| Author | TrackMe Limited, U.K. |
|---|---|
| Tags | cloud |
| Version | 1.0.9 |
| Hash | 180e211cd7f1405a6a1ef362263629ce |
| AppInspect Request ID | 03cae3fa-0940-4522-a83b-0ab89367a722 |
| Run Time | 2025-11-04T21:32:35.452022 |
| Execution Time | 41 |
| Field | Value |
|---|---|
| AppInspect Version | 4.1.0 |
| Name | Version | Is Latest |
|---|---|---|
| dynamic-checks | 1.44.0 | True |
| retire-js | 1.1.1 | True |
| static-checks | 4.1.0 | True |
| Status | Count |
|---|---|
|
Successes
|
118 |
|
Failures
|
0 |
|
Errors
|
0 |
|
Warnings
|
11 |
|
Not Applicable
|
96 |
|
Skipped
|
0 |
256Splunk has begun gathering telemetry on apps submitted to appinspect, that utilize SplunkJS. Please ignore this warning as it has no impact to your Splunk app. Match: splunkjs/mvc
256As of Splunk 6.5, this functionality is deprecated and should be removed in futureapp versions. Match: splunkjs/mvc/headerview.
180 Python files found. Update these Python scripts to be cross-compatible with Python 2 and 3 for Splunk Enterprise 8.0. See https://docs.splunk.com/Documentation/Splunk/latest/Python3Migration/AboutMigration for more information. If you've finished your update, please disregard this message.
24Found a special character in [(?::){0}cribl:custom_commands:*] stanza in props.conf. Sourcetype names containing <>?&# might not be visible. Rename the stanza to not contain any special characters.
35Splunk SDK for Python detected (version 2.1.1). No action required at this time.
346The following line contains subprocess.Popen usage. Use threading and multiprocessing with discretion.
139The following line contains subprocess.Popen usage. Use threading and multiprocessing with discretion.
349The following line contains subprocess.Popen.communicate usage. Use threading and multiprocessing with discretion.
166The following line contains questionable usage `threading.Thread.start` in loop. Use threading and multiprocessing with discretion.
139The following line contains subprocess.Popen.communicate usage. Use threading and multiprocessing with discretion.
70PUBLIC IP 5.5.5.5 is found in lib/PySocks-1.7.1.dist-info/METADATA:70
1PUBLIC IP 1.49.255.68 is found in appserver/static/js/build/assets/DashboardPage-BlpUrPDM.css:1
Detected use of a third-party Mako template, which poses a critical security risk by allowing arbitrary Python code execution. Remove custom Mako templates.
175Insecure HTTP Connection found Match: requests.post Positional arguments, ["/api/v1/auth/login"]; Keyword arguments, {"json": "?", "verify": "?", "headers": "?"}
337Insecure HTTP Connection found Match: requests.get Positional arguments, ["cribl_token"]; Keyword arguments, {}
345Insecure HTTP Connection found Match: requests.get Positional arguments, ["cribl_ssl_certificate_path", "?"]; Keyword arguments, {}
344Insecure HTTP Connection found Match: requests.Session.get Positional arguments, ["cribl_ssl_verify", "?"]; Keyword arguments, {}
344Insecure HTTP Connection found Match: requests.get Positional arguments, ["cribl_ssl_verify", "?"]; Keyword arguments, {}
167Insecure HTTP Connection found Match: requests.post Positional arguments, ["/api/v1/auth/login"]; Keyword arguments, {"json": "?", "verify": "?", "headers": "?"}
307Insecure HTTP Connection found Match: requests.get Positional arguments, ["rbac_roles"]; Keyword arguments, {}
337Insecure HTTP Connection found Match: requests.Session.get Positional arguments, ["cribl_token"]; Keyword arguments, {}
307Insecure HTTP Connection found Match: requests.Session.get Positional arguments, ["rbac_roles"]; Keyword arguments, {}
345Insecure HTTP Connection found Match: requests.Session.get Positional arguments, ["cribl_ssl_certificate_path", "?"]; Keyword arguments, {}
183Insecure HTTP Connection found Match: requests.post Positional arguments, ["/api/v1/auth/login"]; Keyword arguments, {"json": "?", "verify": "?", "headers": "?"}
745Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
58Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
167Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
380Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
51Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
61Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
728Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
175Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
684Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
376Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
775Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
721Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
153Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
701Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
59Detected solnlib (version 7.0.0). No action required.
17Detected splunktaucclib (version 8.0.0). No action required.
No ../.dependencies folder found. Please check that the Splunk App package contains only valid dependencies.
No ../.dependencies folder found. Please add a .dependencies directory with an valid app folder.
No ../.dependencies folder found. Please add a .dependencies directory that contains an app folder with an app.manifest.
authentication.conf does not exist
authentication.conf does not exist
authentication.conf does not exist
Didn't find any flash files.
alert_actions.conf does not exist
distsearch.conf does not exist
indexes.conf does not exist
inputs.conf does not exist
inputs.conf does not exist
The `lookups` directory does not exist.
`inputs.conf` does not exist.
inputs.conf does not exist
authentication.conf does not exist
audit.conf does not exist
bookmarks.conf does not exist
datatypesbnf.conf does not exist
default-mode.conf does not exist
deploymentclient.conf does not exist
deployment.conf does not exist
indexes.conf.conf does not exist
inputs.conf.conf does not exist
health.conf does not exist
inputs.conf.conf does not exist
inputs.conf does not exist
inputs.conf does not exist
inputs.conf does not exist
inputs.conf.conf does not exist
inputs.conf does not exist
inputs.conf does not exist
inputs.conf.conf does not exist
inputs.conf does not exist
instance.cfg.conf does not exist
crawl.conf does not exist
literals.conf does not exist
messages.conf does not exist
No `inputs.conf.spec` was detected.
passwords.conf does not exist
pubsub.conf does not exist
segmenters.conf does not exist
serverclass.conf does not exist
serverclass.seed.xml.conf does not exist
source-classifier.conf does not exist
sourcetypes.conf does not exist
splunk-launch.conf does not exist
telemetry.conf does not exist
`default/transforms.conf` does not exist.
user-seed.conf does not exist
wmi.conf does not exist
workload_pools.conf does not exist
workload_rules.conf does not exist
256Splunk has begun gathering telemetry on apps submitted to appinspect, that utilize SplunkJS. Please ignore this warning as it has no impact to your Splunk app. Match: splunkjs/mvc
Splunk SDK for JavaScript not found.
limits.conf does not exist
outputs.conf does not exist
data/spl2 does not exist
savedsearches.conf does not exist
No invocations of bundled NodeJS binary found.
alert_actions.conf does not exist
No `inputs.conf.spec` file exists.
inputs.conf does not exist
eventtypes.conf does not exist
crawl.conf does not exist
viewstates.conf does not exist
savedsearches.conf does not exist
outputs.conf does not exist
literals.conf does not exist
180 Python files found. Update these Python scripts to be cross-compatible with Python 2 and 3 for Splunk Enterprise 8.0. See https://docs.splunk.com/Documentation/Splunk/latest/Python3Migration/AboutMigration for more information. If you've finished your update, please disregard this message.
README/inputs.conf.spec does not exist.
inputs.conf does not exist
No `inputs.conf.spec` file exists.
lookups folder does not exist
savedsearches.conf does not exist
savedsearches.conf does not exist
savedsearches.conf does not exist
savedsearches.conf does not exist
savedsearches.conf does not exist
savedsearches.conf does not exist
`local/app.conf` does not exist.
`local/app.conf` does not exist.
The local directory does not exist.
collections.conf does not exist
collections.conf does not exist
indexes.conf does not exist
indexes.conf does not exist
indexes.conf does not exist
indexes.conf does not exist
24Found a special character in [(?::){0}cribl:custom_commands:*] stanza in props.conf. Sourcetype names containing <>?&# might not be visible. Rename the stanza to not contain any special characters.
No INGEST_EVAL properties were declared.
alert_actions.conf does not exist
No `alert_actions.conf` was detected.
workflow_actions.conf does not exist
datamodels.conf does not exist
No forbidden python files were found.
35Splunk SDK for Python detected (version 2.1.1). No action required at this time.
346The following line contains subprocess.Popen usage. Use threading and multiprocessing with discretion.
139The following line contains subprocess.Popen usage. Use threading and multiprocessing with discretion.
349The following line contains subprocess.Popen.communicate usage. Use threading and multiprocessing with discretion.
166The following line contains questionable usage `threading.Thread.start` in loop. Use threading and multiprocessing with discretion.
139The following line contains subprocess.Popen.communicate usage. Use threading and multiprocessing with discretion.
Python httplib2 library not found.
addon_builder.conf does not exist
70PUBLIC IP 5.5.5.5 is found in lib/PySocks-1.7.1.dist-info/METADATA:70
1PUBLIC IP 1.49.255.68 is found in appserver/static/js/build/assets/DashboardPage-BlpUrPDM.css:1
No pom.xml, build.gradle or build.gradle.kts file found
Detected use of a third-party Mako template, which poses a critical security risk by allowing arbitrary Python code execution. Remove custom Mako templates.
175Insecure HTTP Connection found Match: requests.post Positional arguments, ["/api/v1/auth/login"]; Keyword arguments, {"json": "?", "verify": "?", "headers": "?"}
337Insecure HTTP Connection found Match: requests.get Positional arguments, ["cribl_token"]; Keyword arguments, {}
345Insecure HTTP Connection found Match: requests.get Positional arguments, ["cribl_ssl_certificate_path", "?"]; Keyword arguments, {}
344Insecure HTTP Connection found Match: requests.Session.get Positional arguments, ["cribl_ssl_verify", "?"]; Keyword arguments, {}
344Insecure HTTP Connection found Match: requests.get Positional arguments, ["cribl_ssl_verify", "?"]; Keyword arguments, {}
167Insecure HTTP Connection found Match: requests.post Positional arguments, ["/api/v1/auth/login"]; Keyword arguments, {"json": "?", "verify": "?", "headers": "?"}
307Insecure HTTP Connection found Match: requests.get Positional arguments, ["rbac_roles"]; Keyword arguments, {}
337Insecure HTTP Connection found Match: requests.Session.get Positional arguments, ["cribl_token"]; Keyword arguments, {}
307Insecure HTTP Connection found Match: requests.Session.get Positional arguments, ["rbac_roles"]; Keyword arguments, {}
345Insecure HTTP Connection found Match: requests.Session.get Positional arguments, ["cribl_ssl_certificate_path", "?"]; Keyword arguments, {}
183Insecure HTTP Connection found Match: requests.post Positional arguments, ["/api/v1/auth/login"]; Keyword arguments, {"json": "?", "verify": "?", "headers": "?"}
745Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
58Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
167Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
380Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
51Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
61Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
728Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
175Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
684Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
376Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
775Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
721Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
153Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
701Ensure that the SSL certificate validation for communications with outside the Splunk Cloud stack is enabled. This can be done by specifying the relevant parameters (verify, cafile etc) to True or the certificate path.
59Detected solnlib (version 7.0.0). No action required.
17Detected splunktaucclib (version 8.0.0). No action required.