Skip to content

Conversation

@Ngwerume
Copy link
Contributor

@Ngwerume Ngwerume commented Dec 4, 2025

No description provided.

@Ngwerume Ngwerume added the codacy-review Trigger Codacy's AI reviewer label Dec 4, 2025
@codacy-production
Copy link

codacy-production bot commented Dec 4, 2025

Codacy's Analysis Summary

100 new issues, 9 flagged as potential false positives (≤ 0 medium issue)
15 new security issues (≤ 0 issue)
0 duplications (≤ 1 gate)

Review Pull Request in Codacy →

AI Reviewer available: add the codacy-review label to get contextual insights without leaving GitHub.

return len(LEAK_LIST)

# Code complexity issues
def complex_function(a, b, c, d, e):

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Codacy found a medium Complexity issue: Method complex_function has a cyclomatic complexity of 16 (limit is 8)

The issue with the complex_function is that it has a high cyclomatic complexity of 16, which indicates that the function has too many paths through the code due to nested conditional statements. High cyclomatic complexity can make the code harder to understand, test, and maintain. The limit is set to 8, so this function exceeds that threshold significantly.

To reduce the complexity, we can simplify the conditional checks. Instead of checking each variable in a nested manner, we can use a single condition that checks if all inputs are greater than zero. This change will flatten the structure and reduce complexity.

Here's the suggested single line change to simplify the function:

def complex_function(a, b, c, d, e):
    if all(x > 0 for x in [a, b, c, d, e]):
        result = a + b + c + d + e
        return result * 2 if result > 100 else result
    return 0

This comment was generated by an experimental AI tool.

def doSomething(self): # Should be snake_case
return self.x + self.y

def calculate(self, a, b, c, d, e, f, g, h): # Too many parameters

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Codacy found a medium Complexity issue: Method calculate has 9 parameters (limit is 8)

The issue identified by the Lizard linter is that the calculate method has too many parameters, exceeding the recommended limit of 8. This can lead to a function that is difficult to understand and maintain, as it becomes cumbersome to manage multiple parameters. To resolve this, we can group related parameters into a single data structure, such as a list or a dictionary, which will reduce the number of parameters passed to the function.

Here’s a code suggestion that wraps the parameters in a list:

Suggested change
def calculate(self, a, b, c, d, e, f, g, h): # Too many parameters
def calculate(self, values): # Replace multiple parameters with a single list parameter

With this change, the method can be called with a single list containing the values, like so: calculate([a, b, c, d, e, f, g, h]). This approach improves the readability and maintainability of the code.


This comment was generated by an experimental AI tool.

def doSomething(self): # Should be snake_case
return self.x + self.y

def calculate(self, a, b, c, d, e, f, g, h): # Too many parameters

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Codacy found a medium Complexity issue: Method calculate has a cyclomatic complexity of 9 (limit is 8)

The issue with the calculate method is that it has too many parameters (8 parameters), leading to high cyclomatic complexity. Cyclomatic complexity measures the number of linearly independent paths through the code, and having too many parameters can make the method harder to understand, maintain, and test. A method with a cyclomatic complexity of 9 exceeds the recommended limit of 8.

To address this, we can refactor the calculate method to accept a single list of parameters instead of individual ones. This change simplifies the method signature and reduces complexity.

Here's the suggested single line change:

Suggested change
def calculate(self, a, b, c, d, e, f, g, h): # Too many parameters
def calculate(self, values): # Pass a list of values instead of multiple parameters

This comment was generated by an experimental AI tool.

Pillow==8.0.0
numpy==1.19.5
pandas==1.2.0
django==3.1.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Codacy found a medium Security issue: Insecure dependency pypi/[email protected] (CVE-2021-44420: django: potential bypass of an upstream access control based on URL paths) (update to 3.1.14)

The issue identified by the Trivy linter pertains to a security vulnerability in the Django package version 3.1.0. Specifically, it is related to CVE-2021-44420, which describes a potential bypass of an upstream access control based on URL paths. This vulnerability could allow unauthorized access to certain resources or functionalities within a web application that uses this version of Django.

To mitigate this security risk, it is recommended to update Django to a more secure version, specifically to at least version 3.1.14, where this vulnerability has been addressed.

Here is the code suggestion to fix the issue:

Suggested change
django==3.1.0
django==3.1.14

This comment was generated by an experimental AI tool.

Pillow==8.0.0
numpy==1.19.5
pandas==1.2.0
django==3.1.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 Codacy found a high Security issue: Insecure dependency pypi/[email protected] (CVE-2022-36359: An issue was discovered in the HTTP FileResponse class in Django 3.2 b ...) (update to 3.2.15)

The issue identified by the Trivy linter pertains to a security vulnerability in Django version 3.1.0, specifically CVE-2022-36359, which affects the HTTP FileResponse class. This vulnerability could potentially allow an attacker to exploit the application, leading to unauthorized access or other malicious activities. To mitigate this risk, it is recommended to upgrade to a more secure version of Django, which is 3.2.15 or later, as this version addresses the identified security concerns.

To fix the issue, you can update the Django version in your requirements file. Here is the suggested one-line change:

Suggested change
django==3.1.0
django==3.2.15

This comment was generated by an experimental AI tool.

flask==3.0.0
flask==2.0.1
requests==2.25.1
Pillow==8.0.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency pypi/[email protected] (CVE-2021-34552: python-pillow: Buffer overflow in image convert function) (update to 8.3.0)

The issue identified by the Trivy linter is a security vulnerability in the Pillow library, specifically version 8.0.0, which has a known buffer overflow vulnerability in the image conversion function (CVE-2021-34552). This vulnerability could potentially allow an attacker to execute arbitrary code or crash the application, making it critical to update to a patched version of the library.

To resolve this issue, you should update the Pillow version in your requirements to at least 8.3.0, which contains the necessary security fixes.

Here’s the code suggestion to fix the issue:

Suggested change
Pillow==8.0.0
Pillow==8.3.0

This comment was generated by an experimental AI tool.

flask==3.0.0
flask==2.0.1
requests==2.25.1
Pillow==8.0.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 Codacy found a high Security issue: Insecure dependency pypi/[email protected] (CVE-2023-44271: python-pillow: uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument) (update to 10.0.0)

The issue identified by the Trivy linter is related to a security vulnerability in the Pillow library version 8.0.0. Specifically, CVE-2023-44271 describes an uncontrolled resource consumption vulnerability that occurs when the textlength method in an ImageDraw instance processes a long text argument. This could potentially lead to denial of service (DoS) conditions due to excessive resource usage.

To resolve this issue, you should update the Pillow dependency to a version that has patched this vulnerability. The recommended version is 10.0.0.

Here’s the code suggestion to fix the issue:

Suggested change
Pillow==8.0.0
Pillow==10.0.0

This comment was generated by an experimental AI tool.

flask==3.0.0
flask==2.0.1
requests==2.25.1
Pillow==8.0.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 Codacy found a high Security issue: Insecure dependency pypi/[email protected] (CVE-2020-35654: python-pillow: decoding crafted YCbCr files could result in heap-based buffer overflow) (update to 8.1.0)

The issue identified by the Trivy linter pertains to a security vulnerability in the Pillow library version 8.0.0. This vulnerability, identified as CVE-2020-35654, involves the potential for a heap-based buffer overflow when decoding specially crafted YCbCr files. Such vulnerabilities can lead to serious security risks, including arbitrary code execution or application crashes.

To mitigate this risk, it is recommended to update the Pillow library to a version where this vulnerability has been addressed. The suggested version is 8.1.0 or higher.

Here's the code suggestion to fix the issue:

Suggested change
Pillow==8.0.0
Pillow==8.1.0

This comment was generated by an experimental AI tool.

flask==3.0.0
flask==2.0.1
requests==2.25.1
Pillow==8.0.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 Codacy found a high Security issue: Insecure dependency pypi/[email protected] (CVE-2024-28219: python-pillow: buffer overflow in _imagingcms.c) (update to 10.3.0)

The issue identified by the Trivy linter is a security vulnerability in the Pillow library version 8.0.0. Specifically, it is associated with a buffer overflow vulnerability in the _imagingcms.c file, which could potentially allow an attacker to execute arbitrary code or crash the application. The recommended solution is to upgrade to a more secure version of Pillow, specifically version 10.3.0 or later, which addresses this vulnerability.

To resolve this issue, you can update the version of Pillow in your requirements file. Here is the suggested change:

Suggested change
Pillow==8.0.0
Pillow==10.3.0

This comment was generated by an experimental AI tool.

flask==3.0.0
flask==2.0.1
requests==2.25.1
Pillow==8.0.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency pypi/[email protected] (CVE-2023-50447: pillow: Arbitrary Code Execution via the environment parameter) (update to 10.2.0)

The issue identified by the Trivy linter is a security vulnerability in the Pillow library version 8.0.0. Specifically, it is associated with CVE-2023-50447, which allows for arbitrary code execution via the environment parameter. This vulnerability can be exploited if untrusted input is processed, leading to potential security risks in applications that use this version of Pillow.

To resolve this issue, you should update Pillow to a secure version that does not contain this vulnerability. The recommended version is 10.2.0.

Here is the code suggestion to fix the issue:

Suggested change
Pillow==8.0.0
Pillow==10.2.0

This comment was generated by an experimental AI tool.

flask==3.0.0
flask==2.0.1
requests==2.25.1
Pillow==8.0.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 Codacy found a high Security issue: Insecure dependency pypi/[email protected] (CVE-2022-45198: Pillow before 9.2.0 performs Improper Handling of Highly Compressed GI ...) (update to 9.2.0)

The issue identified by the Trivy linter is a security vulnerability in the Pillow library version 8.0.0. Specifically, this version is affected by CVE-2022-45198, which describes improper handling of highly compressed GIF images. This vulnerability could potentially allow an attacker to exploit the application by crafting a malicious GIF file, leading to denial of service or other unintended consequences. To mitigate this risk, it's recommended to upgrade to a patched version of the library.

To resolve this issue, you should update the Pillow dependency to at least version 9.2.0, which contains the necessary security fixes.

Here's the code suggestion to fix the issue:

Suggested change
Pillow==8.0.0
Pillow==9.2.0

This comment was generated by an experimental AI tool.

flask==3.0.0
flask==2.0.1
requests==2.25.1
Pillow==8.0.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 Codacy found a high Security issue: Insecure dependency pypi/[email protected] (CVE-2021-27921: python-pillow: Excessive memory allocation in BLP image reader) (update to 8.1.2)

The issue is related to a security vulnerability identified as CVE-2021-27921 in the Pillow library version 8.0.0. This vulnerability can lead to excessive memory allocation when processing BLP images, which could potentially be exploited to cause denial of service or other malicious effects. The recommended action is to upgrade to a more secure version of the Pillow library, specifically version 8.1.2 or later, which addresses this vulnerability.

To fix the issue, you should update the Pillow dependency in your requirements file. Here’s the single line change you need to make:

Suggested change
Pillow==8.0.0
Pillow==8.1.2

This comment was generated by an experimental AI tool.

flask==3.0.0
flask==2.0.1
requests==2.25.1
Pillow==8.0.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Codacy found a medium Security issue: Insecure dependency pypi/[email protected] (GHSA-jgpv-4h4c-xhw3: Uncontrolled Resource Consumption in pillow) (update to 8.1.2)

The issue identified by the Trivy linter is related to a security vulnerability in the Pillow library version 8.0.0. Specifically, it pertains to an uncontrolled resource consumption vulnerability, which can potentially allow an attacker to exploit the application by causing excessive resource usage (like memory or CPU), leading to denial of service or other unintended behaviors. The recommended fix is to update Pillow to version 8.1.2 or later, where this vulnerability has been addressed.

To fix the issue, you should update the version of Pillow in your dependency list. Here’s the suggested change:

Suggested change
Pillow==8.0.0
Pillow==8.1.2

This comment was generated by an experimental AI tool.

flask==3.0.0
flask==2.0.1
requests==2.25.1
Pillow==8.0.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 Codacy found a high Security issue: Insecure dependency pypi/[email protected] (CVE-2021-27923: python-pillow: Excessive memory allocation in ICO image reader) (update to 8.1.2)

The issue identified by the Trivy linter is related to a security vulnerability in the Pillow library version 8.0.0. Specifically, it is associated with CVE-2021-27923, which describes an excessive memory allocation in the ICO image reader of Pillow. This vulnerability could potentially lead to denial of service or other security concerns if exploited. To mitigate this risk, it is recommended to update Pillow to a secure version, specifically to at least 8.1.2, where this vulnerability has been addressed.

To fix this issue, you can update the Pillow version in your requirements file as follows:

Suggested change
Pillow==8.0.0
Pillow==8.1.2

This comment was generated by an experimental AI tool.

@@ -1 +1,31 @@
flask==3.0.0
flask==2.0.1
requests==2.25.1

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Codacy found a medium Security issue: Insecure dependency pypi/[email protected] (CVE-2023-32681: python-requests: Unintended leak of Proxy-Authorization header) (update to 2.31.0)

The issue identified by the Trivy linter pertains to a vulnerability in the requests library version 2.25.1. Specifically, this vulnerability (CVE-2023-32681) relates to an unintended leak of the Proxy-Authorization header, which could potentially expose sensitive information if a proxy is used. To mitigate this security risk, it is recommended to update the requests library to a more secure version, specifically 2.31.0 or later, where this issue has been addressed.

