Security: Tradingagents Improved

316
Vulnerabilities
13
Credential Leaks
FAIL
Quality Gate
B
OWASP Grade
225.8h
Tech Debt (E)
High
DORA Rating

AI Fix Prompts

Auto-generated prompts to fix every issue — copy into Claude, GPT, or any AI coder

View AI Prompts
About: code-quality intelligence by Repobility · https://repobility.com

Quality Gate: Default Gate

Source: Repobility analyzer (https://repobility.com)
MetricCondition
overall_score0.0 >= 50
security_score0.0 >= 40
critical_vulnerabilities29.0 <= 0
critical_credentials0.0 <= 0
duplication_pct32.4 <= 20

DORA Metrics

Repobility · code-quality intelligence · https://repobility.com
Deploy Frequencyunknown (0.0/week)
Lead Time2.6 hours
MTTR0.0 hours
Change Failure Rate0.0%
Total Commits53
Overall RatingHIGH

Vulnerabilities (316)

Data scored by Repobility · https://repobility.com
SeverityIDPackageVersionSummary
criticalGHSA-cgcg-p68q-3w7vlangchain-experimental-langchain-experimental vulnerable to Arbitrary Code Execution
criticalGHSA-x32c-59v5-h7fglangchain-Langchain OS Command Injection vulnerability
criticalGHSA-p2qj-r53j-h3xjlangchain-experimental-LangChain Experimental Eval Injection vulnerability
criticalGHSA-3pqx-4fqf-j49fpyyaml-Deserialization of Untrusted Data in PyYAML
criticalGHSA-6757-jp84-gxfxpyyaml-Improper Input Validation in PyYAML
criticalGHSA-8q59-q68h-6hv4pyyaml-Improper Input Validation in PyYAML
criticalGHSA-rprw-h62v-c2w7pyyaml-PyYAML insecurely deserializes YAML strings leading to arbitrary code execution
criticalGHSA-v8vj-cv27-hjv8langchain-experimental-LangChain Experimental vulnerable to arbitrary code execution
criticalGHSA-887w-45rq-vxgfsqlalchemy-SQLAlchemy vulnerable to SQL Injection via order_by parameter
criticalGHSA-fj32-q626-pjjclangchain-LangChain vulnerable to arbitrary code execution
criticalGHSA-57fc-8q82-gfp3langchain-langchain vulnerable to arbitrary code execution
criticalGHSA-fff8-4w9p-7v76pygments-Command Injection in Pygments
criticalGHSA-www2-v7xj-xrc6urllib3-Exposure of Sensitive Information to an Unauthorized Actor in urllib3
criticalGHSA-vqfr-h8mv-ghfjh11-h11 accepts some malformed Chunked-Encoding bodies
criticalGHSA-6643-h7h5-x9whlangchain-Langchain vulnerable to arbitrary code execution
criticalGHSA-2qmj-7962-cjq8langchain-langchain arbitrary code execution vulnerability
criticalGHSA-9fq2-x9r6-wfmfnumpy-Numpy Deserialization of Untrusted Data
criticalGHSA-h8pj-cxx2-jfg2httpx-Improper Input Validation in httpx
criticalGHSA-fprp-p869-w6q2langchain-LangChain vulnerable to code injection
criticalGHSA-38fc-9xqv-7f7qsqlalchemy-SQLAlchemy is vulnerable to SQL Injection via group_by parameter
criticalGHSA-8h5w-f6q9-wg35langchain-Langchain SQL Injection vulnerability
criticalGHSA-gwqq-6vq7-5j86langchain-langchain Code Injection vulnerability
criticalGHSA-gjjr-63x4-v8cqlangchain-experimental-langchain_experimental vulnerable to arbitrary code execution via PALChain in the python exec method
criticalGHSA-hfg2-wf6j-x53psqlalchemy-SQLAlchemy vulnerable to SQL injection
criticalGHSA-92j5-3459-qgp4langchain-LangChain vulnerable to arbitrary code execution
criticalGHSA-c67j-w6g6-q2cmlangchain-core-LangChain serialization injection vulnerability enables secret extraction in dumps/loads APIs
criticalGHSA-f73w-4m7g-ch9xlangchain-Langchain vulnerable to arbitrary code execution via the evaluate function in the numexpr library
criticalGHSA-prgp-w7vf-ch62langchain-LangChain vulnerable to arbitrary code execution
criticalGHSA-7gfq-f96f-g85jlangchain-langchain vulnerable to arbitrary code execution
highGHSA-jrwr-5x3p-hvc3markdown-it-py-markdown-it-py Denial of Service vulnerability in the command line interface
highGHSA-vrjv-mxr7-vjf8markdown-it-py-markdown-it-py Denial of Service vulnerability
highGHSA-5rv5-6h4r-h22vopentelemetry-instrumentation-opentelemetry-instrumentation Denial of Service vulnerability due to unbound cardinality metrics
highGHSA-7gcm-g887-7qv7protobuf-protobuf affected by a JSON recursion depth bypass
highGHSA-8gq9-2x98-w8hfprotobuf-protobuf-cpp and protobuf-python have potential Denial of Service issue
highGHSA-8qvm-5x2c-j2w7protobuf-protobuf-python has a potential Denial of Service issue
highGHSA-jwvw-v7c5-m82hprotobuf-protobuf susceptible to buffer overflow
highGHSA-3qhf-m339-9g5vmcp-MCP Python SDK vulnerability in the FastMCP Server causes validation error, leading to DoS
highGHSA-9h52-p55h-vw2fmcp-Model Context Protocol (MCP) Python SDK does not enable DNS rebinding protection by default
highGHSA-63vm-454h-vhhqpyasn1-pyasn1 has a DoS vulnerability in decoder
highGHSA-jr27-m4p2-rc6rpyasn1-Denial of Service in pyasn1 via Unbounded Recursion
highGHSA-j975-95f5-7wqhmcp-MCP Python SDK has Unhandled Exception in Streamable HTTP Transport, Leading to Denial of Service
highGHSA-2fc2-6r4j-p65hnumpy-Numpy arbitrary file write via symlink attack
highGHSA-5545-2q6w-2gh6numpy-NumPy NULL Pointer Dereference
highGHSA-27x4-j476-jp5fsetuptools-Setuptools vulnerable to Man-in-the-middle attacks
highGHSA-9w8r-397f-prfhpygments-Infinite Loop in Pygments
highGHSA-496j-2rq6-j6ccgrpcio-Excessive Iteration in gRPC
highGHSA-pq64-v7f5-gqh8pygments-Pygments vulnerable to Regular Expression Denial of Service (ReDoS)
highGHSA-cw6w-4rcx-xphcnumpy-Arbitrary file write in NumPy
highGHSA-33c7-2mpw-hg34uvicorn-Log injection in uvicorn
highGHSA-752w-5fwx-jx9fpyjwt-PyJWT accepts unknown `crit` header extensions

Credential Findings (13)

Source-of-truth: Repobility · https://repobility.com
SeverityPatternFileLine
high[sast:aljefra/ssrf-requests] SSRF via HTTP Client with Variable URLtradingagents/dataflows/alpha_vantage_common.py68
high[sast:aljefra/info-debug-prod] Debug Mode Enabled in Production Configcli/main.py926
high[sast:aljefra/info-debug-prod] Debug Mode Enabled in Production Configcrypto_main.py30
high[sast:aljefra/info-debug-prod] Debug Mode Enabled in Production Configmain.py24
high[sast:aljefra/info-debug-prod] Debug Mode Enabled in Production Configscripts/dashboard.py872
high[sast:aljefra/taint-path-traversal] Path Traversal via Tainted Datascripts/fetch_all_data.py102
high[sast:aljefra/taint-path-traversal] Path Traversal via Tainted Datascripts/fetch_all_data.py103
high[sast:aljefra/ssrf-requests] SSRF via HTTP Client with Variable URLscripts/polymarket/latency_measure.py26
high[sast:aljefra/ssrf-requests] SSRF via HTTP Client with Variable URLscripts/polymarket/latency_measure_v2.py43
high[sast:aljefra/ssrf-requests] SSRF via HTTP Client with Variable URLscripts/polymarket/penny_scanner.py35
high[sast:aljefra/ssrf-requests] SSRF via HTTP Client with Variable URLcli/announcements.py16
mediumEthereum Addressscripts/polymarket/latency_scalper.py33
mediumEthereum Addressscripts/polymarket/negrisk_arb.py26