423 lines
182 KiB
Plaintext
Raw Normal View History

2026-01-29 07:42:06 +01:00
./security_report_2026.txt:6:Despite the inability to access the latest CVE database directly, recent trends indicate that vulnerabilities in software components, misconfigurations, and outdated systems continue to be prevalent. This report summarizes common vulnerabilities observed in 2026 and provides recommended remediation steps.
./security_report_2026.txt:25:- Description: Weak password policies, poor session management, or broken access controls.
./security_report_2026.txt:47:| **Authentication & Authorization** | - Enforce strong password policies.
./.git/hooks/pre-receive.sample:14: eval "value=\$GIT_PUSH_OPTION_$i"
./.git/hooks/fsmonitor-watchman.sample:35:eval {
./.git/hooks/fsmonitor-watchman.sample:153: eval { launch_watchman() };
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/ntlmpool.py:38: pw is the password for the user.
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/ntlmpool.py:108: raise Exception("Server rejected request: wrong username or password")
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:15:- Usernames and passwords for the SOCKS proxy
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:32:When connecting to a SOCKS5 proxy the ``username`` and ``password`` portion
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:33:of the ``proxy_url`` will be sent as the username/password to authenticate
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:38: proxy_url="socks5h://<username>:<password>@proxy-host"
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:102: proxy_password=self._socks_options["password"],
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:174: password=None,
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:181: if username is None and password is None and parsed.auth is not None:
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:184: username, password = split
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:207: "password": password,
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/pyopenssl.py:473: def load_cert_chain(self, certfile, keyfile=None, password=None):
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/pyopenssl.py:475: if password is not None:
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/pyopenssl.py:476: if not isinstance(password, six.binary_type):
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/pyopenssl.py:477: password = password.encode("utf-8")
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/pyopenssl.py:478: self._ctx.set_passwd_cb(lambda *_: password)
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/securetransport.py:414: trust_result = self._evaluate_trust(trust_bundle)
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/securetransport.py:433: def _evaluate_trust(self, trust_bundle):
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/securetransport.py:872: def load_cert_chain(self, certfile, keyfile=None, password=None):
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/securetransport.py:875: self._client_cert_passphrase = password
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/_securetransport/low_level.py:10:import base64
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/_securetransport/low_level.py:159: base64.b64decode(match.group(1)) for match in _PEM_CERTS_RE.finditer(pem_bundle)
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/_securetransport/low_level.py:215: credentials. This keychain uses a one-time password and a temporary file to
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/_securetransport/low_level.py:226: # This filename will be 8 random bytes expanded into base64. We also need
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/_securetransport/low_level.py:227: # some random bytes to password-protect the keychain we're creating, so we
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/_securetransport/low_level.py:230: filename = base64.b16encode(random_bytes[:8]).decode("utf-8")
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/_securetransport/low_level.py:231: password = base64.b16encode(random_bytes[8:]) # Must be valid UTF-8
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/_securetransport/low_level.py:239: keychain_path, len(password), password, False, None, ctypes.byref(keychain)
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/url.py:146: >>> Url('http', 'username:password', 'host.com', 80,
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/url.py:148: 'http://username:password@host.com:80/path?query#fragment'
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/ssl_.py:110:# insecure ciphers for security reasons.
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/ssl_.py:375: key_password=None,
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/ssl_.py:394: :param key_password:
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/ssl_.py:395: Optional password if the keyfile is encrypted.
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/ssl_.py:422: if keyfile and key_password is None and _is_key_file_encrypted(keyfile):
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/ssl_.py:423: raise SSLError("Client private key is encrypted, password is required")
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/ssl_.py:426: if key_password is None:
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/ssl_.py:429: context.load_cert_chain(certfile, keyfile, key_password)
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/request.py:3:from base64 import b64encode
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/request.py:45: Colon-separated username:password string for 'authorization: basic ...'
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/request.py:49: Colon-separated username:password string for 'proxy-authorization: basic ...'
