• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

Bouke / django-two-factor-auth / 213 / 1
96%
master: 96%

Build:
DEFAULT BRANCH: master
Ran 20 May 2014 08:27PM UTC
Files 26
Run time 12s
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

20 May 2014 08:24PM UTC coverage: 96.766% (+0.06%) from 96.711%
DJANGO=1.4 COVERAGE=YES

push

travis-ci

Bouke
Fixed #54 -- Mitigate voicemail hack

See also [this blogpost][1] which uses the victim's voicemail
service to access OTP tokens. When the call goes to voicemail, the
tokens can be access through a vulnerable voicemail service (e.g.
requiring no PIN). Then the attacker will have access to the tokens
and is able to login. When requiring interaction (e.g. pressing a
button), this type of attack can be disarmed. Major services like
Google and Yahoo are still vulnerable to this type of attack.

[1]: http://shubh.am/how-i-bypassed-2-factor-authentication-on-google-yahoo-linkedin-and-many-others/

748 of 773 relevant lines covered (96.77%)

0.97 hits per line

Source Files on job 213.1 (DJANGO=1.4 COVERAGE=YES)
  • Tree
  • List 0
  • Changed 0
  • Source Changed 0
  • Coverage Changed 0
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Build 213
  • Travis Job 213.1
  • c93a3128 on github
  • Prev Job for DJANGO=1.4 COVERAGE=YES on master (#212.1)
  • Next Job for DJANGO=1.4 COVERAGE=YES on master (#214.1)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc