
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    23: 
    24: 
>>> 25: process = subprocess.Popen(
    26:     ["uvicorn", "docs_src.separate_openapi_schemas.tutorial001:app"]
    27: )
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    24: 
    25: 
>>> 26: process = subprocess.Popen(
    27:     ["uvicorn", "docs_src.separate_openapi_schemas.tutorial001:app"]
    28: )
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    24: 
    25: 
>>> 26: process = subprocess.Popen(
    27:     ["uvicorn", "docs_src.separate_openapi_schemas.tutorial001:app"]
    28: )
Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: J)����L�^�笴v�vW�

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    23: 
    24: 
>>> 25: process = subprocess.Popen(
    26:     ["uvicorn", "docs_src.separate_openapi_schemas.tutorial002:app"]
    27: )
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    22: 
    23: 
>>> 24: process = subprocess.Popen(
    25:     ["fastapi", "run", "docs_src/sql_databases/tutorial001.py"],
    26: )
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    22: 
    23: 
>>> 24: process = subprocess.Popen(
    25:     ["fastapi", "run", "docs_src/sql_databases/tutorial002.py"],
    26: )
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    191: 
    192:     logging.info("Setting up GitHub Actions git user")
>>> 193:     subprocess.run(["git", "config", "user.name", "github-actions[bot]"], check=True)
    194:     subprocess.run(
    195:         ["git", "config", "user.email", "github-actions[bot]@users.noreply.github.com"],
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    192:     logging.info("Setting up GitHub Actions git user")
    193:     subprocess.run(["git", "config", "user.name", "github-actions[bot]"], check=True)
>>> 194:     subprocess.run(
    195:         ["git", "config", "user.email", "github-actions[bot]@users.noreply.github.com"],
    196:         check=True,
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    198:     branch_name = f"fastapi-people-sponsors-{secrets.token_hex(4)}"
    199:     logging.info(f"Creating a new branch {branch_name}")
>>> 200:     subprocess.run(["git", "checkout", "-b", branch_name], check=True)
    201:     logging.info("Adding updated file")
    202:     subprocess.run(
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    200:     subprocess.run(["git", "checkout", "-b", branch_name], check=True)
    201:     logging.info("Adding updated file")
>>> 202:     subprocess.run(
    203:         [
    204:             "git",
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    210:     logging.info("Committing updated file")
    211:     message = "👥 Update FastAPI People - Sponsors"
>>> 212:     subprocess.run(["git", "commit", "-m", message], check=True)
    213:     logging.info("Pushing branch")
    214:     subprocess.run(["git", "push", "origin", branch_name], check=True)
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    212:     subprocess.run(["git", "commit", "-m", message], check=True)
    213:     logging.info("Pushing branch")
>>> 214:     subprocess.run(["git", "push", "origin", branch_name], check=True)
    215:     logging.info("Creating PR")
    216:     pr = repo.create_pull(title=message, body=message, base="master", head=branch_name)
Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: ��'���*l��{Z�w�

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: ��'���*l��{Z�w�

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: J�'���E�)�{ �Z

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: J�'���E�)�{ �Z

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: ��'���*l��{Z�w�

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: ������֭k�"��

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    57:     repos_path.write_text(new_repos_content, encoding="utf-8")
    58:     logging.info("Setting up GitHub Actions git user")
>>> 59:     subprocess.run(["git", "config", "user.name", "github-actions[bot]"], check=True)
    60:     subprocess.run(
    61:         ["git", "config", "user.email", "github-actions[bot]@users.noreply.github.com"],
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    58:     logging.info("Setting up GitHub Actions git user")
    59:     subprocess.run(["git", "config", "user.name", "github-actions[bot]"], check=True)
>>> 60:     subprocess.run(
    61:         ["git", "config", "user.email", "github-actions[bot]@users.noreply.github.com"],
    62:         check=True,
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    64:     branch_name = f"fastapi-topic-repos-{secrets.token_hex(4)}"
    65:     logging.info(f"Creating a new branch {branch_name}")
>>> 66:     subprocess.run(["git", "checkout", "-b", branch_name], check=True)
    67:     logging.info("Adding updated file")
    68:     subprocess.run(["git", "add", str(repos_path)], check=True)
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    66:     subprocess.run(["git", "checkout", "-b", branch_name], check=True)
    67:     logging.info("Adding updated file")
>>> 68:     subprocess.run(["git", "add", str(repos_path)], check=True)
    69:     logging.info("Committing updated file")
    70:     message = "👥 Update FastAPI GitHub topic repositories"
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    69:     logging.info("Committing updated file")
    70:     message = "👥 Update FastAPI GitHub topic repositories"
>>> 71:     subprocess.run(["git", "commit", "-m", message], check=True)
    72:     logging.info("Pushing branch")
    73:     subprocess.run(["git", "push", "origin", branch_name], check=True)
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    71:     subprocess.run(["git", "commit", "-m", message], check=True)
    72:     logging.info("Pushing branch")
>>> 73:     subprocess.run(["git", "push", "origin", branch_name], check=True)
    74:     logging.info("Creating PR")
    75:     pr = r.create_pull(title=message, body=message, base="master", head=branch_name)
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    401:         print("Repository is clean, no changes to commit")
    402:         return
>>> 403:     subprocess.run(["git", "config", "user.name", "github-actions[bot]"], check=True)
    404:     subprocess.run(
    405:         ["git", "config", "user.email", "github-actions[bot]@users.noreply.github.com"],
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    402:         return
    403:     subprocess.run(["git", "config", "user.name", "github-actions[bot]"], check=True)
>>> 404:     subprocess.run(
    405:         ["git", "config", "user.email", "github-actions[bot]@users.noreply.github.com"],
    406:         check=True,
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    419:         branch_name += f"-{secrets.token_hex(4)}"
    420:         print(f"Creating a new branch {branch_name}")
>>> 421:         subprocess.run(["git", "checkout", "-b", branch_name], check=True)
    422:     else:
    423:         branch_name = current_branch
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    425:     print("Adding updated files")
    426:     git_path = Path("docs")
>>> 427:     subprocess.run(["git", "add", str(git_path)], check=True)
    428:     print("Committing updated file")
    429:     message = "🌐 Update translations"
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    432:     if command:
    433:         message += f" ({command})"
>>> 434:     subprocess.run(["git", "commit", "-m", message], check=True)
    435:     print("Pushing branch")
    436:     subprocess.run(["git", "push", "origin", branch_name], check=True)
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    434:     subprocess.run(["git", "commit", "-m", message], check=True)
    435:     print("Pushing branch")
>>> 436:     subprocess.run(["git", "push", "origin", branch_name], check=True)
    437:     if not commit_in_place:
    438:         print("Creating PR")
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    9: 
    10: def test_fastapi_cli():
>>> 11:     result = subprocess.run(
    12:         [
    13:             sys.executable,
Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: 8 ��cڲ�(��^j��

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: ��v��=����ƶ瞜�_5��k�zݿw�=�����i�����Ǽww�

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: 8 ��cڲ�(��^j��

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: 8 ��cڲ�(��^j��

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: ��v��=����ƶ瞜�_5��k�zݿw�=�����i�����Ǽww�

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: 8 ��cڲ�(��^j��

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: 8 ��cڲ�(��^j��

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: ��v��=����ƶ瞜�_5��k�zݿw�=�����i�����Ǽww�

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: 8 ��cڲ�(��^j��

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: 8 ��cڲ�(��^j��

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: ��v��=����ƶ瞜�_5��k�zݿw�=�����i�����Ǽww�

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: 8 ��cڲ�(��^j��

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highSC-003Suspicious CommandsMedium ConfidenceLine 0

Dynamic code execution via exec()

Detected by automated pattern matching (rule SC-003) with medium confidence. May be a false positive.

    52:     limit: Annotated[int, Query(le=100)] = 100,
    53: ) -> list[Hero]:
>>> 54:     heroes = session.exec(select(Hero).offset(offset).limit(limit)).all()
    55:     return heroes
    56: 
Report false positive
highSC-003Suspicious CommandsMedium ConfidenceLine 0

Dynamic code execution via exec()

Detected by automated pattern matching (rule SC-003) with medium confidence. May be a false positive.

    48:     limit: int = Query(default=100, le=100),
    49: ) -> list[Hero]:
>>> 50:     heroes = session.exec(select(Hero).offset(offset).limit(limit)).all()
    51:     return heroes
    52: 
Report false positive
highSC-003Suspicious CommandsMedium ConfidenceLine 0

Dynamic code execution via exec()

Detected by automated pattern matching (rule SC-003) with medium confidence. May be a false positive.

    69:     limit: Annotated[int, Query(le=100)] = 100,
    70: ):
>>> 71:     heroes = session.exec(select(Hero).offset(offset).limit(limit)).all()
    72:     return heroes
    73: 
Report false positive
highSC-003Suspicious CommandsMedium ConfidenceLine 0

Dynamic code execution via exec()

Detected by automated pattern matching (rule SC-003) with medium confidence. May be a false positive.

    66:     limit: int = Query(default=100, le=100),
    67: ):
>>> 68:     heroes = session.exec(select(Hero).offset(offset).limit(limit)).all()
    69:     return heroes
    70: 
Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: �I���r�hv�vW�

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: �I���r�hv�vW�

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: r���'Z�؜���j{bs�n�_���5

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: R{.��+��E��]�k���yf��)�

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: R{.��+��E��]�k���yf��)�

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    283: 
    284:     logging.info("Setting up GitHub Actions git user")
>>> 285:     subprocess.run(["git", "config", "user.name", "github-actions[bot]"], check=True)
    286:     subprocess.run(
    287:         ["git", "config", "user.email", "github-actions[bot]@users.noreply.github.com"],
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    284:     logging.info("Setting up GitHub Actions git user")
    285:     subprocess.run(["git", "config", "user.name", "github-actions[bot]"], check=True)
>>> 286:     subprocess.run(
    287:         ["git", "config", "user.email", "github-actions[bot]@users.noreply.github.com"],
    288:         check=True,
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    290:     branch_name = f"fastapi-people-contributors-{secrets.token_hex(4)}"
    291:     logging.info(f"Creating a new branch {branch_name}")
>>> 292:     subprocess.run(["git", "checkout", "-b", branch_name], check=True)
    293:     logging.info("Adding updated file")
    294:     subprocess.run(
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    292:     subprocess.run(["git", "checkout", "-b", branch_name], check=True)
    293:     logging.info("Adding updated file")
>>> 294:     subprocess.run(
    295:         [
    296:             "git",
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    304:     logging.info("Committing updated file")
    305:     message = "👥 Update FastAPI People - Contributors and Translators"
>>> 306:     subprocess.run(["git", "commit", "-m", message], check=True)
    307:     logging.info("Pushing branch")
    308:     subprocess.run(["git", "push", "origin", branch_name], check=True)
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    306:     subprocess.run(["git", "commit", "-m", message], check=True)
    307:     logging.info("Pushing branch")
>>> 308:     subprocess.run(["git", "push", "origin", branch_name], check=True)
    309:     logging.info("Creating PR")
    310:     pr = repo.create_pull(title=message, body=message, base="master", head=branch_name)
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    170:     os.chdir(lang_path)
    171:     shutil.rmtree(build_site_dist_path, ignore_errors=True)
>>> 172:     subprocess.run(["mkdocs", "build", "--site-dir", build_site_dist_path], check=True)
    173:     shutil.copytree(build_site_dist_path, dist_path, dirs_exist_ok=True)
    174:     os.chdir(current_dir)
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    336:     if dirty:
    337:         args.append("--dirty")
>>> 338:     subprocess.run(
    339:         args, env={**os.environ, "LINENUMS": "true"}, cwd=lang_path, check=True
    340:     )
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    423:     previous_content = {base_content}
    424:     for target_version in target_versions:
>>> 425:         version_result = subprocess.run(
    426:             [
    427:                 find_ruff_bin(),
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    437:         )
    438:         content_target = version_result.stdout.decode("utf-8")
>>> 439:         format_result = subprocess.run(
    440:             [find_ruff_bin(), "format", "-"],
    441:             input=content_target.encode("utf-8"),
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    443: 
    444:     logging.info("Setting up GitHub Actions git user")
>>> 445:     subprocess.run(["git", "config", "user.name", "github-actions[bot]"], check=True)
    446:     subprocess.run(
    447:         ["git", "config", "user.email", "github-actions[bot]@users.noreply.github.com"],
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    444:     logging.info("Setting up GitHub Actions git user")
    445:     subprocess.run(["git", "config", "user.name", "github-actions[bot]"], check=True)
>>> 446:     subprocess.run(
    447:         ["git", "config", "user.email", "github-actions[bot]@users.noreply.github.com"],
    448:         check=True,
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    450:     branch_name = f"fastapi-people-experts-{secrets.token_hex(4)}"
    451:     logging.info(f"Creating a new branch {branch_name}")
>>> 452:     subprocess.run(["git", "checkout", "-b", branch_name], check=True)
    453:     logging.info("Adding updated file")
    454:     subprocess.run(["git", "add", str(people_path)], check=True)
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    452:     subprocess.run(["git", "checkout", "-b", branch_name], check=True)
    453:     logging.info("Adding updated file")
>>> 454:     subprocess.run(["git", "add", str(people_path)], check=True)
    455:     logging.info("Committing updated file")
    456:     message = "👥 Update FastAPI People - Experts"
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    455:     logging.info("Committing updated file")
    456:     message = "👥 Update FastAPI People - Experts"
>>> 457:     subprocess.run(["git", "commit", "-m", message], check=True)
    458:     logging.info("Pushing branch")
    459:     subprocess.run(["git", "push", "origin", branch_name], check=True)
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    457:     subprocess.run(["git", "commit", "-m", message], check=True)
    458:     logging.info("Pushing branch")
>>> 459:     subprocess.run(["git", "push", "origin", branch_name], check=True)
    460:     logging.info("Creating PR")
    461:     pr = repo.create_pull(title=message, body=message, base="master", head=branch_name)
Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: +��"�q1������[l

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: +��"�q1������[l

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: +��"�q1������[l

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: ������֭k�^��^

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: ������֭k�^��^

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    24: 
    25: 
>>> 26: process = subprocess.Popen(
    27:     ["fastapi", "run", "docs_src/cookie_param_models/tutorial001.py"]
    28: )
Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: v�,���v�,�)��ۭ�����(�H�

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    23: 
    24: 
>>> 25: process = subprocess.Popen(
    26:     ["fastapi", "run", "docs_src/header_param_models/tutorial001.py"]
    27: )
Report false positive
highDO-BASunknownMedium ConfidenceLine 0

Decoded base64 content: v�,���v�,�)��ۭ�����^i׫

Detected by automated pattern matching (rule DO-BAS) with medium confidence. May be a false positive.

Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    22: 
    23: 
>>> 24: process = subprocess.Popen(
    25:     ["fastapi", "run", "docs_src/json_base64_bytes/tutorial001_py310.py"]
    26: )
Report false positive
highSC-001Suspicious CommandsMedium ConfidenceLine 0

Subprocess execution

Detected by automated pattern matching (rule SC-001) with medium confidence. May be a false positive.

    26: 
    27: 
>>> 28: process = subprocess.Popen(
    29:     ["fastapi", "run", "docs_src/query_param_models/tutorial001.py"]
    30: )
Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.6 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.6 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.6 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.8 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumOB-001ObfuscationMedium ConfidenceLine 0

Possible Base64-encoded payload (long encoded string)

Detected by automated pattern matching (rule OB-001) with medium confidence. May be a false positive.

    10: # to get a string like this run:
    11: # openssl rand -hex 32
>>> 12: SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    13: ALGORITHM = "HS256"
    14: ACCESS_TOKEN_EXPIRE_MINUTES = 30
Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (5.4 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.6 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.6 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.6 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.6 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumOB-001ObfuscationMedium ConfidenceLine 0

Possible Base64-encoded payload (long encoded string)

Detected by automated pattern matching (rule OB-001) with medium confidence. May be a false positive.

    15: # to get a string like this run:
    16: # openssl rand -hex 32
>>> 17: SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    18: ALGORITHM = "HS256"
    19: ACCESS_TOKEN_EXPIRE_MINUTES = 30
Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (5.4 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (5.5 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.6 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.9 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.6 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.6 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.8 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumOB-001ObfuscationMedium ConfidenceLine 0

Possible Base64-encoded payload (long encoded string)

Detected by automated pattern matching (rule OB-001) with medium confidence. May be a false positive.

    14: # to get a string like this run:
    15: # openssl rand -hex 32
>>> 16: SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    17: ALGORITHM = "HS256"
    18: ACCESS_TOKEN_EXPIRE_MINUTES = 30
Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (5.4 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (5.5 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.6 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.9 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.6 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.7 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.6 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (5.4 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumOB-001ObfuscationMedium ConfidenceLine 0

Possible Base64-encoded payload (long encoded string)

Detected by automated pattern matching (rule OB-001) with medium confidence. May be a false positive.

    11: # to get a string like this run:
    12: # openssl rand -hex 32
>>> 13: SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    14: ALGORITHM = "HS256"
    15: ACCESS_TOKEN_EXPIRE_MINUTES = 30
Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.6 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumOB-001ObfuscationMedium ConfidenceLine 0

Possible Base64-encoded payload (long encoded string)

Detected by automated pattern matching (rule OB-001) with medium confidence. May be a false positive.

    78:         "title": "Query string",
    79:         "description": "Query string for the items to search in the database that have a good match",
>>> 80:         # See https://github.com/pydantic/pydantic/blob/80353c29a824c55dea4667b328ba8f329879ac9f/tests/test_fastapi.sh#L25-L34.
    81:         **({"deprecated": True} if PYDANTIC_VERSION_MINOR_TUPLE >= (2, 10) else {}),
    82:     }
Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.5 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumEN-001unknownMedium ConfidenceLine 0

High-entropy string (4.8 bits/char) — possible encoded payload

Detected by automated pattern matching (rule EN-001) with medium confidence. May be a false positive.

Report false positive
mediumOB-001ObfuscationMedium ConfidenceLine 0

Possible Base64-encoded payload (long encoded string)

Detected by automated pattern matching (rule OB-001) with medium confidence. May be a false positive.

    263:     if "$ref" not in json_schema:
    264:         # TODO remove when deprecating Pydantic v1
>>> 265:         # Ref: https://github.com/pydantic/pydantic/blob/d61792cc42c80b13b23e3ffa74bc37ec7c77f7d1/pydantic/schema.py#L207
    266:         json_schema["title"] = field.field_info.title or field_alias.title().replace(
    267:             "_", " "
Report false positive