From 6041a8f57370773704494b4211bf639aac2dc09b Mon Sep 17 00:00:00 2001 From: dqy <1016751306@qq.com> Date: Thu, 25 Apr 2024 20:11:21 +0800 Subject: [PATCH] =?UTF-8?q?fix:=20=E5=88=A0=E9=99=A4=E7=BB=93=E6=9E=9C?= =?UTF-8?q?=E8=BE=93=E5=87=BA?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- results/code/test_backdoor_detection.html | 1 - results/code/test_backdoor_detection.md | 57 ----------------------- results/code/test_backdoor_detection.txt | 57 ----------------------- results/requirements/results.html | 9 ---- results/requirements/results.md | 7 --- results/requirements/results.txt | 6 --- 6 files changed, 137 deletions(-) delete mode 100644 results/code/test_backdoor_detection.html delete mode 100644 results/code/test_backdoor_detection.md delete mode 100644 results/code/test_backdoor_detection.txt delete mode 100644 results/requirements/results.html delete mode 100644 results/requirements/results.md delete mode 100644 results/requirements/results.txt diff --git a/results/code/test_backdoor_detection.html b/results/code/test_backdoor_detection.html deleted file mode 100644 index e11fc31..0000000 --- a/results/code/test_backdoor_detection.html +++ /dev/null @@ -1 +0,0 @@ -Analysis of ../results/code\test_backdoor_detection.html

Security Analysis Report

High Risk

Medium Risk

Low Risk

None Risk

\ No newline at end of file diff --git a/results/code/test_backdoor_detection.md b/results/code/test_backdoor_detection.md deleted file mode 100644 index f490869..0000000 --- a/results/code/test_backdoor_detection.md +++ /dev/null @@ -1,57 +0,0 @@ -# Security Analysis Report for ../results/code\test_backdoor_detection.md -## High Risk -- Line 9: os.system('rm -rf /') -- Line 10: exec('print("Hello")') -- Line 11: eval('2 + 2') -- Line 15: self.assertIn((2, "os.system('rm -rf /')"), results["high"]) -- Line 16: self.assertIn((3, "exec('print(\"Hello\")')"), results["high"]) -- Line 17: self.assertIn((4, "eval('2 + 2')"), results["high"]) -- Line 44: eval('2 + 2') -- Line 50: (3, "eval('2 + 2')"), -## Medium Risk -- Line 21: subprocess.run(['ls', '-l']) -- Line 23: os.popen('ls') -- Line 27: self.assertIn((2, "subprocess.run(['ls', '-l'])"), results["medium"]) -- Line 28: self.assertIn((4, "os.popen('ls')"), results["medium"]) -- Line 45: subprocess.run(['echo', 'hello']) -- Line 54: (4, "subprocess.run(['echo', 'hello'])"), -## Low Risk -## None Risk -- Line 1: import unittest -- Line 3: from detection.backdoor_detection import find_dangerous_functions -- Line 6: class TestBackdoorDetection(unittest.TestCase): -- Line 7: def test_high_risk_detection(self): -- Line 8: content = """import os -- Line 12: """ -- Line 13: file_extension = ".py" -- Line 14: results = find_dangerous_functions(content, file_extension) -- Line 19: def test_medium_risk_detection(self): -- Line 20: content = """import subprocess -- Line 22: import os -- Line 24: """ -- Line 25: file_extension = ".py" -- Line 26: results = find_dangerous_functions(content, file_extension) -- Line 30: def test_no_risk_detection(self): -- Line 31: content = """a = 10 -- Line 32: b = a + 5 -- Line 33: print('This should not be detected as risky.') -- Line 34: """ -- Line 35: file_extension = ".py" -- Line 36: results = find_dangerous_functions(content, file_extension) -- Line 37: self.assertEqual(len(results["high"]), 0) -- Line 38: self.assertEqual(len(results["medium"]), 0) -- Line 39: self.assertEqual(len(results["low"]), 0) -- Line 41: def test_inclusion_of_comments(self): -- Line 42: content = """ -- Line 43: print('This is a safe line') -- Line 46: """ -- Line 47: file_extension = ".py" -- Line 48: results = find_dangerous_functions(content, file_extension) -- Line 49: self.assertIn( -- Line 51: results["high"], -- Line 52: ) -- Line 53: self.assertIn( -- Line 55: results["medium"], -- Line 56: ) -- Line 59: if __name__ == "__main__": -- Line 60: unittest.main() diff --git a/results/code/test_backdoor_detection.txt b/results/code/test_backdoor_detection.txt deleted file mode 100644 index c1e1bd0..0000000 --- a/results/code/test_backdoor_detection.txt +++ /dev/null @@ -1,57 +0,0 @@ -Security Analysis Report for ../results/code\test_backdoor_detection.txt -High Risk: - Line 9: os.system('rm -rf /') - Line 10: exec('print("Hello")') - Line 11: eval('2 + 2') - Line 15: self.assertIn((2, "os.system('rm -rf /')"), results["high"]) - Line 16: self.assertIn((3, "exec('print(\"Hello\")')"), results["high"]) - Line 17: self.assertIn((4, "eval('2 + 2')"), results["high"]) - Line 44: eval('2 + 2') - Line 50: (3, "eval('2 + 2')"), -Medium Risk: - Line 21: subprocess.run(['ls', '-l']) - Line 23: os.popen('ls') - Line 27: self.assertIn((2, "subprocess.run(['ls', '-l'])"), results["medium"]) - Line 28: self.assertIn((4, "os.popen('ls')"), results["medium"]) - Line 45: subprocess.run(['echo', 'hello']) - Line 54: (4, "subprocess.run(['echo', 'hello'])"), -Low Risk: -None Risk: - Line 1: import unittest - Line 3: from detection.backdoor_detection import find_dangerous_functions - Line 6: class TestBackdoorDetection(unittest.TestCase): - Line 7: def test_high_risk_detection(self): - Line 8: content = """import os - Line 12: """ - Line 13: file_extension = ".py" - Line 14: results = find_dangerous_functions(content, file_extension) - Line 19: def test_medium_risk_detection(self): - Line 20: content = """import subprocess - Line 22: import os - Line 24: """ - Line 25: file_extension = ".py" - Line 26: results = find_dangerous_functions(content, file_extension) - Line 30: def test_no_risk_detection(self): - Line 31: content = """a = 10 - Line 32: b = a + 5 - Line 33: print('This should not be detected as risky.') - Line 34: """ - Line 35: file_extension = ".py" - Line 36: results = find_dangerous_functions(content, file_extension) - Line 37: self.assertEqual(len(results["high"]), 0) - Line 38: self.assertEqual(len(results["medium"]), 0) - Line 39: self.assertEqual(len(results["low"]), 0) - Line 41: def test_inclusion_of_comments(self): - Line 42: content = """ - Line 43: print('This is a safe line') - Line 46: """ - Line 47: file_extension = ".py" - Line 48: results = find_dangerous_functions(content, file_extension) - Line 49: self.assertIn( - Line 51: results["high"], - Line 52: ) - Line 53: self.assertIn( - Line 55: results["medium"], - Line 56: ) - Line 59: if __name__ == "__main__": - Line 60: unittest.main() diff --git a/results/requirements/results.html b/results/requirements/results.html deleted file mode 100644 index a5dd084..0000000 --- a/results/requirements/results.html +++ /dev/null @@ -1,9 +0,0 @@ -Vulnerability Report -

