fix: 删除结果输出
This commit is contained in:
parent
bc852ec52c
commit
6041a8f573
@ -1 +0,0 @@
|
||||
<html><head><title>Analysis of ../results/code\test_backdoor_detection.html</title></head><body><h1>Security Analysis Report</h1><h2>High Risk</h2><ul><li>Line 9: os.system('rm -rf /')</li><li>Line 10: exec('print("Hello")')</li><li>Line 11: eval('2 + 2')</li><li>Line 15: self.assertIn((2, "os.system('rm -rf /')"), results["high"])</li><li>Line 16: self.assertIn((3, "exec('print(\"Hello\")')"), results["high"])</li><li>Line 17: self.assertIn((4, "eval('2 + 2')"), results["high"])</li><li>Line 44: eval('2 + 2')</li><li>Line 50: (3, "eval('2 + 2')"),</li></ul><h2>Medium Risk</h2><ul><li>Line 21: subprocess.run(['ls', '-l'])</li><li>Line 23: os.popen('ls')</li><li>Line 27: self.assertIn((2, "subprocess.run(['ls', '-l'])"), results["medium"])</li><li>Line 28: self.assertIn((4, "os.popen('ls')"), results["medium"])</li><li>Line 45: subprocess.run(['echo', 'hello'])</li><li>Line 54: (4, "subprocess.run(['echo', 'hello'])"),</li></ul><h2>Low Risk</h2><ul></ul><h2>None Risk</h2><ul><li>Line 1: import unittest</li><li>Line 3: from detection.backdoor_detection import find_dangerous_functions</li><li>Line 6: class TestBackdoorDetection(unittest.TestCase):</li><li>Line 7: def test_high_risk_detection(self):</li><li>Line 8: content = """import os</li><li>Line 12: """</li><li>Line 13: file_extension = ".py"</li><li>Line 14: results = find_dangerous_functions(content, file_extension)</li><li>Line 19: def test_medium_risk_detection(self):</li><li>Line 20: content = """import subprocess</li><li>Line 22: import os</li><li>Line 24: """</li><li>Line 25: file_extension = ".py"</li><li>Line 26: results = find_dangerous_functions(content, file_extension)</li><li>Line 30: def test_no_risk_detection(self):</li><li>Line 31: content = """a = 10</li><li>Line 32: b = a + 5</li><li>Line 33: print('This should not be detected as risky.')</li><li>Line 34: """</li><li>Line 35: file_extension = ".py"</li><li>Line 36: results = find_dangerous_functions(content, file_extension)</li><li>Line 37: self.assertEqual(len(results["high"]), 0)</li><li>Line 38: self.assertEqual(len(results["medium"]), 0)</li><li>Line 39: self.assertEqual(len(results["low"]), 0)</li><li>Line 41: def test_inclusion_of_comments(self):</li><li>Line 42: content = """</li><li>Line 43: print('This is a safe line')</li><li>Line 46: """</li><li>Line 47: file_extension = ".py"</li><li>Line 48: results = find_dangerous_functions(content, file_extension)</li><li>Line 49: self.assertIn(</li><li>Line 51: results["high"],</li><li>Line 52: )</li><li>Line 53: self.assertIn(</li><li>Line 55: results["medium"],</li><li>Line 56: )</li><li>Line 59: if __name__ == "__main__":</li><li>Line 60: unittest.main()</li></ul></body></html>
|
@ -1,57 +0,0 @@
|
||||
# Security Analysis Report for ../results/code\test_backdoor_detection.md
|
||||
## High Risk
|
||||
- Line 9: os.system('rm -rf /')
|
||||
- Line 10: exec('print("Hello")')
|
||||
- Line 11: eval('2 + 2')
|
||||
- Line 15: self.assertIn((2, "os.system('rm -rf /')"), results["high"])
|
||||
- Line 16: self.assertIn((3, "exec('print(\"Hello\")')"), results["high"])
|
||||
- Line 17: self.assertIn((4, "eval('2 + 2')"), results["high"])
|
||||
- Line 44: eval('2 + 2')
|
||||
- Line 50: (3, "eval('2 + 2')"),
|
||||
## Medium Risk
|
||||
- Line 21: subprocess.run(['ls', '-l'])
|
||||
- Line 23: os.popen('ls')
|
||||
- Line 27: self.assertIn((2, "subprocess.run(['ls', '-l'])"), results["medium"])
|
||||
- Line 28: self.assertIn((4, "os.popen('ls')"), results["medium"])
|
||||
- Line 45: subprocess.run(['echo', 'hello'])
|
||||
- Line 54: (4, "subprocess.run(['echo', 'hello'])"),
|
||||
## Low Risk
|
||||
## None Risk
|
||||
- Line 1: import unittest
|
||||
- Line 3: from detection.backdoor_detection import find_dangerous_functions
|
||||
- Line 6: class TestBackdoorDetection(unittest.TestCase):
|
||||
- Line 7: def test_high_risk_detection(self):
|
||||
- Line 8: content = """import os
|
||||
- Line 12: """
|
||||
- Line 13: file_extension = ".py"
|
||||
- Line 14: results = find_dangerous_functions(content, file_extension)
|
||||
- Line 19: def test_medium_risk_detection(self):
|
||||
- Line 20: content = """import subprocess
|
||||
- Line 22: import os
|
||||
- Line 24: """
|
||||
- Line 25: file_extension = ".py"
|
||||
- Line 26: results = find_dangerous_functions(content, file_extension)
|
||||
- Line 30: def test_no_risk_detection(self):
|
||||
- Line 31: content = """a = 10
|
||||
- Line 32: b = a + 5
|
||||
- Line 33: print('This should not be detected as risky.')
|
||||
- Line 34: """
|
||||
- Line 35: file_extension = ".py"
|
||||
- Line 36: results = find_dangerous_functions(content, file_extension)
|
||||
- Line 37: self.assertEqual(len(results["high"]), 0)
|
||||
- Line 38: self.assertEqual(len(results["medium"]), 0)
|
||||
- Line 39: self.assertEqual(len(results["low"]), 0)
|
||||
- Line 41: def test_inclusion_of_comments(self):
|
||||
- Line 42: content = """
|
||||
- Line 43: print('This is a safe line')
|
||||
- Line 46: """
|
||||
- Line 47: file_extension = ".py"
|
||||
- Line 48: results = find_dangerous_functions(content, file_extension)
|
||||
- Line 49: self.assertIn(
|
||||
- Line 51: results["high"],
|
||||
- Line 52: )
|
||||
- Line 53: self.assertIn(
|
||||
- Line 55: results["medium"],
|
||||
- Line 56: )
|
||||
- Line 59: if __name__ == "__main__":
|
||||
- Line 60: unittest.main()
|
@ -1,57 +0,0 @@
|
||||
Security Analysis Report for ../results/code\test_backdoor_detection.txt
|
||||
High Risk:
|
||||
Line 9: os.system('rm -rf /')
|
||||
Line 10: exec('print("Hello")')
|
||||
Line 11: eval('2 + 2')
|
||||
Line 15: self.assertIn((2, "os.system('rm -rf /')"), results["high"])
|
||||
Line 16: self.assertIn((3, "exec('print(\"Hello\")')"), results["high"])
|
||||
Line 17: self.assertIn((4, "eval('2 + 2')"), results["high"])
|
||||
Line 44: eval('2 + 2')
|
||||
Line 50: (3, "eval('2 + 2')"),
|
||||
Medium Risk:
|
||||
Line 21: subprocess.run(['ls', '-l'])
|
||||
Line 23: os.popen('ls')
|
||||
Line 27: self.assertIn((2, "subprocess.run(['ls', '-l'])"), results["medium"])
|
||||
Line 28: self.assertIn((4, "os.popen('ls')"), results["medium"])
|
||||
Line 45: subprocess.run(['echo', 'hello'])
|
||||
Line 54: (4, "subprocess.run(['echo', 'hello'])"),
|
||||
Low Risk:
|
||||
None Risk:
|
||||
Line 1: import unittest
|
||||
Line 3: from detection.backdoor_detection import find_dangerous_functions
|
||||
Line 6: class TestBackdoorDetection(unittest.TestCase):
|
||||
Line 7: def test_high_risk_detection(self):
|
||||
Line 8: content = """import os
|
||||
Line 12: """
|
||||
Line 13: file_extension = ".py"
|
||||
Line 14: results = find_dangerous_functions(content, file_extension)
|
||||
Line 19: def test_medium_risk_detection(self):
|
||||
Line 20: content = """import subprocess
|
||||
Line 22: import os
|
||||
Line 24: """
|
||||
Line 25: file_extension = ".py"
|
||||
Line 26: results = find_dangerous_functions(content, file_extension)
|
||||
Line 30: def test_no_risk_detection(self):
|
||||
Line 31: content = """a = 10
|
||||
Line 32: b = a + 5
|
||||
Line 33: print('This should not be detected as risky.')
|
||||
Line 34: """
|
||||
Line 35: file_extension = ".py"
|
||||
Line 36: results = find_dangerous_functions(content, file_extension)
|
||||
Line 37: self.assertEqual(len(results["high"]), 0)
|
||||
Line 38: self.assertEqual(len(results["medium"]), 0)
|
||||
Line 39: self.assertEqual(len(results["low"]), 0)
|
||||
Line 41: def test_inclusion_of_comments(self):
|
||||
Line 42: content = """
|
||||
Line 43: print('This is a safe line')
|
||||
Line 46: """
|
||||
Line 47: file_extension = ".py"
|
||||
Line 48: results = find_dangerous_functions(content, file_extension)
|
||||
Line 49: self.assertIn(
|
||||
Line 51: results["high"],
|
||||
Line 52: )
|
||||
Line 53: self.assertIn(
|
||||
Line 55: results["medium"],
|
||||
Line 56: )
|
||||
Line 59: if __name__ == "__main__":
|
||||
Line 60: unittest.main()
|
@ -1,9 +0,0 @@
|
||||
<html><head><title>Vulnerability Report</title></head><body>
|
||||
<h1>Vulnerability Report</h1>
|
||||
<p>OK: apache-airflow==2.8.0 is not affected.</p>
|
||||
<p>WARNING: mlflow==2.5.1 is vulnerable!</p>
|
||||
<p>OK: torch==2.0.0 is not affected.</p>
|
||||
<p>WARNING: aiohttp==3.6.2 is vulnerable!</p>
|
||||
<p>OK: flask not found in the vulnerability database.</p>
|
||||
<p>OK: numpy not found in the vulnerability database.</p>
|
||||
</body></html>
|
@ -1,7 +0,0 @@
|
||||
# Vulnerability Report
|
||||
* OK: apache-airflow==2.8.0 is not affected.
|
||||
* WARNING: mlflow==2.5.1 is vulnerable!
|
||||
* OK: torch==2.0.0 is not affected.
|
||||
* WARNING: aiohttp==3.6.2 is vulnerable!
|
||||
* OK: flask not found in the vulnerability database.
|
||||
* OK: numpy not found in the vulnerability database.
|
@ -1,6 +0,0 @@
|
||||
OK: apache-airflow==2.8.0 is not affected.
|
||||
WARNING: mlflow==2.5.1 is vulnerable!
|
||||
OK: torch==2.0.0 is not affected.
|
||||
WARNING: aiohttp==3.6.2 is vulnerable!
|
||||
OK: flask not found in the vulnerability database.
|
||||
OK: numpy not found in the vulnerability database.
|
Loading…
x
Reference in New Issue
Block a user