To fix the issue, you can update the version of the requests library in your requirements file. Here is the suggested change:

Suggested change
requests==2.25.1
requests==2.31.0

This comment was generated by an experimental AI tool.

flask==3.0.0
flask==2.0.1
requests==2.25.1
Pillow==8.0.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 Codacy found a high Security issue: Insecure dependency pypi/[email protected] (CVE-2020-35653: python-pillow: Buffer over-read in PCX image reader) (update to 8.1.0)

The issue identified by the Trivy linter pertains to a security vulnerability in the Pillow library version 8.0.0. Specifically, this vulnerability (CVE-2020-35653) is a buffer over-read issue in the PCX image reader, which could potentially allow an attacker to exploit this flaw to read sensitive data or cause other unintended behavior in applications that utilize this library.

To address this security concern, it is recommended to upgrade the Pillow library to a version that is not affected by this vulnerability, specifically version 8.1.0 or later.

Here is the code suggestion to fix the issue:

Suggested change
Pillow==8.0.0
Pillow==8.1.0

This comment was generated by an experimental AI tool.

flask==3.0.0
flask==2.0.1
requests==2.25.1
Pillow==8.0.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 Codacy found a high Security issue: Insecure dependency pypi/[email protected] (CVE-2021-28676: python-pillow: Infinite loop in FLI image reader) (update to 8.2.0)

The issue identified by the Trivy linter is a security vulnerability in the Pillow library version 8.0.0. This vulnerability (CVE-2021-28676) is related to an infinite loop that can occur when processing FLI images, which could potentially lead to denial of service. To mitigate this risk, it is recommended to update Pillow to a safer version, specifically version 8.2.0 or later, which addresses this vulnerability.

To fix the issue, you can update the version of Pillow in your requirements file. Here’s the single line change you need to make:

Suggested change
Pillow==8.0.0
Pillow==8.2.0

This comment was generated by an experimental AI tool.

flask==3.0.0
flask==2.0.1
requests==2.25.1
Pillow==8.0.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 Codacy found a high Security issue: Insecure dependency pypi/[email protected] (CVE-2021-28675: python-pillow: Excessive memory allocation in PSD image reader) (update to 8.2.0)

The issue identified by the Trivy linter is a security vulnerability in the Pillow library version 8.0.0. Specifically, it is associated with CVE-2021-28675, which describes an excessive memory allocation in the PSD image reader. This vulnerability could potentially be exploited to cause denial of service (DoS) by exhausting system memory.

To mitigate this security risk, it's recommended to update the Pillow library to a version that has fixed this vulnerability. The suggested version is 8.2.0 or later.

Here is the single line change to update the Pillow dependency:

Suggested change
Pillow==8.0.0
Pillow==8.2.0

This comment was generated by an experimental AI tool.

Pillow==8.0.0
numpy==1.19.5
pandas==1.2.0
django==3.1.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Codacy found a medium Security issue: Insecure dependency pypi/[email protected] (CVE-2020-24584: django: permission escalation in intermediate-level directories of the file system cache on Python 3.7+) (update to 3.1.1)

The issue identified by the Trivy linter pertains to a security vulnerability in Django version 3.1.0, specifically CVE-2020-24584. This vulnerability allows for permission escalation in intermediate-level directories of the file system cache when using Python 3.7 or higher. Essentially, an attacker could exploit this vulnerability to gain unauthorized access to files or directories that they should not have access to.

To resolve this issue, it is recommended to update Django to a secure version, specifically to version 3.1.1 or later, where this vulnerability has been addressed.

Here is the suggested code change:

Suggested change
django==3.1.0
django==3.1.1

This comment was generated by an experimental AI tool.

flask==3.0.0
flask==2.0.1
requests==2.25.1
Pillow==8.0.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Codacy found a medium Security issue: Insecure dependency pypi/[email protected] (CVE-2021-25292: python-pillow: Regular expression DoS in PDF format parser) (update to 8.1.1)

The issue identified by the Trivy linter is a vulnerability in the Pillow library version 8.0.0, specifically related to a Denial of Service (DoS) attack that can occur due to a regular expression flaw in the PDF format parser. This vulnerability is tracked under CVE-2021-25292. To mitigate this security risk, it is recommended to upgrade Pillow to at least version 8.1.1, where this issue has been addressed.

To fix the issue, you can update the Pillow version in your requirements file as follows:

Suggested change
Pillow==8.0.0
Pillow==8.1.1

This comment was generated by an experimental AI tool.

flask==3.0.0
flask==2.0.1
requests==2.25.1
Pillow==8.0.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 Codacy found a high Security issue: Insecure dependency pypi/[email protected] (CVE-2021-25291: python-pillow: out-of-bounds read in TiffReadRGBATile in TiffDecode.c) (update to 8.2.0)

The issue identified by the Trivy linter pertains to a security vulnerability in the Pillow library version 8.0.0. Specifically, it is associated with CVE-2021-25291, which describes an out-of-bounds read in the TiffReadRGBATile function within the TiffDecode.c file. This vulnerability could potentially allow an attacker to exploit the library, leading to unexpected behavior or even the execution of arbitrary code.

