Reading the bandit documentation, these warnings are low severity and it
would make the code significantly worse to try and work around them, so
opt out of them. These calls are working as intended and this project is
designed to be used interactively so injection is not a concern.
Reading the bandit documentation, these warnings are low severity and it would make the code significantly worse to try and work around them, so opt out of them. These calls are working as intended and this project is designed to be used interactively so injection is not a concern.
Link: https://bandit.readthedocs.io/en/latest/plugins/b603_subprocess_without_shell_equals_true.html Link: https://bandit.readthedocs.io/en/latest/plugins/b607_start_process_with_partial_path.html