diff --git a/OWASPtop10.py b/OWASPtop10.py index fe60d86..2e89f61 100644 --- a/OWASPtop10.py +++ b/OWASPtop10.py @@ -1,4 +1,5 @@ # Test file with intentional security vulnerabilities +# Test some other stuff # SQL Injection vulnerability def unsafe_sql_query(user_input): @@ -28,4 +29,4 @@ def unsafe_file_access(filename): def unsafe_request(url): import requests response = requests.get(url + "/admin") - return response.text \ No newline at end of file + return response.text diff --git a/test_vulnerability.py b/test_vulnerability.py index a655cfa..00c00ce 100644 --- a/test_vulnerability.py +++ b/test_vulnerability.py @@ -2,9 +2,11 @@ # This is an example of a potential security vulnerability SECRET_KEY = "hardcoded_secret_key" +username = 'BensPassword' +password = 'BensUsername' def insecure_function(user_input): # This is an example of potential SQL injection query = f"SELECT * FROM users WHERE username = '{user_input}'" # Execute query (this is just an example, don't actually do this!) - return query #sadadssa \ No newline at end of file + return query #sadadssa