Skip to content

Add .gitignore entries for Python and cache artifacts#24

Merged
rad1092 merged 1 commit into
mainfrom
codex/evaluate-current-project-completion-level
Feb 15, 2026
Merged

Add .gitignore entries for Python and cache artifacts#24
rad1092 merged 1 commit into
mainfrom
codex/evaluate-current-project-completion-level

Conversation

@rad1092
Copy link
Copy Markdown
Owner

@rad1092 rad1092 commented Feb 15, 2026

Motivation

  • Prevent transient Python bytecode and local runtime/test cache artifacts from appearing as untracked files so the repository status remains clean during development and CI.

Description

  • Add a new .gitignore that ignores __pycache__/, *.py[cod], .pytest_cache/, and .bitnet_cache/.

Testing

  • Ran the test suite with pytest -q and all tests passed (19 passed).

Codex Task

@rad1092 rad1092 merged commit d11d8f1 into main Feb 15, 2026
4 checks passed
@rad1092 rad1092 deleted the codex/evaluate-current-project-completion-level branch February 15, 2026 00:21
Copy link
Copy Markdown

@chatgpt-codex-connector chatgpt-codex-connector Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: 1cae96332d

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment thread bitnet_tools/web.py
Comment on lines +100 to +101
path = Path(td) / name
path.write_text(text, encoding="utf-8")
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Sanitize uploaded filenames before writing temporary CSV files

The /api/multi-analyze handler writes user-provided name values directly via Path(td) / name, so a request can supply absolute paths or .. segments and cause writes outside the temporary directory. This becomes a real file-write vulnerability whenever the UI is reachable by untrusted clients (for example when started with --host 0.0.0.0), because path.write_text(...) will overwrite any writable target path. Normalize to a basename and reject absolute/parent traversal components before writing.

Useful? React with 👍 / 👎.

Comment thread bitnet_tools/multi_csv.py
" if key in merged.columns and key in df.columns:\n"
" merged = merged.merge(df, on=key, how='outer', suffixes=('', '_r'))\n\n"
"missing_ratio = merged.isna().mean().sort_values(ascending=False)\n"
"print('결측 비율 상위:\n', missing_ratio.head(10))\n\n"
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Badge Escape newline literals in generated pandas example code

The generated pandas_example string inserts \n inside single-quoted print literals (e.g. print('결측 비율 상위:\n', ...)), which becomes an actual newline in the emitted snippet and yields an unterminated string literal when executed. As a result, users copying the provided guidance hit SyntaxError instead of runnable example code, so these print strings should use escaped backslashes (\\n) or separate lines.

Useful? React with 👍 / 👎.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant