MCP Scanner
ScanLeaderboardDocsSign in
Home/anthropics/anthropic-cookbook/Results
0F

claude-cookbooks

anthropics/anthropic-cookbook

130 files · 956 findings

Share GitHub SARIF JSON
673 critical231 high48 medium4 low
Tool Poisoning6 issues
Command Injection1 issue
Path Traversal215 issues
SSRF604 issues
Credential Theft46 issues
Excessive Permissionsclean
Missing Auth6 issues
Path Traversal215

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

.claude/skills/cookbook-audit/validate_notebook.py:119
f"echo '{notebook_abs}' | tr '\\n' '\\0' | xargs -0 uvx --from detect-secrets detect-secrets-hook --baseline {baseline_path} --plugin {plugins_path} --verbose",
How to fix
Data Exfiltration2

Clipboard or screenshot access for exfiltration

high

Accessing clipboard contents or taking screenshots may be used to capture and exfiltrate sensitive data.

.github/ISSUE_TEMPLATE/question.yml:52
description: Any code snippets, error messages, or screenshots
How to fix

Remove clipboard/screenshot access unless explicitly required by the tool's stated purpose.

Supply Chain27

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/claude-link-review.yml:37
uses: actions/checkout@v6
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

Credential Theft46

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:4
"original_uuid": "5e4c01057a10732d34784af2a97bee9d173863f043b9901de8ef7f57bc590145",
How to fix
Rug Pull2

Dynamic import from variable URL

critical

Dynamic imports with variable URLs can load malicious code at runtime.

capabilities/contextual-embeddings/data/codebase_chunks.json:161
"content": "#include \"common.h\"\n\nbool both_require(const uint8_t *bytes, size_t len) {\n  if (len >= 1 && bytes[0] == 'a') {\n    if (len >= 2 && bytes[1] == 'b') {\n      if (len >= 3 && bytes[2] == 'c') { return ACCEPT; }\n    }\n  }\n  return REJECT;\n}",
How to fix
Logging Deficiency40

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:303
"content": "use {\n    crate::args::LogArgs,\n    anyhow::{anyhow, Result},\n    simplelog::{Config, LevelFilter, WriteLogger},\n    std::fs::File,\n};\n\npub struct Logger;\n\nimpl Logger {\n    pub fn init(args: &impl LogArgs) -> Result<()> {\n        let filter: LevelFilter = args.log_level().into();\n        if filter != LevelFilter::Off {\n            let logfile = File::create(args.log_file())\n                .map_err(|e| anyhow!(\"Failed to open log file: {e:}\"))?;\n            WriteLog
How to fix
Tool Poisoning6

Hidden HTML/XML tags in tool description

critical

Tool descriptions containing hidden HTML or XML tags can inject invisible directives to manipulate LLM behavior.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:600
"text": "Making requests\n\n\nThe following examples shows how to generate text from Claude 3 Sonnet on Bedrock:\nPython Typescript Boto3 (Python) from anthropic import AnthropicBedrock\n\nclient = AnthropicBedrock ( # Authenticate by either providing the keys below or use the default AWS credential providers, such as # using ~/.aws/credentials or the \"AWS_SECRET_ACCESS_KEY\" and \"AWS_ACCESS_KEY_ID\" environment variables. aws_access_key = \"<access key>\" , aws_secret_key = \"<secret key>\" ,
How to fix
SSRF604

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:81
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Missing Auth6

Missing rate limiting on endpoint

medium

API endpoints without rate limiting are vulnerable to brute force and denial of service.

claude_agent_sdk/site_reliability_agent/infra_setup.py:469
@app.get("/health")
How to fix

Add rate limiting middleware to all public API endpoints.

Command Injection1

Python exec() call

critical

Python's exec() function executes arbitrary code strings and is a vector for code injection.

claude_agent_sdk/site_reliability_agent/sre_mcp_server.py:2384
# Run using exec (no shell) to prevent injection via metacharacters
How to fix

Remove exec() calls. Use ast.literal_eval for safe expression evaluation.

Excessive Data Exposure6

Returning entire database records without field filtering

medium

Detected SELECT * or ORM queries without explicit field selection. Returning all columns risks exposing sensitive fields (passwords, tokens, internal IDs) to the client or LLM context.

claude_agent_sdk/site_reliability_agent/sre_mcp_server.py:1289
"SELECT * FROM pg_stat_activity"
How to fix

Always specify the exact columns or fields to return. Use SELECT with explicit column names or ORM select/projection options.

Runtime Tool Poisoning1

Response referencing or invoking other tools

high

Detected tool responses that attempt to call or invoke other tools (use_tool, call_tool, invoke, execute_tool). A poisoned tool response could trick the LLM into executing additional tools without user consent.

tool_use/memory_demo/demo_helpers.py:106
result = execute_tool(content, memory_handler)
How to fix

Tool responses should never contain tool invocation patterns. Validate and sanitize all output to ensure it does not include cross-tool call instructions.

Supply Chain
27 issues
Rug Pull2 issues
Data Exfiltration2 issues
Insecure Communicationclean
Excessive Data Exposure6 issues
Logging Deficiency40 issues
Runtime Tool Poisoning1 issue
Shadow MCP Serverclean

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

.claude/skills/cookbook-audit/validate_notebook.py:125
f"echo '{notebook_abs}' | tr '\\n' '\\0' | xargs -0 uvx --from detect-secrets detect-secrets-hook",
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:521
"content": "# Translated to Python and adapted for Ciphey from the JS original at https://github.com/pshihn/base69\n\n\nimport re\nfrom math import ceil\nfrom typing import Dict, Optional\n\nfrom ciphey.iface import Config, Decoder, ParamSpec, T, U, WordList, registry\n\n\n@registry.register\nclass Base69(Decoder[str]):\n    def decode(self, ctext: T) -> Optional[U]:\n        \"\"\"\n        Performs Base69 decoding\n        \"\"\"\n        # Remove whitespace\n        try:\n            ctext = 
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:531
"content": "            for i in range(CHUNK_COUNT):\n                chunk_string = ctext[i * 16 : (i + 1) * 16]\n                if extra_bytes and (i == CHUNK_COUNT - 1):\n                    insert = self.decode_chunk(chunk_string)\n                    for n, elem in enumerate(insert[0 : 7 - extra_bytes]):\n                        result[n + i * 7] = elem\n                else:\n                    insert = self.decode_chunk(chunk_string)\n                    for n, elem in enumerate(insert)
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:680
"content": "#include \"value_generators.h\"\n\n#include <algorithm>\n#include <type_traits>\n#include <math.h>\n\nnamespace {\nusing namespace clickhouse;\n}\n\nstd::vector<uint32_t> MakeNumbers() {\n    return std::vector<uint32_t> {1, 2, 3, 7, 11, 13, 17, 19, 23, 29, 31};\n}\n\nstd::vector<uint8_t> MakeBools() {\n    return std::vector<uint8_t> {1, 0, 0, 0, 1, 1, 0, 1, 1, 1, 0};\n}\n\nstd::vector<std::string> MakeFixedStrings(size_t string_size) {\n    std::vector<std::string> result = MakeStr
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:685
"content": "#include \"value_generators.h\"\n\n#include <algorithm>\n#include <type_traits>\n#include <math.h>\n\nnamespace {\nusing namespace clickhouse;\n}\n\nstd::vector<uint32_t> MakeNumbers() {\n    return std::vector<uint32_t> {1, 2, 3, 7, 11, 13, 17, 19, 23, 29, 31};\n}\n\nstd::vector<uint8_t> MakeBools() {\n    return std::vector<uint8_t> {1, 0, 0, 0, 1, 1, 0, 1, 1, 1, 0};\n}\n\nstd::vector<std::string> MakeFixedStrings(size_t string_size) {\n    std::vector<std::string> result = MakeStr
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:811
"content": "#include \"type_parser.h\"\n\n#include \"clickhouse/exceptions.h\"\n#include \"clickhouse/base/platform.h\" // for _win_\n\n#include <algorithm>\n#include <cmath>\n#include <map>\n#include <mutex>\n#include <unordered_map>\n\n#if defined _win_\n#include <string.h>\n#else\n#include <strings.h>\n#endif\n\n\nnamespace clickhouse {\n\nbool TypeAst::operator==(const TypeAst & other) const {\n    return meta == other.meta\n        && code == other.code\n        && name == other.name\n     
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:861
"content": "                // Empty input string, no tokens produced\n                if (processed_tokens == 0)\n                    return false;\n\n                return ValidateAST(*type);\n            }\n            case Token::Invalid:\n                return false;\n        }\n        ++processed_tokens;\n    } while (true);\n}\n\nTypeParser::Token TypeParser::NextToken() {\n    for (; cur_ < end_; ++cur_) {\n        switch (*cur_) {\n            case ' ':\n            case '\\n':\n    
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:1774
"content": "/*\n *  (C) Copyright 2023 Password4j (http://password4j.com/).\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\");\n *  you may not use this file except in compliance with the License.\n *  You may obtain a copy of the License at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  Unless required by applicable law or agreed to in writing, software\n *  distributed under the License is distributed on an \"AS IS\" BASIS,\n *  WITHOUT WARRANTIES OR C
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:1774
"content": "/*\n *  (C) Copyright 2023 Password4j (http://password4j.com/).\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\");\n *  you may not use this file except in compliance with the License.\n *  You may obtain a copy of the License at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  Unless required by applicable law or agreed to in writing, software\n *  distributed under the License is distributed on an \"AS IS\" BASIS,\n *  WITHOUT WARRANTIES OR C
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:1774
"content": "/*\n *  (C) Copyright 2023 Password4j (http://password4j.com/).\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\");\n *  you may not use this file except in compliance with the License.\n *  You may obtain a copy of the License at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  Unless required by applicable law or agreed to in writing, software\n *  distributed under the License is distributed on an \"AS IS\" BASIS,\n *  WITHOUT WARRANTIES OR C
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:1774
"content": "/*\n *  (C) Copyright 2023 Password4j (http://password4j.com/).\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\");\n *  you may not use this file except in compliance with the License.\n *  You may obtain a copy of the License at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  Unless required by applicable law or agreed to in writing, software\n *  distributed under the License is distributed on an \"AS IS\" BASIS,\n *  WITHOUT WARRANTIES OR C
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:1774
"content": "/*\n *  (C) Copyright 2023 Password4j (http://password4j.com/).\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\");\n *  you may not use this file except in compliance with the License.\n *  You may obtain a copy of the License at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  Unless required by applicable law or agreed to in writing, software\n *  distributed under the License is distributed on an \"AS IS\" BASIS,\n *  WITHOUT WARRANTIES OR C
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:1774
"content": "/*\n *  (C) Copyright 2023 Password4j (http://password4j.com/).\n *\n *  Licensed under the Apache License, Version 2.0 (the \"License\");\n *  you may not use this file except in compliance with the License.\n *  You may obtain a copy of the License at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n *  Unless required by applicable law or agreed to in writing, software\n *  distributed under the License is distributed on an \"AS IS\" BASIS,\n *  WITHOUT WARRANTIES OR C
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:1784
"content": "    private static final Object[][] TEST_VECTORS = new Object[][]{\n            // Single thread\n            new Object[]{\"hunter42\", \"examplesalt\", \"SHA-256\", 1024, 3, 0, 3, \"716043dff777b44aa7b88dcbab12c078abecfac9d289c5b5195967aa63440dfb\"},\n            new Object[]{\"\", \"salt\", \"SHA-256\", 3, 3, 0, 3, \"5f02f8206f9cd212485c6bdf85527b698956701ad0852106f94b94ee94577378\"},\n            new Object[]{\"password\", \"\", \"SHA-256\", 3, 3, 0, 3, \"20aa99d7fe3f4df4bd98c655
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:1784
"content": "    private static final Object[][] TEST_VECTORS = new Object[][]{\n            // Single thread\n            new Object[]{\"hunter42\", \"examplesalt\", \"SHA-256\", 1024, 3, 0, 3, \"716043dff777b44aa7b88dcbab12c078abecfac9d289c5b5195967aa63440dfb\"},\n            new Object[]{\"\", \"salt\", \"SHA-256\", 3, 3, 0, 3, \"5f02f8206f9cd212485c6bdf85527b698956701ad0852106f94b94ee94577378\"},\n            new Object[]{\"password\", \"\", \"SHA-256\", 3, 3, 0, 3, \"20aa99d7fe3f4df4bd98c655
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:1794
"content": "            new Object[]{\"password\", \"\", \"SHA-256\", 3, 3, 1, 3, \"498344ee9d31baf82cc93ebb3874fe0b76e164302c1cefa1b63a90a69afb9b4d\"},\n            new Object[]{\"\\000\", \"\\000\", \"SHA-256\", 3, 3, 4, 3, \"8a665611e40710ba1fd78c181549c750f17c12e423c11930ce997f04c7153e0c\"},\n            new Object[]{\"\\000\", \"\\000\", \"SHA-256\", 3, 3, 1, 3, \"d9e33c683451b21fb3720afbd78bf12518c1d4401fa39f054b052a145c968bb1\"},\n            new Object[]{\"password\", \"salt\", \"SHA-256
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:1794
"content": "            new Object[]{\"password\", \"\", \"SHA-256\", 3, 3, 1, 3, \"498344ee9d31baf82cc93ebb3874fe0b76e164302c1cefa1b63a90a69afb9b4d\"},\n            new Object[]{\"\\000\", \"\\000\", \"SHA-256\", 3, 3, 4, 3, \"8a665611e40710ba1fd78c181549c750f17c12e423c11930ce997f04c7153e0c\"},\n            new Object[]{\"\\000\", \"\\000\", \"SHA-256\", 3, 3, 1, 3, \"d9e33c683451b21fb3720afbd78bf12518c1d4401fa39f054b052a145c968bb1\"},\n            new Object[]{\"password\", \"salt\", \"SHA-256
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:1794
"content": "            new Object[]{\"password\", \"\", \"SHA-256\", 3, 3, 1, 3, \"498344ee9d31baf82cc93ebb3874fe0b76e164302c1cefa1b63a90a69afb9b4d\"},\n            new Object[]{\"\\000\", \"\\000\", \"SHA-256\", 3, 3, 4, 3, \"8a665611e40710ba1fd78c181549c750f17c12e423c11930ce997f04c7153e0c\"},\n            new Object[]{\"\\000\", \"\\000\", \"SHA-256\", 3, 3, 1, 3, \"d9e33c683451b21fb3720afbd78bf12518c1d4401fa39f054b052a145c968bb1\"},\n            new Object[]{\"password\", \"salt\", \"SHA-256
How to fix

Strip null bytes from all file path inputs before processing.

Null byte injection in file paths

critical

Null bytes in file paths can truncate path validation and access unintended files.

capabilities/contextual-embeddings/data/codebase_chunks.json:1794
"content": "            new Object[]{\"password\", \"\", \"SHA-256\", 3, 3, 1, 3, \"498344ee9d31baf82cc93ebb3874fe0b76e164302c1cefa1b63a90a69afb9b4d\"},\n            new Object[]{\"\\000\", \"\\000\", \"SHA-256\", 3, 3, 4, 3, \"8a665611e40710ba1fd78c181549c750f17c12e423c11930ce997f04c7153e0c\"},\n            new Object[]{\"\\000\", \"\\000\", \"SHA-256\", 3, 3, 1, 3, \"d9e33c683451b21fb3720afbd78bf12518c1d4401fa39f054b052a145c968bb1\"},\n            new Object[]{\"password\", \"salt\", \"SHA-256
How to fix

Strip null bytes from all file path inputs before processing.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/contextual-embeddings/data/codebase_chunks.json:548
"content": "import pytest\n\nfrom ciphey import decrypt\nfrom ciphey.iface import Config\n\nanswer_str = \"Hello my name is bee and I like dog and apple and tree\"\n\n\ndef test_a1z26():\n    res = decrypt(\n        Config().library_default().complete_config(),\n        \"8 5 12 12 15 13 25 14 1 13 5 9 19 2 5 5 1 14 4 9 12 9 11 5 4 15 7 1 14 4 1 16 16 12 5 1 14 4 20 18 5 5\",\n    )\n    assert res == \"hellomynameisbeeandilikedogandappleandtree\"\n\n\ndef test_affine():\n    res = decrypt(\n   
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/contextual-embeddings/data/codebase_chunks.json:603
"content": "    assert res == answer_str\n\n\ndef test_braille():\n    res = decrypt(\n        Config.library_default().complete_config(),\n        \"\u2813\u2811\u2807\u2807\u2815\u2800\u280d\u283d\u2800\u281d\u2801\u280d\u2811\u2800\u280a\u280e\u2800\u2803\u2811\u2811\u2800\u2801\u281d\u2819\u2800\u280a\u2800\u2807\u280a\u2805\u2811\u2800\u2819\u2815\u281b\u2800\u2801\u281d\u2819\u2800\u2801\u280f\u280f\u2807\u2811\u2800\u2801\u281d\u2819\u2800\u281e\u2817\u2811\u2811\",\n    )\n    assert res
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:35
"text": "Authentication\n\n\nAll requests to the Claude API must include an x-api-key header with your API key. If you are using the Client SDKs, you will set the API when constructing a client, and then the SDK will send the header on your behalf with every request. If integrating directly with the API, you\u2019ll need to send this header yourself.\nShellcurl https://api.anthropic.com/v1/messages --header \"x-api-key: YOUR_API_KEY\" ...\nShell\nShell\n\ncurl https://api.anthropic.com/v1/messag
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:35
"text": "Authentication\n\n\nAll requests to the Claude API must include an x-api-key header with your API key. If you are using the Client SDKs, you will set the API when constructing a client, and then the SDK will send the header on your behalf with every request. If integrating directly with the API, you\u2019ll need to send this header yourself.\nShellcurl https://api.anthropic.com/v1/messages --header \"x-api-key: YOUR_API_KEY\" ...\nShell\nShell\n\ncurl https://api.anthropic.com/v1/messag
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:35
"text": "Authentication\n\n\nAll requests to the Claude API must include an x-api-key header with your API key. If you are using the Client SDKs, you will set the API when constructing a client, and then the SDK will send the header on your behalf with every request. If integrating directly with the API, you\u2019ll need to send this header yourself.\nShellcurl https://api.anthropic.com/v1/messages --header \"x-api-key: YOUR_API_KEY\" ...\nShell\nShell\n\ncurl https://api.anthropic.com/v1/messag
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:35
"text": "Authentication\n\n\nAll requests to the Claude API must include an x-api-key header with your API key. If you are using the Client SDKs, you will set the API when constructing a client, and then the SDK will send the header on your behalf with every request. If integrating directly with the API, you\u2019ll need to send this header yourself.\nShellcurl https://api.anthropic.com/v1/messages --header \"x-api-key: YOUR_API_KEY\" ...\nShell\nShell\n\ncurl https://api.anthropic.com/v1/messag
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:265
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:265
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:265
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:265
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:265
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:265
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:265
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:265
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:265
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:265
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:275
"text": "Optional function parameters\n\n\nYou can specify optional API parameters by listing argument-value pairs.\nYou can set multiple parameters. Simply list them one after another, with each argument and value pair separated by commas.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also setting the model.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also settin
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:275
"text": "Optional function parameters\n\n\nYou can specify optional API parameters by listing argument-value pairs.\nYou can set multiple parameters. Simply list them one after another, with each argument and value pair separated by commas.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also setting the model.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also settin
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:275
"text": "Optional function parameters\n\n\nYou can specify optional API parameters by listing argument-value pairs.\nYou can set multiple parameters. Simply list them one after another, with each argument and value pair separated by commas.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also setting the model.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also settin
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:275
"text": "Optional function parameters\n\n\nYou can specify optional API parameters by listing argument-value pairs.\nYou can set multiple parameters. Simply list them one after another, with each argument and value pair separated by commas.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also setting the model.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also settin
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:275
"text": "Optional function parameters\n\n\nYou can specify optional API parameters by listing argument-value pairs.\nYou can set multiple parameters. Simply list them one after another, with each argument and value pair separated by commas.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also setting the model.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also settin
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:275
"text": "Optional function parameters\n\n\nYou can specify optional API parameters by listing argument-value pairs.\nYou can set multiple parameters. Simply list them one after another, with each argument and value pair separated by commas.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also setting the model.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also settin
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:405
"text": "Handling tool use and tool result content blocks\n\n\nWhen Claude decides to use one of the tools you\u2019ve provided, it will return a response with a stop_reason of tool_use and one or more tool_use content blocks in the API response that include:\nid: A unique identifier for this particular tool use block. This will be used to match up the tool results later.\nname: The name of the tool being used.\ninput: An object containing the input being passed to the tool, conforming to the to
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:405
"text": "Handling tool use and tool result content blocks\n\n\nWhen Claude decides to use one of the tools you\u2019ve provided, it will return a response with a stop_reason of tool_use and one or more tool_use content blocks in the API response that include:\nid: A unique identifier for this particular tool use block. This will be used to match up the tool results later.\nname: The name of the tool being used.\ninput: An object containing the input being passed to the tool, conforming to the to
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:405
"text": "Handling tool use and tool result content blocks\n\n\nWhen Claude decides to use one of the tools you\u2019ve provided, it will return a response with a stop_reason of tool_use and one or more tool_use content blocks in the API response that include:\nid: A unique identifier for this particular tool use block. This will be used to match up the tool results later.\nname: The name of the tool being used.\ninput: An object containing the input being passed to the tool, conforming to the to
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:405
"text": "Handling tool use and tool result content blocks\n\n\nWhen Claude decides to use one of the tools you\u2019ve provided, it will return a response with a stop_reason of tool_use and one or more tool_use content blocks in the API response that include:\nid: A unique identifier for this particular tool use block. This will be used to match up the tool results later.\nname: The name of the tool being used.\ninput: An object containing the input being passed to the tool, conforming to the to
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:405
"text": "Handling tool use and tool result content blocks\n\n\nWhen Claude decides to use one of the tools you\u2019ve provided, it will return a response with a stop_reason of tool_use and one or more tool_use content blocks in the API response that include:\nid: A unique identifier for this particular tool use block. This will be used to match up the tool results later.\nname: The name of the tool being used.\ninput: An object containing the input being passed to the tool, conforming to the to
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:405
"text": "Handling tool use and tool result content blocks\n\n\nWhen Claude decides to use one of the tools you\u2019ve provided, it will return a response with a stop_reason of tool_use and one or more tool_use content blocks in the API response that include:\nid: A unique identifier for this particular tool use block. This will be used to match up the tool results later.\nname: The name of the tool being used.\ninput: An object containing the input being passed to the tool, conforming to the to
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:405
"text": "Handling tool use and tool result content blocks\n\n\nWhen Claude decides to use one of the tools you\u2019ve provided, it will return a response with a stop_reason of tool_use and one or more tool_use content blocks in the API response that include:\nid: A unique identifier for this particular tool use block. This will be used to match up the tool results later.\nname: The name of the tool being used.\ninput: An object containing the input being passed to the tool, conforming to the to
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:41
"text": "Authentication\n\n\nAll requests to the Claude API must include an x-api-key header with your API key. If you are using the Client SDKs, you will set the API when constructing a client, and then the SDK will send the header on your behalf with every request. If integrating directly with the API, you\u2019ll need to send this header yourself.\nShellcurl https://api.anthropic.com/v1/messages --header \"x-api-key: YOUR_API_KEY\" ...\nShell\nShell\n\ncurl https://api.anthropic.com/v1/messag
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:41
"text": "Authentication\n\n\nAll requests to the Claude API must include an x-api-key header with your API key. If you are using the Client SDKs, you will set the API when constructing a client, and then the SDK will send the header on your behalf with every request. If integrating directly with the API, you\u2019ll need to send this header yourself.\nShellcurl https://api.anthropic.com/v1/messages --header \"x-api-key: YOUR_API_KEY\" ...\nShell\nShell\n\ncurl https://api.anthropic.com/v1/messag
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:41
"text": "Authentication\n\n\nAll requests to the Claude API must include an x-api-key header with your API key. If you are using the Client SDKs, you will set the API when constructing a client, and then the SDK will send the header on your behalf with every request. If integrating directly with the API, you\u2019ll need to send this header yourself.\nShellcurl https://api.anthropic.com/v1/messages --header \"x-api-key: YOUR_API_KEY\" ...\nShell\nShell\n\ncurl https://api.anthropic.com/v1/messag
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:41
"text": "Authentication\n\n\nAll requests to the Claude API must include an x-api-key header with your API key. If you are using the Client SDKs, you will set the API when constructing a client, and then the SDK will send the header on your behalf with every request. If integrating directly with the API, you\u2019ll need to send this header yourself.\nShellcurl https://api.anthropic.com/v1/messages --header \"x-api-key: YOUR_API_KEY\" ...\nShell\nShell\n\ncurl https://api.anthropic.com/v1/messag
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:317
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:317
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:317
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:317
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:317
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:317
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:317
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:317
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:317
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:317
"text": "Enter your first prompt\n\n\nThere are two main functions you can use to call Claude using Claude for Sheets. For now, let\u2019s use CLAUDE().\n1Simple promptIn any cell, type =CLAUDE(\"Claude, in one sentence, what's good about the color blue?\")\nClaude should respond with an answer. You will know the prompt is processing because the cell will say Loading...\n2Adding parametersParameter arguments come after the initial prompt, like =CLAUDE(prompt, model, params...).\nmodel is always 
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:329
"text": "Optional function parameters\n\n\nYou can specify optional API parameters by listing argument-value pairs.\nYou can set multiple parameters. Simply list them one after another, with each argument and value pair separated by commas.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also setting the model.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also settin
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:329
"text": "Optional function parameters\n\n\nYou can specify optional API parameters by listing argument-value pairs.\nYou can set multiple parameters. Simply list them one after another, with each argument and value pair separated by commas.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also setting the model.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also settin
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:329
"text": "Optional function parameters\n\n\nYou can specify optional API parameters by listing argument-value pairs.\nYou can set multiple parameters. Simply list them one after another, with each argument and value pair separated by commas.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also setting the model.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also settin
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:329
"text": "Optional function parameters\n\n\nYou can specify optional API parameters by listing argument-value pairs.\nYou can set multiple parameters. Simply list them one after another, with each argument and value pair separated by commas.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also setting the model.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also settin
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:329
"text": "Optional function parameters\n\n\nYou can specify optional API parameters by listing argument-value pairs.\nYou can set multiple parameters. Simply list them one after another, with each argument and value pair separated by commas.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also setting the model.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also settin
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:329
"text": "Optional function parameters\n\n\nYou can specify optional API parameters by listing argument-value pairs.\nYou can set multiple parameters. Simply list them one after another, with each argument and value pair separated by commas.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also setting the model.\nThe first two parameters must always be the prompt and the model. You cannot set an optional parameter without also settin
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:485
"text": "Handling tool use and tool result content blocks\n\n\nWhen Claude decides to use one of the tools you\u2019ve provided, it will return a response with a stop_reason of tool_use and one or more tool_use content blocks in the API response that include:\nid: A unique identifier for this particular tool use block. This will be used to match up the tool results later.\nname: The name of the tool being used.\ninput: An object containing the input being passed to the tool, conforming to the to
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:485
"text": "Handling tool use and tool result content blocks\n\n\nWhen Claude decides to use one of the tools you\u2019ve provided, it will return a response with a stop_reason of tool_use and one or more tool_use content blocks in the API response that include:\nid: A unique identifier for this particular tool use block. This will be used to match up the tool results later.\nname: The name of the tool being used.\ninput: An object containing the input being passed to the tool, conforming to the to
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:485
"text": "Handling tool use and tool result content blocks\n\n\nWhen Claude decides to use one of the tools you\u2019ve provided, it will return a response with a stop_reason of tool_use and one or more tool_use content blocks in the API response that include:\nid: A unique identifier for this particular tool use block. This will be used to match up the tool results later.\nname: The name of the tool being used.\ninput: An object containing the input being passed to the tool, conforming to the to
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:485
"text": "Handling tool use and tool result content blocks\n\n\nWhen Claude decides to use one of the tools you\u2019ve provided, it will return a response with a stop_reason of tool_use and one or more tool_use content blocks in the API response that include:\nid: A unique identifier for this particular tool use block. This will be used to match up the tool results later.\nname: The name of the tool being used.\ninput: An object containing the input being passed to the tool, conforming to the to
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:485
"text": "Handling tool use and tool result content blocks\n\n\nWhen Claude decides to use one of the tools you\u2019ve provided, it will return a response with a stop_reason of tool_use and one or more tool_use content blocks in the API response that include:\nid: A unique identifier for this particular tool use block. This will be used to match up the tool results later.\nname: The name of the tool being used.\ninput: An object containing the input being passed to the tool, conforming to the to
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:485
"text": "Handling tool use and tool result content blocks\n\n\nWhen Claude decides to use one of the tools you\u2019ve provided, it will return a response with a stop_reason of tool_use and one or more tool_use content blocks in the API response that include:\nid: A unique identifier for this particular tool use block. This will be used to match up the tool results later.\nname: The name of the tool being used.\ninput: An object containing the input being passed to the tool, conforming to the to
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:485
"text": "Handling tool use and tool result content blocks\n\n\nWhen Claude decides to use one of the tools you\u2019ve provided, it will return a response with a stop_reason of tool_use and one or more tool_use content blocks in the API response that include:\nid: A unique identifier for this particular tool use block. This will be used to match up the tool results later.\nname: The name of the tool being used.\ninput: An object containing the input being passed to the tool, conforming to the to
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

capabilities/retrieval_augmented_generation/evaluation/docs_evaluation_dataset.json:830
"correct_answer": "When calling the Claude API using Claude for Sheets, you can specify API parameters in two ways: 1) As additional arguments after the prompt and model in the CLAUDE() function, like =CLAUDE(prompt, model, \"max_tokens\", 3). 2) By passing in an API key to be used just for a specific cell, like \"api_key\", \"sk-ant-api03-j1W...\""
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Python open() with user-controlled path

high

Using Python's open() with variable paths without validation enables path traversal.

claude_agent_sdk/chief_of_staff_agent/scripts/decision_matrix.py:207
with open(args.input) as f:
How to fix

Validate and sanitize file paths using os.path.realpath() and check against allowed directories.

Python open() with user-controlled path

high

Using Python's open() with variable paths without validation enables path traversal.

claude_agent_sdk/chief_of_staff_agent/scripts/talent_scorer.py:125
with open(args.input) as f:
How to fix

Validate and sanitize file paths using os.path.realpath() and check against allowed directories.

Directory traversal sequence targeting sensitive files

critical

Paths containing '../' sequences targeting sensitive system files (etc/passwd, .ssh, .env) can escape intended directories.

claude_agent_sdk/observability_agent/docker/docker-compose.yml:9
- ../../.env
How to fix

Validate and sanitize file paths. Use path.resolve() with a base directory and verify the result stays within the allowed root.

Windows-style path traversal patterns

high

Backslash-based directory traversal patterns targeting Windows file systems.

third_party/ElevenLabs/stream_voice_assistant_websocket.py:284
print("\nStreaming Claude response...\n")
How to fix

Normalize path separators and apply traversal checks for both forward and backslashes.

Writing session data to external storage

high

Sending conversation, prompt, or session data to external storage services may leak sensitive user interactions.

third_party/ElevenLabs/stream_voice_assistant_websocket.py:321
ws.send(json.dumps(initial_message))
How to fix

Do not write session or conversation data to external storage. Keep user interaction data within the authorized session boundary.

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/claude-link-review.yml:69
uses: anthropics/claude-code-action@v1
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/claude-model-check.yml:38
uses: actions/checkout@v6
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/claude-model-check.yml:70
uses: anthropics/claude-code-action@v1
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/claude-pr-review.yml:38
uses: actions/checkout@v6
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/claude-pr-review.yml:44
uses: anthropics/claude-code-action@v1
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/links.yml:18
- uses: actions/checkout@v6
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/links.yml:45
uses: actions/setup-python@v6
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/links.yml:116
uses: lycheeverse/lychee-action@v2
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/links.yml:130
uses: lycheeverse/lychee-action@v2
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/links.yml:145
uses: marocchino/sticky-pull-request-comment@v2
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/links.yml:152
uses: actions/upload-artifact@v6
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/lint-format.yml:26
- uses: actions/checkout@v6
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/lint-format.yml:29
uses: astral-sh/setup-uv@v4
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/lint-format.yml:120
uses: anthropics/claude-code-action@v1
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/notebook-diff-comment.yml:17
- uses: actions/checkout@v6
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/notebook-diff-comment.yml:22
uses: astral-sh/setup-uv@v4
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/notebook-quality.yml:23
- uses: actions/checkout@v6
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/notebook-quality.yml:26
uses: astral-sh/setup-uv@v4
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/notebook-quality.yml:58
uses: anthropics/claude-code-action@v1
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/notebook-quality.yml:123
uses: actions/upload-artifact@v6
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/notebook-tests.yml:25
- uses: actions/checkout@v4
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/notebook-tests.yml:30
uses: astral-sh/setup-uv@v4
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/notebook-tests.yml:129
uses: anthropics/claude-code-action@v1
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/notebook-tests.yml:210
uses: actions/upload-artifact@v4
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/verify-authors.yml:20
uses: actions/checkout@v6
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

GitHub Actions with unpinned actions

high

Using GitHub Actions with branch references instead of SHA pins enables supply chain attacks.

.github/workflows/verify-authors.yml:23
uses: actions/setup-python@v6
How to fix

Pin GitHub Actions to full commit SHAs: uses: actions/checkout@abc123...

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:76
"original_uuid": "78cd6ead8e87695b47c2904e3027ae2b7251677caa5c5815b38c8756fe1a0b0c",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:118
"original_uuid": "2b9a8221386274740c40ffa7cdeee92c189fa3f9f59f17c347bfa99abbfa84cd",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:160
"original_uuid": "531430fb53d5505059ecf3d7c8b4b6dd2a8ea035e0b37da202c385b706c7890f",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:172
"original_uuid": "0732e22d364e4359bf093902d674d9ec891bf9a2b4281da5c5bebc1d67879f95",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:184
"original_uuid": "9de08c4cbd3e0aca53020c82fcb434e39fc07d85fc092617f89c993d1fd28210",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:206
"original_uuid": "a72987c2673fe8ea07415380a869075c4e492ac6323ef0d1126bec73e8d4319f",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:238
"original_uuid": "86e39b19ca47c979baa00968bc37f96da0b379d1e2a30e8407738bdce8e98748",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:270
"original_uuid": "f53f33e3403059a8fa7d21b3037c33c6a797fa43c38bca3e16adedee20780642",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:302
"original_uuid": "17f3b912090b0ab395e7ceed8c88c38cea8c99bc292e3d94feec7a7dcbdf3ee2",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:314
"original_uuid": "db4820f398227726bb49a455d49677d8b6cce93fd915b4632ce34ca39c1684f4",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:371
"original_uuid": "ea58fee353c3cce2856ea3e5cba5cad31eb25bef27af6a2828000a99cca9d947",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:388
"original_uuid": "3990e75dcaf5a10f72ca64cdf4ac7c3cbeb3e0e9c643269d774222d0b105bb7b",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:405
"original_uuid": "b9849c2091e8c45fe2589066b6c8ac5d95127a61895c7482b37250e853ab8aad",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:417
"original_uuid": "d4bc89992e119e8c40738b830e03e9586e1cb958d4e30c96f935e7385841364f",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:449
"original_uuid": "fd3a6d5d6a5a1ab1afaae8810c2d2141ea1707b7eb7bfd5b883947d078519c31",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:486
"original_uuid": "44f12a4ef079daf871dc6a95ed7af4ff2ec55b48ca3b004dfc954bf4c9b05ba3",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:503
"original_uuid": "bfc6250497ea53318a31782941f86e13660430636fa5ac61fbda86e2ffb94ea2",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:520
"original_uuid": "2da927c1c66089a8d0af2c7edd199977cc56933b1ba803439d7f2f7f7592f3a3",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:547
"original_uuid": "1cb2aa7099194a80d66547995e291634a603cb89864add10e5fa54c0a6656c74",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:679
"original_uuid": "538e985a1d85e0fc67ab55f40ee6dade761bf959d5e8f3daca45b722935ba6a5",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:731
"original_uuid": "6ffb0cf236934c884639effc308d9cb67a7cd33d849153664bd70cc5b7dc6787",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:788
"original_uuid": "68689866af92461ae59fa9f0bc3064ba012e1482bce9a48fc44e1b25a26ac50c",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:810
"original_uuid": "8001dcf16ed7af29411a65852c128e572d3ca6697c0f70ae4e1018147047ea69",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:887
"original_uuid": "e3d478567bc2bb9f55952c093a97847b3dc538cdcdd9d8b74b855857cf238bd1",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:999
"original_uuid": "b55a4b2aefbbe30b355c360d7f1f24bd114d9699fdd21c2e4eae3f693ab5ef36",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1021
"original_uuid": "f08b70253a31ba96a0e3e873e3f53393786ceb5fb150ea3878551b32ccf3914d",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1033
"original_uuid": "087c7915a5df0e768bca07ed728ccdebfa8bfd6d5eeb03a815ad219ead305e6a",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1090
"original_uuid": "130da0aba10d9e75238c693ee9b6ea2494f8eca2a10e29fa834efe3729ee5bd6",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1112
"original_uuid": "43bd45ab839500606044476e58992df90d6c72471777260327776df9c3f3d4bd",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1129
"original_uuid": "4969d098eff293d66a67d63d1c2d7c785a7b09666272510b9e0c6324e8246dc8",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1141
"original_uuid": "e154c2b27db3036da0a3ae9e88f7445ec748ea9d2d1c24b14460801801705c66",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1188
"original_uuid": "f8dd24de0db395aa7cff1e4c804eb1d10f916c9b4765d7c790b1dedfa339f913",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1340
"original_uuid": "bd642f9c2a6fa3b4643bf66c82f214dd6cea1dcff7f20ce8cad864503b7f40ee",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1422
"original_uuid": "f59e2b84517250cd221b201aeac31b98b6174d155ea11255097ffb06702d29b0",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1434
"original_uuid": "26dc2c78337411bfcc55ab9e71922005456242e97463ace852147e88984a5f08",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1481
"original_uuid": "e23ba17cf99c628afc86f67b22af62848a96d600c7e29bfb7fb12e5cacea7f05",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1513
"original_uuid": "e357fbf7acddc26c61f964891486394c176804f31a319d178f3a4c9b41dd47e0",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1600
"original_uuid": "c5cc0b3e2067eb3f0eec0e111678da31cd242215e7c815420964ca9d607e7ddf",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1687
"original_uuid": "eabb6a15874b3744292a5808f64e7a6ddf5b7114f80bad3306c2af61d8799b09",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1709
"original_uuid": "a7207d085190f179fc2a0f4ed97aece6f033ecdda1104e75dac8fe43844b598b",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1726
"original_uuid": "2c42fa36aa434372ba169a9f7cbfe3a0a0b140342bb70fe07907b93ac23f23e9",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1773
"original_uuid": "b80798210bd12005120f16aa5e3903f550597521ed42ea5f67a050954fbd78ad",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1830
"original_uuid": "cf29d0f1b0d00030546c50e9c15f1fc432ba590aaa270f7c6dcfa2591c386f25",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1922
"original_uuid": "2c96230c24dfd108a09abadeb43abd5f3220c4890e6e1bef947ab5dbb7628757",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Hardcoded API key or token literal

