* File changed: [patchwork/app.py](https://github.com/patched-codes/patchwork/pull/704/files#diff-839e90b808d34e4cf447eff0896161788ccfc6e1f2970be2e551b64ba413a503)Fix vulnerability by avoiding dynamic input in importlib.import_module() Avoid using dynamic module_path in importlib.import_module() to prevent loading arbitrary code.
* File changed: [patchwork/common/utils/step_typing.py](https://github.com/patched-codes/patchwork/pull/704/files#diff-4490efb269fda5b75b1edc5f5fa275d34675bca1ffbb22e06829384e562205ff)Fix vulnerability by avoiding dynamic values in `importlib.import_module()` Avoid using dynamic values in `importlib.import_module()` by hardcoding the `typed` module to prevent running untrusted code.
* File changed: [patchwork/common/utils/dependency.py](https://github.com/patched-codes/patchwork/pull/704/files#diff-6ad070db06c1de59a1e0b0b199944f057089f121f94abdf817a0845e3c5d81f6)Fix vulnerability by avoiding dynamic values in `importlib.import_module()` Avoid using untrusted user input directly in `importlib.import_module()`. Added a whitelist check to prevent running untrusted code.
This pull request from patched fixes 3 issues.
Fix vulnerability by avoiding dynamic input in importlib.import_module()
Avoid using dynamic module_path in importlib.import_module() to prevent loading arbitrary code.Fix vulnerability by avoiding dynamic values in `importlib.import_module()`
Avoid using dynamic values in `importlib.import_module()` by hardcoding the `typed` module to prevent running untrusted code.Fix vulnerability by avoiding dynamic values in `importlib.import_module()`
Avoid using untrusted user input directly in `importlib.import_module()`. Added a whitelist check to prevent running untrusted code.