Security: Ask Chopper

14
Vulnerabilities
0
Credential Leaks
PASS
Quality Gate
A
OWASP Grade
5.6h
Tech Debt (B)
Medium
DORA Rating
Unknown
License (unknown)
Repobility · severity-and-effort ranking · https://repobility.com

AI Fix Prompts

Auto-generated prompts to fix every issue — copy into Claude, GPT, or any AI coder

View AI Prompts

Quality Gate: Default Gate

Scored by Repobility's multi-pass pipeline · https://repobility.com
MetricCondition
overall_score57.5 >= 50
security_score76.0 >= 40
critical_vulnerabilities0.0 <= 0
critical_credentials0.0 <= 0
duplication_pct0.0 <= 20

DORA Metrics

Powered by Repobility · code-quality intelligence
Deploy Frequencymonthly (0.2/week)
Lead Time672.0 hours
MTTR48.0 hours
Change Failure Rate100.0%
Total Commits63
Overall RatingMEDIUM

Vulnerabilities (14)

Source: Repobility analyzer (https://repobility.com)
SeverityIDPackageVersionSummary
criticalGHSA-3f63-hfp8-52jqpillow10.1.0
criticalCVE-2023-50447Pillow10.1.0pillow: Arbitrary Code Execution via the environment parameter
highGHSA-737v-mqg7-c878defu6.1.4
highCVE-2024-28219Pillow10.1.0python-pillow: buffer overflow in _imagingcms.c
highCVE-2026-35209defu6.1.4defu: Prototype pollution via `__proto__` key in defaults argument
highGHSA-38f7-945m-qr2geffect3.16.12
highCVE-2026-32887effect3.16.12Effect `AsyncLocalStorage` context lost/contaminated inside Effect fibers under concurrent load with RPC
highGHSA-44wm-f244-xhp3pillow10.1.0
mediumGHSA-29vq-49wr-vm6xwerkzeug3.1.3
mediumCVE-2025-66221Werkzeug3.1.3Werkzeug: Werkzeug: Denial of service via Windows device names in path segments
mediumCVE-2026-21860Werkzeug3.1.3 Werkzeug safe_join() allows Windows special device names with compound extensions
mediumCVE-2026-27199Werkzeug3.1.3 Werkzeug safe_join() allows Windows special device names
mediumGHSA-hgf8-39gv-g3f2werkzeug3.1.3
mediumGHSA-87hc-h4r5-73f7werkzeug3.1.3