id: "py-unsafe-exec:101" language: py project: unsafe-exec version: "1.0.0" description: "Python handler with reachable eval sink" entrypoints: - "POST /api/exec" sinks: - id: "PyUnsafeExec::handle_request" path: "src/app.py::handle_request" kind: "process" location: file: src/app.py line: 8 notes: "eval on user input" environment: os_image: "python:3.12-alpine" runtime: python: "3.12" source_date_epoch: 1730000000 resource_limits: cpu: "2" memory: "4Gi" build: command: "./build/build.sh" source_date_epoch: 1730000000 outputs: artifact_path: outputs/binary.tar.gz sbom_path: outputs/sbom.cdx.json coverage_path: outputs/coverage.json traces_dir: outputs/traces attestation_path: outputs/attestation.json test: command: "./tests/run-tests.sh" expected_coverage: - outputs/coverage.json expected_traces: - outputs/traces/traces.json ground_truth: summary: "Eval reachable via POST /api/exec" evidence_files: - "../benchmark/truth/py-unsafe-exec.json" sandbox: network: loopback privileges: rootless redaction: pii: false policy: "benchmark-default/v1"