**Context and Purpose:** This PR automatically remediates a security vulnerability: - **Description:** Detected possible formatted SQL query. Use parameterized queries instead. - **Rule ID:** python.lang.security.audit.formatted-sql-query.formatted-sql-query - **Severity:** HIGH - **File:** rag/utils/opendal_conn.py - **Lines Affected:** 98 - 98 This change is necessary to protect the application from potential security risks associated with this vulnerability. **Solution Implemented:** The automated remediation process has applied the necessary changes to the affected code in `rag/utils/opendal_conn.py` to resolve the identified issue. Please review the changes to ensure they are correct and integrate as expected. |
||
|---|---|---|
| .. | ||
| __init__.py | ||
| azure_sas_conn.py | ||
| azure_spn_conn.py | ||
| doc_store_conn.py | ||
| es_conn.py | ||
| infinity_conn.py | ||
| minio_conn.py | ||
| opendal_conn.py | ||
| opensearch_coon.py | ||
| oss_conn.py | ||
| redis_conn.py | ||
| s3_conn.py | ||
| storage_factory.py | ||
| tavily_conn.py | ||