shell bypass 403
UnknownSec Shell
:
/
opt
/
cloudlinux
/
venv
/
lib
/
python3.11
/
site-packages
/
astroid
/
nodes
/
scoped_nodes
/ [
drwxr-xr-x
]
upload
mass deface
mass delete
console
info server
name :
utils.py
# Licensed under the LGPL: https://www.gnu.org/licenses/old-licenses/lgpl-2.1.en.html # For details: https://github.com/PyCQA/astroid/blob/main/LICENSE # Copyright (c) https://github.com/PyCQA/astroid/blob/main/CONTRIBUTORS.txt """This module contains utility functions for scoped nodes.""" from __future__ import annotations from collections.abc import Sequence from typing import TYPE_CHECKING from astroid.manager import AstroidManager if TYPE_CHECKING: from astroid import nodes def builtin_lookup(name: str) -> tuple[nodes.Module, Sequence[nodes.NodeNG]]: """Lookup a name in the builtin module. Return the list of matching statements and the ast for the builtin module """ manager = AstroidManager() try: _builtin_astroid = manager.builtins_module except KeyError: # User manipulated the astroid cache directly! Rebuild everything. manager.clear_cache() _builtin_astroid = manager.builtins_module if name == "__dict__": return _builtin_astroid, () try: stmts: Sequence[nodes.NodeNG] = _builtin_astroid.locals[name] # type: ignore[assignment] except KeyError: stmts = () return _builtin_astroid, stmts
© 2024 UnknownSec