Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
W zad 1 ukryto wyświetlanie danych wrażliwych poprzez zastąpienie znaków znakiem '*'

W zad 2 znaleziono wycieki kluczy w historii repo, nie są to "fałszywe pozytywy" - najlepiej w tej sytuacji usunąć te commity z historii i wymienić klucze.
+==============================================================================+$$| $$ $$ /$$__ $$|_ $$ / | $$ | $$ |$$| $$ | $$/ | $$ /$$| $$ | $$ |
| |
| /$$$$$$ /$$ |
| /$$__ $$ | $$ |
| /$$$$$$$ /$$$$$$ | $$ _//$$$$$$ /$$$$$$ /$$ /$$ |
| /$$_____/ |___
| | $$$$$$ /$$$$$$$| $$/ | $$$$$$$$ | $$ | $$ | $$ |
| ____ $$ /$$__
| /$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$ |
| |_/ _/|/ _/ _/ ___ $$ |
| /$$ | $$ |
| | $$$$$$/ |
| by pyup.io ______/ |
| |
+==============================================================================+
| REPORT |
| checked 18 packages, using free DB (updated once a month) |
+============================+===========+==========================+==========+
| package | installed | affected | ID |
+============================+===========+==========================+==========+
| jinja2 | 3.1.2 | <3.1.3 | 64227 |
+==============================================================================+
| Jinja is an extensible templating engine. Special placeholders in the |
| template allow writing code similar to Python syntax. It is possible to |
| inject arbitrary HTML attributes into the rendered HTML template, |
| potentially leading to Cross-Site Scripting (XSS). The Jinja
xmlattr|| filter can be abused to inject arbitrary HTML attribute keys and values, |
| bypassing the auto escaping mechanism and potentially leading to XSS. It may |
| also be possible to bypass attribute validation checks if they are |
| blacklist-based. |
+==============================================================================+
| jinja2 | 3.1.2 | <3.1.4 | 71591 |
+==============================================================================+
| Jinja is an extensible templating engine. The
xmlattrfilter in affected || versions of Jinja accepts keys containing non-attribute characters. XML/HTML |
| attributes cannot contain spaces,
/,>, or=, as each would then be || interpreted as starting a separate attribute. If an application accepts keys |
| (as opposed to only values) as user input, and renders these in pages that |
| other users see as well, an attacker could use this to inject other |
| attributes and perform XSS. The fix for CVE-2024-22195 only addressed spaces |
| but not other characters. Accepting keys as user input is now explicitly |
| considered an unintended use case of the
xmlattrfilter, and code that || does so without otherwise validating the input should be flagged as |
| insecure, regardless of Jinja version. Accepting values as user input |
| continues to be safe. |
+==============================================================================+
| jinja2 | 3.1.2 | <3.1.5 | 76378 |
+==============================================================================+
| An oversight in how the Jinja sandboxed environment detects calls to |
| str.format allows an attacker who controls the content of a template to |
| execute arbitrary Python code. To exploit the vulnerability, an attacker |
| needs to control the content of a template. Whether that is the case depends |
| on the type of application using Jinja. This vulnerability impacts users of |
| applications which execute untrusted templates. Jinja's sandbox does catch |
| calls to str.format and ensures they don't escape the sandbox. However, it's |
| possible to store a reference to a malicious string's format method, then |
| pass that to a filter that calls it. No such filters are built-in to Jinja, |
| but could be present through custom filters in an application. After the |
| fix, such indirect calls are also handled by the sandbox. |
+==============================================================================+
| jinja2 | 3.1.2 | <3.1.6 | 75976 |
+==============================================================================+
| Prior to 3.1.6, an oversight in how the Jinja sandboxed environment |
| interacts with the |attr filter allows an attacker that controls the content |
| of a template to execute arbitrary Python code. To exploit the |
| vulnerability, an attacker needs to control the content of a template. |
| Whether that is the case depends on the type of application using Jinja. |
| This vulnerability impacts users of applications which execute untrusted |
| templates. Jinja's sandbox does catch calls to str.format and ensures they |
| don't escape the sandbox. However, it's possible to use the |attr filter to |
| get a reference to a string's plain format method, bypassing the sandbox. |
| After the fix, the |attr filter no longer bypasses the environment's |
| attribute lookup. This vulnerability is fixed in 3.1.6. |
+==============================================================================+
| jinja2 | 3.1.2 | >=3.0.0a1,<3.1.5 | 74735 |
+==============================================================================+
