Skip to content

feat: Add initial Dockerfile, Pipfile.lock, and Terraform example for…

0e88b50
Select commit
Loading
Failed to load commit list.
Open

feat: Add initial Dockerfile, Pipfile.lock, and Terraform example for… #158

feat: Add initial Dockerfile, Pipfile.lock, and Terraform example for…
0e88b50
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / trivy failed Apr 2, 2026 in 13s

16 new alerts including 6 high severity security vulnerabilities

New alerts in code changed by this pull request

Security Alerts:

  • 6 high
  • 8 medium
  • 2 low

See annotations below for details.

View all branch alerts.

Annotations

Check failure on line 34 in devsecops-demo/Pipfile.lock

See this annotation in the file changed.

Code scanning / Trivy

flask: Possible disclosure of permanent session cookie due to missing Vary: Cookie header High

Package: flask
Installed Version: 2.0.2
Vulnerability CVE-2023-30861
Severity: HIGH
Fixed Version: 2.3.2, 2.2.5
Link: CVE-2023-30861

Check failure on line 50 in devsecops-demo/Pipfile.lock

See this annotation in the file changed.

Code scanning / Trivy

jinja2: Jinja has a sandbox breakout through malicious filenames High

Package: jinja2
Installed Version: 3.0.2
Vulnerability CVE-2024-56201
Severity: MEDIUM
Fixed Version: 3.1.5
Link: CVE-2024-56201

Check failure on line 50 in devsecops-demo/Pipfile.lock

See this annotation in the file changed.

Code scanning / Trivy

jinja2: Jinja has a sandbox breakout through indirect reference to format method High

Package: jinja2
Installed Version: 3.0.2
Vulnerability CVE-2024-56326
Severity: MEDIUM
Fixed Version: 3.1.5
Link: CVE-2024-56326

Check failure on line 126 in devsecops-demo/Pipfile.lock

See this annotation in the file changed.

Code scanning / Trivy

python-werkzeug: high resource usage when parsing multipart form data with many fields High

Package: werkzeug
Installed Version: 2.0.2
Vulnerability CVE-2023-25577
Severity: HIGH
Fixed Version: 2.2.3
Link: CVE-2023-25577

Check failure on line 126 in devsecops-demo/Pipfile.lock

See this annotation in the file changed.

Code scanning / Trivy

python-werkzeug: user may execute code on a developer's machine High

Package: werkzeug
Installed Version: 2.0.2
Vulnerability CVE-2024-34069
Severity: HIGH
Fixed Version: 3.0.3
Link: CVE-2024-34069

Check failure on line 126 in devsecops-demo/Pipfile.lock

See this annotation in the file changed.

Code scanning / Trivy

werkzeug: python-werkzeug: Werkzeug possible resource exhaustion when parsing file data in forms High

Package: werkzeug
Installed Version: 2.0.2
Vulnerability CVE-2024-49767
Severity: MEDIUM
Fixed Version: 3.0.6
Link: CVE-2024-49767

Check warning on line 50 in devsecops-demo/Pipfile.lock

See this annotation in the file changed.

Code scanning / Trivy

jinja2: HTML attribute injection when passing user input as keys to xmlattr filter Medium

Package: jinja2
Installed Version: 3.0.2
Vulnerability CVE-2024-22195
Severity: MEDIUM
Fixed Version: 3.1.3
Link: CVE-2024-22195

Check warning on line 50 in devsecops-demo/Pipfile.lock

See this annotation in the file changed.

Code scanning / Trivy

jinja2: accepts keys containing non-attribute characters Medium

Package: jinja2
Installed Version: 3.0.2
Vulnerability CVE-2024-34064
Severity: MEDIUM
Fixed Version: 3.1.4
Link: CVE-2024-34064

Check warning on line 50 in devsecops-demo/Pipfile.lock

See this annotation in the file changed.

Code scanning / Trivy

jinja2: Jinja sandbox breakout through attr filter selecting format method Medium

Package: jinja2
Installed Version: 3.0.2
Vulnerability CVE-2025-27516
Severity: MEDIUM
Fixed Version: 3.1.6
Link: CVE-2025-27516

Check warning on line 126 in devsecops-demo/Pipfile.lock

See this annotation in the file changed.

Code scanning / Trivy

python-werkzeug: high resource consumption leading to denial of service Medium

Package: werkzeug
Installed Version: 2.0.2
Vulnerability CVE-2023-46136
Severity: MEDIUM
Fixed Version: 3.0.1, 2.3.8
Link: CVE-2023-46136

Check warning on line 126 in devsecops-demo/Pipfile.lock

See this annotation in the file changed.

Code scanning / Trivy

werkzeug: python-werkzeug: Werkzeug safe_join not safe on Windows Medium

Package: werkzeug
Installed Version: 2.0.2
Vulnerability CVE-2024-49766
Severity: MEDIUM
Fixed Version: 3.0.6
Link: CVE-2024-49766

Check warning on line 126 in devsecops-demo/Pipfile.lock

See this annotation in the file changed.

Code scanning / Trivy

Werkzeug: Werkzeug: Denial of service via Windows device names in path segments Medium

Package: werkzeug
Installed Version: 2.0.2
Vulnerability CVE-2025-66221
Severity: MEDIUM
Fixed Version: 3.1.4
Link: CVE-2025-66221

Check warning on line 126 in devsecops-demo/Pipfile.lock

See this annotation in the file changed.

Code scanning / Trivy

Werkzeug safe_join() allows Windows special device names with compound extensions Medium

Package: werkzeug
Installed Version: 2.0.2
Vulnerability CVE-2026-21860
Severity: MEDIUM
Fixed Version: 3.1.5
Link: CVE-2026-21860

Check warning on line 126 in devsecops-demo/Pipfile.lock

See this annotation in the file changed.

Code scanning / Trivy

Werkzeug safe_join() allows Windows special device names Medium

Package: werkzeug
Installed Version: 2.0.2
Vulnerability CVE-2026-27199
Severity: MEDIUM
Fixed Version: 3.1.6
Link: CVE-2026-27199

Check notice on line 34 in devsecops-demo/Pipfile.lock

See this annotation in the file changed.

Code scanning / Trivy

flask: Flask: Information disclosure via improper caching of session data Low

Package: flask
Installed Version: 2.0.2
Vulnerability CVE-2026-27205
Severity: LOW
Fixed Version: 3.1.3
Link: CVE-2026-27205

Check notice on line 126 in devsecops-demo/Pipfile.lock

See this annotation in the file changed.

Code scanning / Trivy

python-werkzeug: cookie prefixed with = can shadow unprefixed cookie Low

Package: werkzeug
Installed Version: 2.0.2
Vulnerability CVE-2023-23934
Severity: LOW
Fixed Version: 2.2.3
Link: CVE-2023-23934