Skip to content

https://bito.atlassian.net/browse/BITO-12071 https://bito.atlassian.net/wiki/spaces/EN/pages/1132003418/Quality+Assurance+QA https://bito.atlassian.net/wiki/spaces/EN/pages/1140260899/QA+Validation+Toolkit+SQL+Queries+Curl+Commands https://bito.atlassian.net/wiki/spaces/EN/pages/1142849543/AI-Architect+Self-hosted+Architecture

Summary by Bito

This pull request introduces secure web application endpoints in Python and Go to mitigate common vulnerabilities including SQL injection, command injection, weak password hashing, insecure file uploads, and information disclosure. It adds a comprehensive Python file demonstrating code quality anti-patterns and modifies a Java test suite to include additional tests while correcting a syntax error.

Detailed Changes
  • Introduces secure web application endpoints in Python (Flask) and Go (Gin) that implement best practices to prevent SQL injection using parameterized queries, command injection via safe argument execution, weak hashing with bcrypt, insecure uploads through file validation, and information disclosure by filtering sensitive config data.
  • Adds a Python file showcasing various code quality issues including unused imports, poor error handling, inefficient algorithms, magic numbers, and other anti-patterns for demonstration purposes.
  • Modifies Java test class to add an additional test method and corrects a syntax error in an assertion statement.
Edited by Amruta Hulagar

Merge request reports