| A vulnerability in the Jinja compiler allows an attacker who can control |
| both the content and filename of a template to execute arbitrary Python |
| code, bypassing Jinja's sandbox protections. To exploit this vulnerability, |
| an attacker must have the ability to manipulate both the template's filename |
| and its contents. The risk depends on the application's specific use case. |
| This issue affects applications that render untrusted templates where the |
| attacker can determine the template filename, potentially leading to severe |
| security breaches. |
+==============================================================================+
| werkzeug | 2.3.7 | <2.3.8 | 62019 |
+==============================================================================+
| Werkzeug 3.0.1 and 2.3.8 include a security fix: Slow multipart parsing for |
| large parts potentially enabling DoS attacks. |
| pallets/werkzeug@b1916c0 |
| 2bfc5c1 |
+==============================================================================+
| werkzeug | 2.3.7 | <3.0.3 | 71594 |
+==============================================================================+
| Werkzeug is a comprehensive WSGI web application library. The debugger in |
| affected versions of Werkzeug can allow an attacker to execute code on a |
| developer's machine under some circumstances. This requires the attacker to |
| get the developer to interact with a domain and subdomain they control, and |
| enter the debugger PIN, but if they are successful it allows access to the |
| debugger even if it is only running on localhost. This also requires the |
| attacker to guess a URL in the developer's application that will trigger the |
| debugger. |
+==============================================================================+
| werkzeug | 2.3.7 | <3.0.6 | 73969 |
+==============================================================================+
| Affected versions of Werkzeug are vulnerable to Path Traversal (CWE-22) on |
| Windows systems running Python versions below 3.11. The safe_join() function |
| failed to properly detect certain absolute paths on Windows, allowing |
| attackers to potentially access files outside the intended directory. An |
| attacker could craft special paths starting with "/" that bypass the |
| directory restrictions on Windows systems. The vulnerability exists in the |
| safe_join() function which relied solely on os.path.isabs() for path |
| validation. This is exploitable on Windows systems by passing paths starting |
| with "/" to safe_join(). To remediate, upgrade to the latest version which |
| includes additional path validation checks. |
| NOTE: This vulnerability specifically affects Windows systems running Python |
| versions below 3.11 where ntpath.isabs() behavior differs. |
+==============================================================================+
| werkzeug | 2.3.7 | <3.0.6 | 73889 |
+==============================================================================+
| Affected versions of Werkzeug are potentially vulnerable to resource |
| exhaustion when parsing file data in forms. Applications using |
| 'werkzeug.formparser.MultiPartParser' to parse 'multipart/form-data' |
| requests (e.g. all flask applications) are vulnerable to a relatively simple |
| but effective resource exhaustion (denial of service) attack. A specifically |
| crafted form submission request can cause the parser to allocate and block 3 |
| to 8 times the upload size in main memory. There is no upper limit; a single |
| upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. |
+==============================================================================+
| werkzeug | 2.3.7 | <=2.3.7 | 71595 |
+==============================================================================+
| Werkzeug is a comprehensive WSGI web application library. If an upload of a |
| file that starts with CR or LF and then is followed by megabytes of data |
| without these characters: all of these bytes are appended chunk by chunk |
| into internal bytearray and lookup for boundary is performed on growing |
| buffer. This allows an attacker to cause a denial of service by sending |
| crafted multipart data to an endpoint that will parse it. The amount of CPU |
| time required can block worker processes from handling legitimate requests. |
+==============================================================================+
| healpy | 1.8.0 | <=1.16.6 | 61774 |
+==============================================================================+
| Healpy 1.16.6 and prior releases ship with a version of 'libcurl' that has a |
| high-severity vulnerability. |
+==============================================================================+
W zad 3 wykryto wiele podatnośći,
Werkzeug <2.3.7 : Powolny parsing dla dużych fragmentów - Werkzeug w przypadku dużych części multipart analizuje dane bardzo wolno i w kosztowny sposób - może to doprowadzić do Denial of Service. Potencjalna osoba mogłaby przesyłać bardzo duże pliki poprzez HTTP POST do analizy i tym samym zawiesić nasz system.