Skip to content

Conversation

anupamme
Copy link

Context and Purpose:

This PR automatically remediates a security vulnerability:

  • Description: Detected the use of eval(). eval() can be dangerous if used to evaluate dynamic content. If this content can be input from outside the program, this may be a code injection vulnerability. Ensure evaluated content is not definable by external sources.
  • Rule ID: python.lang.security.audit.eval-detected.eval-detected
  • Severity: HIGH
  • File: benchmark/PaddleOCR_DBNet/base/base_dataset.py
  • Lines Affected: 43 - 43

This change is necessary to protect the application from potential security risks associated with this vulnerability.

Solution Implemented:

The automated remediation process has applied the necessary changes to the affected code in benchmark/PaddleOCR_DBNet/base/base_dataset.py to resolve the identified issue.

Please review the changes to ensure they are correct and integrate as expected.

Copy link

paddle-bot bot commented May 27, 2025

Thanks for your contribution!

@CLAassistant
Copy link

CLAassistant commented May 27, 2025

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you all sign our Contributor License Agreement before we can accept your contribution.
1 out of 2 committers have signed the CLA.

✅ anupamme
❌ agent-kira
You have signed the CLA already but the status is still pending? Let us recheck it.

@luotao1
Copy link
Collaborator

luotao1 commented Sep 19, 2025

Please sign the CLA. @anupamme

….eval-detected-benchmark-paddleocr_dbnet-base-base_dataset.py-8ec1
@luotao1
Copy link
Collaborator

luotao1 commented Sep 19, 2025

1 out of 2 committers have signed the CLA.

✅ anupamme
❌ agent-kira

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants