From b0f918576dc37533ee895b0d312f7aa41e6ff63c Mon Sep 17 00:00:00 2001 From: pirahnasa Date: Tue, 3 Dec 2024 12:34:12 +0100 Subject: [PATCH] fix linter --- agent/exploits/cve_2024_11667.py | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/agent/exploits/cve_2024_11667.py b/agent/exploits/cve_2024_11667.py index 40b7e7c..2110cd3 100644 --- a/agent/exploits/cve_2024_11667.py +++ b/agent/exploits/cve_2024_11667.py @@ -5,7 +5,6 @@ from urllib import parse as urlparse from requests import exceptions as requests_exceptions -from sqlalchemy import false from agent import definitions from agent import exploits_registry @@ -60,7 +59,7 @@ class CVE202411667Exploit(webexploit.WebExploit): def check(self, target: definitions.Target) -> list[definitions.Vulnerability]: """Check for vulnerability in the target.""" - vulnerabilities = [] + vulnerabilities: list[definitions.Vulnerability] = [] target_endpoint = urlparse.urljoin(target.origin, self.check_request.path) try: