- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
ID: python-security/aws-boto-credentials
Language: Python
Severity: Notice
Category: Security
CWE: 798
This rule makes sure that the boto3
library use the environments variables to authenticate instead of using hardcoded credentials. This rule checks for the boto3.client
and boto3.Session
calls. It addresses the CWE-798 rule - uses of hardcoded credentials in code.
from boto3 import client
cli = client(
's3',
aws_access_key_id="AGPAFOOBAR",
aws_secret_access_key="bar",
aws_session_token=SESSION_TOKEN
)
import boto3
client = boto3.client(
's3',
aws_access_key_id="AGPAFOOBAR",
aws_secret_access_key="bar",
aws_session_token=SESSION_TOKEN
)
import boto3
client = boto3.Session(
's3',
aws_access_key_id=ACCESS_KEY,
aws_secret_access_key=SECRET_KEY,
aws_session_token="foobar" # hard coded credential
)
import boto3
client = boto3.Session(
's3',
aws_session_token=SESSION_TOKEN
)
import boto3
client = boto3.client(
's3',
aws_session_token=SESSION_TOKEN
)
client = boto3.client(
's3',
aws_access_key_id=ACCESS_KEY,
aws_secret_access_key=SECRET_KEY,
aws_session_token=SESSION_TOKEN
)
|
|
For more information, please read the Code Analysis documentation
Identify code vulnerabilities directly in yourVS Code editor
Identify code vulnerabilities directly inJetBrains products