Send an email or submit an github issue if you see a vulnerability that SHOULD be addressed.
I advocate for better and simple security, so this tool is reviewed to identify potential vulnerabilities.
Result of scan with Pytyon Code Audit:
result_output = input("HTML output [H] (=Default) or TXT output [T]? )")
Inspecting the code on Input Validation and Sanitization learns that Input Values are restricted.
Of course, also no exec or eval is done on given user input.
URL processing Should always be done carefully, since using urlopen can lead to parsing errors.
Checking the status of an URL requires using a construct like:
request = Request(url, headers=nocxheaders)
with urlopen(request, timeout=nocxtimeout) as response:
return url, response.statusMitigation to our judgement:
- Content of URLs is not processed.
- Only the DNS or HTTP status of an URL is verified.
- Use of more vulnerable external libraries, like
requestsoraiohttpare deliberately avoided.