exec_call
System command execution
Line 213Snippets
mpremote exec "exec(open('my_program.py').read())"mpremote exec "exec(open('my_program.py').read())"python_subprocess
System command execution (Python)
System command execution (Python)
Line 1020Snippets
result = subprocess.run( result = subprocess.run( result = subprocess.run( mode_result = subprocess.run( result = subprocess.run(privilege_escalation
Privilege escalation attempt
Privilege escalation attempt
Line 65Snippets
- `status: "permission_denied"` → Serial port not accessible. On Linux: `sudo chmod 666 /dev/ttyACM0`. On Windows: check Device Manager for driver issues. - `status: "permission_denied"` → Serial port not accessible. On Linux: `sudo chmod 666 /dev/ttyACM0`. On Windows: check Device Manager for driver issues. return None, f"Permission denied on {port}. Run: sudo chmod 666 {port}" return None, f"Permission denied on {port}. Run: sudo chmod 666 {port}" else f"Run: sudo chmod 666 {port}"data_exfiltration
Data exfiltration attempt
Data exfiltration attempt
Line 1843Snippets
ws.send(password + "\r\n")hardcoded_secret
Potentially hardcoded secret
Potentially hardcoded secret
Line 696Snippets
ap.config(essid="ESP32-AP", password="12345678", password = "YOUR_PASS" # Replace with actual value ap.config(essid="ESP32-AP", password="12345678", authmode=network.AUTH_WPA2_PSK)ap.config(essid="ESP32-AP", password="12345678", password = "YOUR_PASS" # Replace with actual valueTrust Score
Mis a jour il y a 2 semaines
Analyse le
31 mars 2026, 15:58
+ 2 previous scans
Compatible avec
Skill details
Mis a jour il y a 2 semaines
Analyse le 31 mars 2026, 15:58
Description
MicroPython sensor reading — DHT11/22, BME280, MPU6050, ADC, ultrasonic HC-SR04, photoresistor, generic I2C sensors.
Scans recents
31 mars 2026, 15:58
Latest analysis
31 mars 2026, 15:11
Run 2
27 mars 2026, 15:43
Run 1