@@ -92,26 +92,30 @@ class InnerBreakException(Exception):
9292 return False
9393
9494
95+ @pytest .mark .skip ("Failing reliably on main" )
9596def test_insecure_cookie (client ):
9697 payload = {"name" : "admin" , "pass" : "adminpassword" , "csrfmiddlewaretoken" : client .csrftoken }
9798 reply = client .pygoat_session .post (PYGOAT_URL + "/sql_lab" , data = payload , headers = TESTAGENT_HEADERS )
9899 assert reply .status_code == 200
99100 assert vulnerability_in_traces ("INSECURE_COOKIE" , client .agent_session )
100101
101102
103+ @pytest .mark .skip ("Failing reliably on main" )
102104def test_nohttponly_cookie (client ):
103105 payload = {
"email" :
"[email protected] " ,
"csrfmiddlewaretoken" :
client .
csrftoken }
104106 reply = client .pygoat_session .post (PYGOAT_URL + "/otp" , data = payload , headers = TESTAGENT_HEADERS )
105107 assert reply .status_code == 200
106108 assert vulnerability_in_traces ("NO_HTTPONLY_COOKIE" , client .agent_session )
107109
108110
111+ @pytest .mark .skip ("Failing reliably on main" )
109112def test_weak_random (client ):
110113 reply = client .pygoat_session .get (PYGOAT_URL + "/otp?email=test%40test.com" , headers = TESTAGENT_HEADERS )
111114 assert reply .status_code == 200
112115 assert vulnerability_in_traces ("WEAK_RANDOMNESS" , client .agent_session )
113116
114117
118+ @pytest .mark .skip ("Failing reliably on main" )
115119def test_weak_hash (client ):
116120 payload = {"username" : "admin" , "password" : "adminpassword" , "csrfmiddlewaretoken" : client .csrftoken }
117121 reply = client .pygoat_session .post (
@@ -121,13 +125,15 @@ def test_weak_hash(client):
121125 assert vulnerability_in_traces ("WEAK_HASH" , client .agent_session )
122126
123127
128+ @pytest .mark .skip ("Failing reliably on main" )
124129def test_cmdi (client ):
125130 payload = {"domain" : "google.com && ls" , "csrfmiddlewaretoken" : client .csrftoken }
126131 reply = client .pygoat_session .post (PYGOAT_URL + "/cmd_lab" , data = payload , headers = TESTAGENT_HEADERS )
127132 assert reply .status_code == 200
128133 assert vulnerability_in_traces ("COMMAND_INJECTION" , client .agent_session )
129134
130135
136+ @pytest .mark .skip ("Failing reliably on main" )
131137def test_sqli (client ):
132138 payload = {"name" : "admin" , "pass" : "anything' OR '1' ='1" , "csrfmiddlewaretoken" : client .csrftoken }
133139 reply = client .pygoat_session .post (PYGOAT_URL + "/sql_lab" , data = payload , headers = TESTAGENT_HEADERS )
@@ -153,6 +159,7 @@ def test_ssrf1(client, tracer, iast_span_defaults):
153159 assert vulnerability_in_traces ("SSRF" , client .agent_session )
154160
155161
162+ @pytest .mark .skip ("Failing reliably on main" )
156163def test_ssrf2 (client , tracer , span_defaults ):
157164 from ddtrace .appsec ._iast ._taint_tracking import OriginType
158165 from ddtrace .appsec ._iast ._taint_tracking import taint_pyobject
0 commit comments