-
Notifications
You must be signed in to change notification settings - Fork 5
Add server IP address via ipify #34
base: main
Are you sure you want to change the base?
Conversation
| @@ -1 +1,2 @@ | |||
| requests==2.19.0 | |||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| requests==2.19.0 | |
| requests==2.32.3 |
Minder Vulnerability Report
|
| Package | Version | #Vulnerabilities | #Fixes | Patch |
|---|---|---|---|---|
| requests | 2.19.0 | 5 | 5 | 2.32.3 |
Summary of vulnerabilities found
Minder found the following vulnerabilities in this PR:| Ecosystem | Name | Version | Vulnerability ID | Summary | Introduced | Fixed |
|---|---|---|---|---|---|---|
| PyPI | requests | 2.19.0 | GHSA-9wx4-h78v-vm56 | Requests `Session` object does not verify requests after making first request with verify=False | 0 | 2.32.0 |
| PyPI | requests | 2.19.0 | GHSA-j8r2-6x86-q33q | Unintended leak of Proxy-Authorization header in requests | 2.3.0 | 2.31.0 |
| PyPI | requests | 2.19.0 | GHSA-x84v-xcm2-53pg | Insufficiently Protected Credentials in Requests | 0 | 2.20.0 |
| PyPI | requests | 2.19.0 | PYSEC-2018-28 | 0 | 2.20.0 | |
| PyPI | requests | 2.19.0 | PYSEC-2023-74 | 2.3.0 | 2.31.0 |
Dependency InformationMinder analyzed the dependencies introduced in this pull request and detected that some dependencies do not meet your security profile. 📦 Dependency: requestsTrusty Score: 0Scoring details
Proof of Origin (Provenance)This package can be linked back to its source code using a historical provenance map. We were able to correlate a significant number of git tags and tagged releases in this package’s source code to versions of the published package. This mapping creates a strong link from the package back to its source code repository, verifying proof of origin.
|
Dependency InformationMinder analyzed the dependencies introduced in this pull request and detected that some dependencies do not meet your security profile. 📦 Dependency: requestsTrusty Score: 0Scoring details
Proof of Origin (Provenance)This package can be linked back to its source code using a historical provenance map. We were able to correlate a significant number of git tags and tagged releases in this package’s source code to versions of the published package. This mapping creates a strong link from the package back to its source code repository, verifying proof of origin.
|
1 similar comment
Dependency InformationMinder analyzed the dependencies introduced in this pull request and detected that some dependencies do not meet your security profile. 📦 Dependency: requestsTrusty Score: 0Scoring details
Proof of Origin (Provenance)This package can be linked back to its source code using a historical provenance map. We were able to correlate a significant number of git tags and tagged releases in this package’s source code to versions of the published package. This mapping creates a strong link from the package back to its source code repository, verifying proof of origin.
|
Dependency InformationMinder analyzed the dependencies introduced in this pull request and detected that some dependencies do not meet your security profile. 📦 Dependency: requestsTrusty Score: 0Scoring details
Proof of Origin (Provenance)This package can be linked back to its source code using a historical provenance map. We were able to correlate a significant number of git tags and tagged releases in this package’s source code to versions of the published package. This mapping creates a strong link from the package back to its source code repository, verifying proof of origin.
|
Dependency InformationMinder analyzed the dependencies introduced in this pull request and detected that some dependencies do not meet your security profile. 📦 Dependency: requestsTrusty Score: 0Scoring details
Proof of Origin (Provenance)This package can be linked back to its source code using a historical provenance map. We were able to correlate a significant number of git tags and tagged releases in this package’s source code to versions of the published package. This mapping creates a strong link from the package back to its source code repository, verifying proof of origin.
|
No description provided.