critical

String literals matching known API key prefixes (sk-, ghp_, AKIA, xoxb-, etc.) or long base64-like strings may expose secrets in source code.

capabilities/contextual-embeddings/data/codebase_chunks.json:1939
"original_uuid": "bf58cf0c65c709224da0f68ad6bd4fed3df1afcf9677f840b923e95af7377a0b",
How to fix

Remove hardcoded secrets from source code. Use environment variables or a secrets manager.

Use static imports only. Do not dynamically import modules from variable paths.

Dynamic import from variable URL

critical

Dynamic imports with variable URLs can load malicious code at runtime.

capabilities/contextual-embeddings/data/codebase_chunks.json:166
"content": "#include \"common.h\"\n\nbool both_require(const uint8_t *bytes, size_t len) {\n  if (len >= 1 && bytes[0] == 'a') {\n    if (len >= 2 && bytes[1] == 'b') {\n      if (len >= 3 && bytes[2] == 'c') { return ACCEPT; }\n    }\n  }\n  return REJECT;\n}"
How to fix

Use static imports only. Do not dynamically import modules from variable paths.

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:308
"content": "use {\n    crate::args::LogArgs,\n    anyhow::{anyhow, Result},\n    simplelog::{Config, LevelFilter, WriteLogger},\n    std::fs::File,\n};\n\npub struct Logger;\n\nimpl Logger {\n    pub fn init(args: &impl LogArgs) -> Result<()> {\n        let filter: LevelFilter = args.log_level().into();\n        if filter != LevelFilter::Off {\n            let logfile = File::create(args.log_file())\n                .map_err(|e| anyhow!(\"Failed to open log file: {e:}\"))?;\n            WriteLog
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:372
"content": "from typing import Dict, Optional\n\nimport logging\nfrom rich.logging import RichHandler\n\nfrom ciphey.iface import Config, Decoder, ParamSpec, T, U, registry\n\n\n@registry.register\nclass Octal(Decoder[str]):\n    def decode(self, ctext: T) -> Optional[U]:\n        \"\"\"\n        Performs Octal decoding\n        \"\"\"\n        str_converted = []\n        octal_seq = ctext.split(\" \")\n        if len(octal_seq) == 1:\n            # Concatted octal must be formed of octal triple
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:377
"content": "from typing import Dict, Optional\n\nimport logging\nfrom rich.logging import RichHandler\n\nfrom ciphey.iface import Config, Decoder, ParamSpec, T, U, registry\n\n\n@registry.register\nclass Octal(Decoder[str]):\n    def decode(self, ctext: T) -> Optional[U]:\n        \"\"\"\n        Performs Octal decoding\n        \"\"\"\n        str_converted = []\n        octal_seq = ctext.split(\" \")\n        if len(octal_seq) == 1:\n            # Concatted octal must be formed of octal triple
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:382
"content": "                    return None\n                n = int(octal_char, 8)\n                if (\n                    n < 0\n                ):  # n cannot be greater than 255, as we checked that with the earlier length check\n                    logging.debug(f\"Non octal char {octal_char}\")\n                    return None\n                str_converted.append(n)\n\n            return bytes(str_converted)\n        # Catch bad octal chars\n        except ValueError:\n            retur
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:389
"content": "import re\nfrom typing import Dict, Optional\n\nimport logging\nfrom rich.logging import RichHandler\n\nfrom ciphey.iface import Config, Decoder, ParamSpec, T, U, registry\n\n\n@registry.register\nclass A1z26(Decoder[str]):\n    def decode(self, ctext: T) -> Optional[U]:\n        \"\"\"\n        Performs A1Z26 decoding\n        \"\"\"\n        logging.debug(\"Attempting A1Z26\")\n        ctext_converted = []\n        ctext_split = re.split(r\"[ ,;:\\-\\n]\", ctext)\n        delimiter
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:394
"content": "import re\nfrom typing import Dict, Optional\n\nimport logging\nfrom rich.logging import RichHandler\n\nfrom ciphey.iface import Config, Decoder, ParamSpec, T, U, registry\n\n\n@registry.register\nclass A1z26(Decoder[str]):\n    def decode(self, ctext: T) -> Optional[U]:\n        \"\"\"\n        Performs A1Z26 decoding\n        \"\"\"\n        logging.debug(\"Attempting A1Z26\")\n        ctext_converted = []\n        ctext_split = re.split(r\"[ ,;:\\-\\n]\", ctext)\n        delimiter
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:399
"content": "                        f\"Failed to decode A1Z26 due to invalid number '{val}'\"\n                    )\n                    return None\n                val2 = int(i) + 96\n                ctext_converted.append(chr(val2))\n            ctext_decoded = \"\".join(ctext_converted)\n            logging.info(\n                f\"A1Z26 successful, returning '{ctext_decoded}' with delimiter(s) {delimiters}\"\n            )\n            return ctext_decoded\n        except Exception:\n    
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:418
"content": "from typing import Dict, Optional\n\nimport logging\nfrom rich.logging import RichHandler\n\nfrom ciphey.iface import Config, Decoder, ParamSpec, T, Translation, U, registry\n\n\n@registry.register\nclass Morse_code(Decoder[str]):\n    # A priority list for char/word boundaries\n    BOUNDARIES = {\" \": 1, \"/\": 2, \"\\n\": 3}\n    PURGE = {ord(c): None for c in BOUNDARIES.keys()}\n    MAX_PRIORITY = 3\n    ALLOWED = {\".\", \"-\", \" \", \"/\", \"\\n\"}\n    MORSE_CODE_DICT: Dict[s
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:423
"content": "from typing import Dict, Optional\n\nimport logging\nfrom rich.logging import RichHandler\n\nfrom ciphey.iface import Config, Decoder, ParamSpec, T, Translation, U, registry\n\n\n@registry.register\nclass Morse_code(Decoder[str]):\n    # A priority list for char/word boundaries\n    BOUNDARIES = {\" \": 1, \"/\": 2, \"\\n\": 3}\n    PURGE = {ord(c): None for c in BOUNDARIES.keys()}\n    MAX_PRIORITY = 3\n    ALLOWED = {\".\", \"-\", \" \", \"/\", \"\\n\"}\n    MORSE_CODE_DICT: Dict[s
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:428
"content": "        char_boundary = word_boundary = None\n        char_priority = word_priority = 0\n        # Custom loop allows early break\n        for i in ctext:\n            i_priority = self.BOUNDARIES.get(i)\n            if i_priority is None:\n                if i in self.ALLOWED:\n                    continue\n                logging.debug(f\"Non-morse char '{i}' found\")\n                return None\n\n"
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:433
"content": "            if i_priority <= char_priority or i == char_boundary or i == word_boundary:\n                continue\n            # Default to having a char boundary over a word boundary\n            if (\n                i_priority > word_priority\n                and word_boundary is None\n                and char_boundary is not None\n            ):\n                word_priority = i_priority\n                word_boundary = i\n                continue\n            char_priority = i_
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:438
"content": "        for word in ctext.split(word_boundary) if word_boundary else [ctext]:\n            logging.debug(f\"Attempting to decode word {word}\")\n            for char in word.split(char_boundary):\n                char = char.translate(self.PURGE)\n                if len(char) == 0:\n                    continue\n                try:\n                    m = self.MORSE_CODE_DICT_INV[char]\n                except KeyError:\n                    logging.debug(f\"Invalid codeword '{char}'
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:450
"content": "import re\nfrom typing import Dict, List, Optional\n\nimport logging\nfrom rich.logging import RichHandler\n\nfrom ciphey.iface import (\n    Config,\n    Cracker,\n    CrackInfo,\n    CrackResult,\n    ParamSpec,\n    Translation,\n    registry,\n)\n\n\n@registry.register\nclass Soundex(Cracker[str]):\n    def getInfo(self, ctext: str) -> CrackInfo:\n        return CrackInfo(\n            success_likelihood=0.1,\n            success_runtime=1e-5,\n            failure_runtime=1e-5,\n
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:460
"content": "    def attemptCrack(self, ctext: str) -> List[CrackResult]:\n        \"\"\"\n        Attempts to crack Soundex by generating all possible combinations.\n        \"\"\"\n        logging.debug(\"Attempting Soundex cracker\")\n        word_list = []\n        sentences = []\n        result = []\n\n        # Convert to uppercase and replace delimiters and whitespace with nothing\n        ctext = re.sub(r\"[,;:\\-\\s]\", \"\", ctext.upper())\n\n        # Make sure ctext contains only A-Z 
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:465
"content": "        # Make sure ctext is divisible by 4\n        ctext_len = len(ctext)\n        if ctext_len % 4:\n            logging.debug(\n                f\"Failed to decode Soundex because length must be a multiple of 4, not '{ctext_len}'\"\n            )\n            return None\n\n        # Split ctext into groups of 4\n        ctext = \" \".join(ctext[i : i + 4] for i in range(0, len(ctext), 4))\n        ctext_split = ctext.split(\" \")\n        soundex_keys = self.SOUNDEX_DICT.keys()\
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:504
"content": "from functools import lru_cache\nfrom typing import Any, Dict, Optional, Set\n\nimport cipheydists\nimport logging\n\nfrom ciphey.iface import (\n    Config,\n    Distribution,\n    ParamSpec,\n    ResourceLoader,\n    Translation,\n    WordList,\n    registry,\n)\n\n\n@registry.register_multi(WordList, Distribution, Translation)\nclass CipheyDists(ResourceLoader):\n    # _wordlists: Set[str] = frozenset({\"english\", \"english1000\", \"englishStopWords\"})\n    # _brandons: Set[str]
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:514
"content": "    def whatResources(self) -> Optional[Set[str]]:\n        pass\n\n    @lru_cache()\n    def getResource(self, name: str) -> Any:\n        logging.debug(f\"Loading cipheydists resource {name}\")\n        prefix, name = name.split(\"::\", 1)\n        return self._getters[prefix](name)\n\n    def __init__(self, config: Config):\n        super().__init__(config)\n\n    @staticmethod\n    def getParams() -> Optional[Dict[str, ParamSpec]]:\n        return None\n"
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:888
"content": "// Copyright 2005, Google Inc.\n// All rights reserved.\n//\n// Redistribution and use in source and binary forms, with or without\n// modification, are permitted provided that the following conditions are\n// met:\n//\n//     * Redistributions of source code must retain the above copyright\n// notice, this list of conditions and the following disclaimer.\n//     * Redistributions in binary form must reproduce the above\n// copyright notice, this list of conditions and the following 
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:963
"content": "//   LOG(DFATAL) << \"death\";\n//   return 12;\n// }\n//\n// TEST(TestSuite, TestDieOr12WorksInDgbAndOpt) {\n//   int sideeffect = 0;\n//   // Only asserts in dbg.\n//   EXPECT_DEBUG_DEATH(DieInDebugOr12(&sideeffect), \"death\");\n//\n// #ifdef NDEBUG\n//   // opt-mode has sideeffect visible.\n//   EXPECT_EQ(12, sideeffect);\n// #else\n//   // dbg-mode no visible sideeffect.\n//   EXPECT_EQ(0, sideeffect);\n// #endif\n// }\n//\n// This will assert that DieInDebugReturn12InOpt() cras
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:988
"content": "//  the end allows the syntax of streaming additional messages into the\n//  macro, for compilational compatibility with EXPECT_DEATH/ASSERT_DEATH.\n# define GTEST_UNSUPPORTED_DEATH_TEST(statement, regex, terminator) \\\n    GTEST_AMBIGUOUS_ELSE_BLOCKER_ \\\n    if (::testing::internal::AlwaysTrue()) { \\\n      GTEST_LOG_(WARNING) \\\n          << \"Death tests are not supported on this platform.\\n\" \\\n          << \"Statement '\" #statement \"' cannot be verified.\"; \\\n    } e
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:1142
"content": "/*\n * Copyright 2020 Google LLC.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\"); you may not\n * use this file except in compliance with the License. You may obtain a copy of\n * the License at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS, WITHOUT\n * WARRANTIES OR CONDITIONS OF ANY KIND, either expres
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/contextual-embeddings/data/codebase_chunks.json:1601
"content": "/*\n * Copyright 2018 Google LLC.\n *\n * Licensed under the Apache License, Version 2.0 (the \"License\"); you may not\n * use this file except in compliance with the License. You may obtain a copy of\n * the License at\n *\n *      http://www.apache.org/licenses/LICENSE-2.0\n *\n * Unless required by applicable law or agreed to in writing, software\n * distributed under the License is distributed on an \"AS IS\" BASIS, WITHOUT\n * WARRANTIES OR CONDITIONS OF ANY KIND, either expres
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Console.log in production code

low

Detected console.log() usage in non-test source code. Console.log is not appropriate for production logging as it lacks log levels, structured output, and proper log management.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:565
"text": "Typescript\n\n\nTypescript library GitHub repo\nExample:\nTypescriptimport Anthropic from '@anthropic-ai/sdk';\n\nconst anthropic = new Anthropic({\n  apiKey: 'my_api_key', // defaults to process.env[\"ANTHROPIC_API_KEY\"]\n});\n\nconst msg = await anthropic.messages.create({\n  model: \"claude-3-5-sonnet-20241022\",\n  max_tokens: 1024,\n  messages: [{ role: \"user\", content: \"Hello, Claude\" }],\n});\nconsole.log(msg);\nTypescript\nTypescript\n\nimport Anthropic from '@anthropic-ai/
How to fix

Replace console.log with a structured logging library (e.g., winston, pino) that supports log levels and proper log management.

Console.log in production code

low

Detected console.log() usage in non-test source code. Console.log is not appropriate for production logging as it lacks log levels, structured output, and proper log management.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:565
"text": "Typescript\n\n\nTypescript library GitHub repo\nExample:\nTypescriptimport Anthropic from '@anthropic-ai/sdk';\n\nconst anthropic = new Anthropic({\n  apiKey: 'my_api_key', // defaults to process.env[\"ANTHROPIC_API_KEY\"]\n});\n\nconst msg = await anthropic.messages.create({\n  model: \"claude-3-5-sonnet-20241022\",\n  max_tokens: 1024,\n  messages: [{ role: \"user\", content: \"Hello, Claude\" }],\n});\nconsole.log(msg);\nTypescript\nTypescript\n\nimport Anthropic from '@anthropic-ai/
How to fix

Replace console.log with a structured logging library (e.g., winston, pino) that supports log levels and proper log management.

Console.log in production code

low

Detected console.log() usage in non-test source code. Console.log is not appropriate for production logging as it lacks log levels, structured output, and proper log management.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:565
"text": "Typescript\n\n\nTypescript library GitHub repo\nExample:\nTypescriptimport Anthropic from '@anthropic-ai/sdk';\n\nconst anthropic = new Anthropic({\n  apiKey: 'my_api_key', // defaults to process.env[\"ANTHROPIC_API_KEY\"]\n});\n\nconst msg = await anthropic.messages.create({\n  model: \"claude-3-5-sonnet-20241022\",\n  max_tokens: 1024,\n  messages: [{ role: \"user\", content: \"Hello, Claude\" }],\n});\nconsole.log(msg);\nTypescript\nTypescript\n\nimport Anthropic from '@anthropic-ai/
How to fix

Replace console.log with a structured logging library (e.g., winston, pino) that supports log levels and proper log management.

Console.log in production code

low

Detected console.log() usage in non-test source code. Console.log is not appropriate for production logging as it lacks log levels, structured output, and proper log management.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:565
"text": "Typescript\n\n\nTypescript library GitHub repo\nExample:\nTypescriptimport Anthropic from '@anthropic-ai/sdk';\n\nconst anthropic = new Anthropic({\n  apiKey: 'my_api_key', // defaults to process.env[\"ANTHROPIC_API_KEY\"]\n});\n\nconst msg = await anthropic.messages.create({\n  model: \"claude-3-5-sonnet-20241022\",\n  max_tokens: 1024,\n  messages: [{ role: \"user\", content: \"Hello, Claude\" }],\n});\nconsole.log(msg);\nTypescript\nTypescript\n\nimport Anthropic from '@anthropic-ai/
How to fix

