Using yaml.load() on Untrusted Input
Calling yaml.load() without safe_load() on user-provided YAML, allowing arbitrary Python object instantiation.
Using yaml.load() with untrusted input can execute arbitrary Python code.
Calling yaml.load() without safe_load() on user-provided YAML, allowing arbitrary Python object instantiation.
Sourcery automatically identifies remote code execution from unsafe yaml deserialization in python and many other security issues in your codebase.