Our great sponsors
-
python-logging.config-exploit
Proof of concept exploit for Python Security Consideration "logging: Logging configuration uses eval()"
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
Thanks a lot for your input. In fact we think quite alike! I was planning on writing a plugin for widely used tool bandit for finding common security issues in Python code. I sent the PR today.
NOTE:
The number of mentions on this list indicates mentions on common posts plus user suggested alternatives.
Hence, a higher number means a more popular project.
Related posts
- Enhance your python code security using bandit
- How to write safe and secure Python code, detect CWE and avoid vulnerabilities in production code
- Looking for an official documentation regarding security best practices and how to write secure code
- Check your code in Python notebooks
- please stop with the cryptography projects