Replace console.log with a structured logging library (e.g., winston, pino) that supports log levels and proper log management.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:50
"text": "Start with the Workbench\n\n\nAny API call you make\u2013-regardless of the specific task-\u2013sends a well-configured prompt to the Claude API. As you\u2019re learning to make the most of Claude, we recommend that you start the development process in the Workbench, a web-based interface to Claude.\nLog into the Claude Console and click Workbench.\nIn the middle section, under User, let\u2019s ask Claude a question.\nUserWhy is the ocean salty?\nUser\nUser\n\nWhy is the ocean salty?\nW
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:165
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:185
"text": "Text capabilities and use cases\n\n\nClaude has a broad range of text-based capabilities, including but not limited to:\nCapabilityThis enables you to\u2026Text SummarizationDistill lengthy content into key insights for executives, social media, or product teams.Content GenerationCraft compelling content from blog posts and emails to marketing slogans and product descriptions.Data / Entity ExtractionUncover structured insights from unstructured text like reviews, news articles, or trans
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:230
"text": "Available Voyage models\n\n\nVoyage recommends using the following embedding models:\nModelContext LengthEmbedding DimensionDescriptionvoyage-large-2160001536Voyage AI\u2019s most powerful generalist embedding model.voyage-code-2160001536Optimized for code retrieval (17% better than alternatives), and also SoTA on general-purpose corpora. See this Voyage blog post for details.voyage-240001024Base generalist embedding model optimized for both latency and quality.voyage-lite-02-instruct40
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:410
"text": "Troubleshooting errors\n\n\nThere are a few different types of errors that can occur when using tools with Claude:\nTool execution error If the tool itself throws an error during execution (e.g. a network error when fetching weather data), you can return the error message in the content along with \"is_error\": true : JSON { \"role\" : \"user\" , \"content\" : [ { \"type\" : \"tool_result\" , \"tool_use_id\" : \"toolu_01A09q90qw90lq917835lq9\" , \"content\" : \"ConnectionError: the weat
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:625
"text": "Making requests\n\n\nBefore running requests you may need to run gcloud auth application-default login to authenticate with GCP.\nThe following examples shows how to generate text from Claude 3 Haiku on Vertex AI:\nPython Typescript cURL from anthropic import AnthropicVertex\n\nproject_id = \"MY_PROJECT_ID\" # Where the model is running. e.g. us-central1 or europe-west4 for haiku region = \"MY_REGION\" client = AnthropicVertex ( project_id = project_id , region = region ) message = clie
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:59
"text": "Start with the Workbench\n\n\nAny API call you make\u2013-regardless of the specific task-\u2013sends a well-configured prompt to the Claude API. As you\u2019re learning to make the most of Claude, we recommend that you start the development process in the Workbench, a web-based interface to Claude.\nLog into the Claude Console and click Workbench.\nIn the middle section, under User, let\u2019s ask Claude a question.\nUserWhy is the ocean salty?\nUser\nUser\n\nWhy is the ocean salty?\nW
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:197
"text": "Example evals\n\n\nTask fidelity (sentiment analysis) - exact match evaluation What it measures : Exact match evals measure whether the model\u2019s output exactly matches a predefined correct answer. It\u2019s a simple, unambiguous metric that\u2019s perfect for tasks with clear-cut, categorical answers like sentiment analysis (positive, negative, neutral). Example eval test cases : 1000 tweets with human-labeled sentiments. import anthropic\n\ntweets = [ { \"text\" : \"This movie was 
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:221
"text": "Text capabilities and use cases\n\n\nClaude has a broad range of text-based capabilities, including but not limited to:\nCapabilityThis enables you to\u2026Text SummarizationDistill lengthy content into key insights for executives, social media, or product teams.Content GenerationCraft compelling content from blog posts and emails to marketing slogans and product descriptions.Data / Entity ExtractionUncover structured insights from unstructured text like reviews, news articles, or trans
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:275
"text": "Available Voyage models\n\n\nVoyage recommends using the following embedding models:\nModelContext LengthEmbedding DimensionDescriptionvoyage-large-2160001536Voyage AI\u2019s most powerful generalist embedding model.voyage-code-2160001536Optimized for code retrieval (17% better than alternatives), and also SoTA on general-purpose corpora. See this Voyage blog post for details.voyage-240001024Base generalist embedding model optimized for both latency and quality.voyage-lite-02-instruct40
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

capabilities/retrieval_augmented_generation/data/anthropic_summary_indexed_docs.json:491
"text": "Troubleshooting errors\n\n\nThere are a few different types of errors that can occur when using tools with Claude:\nTool execution error If the tool itself throws an error during execution (e.g. a network error when fetching weather data), you can return the error message in the content along with \"is_error\": true : JSON { \"role\" : \"user\" , \"content\" : [ { \"type\" : \"tool_result\" , \"tool_use_id\" : \"toolu_01A09q90qw90lq917835lq9\" , \"content\" : \"ConnectionError: the weat
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

claude_agent_sdk/site_reliability_agent/infra_setup.py:824
pass  # Suppress logs
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Disabled or suppressed security logging

medium

Detected patterns that disable, silence, or suppress logging or audit trails. Disabling security logging can mask malicious activity and hinder incident investigation.

skills/custom_skills/applying-brand-guidelines/validate_brand.py:23
logo_usage_rules: dict | None = None
How to fix

Ensure security-related logging is always enabled in production. Never suppress audit trails or security event logs.

Remove hidden HTML/XML tags from tool descriptions. Descriptions must be plain text.

Hidden HTML/XML tags in tool description

critical

Tool descriptions containing hidden HTML or XML tags can inject invisible directives to manipulate LLM behavior.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:600
"text": "Making requests\n\n\nThe following examples shows how to generate text from Claude 3 Sonnet on Bedrock:\nPython Typescript Boto3 (Python) from anthropic import AnthropicBedrock\n\nclient = AnthropicBedrock ( # Authenticate by either providing the keys below or use the default AWS credential providers, such as # using ~/.aws/credentials or the \"AWS_SECRET_ACCESS_KEY\" and \"AWS_ACCESS_KEY_ID\" environment variables. aws_access_key = \"<access key>\" , aws_secret_key = \"<secret key>\" ,
How to fix

Remove hidden HTML/XML tags from tool descriptions. Descriptions must be plain text.

Hidden HTML/XML tags in tool description

critical

Tool descriptions containing hidden HTML or XML tags can inject invisible directives to manipulate LLM behavior.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:600
"text": "Making requests\n\n\nThe following examples shows how to generate text from Claude 3 Sonnet on Bedrock:\nPython Typescript Boto3 (Python) from anthropic import AnthropicBedrock\n\nclient = AnthropicBedrock ( # Authenticate by either providing the keys below or use the default AWS credential providers, such as # using ~/.aws/credentials or the \"AWS_SECRET_ACCESS_KEY\" and \"AWS_ACCESS_KEY_ID\" environment variables. aws_access_key = \"<access key>\" , aws_secret_key = \"<secret key>\" ,
How to fix

Remove hidden HTML/XML tags from tool descriptions. Descriptions must be plain text.

Hidden HTML/XML tags in tool description

critical

Tool descriptions containing hidden HTML or XML tags can inject invisible directives to manipulate LLM behavior.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:600
"text": "Making requests\n\n\nThe following examples shows how to generate text from Claude 3 Sonnet on Bedrock:\nPython Typescript Boto3 (Python) from anthropic import AnthropicBedrock\n\nclient = AnthropicBedrock ( # Authenticate by either providing the keys below or use the default AWS credential providers, such as # using ~/.aws/credentials or the \"AWS_SECRET_ACCESS_KEY\" and \"AWS_ACCESS_KEY_ID\" environment variables. aws_access_key = \"<access key>\" , aws_secret_key = \"<secret key>\" ,
How to fix

Remove hidden HTML/XML tags from tool descriptions. Descriptions must be plain text.

Hidden HTML/XML tags in tool description

critical

Tool descriptions containing hidden HTML or XML tags can inject invisible directives to manipulate LLM behavior.

capabilities/retrieval_augmented_generation/data/anthropic_docs.json:600
"text": "Making requests\n\n\nThe following examples shows how to generate text from Claude 3 Sonnet on Bedrock:\nPython Typescript Boto3 (Python) from anthropic import AnthropicBedrock\n\nclient = AnthropicBedrock ( # Authenticate by either providing the keys below or use the default AWS credential providers, such as # using ~/.aws/credentials or the \"AWS_SECRET_ACCESS_KEY\" and \"AWS_ACCESS_KEY_ID\" environment variables. aws_access_key = \"<access key>\" , aws_secret_key = \"<secret key>\" ,
How to fix

Remove hidden HTML/XML tags from tool descriptions. Descriptions must be plain text.

Cross-tool shadowing of system commands

high

Tool names mimicking built-in system tools (e.g., 'bash', 'shell', 'terminal') can trick the LLM into routing actions to a malicious handler.

tool_use/memory_demo/sample_code/sql_query_builder.py:85
# Executes: SELECT * FROM users WHERE username = 'admin' OR '1'='1'
How to fix

Rename the tool to avoid colliding with system commands (bash, shell, exec, etc.).

