apache/poi
apache/poiClick the green button below to open GitHub’s new-issue form, pre-filled with the report title, summary table, top findings, and an embedded score-card image. No authentication needed — you review on GitHub before submitting. Repobility is credited as the scanner.
This image will render at the top of the issue body. Hosted on Repobility, refreshes automatically after re-scans.
Code quality scan: 44 findings (B-, 78/100)
Hi @apache, an automated scan of this repository surfaced **44 code-quality findings** that may be worth a look.
Full details, severity filters, and per-file context are at the link below — feel free to close this issue if it isn't useful to you.
## Full interactive report
**https://repobility.com/scan/04c8bcc5-9bd7-43c2-8ab5-56e918f8f3c4/**

## At a glance
- **Score**: `78/100` • **Grade**: `B-`
- **Scanned**: `2026-05-16 13:30 UTC`
- **Lines of code**: 50,767
- **Total findings**: 44
- **Security-tagged**: 6
- **Credential / secret patterns**: 0
## Top issues, with file & line
_These are deterministic rule-based findings — the file paths and line numbers below are real and can be verified in your tree._
1. **[high]** [SEC029] Server-Side Request Forgery (SSRF) — outbound HTTP from user input: Outbound HTTP request to a user-controlled URL without allowlist validation. Attackers can probe internal services (169.254.169.254 metadata, internal Kubernetes endpoints, file:// URIs), exfiltrate data, or pivot through your network. SSRF is OWASP A10:2021 and a frequent foothold in cloud breaches. — `poi-ooxml/src/main/java/org/apache/poi/poifs/crypt/dsig/SignatureConfig.java:506`
_Validate the URL against an allowlist BEFORE fetching: ALLOWED = {'images.example.com', 'cdn.example.com'} host = urlparse(url).hostname if host not in ALLOWED: abort(400)…_
2. **[high]** [SEC029] Server-Side Request Forgery (SSRF) — outbound HTTP from user input: Outbound HTTP request to a user-controlled URL without allowlist validation. Attackers can probe internal services (169.254.169.254 metadata, internal Kubernetes endpoints, file:// URIs), exfiltrate data, or pivot through your network. SSRF is OWASP A10:2021 and a frequent foothold in cloud breaches. — `poi-ooxml/src/main/java/org/apache/poi/poifs/crypt/dsig/services/TSPTimeStampService.java:239`
_Validate the URL against an allowlist BEFORE fetching: ALLOWED = {'images.example.com', 'cdn.example.com'} host = urlparse(url).hostname if host not in ALLOWED: abort(400)…_
3. **[high]** [SEC029] Server-Side Request Forgery (SSRF) — outbound HTTP from user input: Outbound HTTP request to a user-controlled URL without allowlist validation. Attackers can probe internal services (169.254.169.254 metadata, internal Kubernetes endpoints, file:// URIs), exfiltrate data, or pivot through your network. SSRF is OWASP A10:2021 and a frequent foothold in cloud breaches. — `poi-ooxml/src/main/java/org/apache/poi/poifs/crypt/dsig/services/TimeStampSimpleHttpClient.java:212`
_Validate the URL against an allowlist BEFORE fetching: ALLOWED = {'images.example.com', 'cdn.example.com'} host = urlparse(url).hostname if host not in ALLOWED: abort(400)…_
4. **[high]** [SEC013] Path Traversal — User Input in File Path: User-controlled input used in file path without sanitization. Allows reading arbitrary files. — `poi-ooxml/src/main/java/org/apache/poi/openxml4j/opc/OPCPackage.java:429`
_Use os.path.realpath() and verify the path starts with your expected base directory. Use secure_filename() for uploads._
5. **[high]** [SEC013] Path Traversal — User Input in File Path: User-controlled input used in file path without sanitization. Allows reading arbitrary files. — `poi-ooxml/src/main/java/org/apache/poi/ooxml/util/PackageHelper.java:51`
_Use os.path.realpath() and verify the path starts with your expected base directory. Use secure_filename() for uploads._
See all 44 findings, with severity filters and AI fix prompts: **https://repobility.com/scan/04c8bcc5-9bd7-43c2-8ab5-56e918f8f3c4/**
---
**What is this?** [Repobility](https://repobility.com) is a research project that scans public repositories with a multi-layer static analyzer (rule-based, no AI hallucinations) and learns code-quality patterns across a broad cross-repo corpus. This is **not a sales pitch** — there's no paywall, no signup required to view the report, and no payment ask. If the findings aren't useful, please close this issue and we won't post again.
**To re-run after fixes land:** paste your repo URL at [repobility.com](https://repobility.com) — fresh scan, free.
_Issue filed via the public Repobility report at https://repobility.com/scan/04c8bcc5-9bd7-43c2-8ab5-56e918f8f3c4/._
The button opens GitHubâs new-issue page in a new tab. You will see the title + body pre-filled â review, edit if you want, then click GitHubâs "Submit new issue" button. Repobility never posts anything on your behalf.
For real security findings on big repos: use the project's SECURITY.md or
private advisory flow instead of a public issue.