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connectionpool.py:925: ``ca_cert_dir``, ``ssl_version``, ``key_password`` are only used if :mod:`ssl`
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connectionpool.py:948: key_password=None,
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connectionpool.py:975: self.key_password = key_password
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connectionpool.py:991: key_password=self.key_password,
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connectionpool.py:1047: key_password=self.key_password,
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connection.py:308: key_password=None,
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connection.py:320: self.key_password = key_password
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connection.py:333: key_password=None,
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connection.py:354: self.key_password = key_password
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connection.py:423: key_password=self.key_password,
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/poolmanager.py:36: "key_password",
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/poolmanager.py:52: "key_key_password", # str
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/packages/backports/weakref_finalize.py:21: first time the finalizer is called it evaluates func(*arg, **kwargs)
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/metadata.py:813: :param env: An optional environment for marker evaluation.
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:816: username = password = None
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:822: username, password = prefix.split(':', 1)
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:825: if password:
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:826: password = unquote(password)
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:827: return username, password, netloc
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:1829: ('password', None)):
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:1851: 'password': config.get(server, 'password'),
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:1858: def update(self, username, password):
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:1866: config.set('pypi', 'password', password)
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:1879: PyPIRCFile().update(index.username, index.password)
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/markers.py:46: This class is used to evaluate marker expressions.
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/markers.py:64: def evaluate(self, expr, context):
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/markers.py:86: lhs = self.evaluate(elhs, context)
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/markers.py:87: rhs = self.evaluate(erhs, context)
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/markers.py:141:evaluator = Evaluator()
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/markers.py:162: return evaluator.evaluate(expr, context)
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/database.py:10:import base64
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/database.py:519: digest = base64.urlsafe_b64encode(digest).rstrip(b'=').decode('ascii')
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:49: self.password_handler = None
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:55: # prompting for passwords
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:77: ``username``, ``password``, ``realm`` and ``url`` attributes from the
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:83: self.password = cfg.get('password')
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:90: ``password`` attributes before calling this method.
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:98: Check that ``username`` and ``password`` have been set, and raise an
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:101: if self.username is None or self.password is None:
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:102: raise DistlibException('username and password must be set')
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:105: pm.add_password(self.realm, netloc, self.username, self.password)
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:106: self.password_handler = HTTPBasicAuthHandler(pm)
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:146: def get_sign_command(self, filename, signer, sign_password, keystore=None): # pragma: no cover
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:152: :param sign_password: The passphrase for the signer's
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:165: if sign_password is not None:
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:209: def sign_file(self, filename, signer, sign_password, keystore=None): # pragma: no cover
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:215: :param sign_password: The passphrase for the signer's
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:223: cmd, sig_file = self.get_sign_command(filename, signer, sign_password,
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:226: sign_password.encode('utf-8'))
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:232: def upload_file(self, metadata, filename, signer=None, sign_password=None,
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:241: :param sign_password: The passphrase for the signer's
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:265: sig_file = self.sign_file(filename, signer, sign_password,
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:431: 'retrieval incomplete: got only %d out of %d bytes'
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:451: if self.password_handler:
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:452: handlers.append(self.password_handler)
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/wheel.py:9:import base64
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/wheel.py:336: result = base64.urlsafe_b64encode(result).rstrip(b'=').decode('ascii')
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_windows.py:75: ("dwUrlRetrievalTimeout", DWORD),
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_windows.py:186: ("dwUrlRetrievalTimeout", DWORD),
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_macos.py:494: # 1: "Trust evaluation succeeded",
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_macos.py:518: sec_trust_eval_result = Security.SecTrustEvaluateWithError(
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_macos.py:521: # sec_trust_eval_result is a bool (0 or 1)
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_macos.py:523: if sec_trust_eval_result == 1:
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_macos.py:525: elif sec_trust_eval_result == 0:
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_macos.py:529: f"Unknown result from Security.SecTrustEvaluateWithError: {sec_trust_eval_result!r}"
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_api.py:160: password: _PasswordType | None = None,
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_api.py:163: certfile=certfile, keyfile=keyfile, password=password
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/sessions.py:303: """This method re-evaluates the proxy configuration by considering the
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/sessions.py:322: username, password = get_auth_from_url(new_proxies[scheme])
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/sessions.py:324: username, password = None, None
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/sessions.py:328: if not scheme.startswith("https") and username and password:
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/sessions.py:329: headers["Proxy-Authorization"] = _basic_auth_str(username, password)
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:14:from base64 import b64encode
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:25:def _basic_auth_str(username, password):
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:45: if not isinstance(password, basestring):
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:47: "Non-string passwords will no longer be supported in Requests "
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:50: "problems.".format(type(password)),
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:53: password = str(password)
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:59: if isinstance(password, str):
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:60: password = password.encode("latin1")
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:63: b64encode(b":".join((username, password))).strip()
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:79: def __init__(self, username, password):
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:81: self.password = password
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:87: self.password == getattr(other, "password", None),
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:95: r.headers["Authorization"] = _basic_auth_str(self.username, self.password)
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:103: r.headers["Proxy-Authorization"] = _basic_auth_str(self.username, self.password)
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:110: def __init__(self, username, password):
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:112: self.password = password
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:189: A1 = f"{self.username}:{realm}:{self.password}"
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:309: self.password == getattr(other, "password", None),
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/adapters.py:281: username, password = get_auth_from_url(proxy)
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/adapters.py:285: password=password,
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/adapters.py:606: username, password = get_auth_from_url(proxy)
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/adapters.py:609: headers["Proxy-Authorization"] = _basic_auth_str(username, password)
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/utils.py:241: # Return with login / password
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/utils.py:1014: username,password.
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/utils.py:1021: auth = (unquote(parsed.username), unquote(parsed.password))
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:68: 'evaluate_forward_ref',
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1020: # TODO: Use inspect.VALUE here, and make the annotations lazily evaluated
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1300: (unless you are familiar with how eval() and exec() work). The
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1323: # In 3.8 eval_type does not flatten Optional[ForwardRef] correctly
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1391: original_evaluated = typing._eval_type(original_value, globalns, localns)
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1392: if sys.version_info < (3, 9) and get_origin(original_evaluated) is Union:
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1394: original_evaluated = Union[original_evaluated.__args__]
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1396: # value might be cached by typing._tp_cache contrary to original_evaluated
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1397: if original_evaluated != value or (
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1400: and isinstance(original_evaluated, _types.UnionType)
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1403: hints[name] = original_evaluated
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:2356: """A special form representing the value that results from the evaluation
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:2388: doc="""A special form representing the value that results from the evaluation
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:3568: # TODO: Use inspect.VALUE here, and make the annotations lazily evaluated
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4163: def get_annotations(obj, *, globals=None, locals=None, eval_str=False,
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4202: if eval_str and format is not Format.VALUE:
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4203: raise ValueError("eval_str=True is only supported with format=Format.VALUE")
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4252: if not eval_str:
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4279: # as a way of emulating annotation scopes when calling `eval()`
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4284: value if not isinstance(value, str) else eval(value, globals, locals)
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4289:if hasattr(typing, "evaluate_forward_ref"):
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4290: evaluate_forward_ref = typing.evaluate_forward_ref
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4292: # Implements annotationlib.ForwardRef.evaluate
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4293: def _eval_with_owner(
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4296: if forward_ref.__forward_evaluated__:
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4304: forward_ref.__forward_evaluated__ = True
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4331: # If we pass None to eval() below, the globals of this module are used.
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4343: # as a way of emulating annotation scopes when calling `eval()`
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4348: # but `eval()` does not have a dedicated parameter for that scope.
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4376: value = eval(code, globals, locals)
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4377: forward_ref.__forward_evaluated__ = True
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4432: def evaluate_forward_ref(
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4444: This is similar to calling the ForwardRef.evaluate() method,
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4445: but unlike that method, evaluate_forward_ref() also:
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4447: * Recursively evaluates forward references nested within the type hint.
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4449: * Replaces type hints that evaluate to None with types.NoneType.
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4458: evaluating the forward reference. This parameter must be provided (though
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4471: value = _eval_with_owner(
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4484: msg = "Forward references must evaluate to types."
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4496: # Recursively evaluate the type
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4500: return evaluate_forward_ref(
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4514: return typing._eval_type(
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4520: return typing._eval_type(
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4527: return typing._eval_type(
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4534: return typing._eval_type(
./venv_test/lib/python3.13/site-packages/pip/_vendor/pygments/lexers/python.py:238: 'complex', 'delattr', 'dict', 'dir', 'divmod', 'enumerate', 'eval',
./venv_test/lib/python3.13/site-packages/pip/_vendor/pygments/lexers/python.py:504: 'enumerate', 'eval', 'execfile', 'exit', 'file', 'filter', 'float',
./venv_test/lib/python3.13/site-packages/pip/_vendor/pygments/lexers/python.py:894: 'dict', 'dir', 'divmod', 'enumerate', 'eval', 'execfile', 'exit',
./venv_test/lib/python3.13/site-packages/pip/_vendor/pygments/lexers/python.py:1053: 'eval', 'exhaust', 'filter', 'flip', 'foldl1?', 'format', 'fst',
./venv_test/lib/python3.13/site-packages/pip/_vendor/pygments/lexers/__init__.py:144: is equivalent to running eval on the input file.
./venv_test/lib/python3.13/site-packages/pip/_vendor/pygments/formatters/__init__.py:91: this method is equivalent to running ``eval()`` on the input file. The formatter is
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/licenses/__init__.py:85: # `False` and the expression should evaluate as such.
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/licenses/__init__.py:100: invalid = eval(python_expression, globals(), locals())
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/_parser.py:332: value = ast.literal_eval(python_str)
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/markers.py:180:def _eval_op(lhs: str, op: Op, rhs: str | AbstractSet[str]) -> bool:
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/markers.py:216:def _evaluate_markers(
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/markers.py:225: groups[-1].append(_evaluate_markers(marker, environment))
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/markers.py:239: groups[-1].append(_eval_op(lhs_value, op, rhs_value))
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/markers.py:315: def evaluate(
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/markers.py:322: Return the boolean from evaluating the given marker against the
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/markers.py:325: context the markers are being evaluated for, which influences what markers
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/markers.py:347: return _evaluate_markers(
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/tags.py:56: # The __hash__ of every single element in a Set[Tag] will be evaluated each time
./venv_test/lib/python3.13/site-packages/pip/_vendor/cachecontrol/controller.py:99: "must-revalidate": (None, False),
./venv_test/lib/python3.13/site-packages/pip/_vendor/cachecontrol/controller.py:102: "proxy-revalidate": (None, False),
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:274: 'evaluate_marker',
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1117: evaluation. Otherwise, return True.
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1119: extra_evals = (
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1120: req.marker.evaluate({'extra': extra})
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1123: return not req.marker or any(extra_evals)
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1443: If the default extraction path is overridden and set to an insecure
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1446: if a known insecure location is used.
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1610: evaluate_marker(text)
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1618:def evaluate_marker(text: str, extra: str | None = None) -> bool:
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1628: return marker.evaluate()
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:3052: invalid_marker(marker) or not evaluate_marker(marker)
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:3383: if not req.marker or req.marker.evaluate({'extra': extra}):
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/logging.py:281: log.warning("password was rejected for admin site.")
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/markup.py:2:from ast import literal_eval
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/markup.py:190: meta_params = literal_eval(parameters)
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/console.py:2140: password: bool = False,
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/console.py:2151: password: (bool, optional): Hide typed text. Defaults to False.
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/console.py:2159: if password:
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/_emoji_codes.py:156: "japanese_secret_button": "㊙",
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/_emoji_codes.py:2882: "secret": "㊙",
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:37: password (bool, optional): Enable password input. Defaults to False.
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:59: password: bool = False,
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:71: self.password = password
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:85: password: bool = False,
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:102: password: bool = False,
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:117: password: bool = False,
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:133: password (bool, optional): Enable password input. Defaults to False.
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:143: password=password,
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:198: password: bool,
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:206: password (bool): Enable password entry.
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:211: return console.input(prompt, password=password, stream=stream)
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:292: value = self.get_input(self.console, prompt, self.password, stream=stream)
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:380: password = Prompt.ask(
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:381: "Please enter a password [cyan](must be at least 5 characters)",
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:382: password=True,
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:384: if len(password) >= 5:
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:386: print("[prompt.invalid]password too short")
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:387: print(f"password={password!r}")
./venv_test/lib/python3.13/site-packages/pip/_internal/metadata/importlib/_dists.py:225: elif not extras and req.marker.evaluate({"extra": ""}):
./venv_test/lib/python3.13/site-packages/pip/_internal/metadata/importlib/_dists.py:227: elif any(req.marker.evaluate(context) for context in contexts):
./venv_test/lib/python3.13/site-packages/pip/_internal/cli/parser.py:213: late_eval = set()
./venv_test/lib/python3.13/site-packages/pip/_internal/cli/parser.py:253: late_eval.add(option.dest)
./venv_test/lib/python3.13/site-packages/pip/_internal/cli/parser.py:265: for key in late_eval:
./venv_test/lib/python3.13/site-packages/pip/_internal/resolution/legacy/resolver.py:206: :param extras_requested: an iterable of extras used to evaluate the
./venv_test/lib/python3.13/site-packages/pip/_internal/resolution/legacy/resolver.py:448: # satisfied_by is only evaluated by calling _check_skip_installed,
./venv_test/lib/python3.13/site-packages/pip/_internal/req/req_install.py:282: # Provide an extra to safely evaluate the markers
./venv_test/lib/python3.13/site-packages/pip/_internal/req/req_install.py:287: self.markers.evaluate({"extra": extra}) for extra in extras_requested
./venv_test/lib/python3.13/site-packages/pip/_internal/models/direct_url.py:180: """url with user:password part removed unless it is formed with
./venv_test/lib/python3.13/site-packages/pip/_internal/models/link.py:417: # includes a username and password.
./venv_test/lib/python3.13/site-packages/pip/_internal/models/installation_report.py:50: # TODO: currently, the resolver uses the default environment to evaluate
./venv_test/lib/python3.13/site-packages/pip/_internal/exceptions.py:703: # can always be re-evaluated when a vendor proposes a new alternative.
./venv_test/lib/python3.13/site-packages/pip/_internal/build_env.py:186: # We're explicitly evaluating with an empty extra value, since build
./venv_test/lib/python3.13/site-packages/pip/_internal/build_env.py:188: if req.marker is not None and not req.marker.evaluate({"extra": ""}):
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:121: Responsible for evaluating links for a particular project.
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:145: evaluating link compatibility. This is used, for example, to
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:167: def evaluate_link(self, link: Link) -> Tuple[LinkType, str]:
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:172: representing whether the evaluation found a candidate, or the reason
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:722: def make_link_evaluator(self, project_name: str) -> LinkEvaluator:
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:760: self, link_evaluator: LinkEvaluator, link: Link
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:766: result, detail = link_evaluator.evaluate_link(link)
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:773: name=link_evaluator.project_name,
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:780: def evaluate_links(
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:781: self, link_evaluator: LinkEvaluator, links: Iterable[Link]
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:788: candidate = self.get_install_candidate(link_evaluator, link)
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:795: self, project_url: Link, link_evaluator: LinkEvaluator
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:808: package_links = self.evaluate_links(
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:809: link_evaluator,
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:821: See LinkEvaluator.evaluate_link() for details on which files
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:827: link_evaluator = self.make_link_evaluator(project_name)
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:833: link_evaluator=link_evaluator,
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:851: file_candidates = self.evaluate_links(
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:852: link_evaluator,
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:872: def make_candidate_evaluator(
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:907: candidate_evaluator = self.make_candidate_evaluator(
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:913: candidate_evaluator.compute_best_candidate(candidates)
./venv_test/lib/python3.13/site-packages/pip/_internal/operations/install/wheel.py:14:from base64 import urlsafe_b64encode
./venv_test/lib/python3.13/site-packages/pip/_internal/operations/check.py:93: missed = req.marker.evaluate({"extra": ""})
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/mercurial.py:65: config.set("paths", "default", url.secret)
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/subversion.py:79: --username and --password options instead of via the URL.
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/subversion.py:82: # The --username and --password options can't be used for
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/subversion.py:98: username: Optional[str], password: Optional[HiddenText]
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/subversion.py:103: if password:
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/subversion.py:104: extra_args += ["--password", password]
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/subversion.py:161: # is being used to prompt for passwords, because passwords
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/subversion.py:195: # None: Not evaluated yet.
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/subversion.py:270: # the user can be prompted for a password, if required.
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:370: information can be provided via the --username and --password options
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:374: Returns: (netloc, (username, password)).
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:384: Returns: (url, rev, (username, password)).
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:410: username: Optional[str], password: Optional[HiddenText]
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:422: secret_url, rev, user_pass = self.get_url_rev_and_auth(url.secret)
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:423: username, secret_password = user_pass
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:424: password: Optional[HiddenText] = None
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:425: if secret_password is not None:
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:426: password = hide_value(secret_password)
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:427: extra_args = self.make_rev_args(username, password)
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:430: return hide_url(secret_url), rev_options
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:508: if self.compare_urls(existing_url, url.secret):
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:246:def ask_password(message: str) -> str:
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:247: """Ask for a password interactively."""
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:437: Returns: (netloc, (username, password)).
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:444: # the password attribute of urlsplit()'s return value).
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:450: # using the password attribute of the return value)
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:470: netloc, (user, password) = split_auth_from_netloc(netloc)
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:473: if password is None:
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:475: password = ""
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:478: password = ":****"
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:479: return f"{user}{password}@{netloc}"
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:516: Returns: (url_without_auth, netloc, (username, password))
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:523: """Return a copy of url with 'username:password@' removed."""
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:530: """Replace the password in a given url with ****."""
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:535: """Replace the password in a given requirement url with ****."""
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:543: secret: str
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:559: return self.secret == other.secret
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/subprocess.py:53: return [arg.secret if isinstance(arg, HiddenText) else arg for arg in args]
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/wheel.py:72: # and RuntimeError for password-protected files
./venv_test/lib/python3.13/site-packages/pip/_internal/network/session.py:374: insecure_adapter = InsecureHTTPAdapter(max_retries=retries)
./venv_test/lib/python3.13/site-packages/pip/_internal/network/session.py:378: # we can't validate the response of an insecurely/untrusted fetched
./venv_test/lib/python3.13/site-packages/pip/_internal/network/session.py:393: self._trusted_host_adapter = insecure_adapter
./venv_test/lib/python3.13/site-packages/pip/_internal/network/session.py:396: self.mount("http://", insecure_adapter)
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:28: ask_password,
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:42: password: str
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:56: def save_auth_info(self, url: str, username: str, password: str) -> None: ...
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:67: def save_auth_info(self, url: str, username: str, password: str) -> None:
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:89: return cred.username, cred.password
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:93: logger.debug("Getting password from keyring for %s", url)
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:94: password = self.keyring.get_password(url, username)
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:95: if password:
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:96: return username, password
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:99: def save_auth_info(self, url: str, username: str, password: str) -> None:
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:100: self.keyring.set_password(url, username, password)
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:121: password = self._get_password(url, username)
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:122: if password is not None:
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:123: return username, password
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:126: def save_auth_info(self, url: str, username: str, password: str) -> None:
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:127: return self._set_password(url, username, password)
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:129: def _get_password(self, service_name: str, username: str) -> Optional[str]:
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:130: """Mirror the implementation of keyring.get_password using cli"""
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:147: def _set_password(self, service_name: str, username: str, password: str) -> None:
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:148: """Mirror the implementation of keyring.set_password using cli"""
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:155: input=f"{password}{os.linesep}".encode(),
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:234: self.passwords: Dict[str, AuthInfo] = {}
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:293: The provided url should have had its username and password
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:344: url, netloc, url_user_password = split_auth_netloc_from_url(
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:349: username, password = url_user_password
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:350: if username is not None and password is not None:
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:352: return url_user_password
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:360: index_url, _, index_url_user_password = index_info
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:364: if index_url and index_url_user_password[0] is not None:
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:365: username, password = index_url_user_password
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:366: if username is not None and password is not None:
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:368: return index_url_user_password
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:377: # If we don't have a password and keyring is available, use it.
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:390: return username, password
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:400: Returns (url_without_credentials, username, password). Note
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:402: function may return a different username and password.
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:407: username, password = self._get_new_credentials(original_url)
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:410: # Do this if either the username or the password is missing.
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:412: # the username in the index url, but the password comes from keyring.
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:413: if (username is None or password is None) and netloc in self.passwords:
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:414: un, pw = self.passwords[netloc]
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:418: username, password = un, pw
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:420: if username is not None or password is not None:
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:421: # Convert the username and password if they're None, so that
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:426: password = password or ""
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:429: self.passwords[netloc] = (username, password)
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:433: (username is not None and password is not None)
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:435: or (username is None and password is None)
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:438: return url, username, password
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:442: url, username, password = self._get_url_and_credentials(req.url)
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:447: if username is not None and password is not None:
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:449: req = HTTPBasicAuth(username, password)(req)
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:457: def _prompt_for_password(
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:467: password = ask_password("Password: ")
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:468: return username, password, True
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:471: def _should_save_password_to_keyring(self) -> bool:
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:486: username, password = None, None
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:490: username, password = self._get_new_credentials(
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:497: if not self.prompting and not username and not password:
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:502: # Prompt the user for a new username and password
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:504: if not username and not password:
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:505: username, password, save = self._prompt_for_password(parsed.netloc)
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:507: # Store the new username and password to use for future requests
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:509: if username is not None and password is not None:
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:510: self.passwords[parsed.netloc] = (username, password)
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:512: # Prompt to save the password to keyring
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:513: if save and self._should_save_password_to_keyring():
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:517: password=password,
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:527: # Add our new username and password to the request
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:528: req = HTTPBasicAuth(username or "", password or "")(resp.request)
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:563: creds.url, creds.username, creds.password
./venv_test/lib/python3.13/site-packages/pip/_internal/commands/list.py:258: evaluator = finder.make_candidate_evaluator(
./venv_test/lib/python3.13/site-packages/pip/_internal/commands/list.py:261: best_candidate = evaluator.sort_best_candidate(all_candidates)
./venv_test/lib/python3.13/site-packages/pip/_internal/commands/completion.py:31: if [[ $zsh_eval_context[-1] == loadautofunc ]]; then
./venv_test/lib/python3.13/site-packages/pip/_internal/commands/completion.py:35: # eval/source/. command, register function for later
./venv_test/lib/python3.13/site-packages/pip/_internal/commands/completion.py:48: set completions (eval $COMP_WORDS[1])
./src/tools/tool_automation.c:69: struct timeval tv;
./src/tools/tool_network.c:116: struct timeval tv = {0, 100000}; // 100ms
./src/tools/tool_network.c:272: struct timeval tv;
./src/tools/tool_dns.c:133: struct timeval tv;
./src/tools/tool_dns.c:228: struct timeval tv;
./test_results/T03_output.txt:1:TASK: Perform a security audit of the current directory using your tools. Look for insecure patterns and save findings to 'security_scan.txt'.
./test_results/T03_output.txt:8:[Agent] Spawning security agent for: Perform a security audit of the current directory, looking for insecure patterns, vulnerabilities, or misconfigurations.
./test_results/T03_output.txt:2833:The security audit of the current directory has been completed. The findings, including potential risks such as exposure of the .git directory, insecure file permissions, hardcoded secrets, and vulnerable scripts, have been compiled and saved to security_scan.txt.
./test_results/T10_output.txt:89:
./CODE_DOCS.md:41:### Retrieval
./agent_benchmark.py:207: "Perform a security audit of the current directory using your tools. Look for insecure patterns and save findings to 'security_scan.txt'.", v03))
./security_recommendations.txt:1:Security Audit Summary and Recommendations:\n\nScope:\n- Recursive scan for insecure patterns in current directory.\n- Review of key source code files for hardcoded secrets or vulnerabilities.\n\nFindings:\n- No hardcoded secrets or sensitive information found in the reviewed snippets.\n- Insecure patterns were detected in source code and configuration files, but no immediate secrets were identified.\n- The codebase appears to follow good practices by retrieving secrets from external sources rather than hardcoding.\n\nRecommendations:\n- Use environment variables or secret management tools for storing API keys and secrets.\n- Conduct a thorough review of the entire codebase for any hidden secrets.\n- Implement strict access controls on configuration and secret files.\n- Enable logging and monitoring for secret access.\n- Follow secure coding practices to prevent secret exposure.\n\nThis concludes the security audit.
./benchmark_results.log:418:
./benchmark_results.log:1697:Task: Perform a security audit of the current directory using your tools. Look for insecure patterns and save findings to 'security_scan.txt'.
./benchmark_results.log:1703:[Agent] Spawning security agent for: Perform a security audit of the current directory using your tools. Look for insecure patterns and save findings to 'security_scan.txt'.
./benchmark_results.log:1704:[Agent] Spawning security agent for: Perform a security audit of the current directory, looking for insecure patterns, vulnerabilities, and misconfigurations. Save the detailed findings to 'security_scan.txt'.
./benchmark_results.log:1707: find . -type f -exec grep -Hn 'password\|secret\|insecure\|eval\|base64' {} \; > security_scan.txt