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:93
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:105
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:117
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:129
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:210
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:222
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:234
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:246
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:258
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:339
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:351
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:363
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:375
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:387
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:468
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:480
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:492
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:504
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:516
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:597
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:609
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:621
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:633
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:645
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:726
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:738
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:750
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:762
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:774
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:855
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:867
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:879
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:891
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:903
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:984
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:996
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1008
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1020
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1032
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1113
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1125
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1137
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1149
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1161
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1242
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1254
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1266
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1278
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1290
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1371
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1383
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1395
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1407
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1419
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1500
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1512
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1524
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1536
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1548
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1629
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1641
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1653
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1665
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1677
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1758
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1770
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1782
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1794
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1806
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1887
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1899
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1911
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1923
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:1935
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2016
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2028
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2040
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2052
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2064
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2145
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2157
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2169
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2181
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2193
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2274
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2286
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2298
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2310
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2322
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2403
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2415
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2427
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2439
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2451
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2532
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2544
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2556
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2568
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2580
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2661
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2673
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2685
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2697
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2709
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2790
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2802
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2814
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2826
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2838
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2919
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2931
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2943
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2955
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:2967
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3048
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3060
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3072
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3084
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3096
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3177
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3189
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3201
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3213
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3225
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3306
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3318
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3330
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3342
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3354
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3435
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3447
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3459
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3471
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3483
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3564
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3576
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3588
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3600
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3612
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3694
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3706
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3718
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3730
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3742
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3824
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3836
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3848
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3860
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3872
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3954
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3966
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3978
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:3990
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4002
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4083
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4095
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4107
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4119
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4131
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4212
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4224
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4236
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4248
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4260
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4341
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4353
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4365
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4377
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4389
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4471
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4483
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4495
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4507
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4519
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4600
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4612
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4624
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4636
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4648
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4730
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4742
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4754
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4766
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4778
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4860
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4872
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4884
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4896
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4908
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:4990
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5002
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5014
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5026
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5038
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5120
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5132
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5144
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5156
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5168
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5249
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5261
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5273
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5285
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5297
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5379
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5391
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5403
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5415
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5427
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5508
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5520
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5532
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5544
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5556
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5637
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5649
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5661
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5673
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5685
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5766
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5778
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5790
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5802
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5814
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5895
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5907
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5919
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5931
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:5943
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6024
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6036
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6048
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6060
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6072
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6153
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6165
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6177
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6189
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6201
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6282
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6294
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6306
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6318
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6330
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6411
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6423
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6435
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6447
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6459
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6540
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6552
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6564
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6576
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6588
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6669
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6681
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6693
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6705
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6717
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6798
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6810
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6822
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6834
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6846
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6927
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6939
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6951
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6963
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:6975
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7056
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7068
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7080
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7092
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7104
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7185
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7197
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7209
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7221
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7233
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7314
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7326
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7338
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7350
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7362
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7443
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7455
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7467
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7479
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7491
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7572
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7584
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7596
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7608
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7620
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7701
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7713
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7725
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7737
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7749
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7830
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7842
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7854
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7866
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7878
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7959
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7971
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7983
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:7995
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8007
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8088
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8100
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8112
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8124
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8136
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8217
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8229
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8241
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8253
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8265
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8346
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8358
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8370
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8382
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8394
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8475
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8487
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8499
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8511
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8523
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8604
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8616
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8628
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8640
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8652
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8733
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8745
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8757
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8769
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8781
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8862
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8874
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8886
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8898
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8910
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:8991
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9003
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9015
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9027
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9039
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9120
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9132
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9144
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9156
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9168
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9249
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9261
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9273
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9285
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9297
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9378
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9390
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9402
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9414
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9426
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9507
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9519
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9531
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9543
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9555
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9636
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9648
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9660
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9672
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9684
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9765
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9777
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9789
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9801
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9813
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9894
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9906
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9918
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9930
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:9942
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10023
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10035
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10047
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10059
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10071
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10152
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10164
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10176
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10188
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10200
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10281
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10293
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10305
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10317
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10329
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10411
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10423
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10435
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10447
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10459
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10540
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10552
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10564
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10576
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10588
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10669
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10681
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10693
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10705
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10717
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10798
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10810
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10822
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10834
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10846
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10927
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10939
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10951
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10963
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:10975
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11056
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11068
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11080
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11092
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11104
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11185
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11197
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11209
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11221
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11233
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11314
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11326
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11338
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11350
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11362
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11443
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11455
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11467
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11479
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11491
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11572
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11584
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11596
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11608
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11620
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11701
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11713
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11725
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11737
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11749
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11830
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11842
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11854
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11866
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11878
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11959
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11971
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11983
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:11995
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12007
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12088
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12100
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12112
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12124
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12136
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12217
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12229
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12241
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12253
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12265
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12346
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12358
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12370
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12382
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12394
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12475
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12487
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12499
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12511
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12523
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12622
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12634
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12646
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12658
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12670
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12751
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12763
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12775
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12787
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12799
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12880
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12892
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12904
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12916
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:12928
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13009
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13021
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13033
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13045
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13057
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13138
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13150
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13162
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13174
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13186
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13267
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13279
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13291
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13303
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13315
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13396
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13408
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13420
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13432
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13444
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13525
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13537
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13549
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13561
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13573
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13654
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13666
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13678
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13690
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13702
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13784
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13796
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13808
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13820
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13832
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13914
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13926
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13938
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13950
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:13962
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14044
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14056
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14068
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14080
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14092
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14173
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14185
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14197
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14209
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14221
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14302
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14314
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14326
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14338
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14350
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14431
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14443
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14455
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14467
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14479
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14559
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14571
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14583
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14595
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14607
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14687
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14699
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14711
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14723
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14735
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14816
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14828
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14840
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14852
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14864
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14945
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14957
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14969
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14981
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:14993
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15074
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15086
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15098
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15110
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15122
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15202
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15214
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15226
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15238
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15250
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15331
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15343
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15355
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15367
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15379
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15460
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15472
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

Dangerous URL schema usage

critical

file://, gopher://, dict://, and other non-HTTP schemas can be exploited for SSRF.

capabilities/retrieval_augmented_generation/data/retrieval_results.json:15484
"value": "file://eval_retrieval.py"
How to fix

Only allow http:// and https:// URL schemas. Validate URL schemas before making requests.

HTTP request with unvalidated URL parameter

high

Passing user-controlled variables directly to fetch, axios, or http.get without URL validation enables SSRF attacks.

claude_agent_sdk/site_reliability_agent/infra_setup.py:991
asyncio.create_task(make_request(session, endpoint))
How to fix

Validate and sanitize all URLs before making HTTP requests. Use an allowlist of permitted domains.

Request to localhost or loopback address

high

Requests targeting 127.0.0.1, localhost, or [::1] may access internal services not intended to be exposed.

claude_agent_sdk/site_reliability_agent/infra_setup.py:69
test: ["CMD", "curl", "-f", "http://localhost:8080/health"]
How to fix

Block requests to localhost and loopback addresses. Implement URL validation that rejects 127.x.x.x and ::1.

HTTP request with unvalidated URL parameter

high

Passing user-controlled variables directly to fetch, axios, or http.get without URL validation enables SSRF attacks.

claude_agent_sdk/site_reliability_agent/sre_mcp_server.py:2711
await handle_request(request)
How to fix

Validate and sanitize all URLs before making HTTP requests. Use an allowlist of permitted domains.

Request to localhost or loopback address

high

Requests targeting 127.0.0.1, localhost, or [::1] may access internal services not intended to be exposed.

claude_agent_sdk/site_reliability_agent/sre_mcp_server.py:39
PROMETHEUS_URL = "http://localhost:9090"
How to fix

Block requests to localhost and loopback addresses. Implement URL validation that rejects 127.x.x.x and ::1.

Request to localhost or loopback address

high

Requests targeting 127.0.0.1, localhost, or [::1] may access internal services not intended to be exposed.

lychee.toml:41
"http://localhost.*",
How to fix

Block requests to localhost and loopback addresses. Implement URL validation that rejects 127.x.x.x and ::1.

Request to localhost or loopback address

high

Requests targeting 127.0.0.1, localhost, or [::1] may access internal services not intended to be exposed.

lychee.toml:42
"http://127.0.0.1.*"
How to fix

Block requests to localhost and loopback addresses. Implement URL validation that rejects 127.x.x.x and ::1.

Missing rate limiting on endpoint

medium

API endpoints without rate limiting are vulnerable to brute force and denial of service.

claude_agent_sdk/site_reliability_agent/infra_setup.py:485
@app.get("/metrics")
How to fix

Add rate limiting middleware to all public API endpoints.

Missing rate limiting on endpoint

medium

API endpoints without rate limiting are vulnerable to brute force and denial of service.

claude_agent_sdk/site_reliability_agent/infra_setup.py:501
@app.get("/api/users")
How to fix

Add rate limiting middleware to all public API endpoints.

Missing rate limiting on endpoint

medium

API endpoints without rate limiting are vulnerable to brute force and denial of service.

claude_agent_sdk/site_reliability_agent/infra_setup.py:558
@app.get("/api/orders")
How to fix

Add rate limiting middleware to all public API endpoints.

Missing rate limiting on endpoint

medium

API endpoints without rate limiting are vulnerable to brute force and denial of service.

claude_agent_sdk/site_reliability_agent/infra_setup.py:603
@app.get("/api/stats")
How to fix

Add rate limiting middleware to all public API endpoints.

Missing rate limiting on endpoint

medium

API endpoints without rate limiting are vulnerable to brute force and denial of service.

claude_agent_sdk/site_reliability_agent/infra_setup.py:647
@app.get("/")
How to fix

Add rate limiting middleware to all public API endpoints.

Returning entire database records without field filtering

medium

Detected SELECT * or ORM queries without explicit field selection. Returning all columns risks exposing sensitive fields (passwords, tokens, internal IDs) to the client or LLM context.

tool_use/memory_demo/sample_code/sql_query_builder.py:30
query = f"SELECT * FROM users WHERE username = '{username}'"
How to fix

Always specify the exact columns or fields to return. Use SELECT with explicit column names or ORM select/projection options.

Returning entire database records without field filtering

medium

Detected SELECT * or ORM queries without explicit field selection. Returning all columns risks exposing sensitive fields (passwords, tokens, internal IDs) to the client or LLM context.

tool_use/memory_demo/sample_code/sql_query_builder.py:37
query = "SELECT * FROM users WHERE username = ?"
How to fix

Always specify the exact columns or fields to return. Use SELECT with explicit column names or ORM select/projection options.

Returning entire database records without field filtering

medium

Detected SELECT * or ORM queries without explicit field selection. Returning all columns risks exposing sensitive fields (passwords, tokens, internal IDs) to the client or LLM context.

tool_use/memory_demo/sample_code/sql_query_builder.py:49
query = f"SELECT * FROM users WHERE name LIKE '%{search_term}%' LIMIT {limit}"
How to fix

Always specify the exact columns or fields to return. Use SELECT with explicit column names or ORM select/projection options.

Returning entire database records without field filtering

medium

Detected SELECT * or ORM queries without explicit field selection. Returning all columns risks exposing sensitive fields (passwords, tokens, internal IDs) to the client or LLM context.

tool_use/memory_demo/sample_code/sql_query_builder.py:72
query = f"SELECT * FROM users WHERE role = '{role}' ORDER BY {order_by}"
How to fix

Always specify the exact columns or fields to return. Use SELECT with explicit column names or ORM select/projection options.

Returning entire database records without field filtering

medium

Detected SELECT * or ORM queries without explicit field selection. Returning all columns risks exposing sensitive fields (passwords, tokens, internal IDs) to the client or LLM context.

tool_use/memory_demo/sample_code/sql_query_builder.py:85
# Executes: SELECT * FROM users WHERE username = 'admin' OR '1'='1'
How to fix

Always specify the exact columns or fields to return. Use SELECT with explicit column names or ORM select/projection options.