Derived from the flake8-bandit linter.
What it does#
Checks for uses of the builtin
Why is this bad?#
eval() function is insecure as it enables arbitrary code execution.
If you need to evaluate an expression from a string, consider using
ast.literal_eval() instead, which will raise an exception if the
expression is not a valid Python literal.