Conversation
| import sys | ||
|
|
||
| # import defusedxml.sax.handler as saxhandler | ||
| import xml.sax.handler as saxhandler |
Check notice
Code scanning / Bandit
Using xml.sax.handler to parse untrusted XML data is known to be vulnerable to XML attacks. Replace xml.sax.handler with the equivalent defusedxml package, or make sure defusedxml.defuse_stdlib() is called. Note
| from multiprocessing import Pool | ||
| from pathlib import Path | ||
| from typing import TYPE_CHECKING | ||
| from xml import sax # NOQA: S406 |
Check notice
Code scanning / Bandit
Using sax to parse untrusted XML data is known to be vulnerable to XML attacks. Replace sax with the equivalent defusedxml package, or make sure defusedxml.defuse_stdlib() is called. Note
| """ | ||
| builder = TreeBuilder() | ||
| for mtd_file in scene_path.glob("**/MTD_*.xml"): | ||
| sax.parseString(mtd_file.read_text(), builder) # NOQA: S317 |
Check warning
Code scanning / Bandit
Using xml.sax.parseString to parse untrusted XML data is known to be vulnerable to XML attacks. Replace xml.sax.parseString with its defusedxml equivalent function or make sure defusedxml.defuse_stdlib() is called Warning
No description provided.