To resolve this issue, it is recommended to update the Pillow library to a secure version, specifically to version 8.2.0 or later, where this vulnerability has been addressed.

Here is the code suggestion to fix the issue:

Suggested change
Pillow==8.0.0
Pillow==8.2.0

This comment was generated by an experimental AI tool.

flask==3.0.0
flask==2.0.1
requests==2.25.1
Pillow==8.0.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 Codacy found a high Security issue: Insecure dependency pypi/[email protected] (CVE-2021-28677: python-pillow: Excessive CPU use in EPS image reader) (update to 8.2.0)

The issue identified by the Trivy linter is a security vulnerability in the Pillow library version 8.0.0. Specifically, it relates to CVE-2021-28677, which describes a problem where the EPS image reader in Pillow can cause excessive CPU usage. This vulnerability can potentially lead to denial of service (DoS) conditions if an attacker can manipulate EPS files being processed by an application using this version of Pillow.

To mitigate this vulnerability, it is recommended to update the Pillow library to a more secure version, specifically version 8.2.0 or later, where this issue has been addressed.

Here’s the suggested code change:

Suggested change
Pillow==8.0.0
Pillow==8.2.0

This comment was generated by an experimental AI tool.

flask==3.0.0
flask==2.0.1
requests==2.25.1
Pillow==8.0.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 Codacy found a high Security issue: Insecure dependency pypi/[email protected] (CVE-2021-27922: python-pillow: Excessive memory allocation in ICNS image reader) (update to 8.1.2)

The issue identified by the Trivy linter pertains to a vulnerability in the Pillow library version 8.0.0. Specifically, CVE-2021-27922 describes a security flaw that allows for excessive memory allocation in the ICNS image reader, which could potentially lead to denial-of-service attacks or other adverse effects when handling malicious image files. To mitigate this risk, it is recommended to upgrade to a patched version of the library.

To resolve this issue, you can update the Pillow dependency to version 8.1.2 or later, which addresses the vulnerability. Here is the suggested change:

Suggested change
Pillow==8.0.0
Pillow==8.1.2

This comment was generated by an experimental AI tool.

flask==3.0.0
flask==2.0.1
requests==2.25.1
Pillow==8.0.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Codacy found a critical Security issue: Insecure dependency pypi/[email protected] (CVE-2021-25289: python-pillow: insufficent fix for CVE-2020-35654 due to incorrect error checking in TiffDecode.c) (update to 8.1.1)

The issue identified by the Trivy linter pertains to a known security vulnerability in the Pillow library, specifically version 8.0.0. This vulnerability (CVE-2021-25289) relates to insufficient error checking in the TIFF decoding process, which could potentially allow for exploitation through crafted TIFF images. To mitigate this risk, it is recommended to update to a patched version of the library, which in this case is 8.1.1 or later.

To fix the issue, you can update the Pillow version in your requirements file. Here’s the single line change you need to make:

Suggested change
Pillow==8.0.0
Pillow==8.1.1

This comment was generated by an experimental AI tool.

Pillow==8.0.0
numpy==1.19.5
pandas==1.2.0
django==3.1.0

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🚫 Codacy found a high Security issue: Insecure dependency pypi/[email protected] (CVE-2021-33571: django: Possible indeterminate SSRF, RFI, and LFI attacks since validators accepted leading zeros in IPv4 addresses) (update to 3.1.12)

The issue identified by Trivy is related to a security vulnerability in Django version 3.1.0, specifically CVE-2021-33571. This vulnerability allows for the possibility of Server-Side Request Forgery (SSRF), Remote File Inclusion (RFI), and Local File Inclusion (LFI) attacks due to the way the framework's validators handle leading zeros in IPv4 addresses. To mitigate this security risk, it's recommended to update Django to a patched version, specifically 3.1.12 or later.

To fix this issue, you can update the version of Django in your requirements file. Here’s the single line change you would make:

Suggested change
django==3.1.0
django==3.1.12

This comment was generated by an experimental AI tool.

@Ngwerume Ngwerume added codacy-review Trigger Codacy's AI reviewer and removed codacy-review Trigger Codacy's AI reviewer labels Dec 5, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

codacy-review Trigger Codacy's AI reviewer

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants