WhisperX tag archive

#sast

This page collects WhisperX intelligence signals tagged #sast. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (9)

The Lab · 2026-03-28 18:26:54 · GitHub Issues

1. Health Dataspace MVP Exposes Critical CVEs in Next.js, OTel SDK, Undici During Penetration Test Prep

A planned penetration test for the Minimum Viable Health Dataspace v2 has revealed multiple high-severity vulnerabilities in its core dependencies, raising immediate security risks for the demo platform. The automated scan, using Trivy and npm audit, identified critical flaws in the Next.js framework, the OpenTelemetry...

The Lab · 2026-04-13 06:22:30 · GitHub Issues

2. GitHub Repo 'vuln-test-suite' Exposes Critical Command Injection Flaw via `shell=True`

A critical security vulnerability has been flagged in a public GitHub repository, exposing a direct path for command injection attacks. The automated scanner 'bandit' identified a HIGH severity flaw (CWE-78) in the file `vulnerable_code/command_injection.py`. The issue stems from the dangerous use of `subprocess.call()...

The Lab · 2026-04-14 15:22:48 · GitHub Issues

3. Apache Superset Codebase Flags High-Risk 'eval()' Use, Potential Code Injection Vulnerability

A high-severity security vulnerability has been flagged within the Apache Superset project's codebase. The automated scanner Semgrep detected the use of the dangerous `eval()` function in a file named `insecure_deserialization.py`. The presence of `eval()` is a classic red flag for potential code injection attacks, esp...

The Lab · 2026-04-14 15:22:49 · GitHub Issues

4. Apache Superset Codebase Flags High-Risk 'eval()' Vulnerability in Python File

A high-severity code injection vulnerability has been flagged within the Apache Superset project's codebase. The static application security testing (SAST) scanner Semgrep detected the use of the dangerous `eval()` function in a Python file, raising a red flag for a potential CWE-95 (Improper Neutralization of Directiv...

The Lab · 2026-04-16 02:22:27 · GitHub Issues

5. Apache Superset Codebase Exposes Multiple XSS Vulnerabilities via markupsafe.Markup

A security scan of the Apache Superset codebase has flagged a critical pattern of insecure coding practices, exposing the popular data visualization platform to potential cross-site scripting (XSS) attacks. The automated scanner, Bandit, identified seven distinct locations where the `markupsafe.Markup` class is being u...

The Lab · 2026-04-16 02:22:28 · GitHub Issues

6. Apache Superset Code Audit Flags Medium-Severity Path Traversal Risk in URL Handling

A static application security testing (SAST) scan of the Apache Superset codebase has identified a medium-severity vulnerability related to improper URL scheme validation. The scanner, Bandit, flagged five distinct locations where the `urlopen` function is used without restricting permitted URL schemes, potentially all...

The Lab · 2026-04-16 02:22:35 · GitHub Issues

7. Python YAML Vulnerability Alert: Unsafe Load Methods Risk Arbitrary Code Execution

A critical software vulnerability has been flagged, exposing Python applications using common YAML parsing libraries to potential remote takeover. The flaw centers on the use of unsafe deserialization methods—specifically `yaml.unsafe_load`, `yaml.Loader`, `yaml.CLoader`, and `yaml.UnsafeLoader`. These functions, when ...

The Lab · 2026-04-16 04:22:43 · GitHub Issues

9. Apache Superset Code Audit Flags Medium-Severity Path Traversal Risk in URL Handling

A static application security testing (SAST) scan of the Apache Superset codebase has identified a medium-severity vulnerability related to improper URL scheme validation. The scanner, Bandit, flagged five distinct locations where the code opens URLs without restricting permitted schemes, potentially allowing the use o...