Vulnerability Report

-

OK: apache-airflow==2.8.0 is not affected.

-

WARNING: mlflow==2.5.1 is vulnerable!

-

OK: torch==2.0.0 is not affected.

-

WARNING: aiohttp==3.6.2 is vulnerable!

-

OK: flask not found in the vulnerability database.

-

OK: numpy not found in the vulnerability database.

- \ No newline at end of file diff --git a/results/requirements/results.md b/results/requirements/results.md deleted file mode 100644 index 91eebe2..0000000 --- a/results/requirements/results.md +++ /dev/null @@ -1,7 +0,0 @@ -# Vulnerability Report -* OK: apache-airflow==2.8.0 is not affected. -* WARNING: mlflow==2.5.1 is vulnerable! -* OK: torch==2.0.0 is not affected. -* WARNING: aiohttp==3.6.2 is vulnerable! -* OK: flask not found in the vulnerability database. -* OK: numpy not found in the vulnerability database. diff --git a/results/requirements/results.txt b/results/requirements/results.txt deleted file mode 100644 index 0885c01..0000000 --- a/results/requirements/results.txt +++ /dev/null @@ -1,6 +0,0 @@ -OK: apache-airflow==2.8.0 is not affected. -WARNING: mlflow==2.5.1 is vulnerable! -OK: torch==2.0.0 is not affected. -WARNING: aiohttp==3.6.2 is vulnerable! -OK: flask not found in the vulnerability database. -OK: numpy not found in the vulnerability database.