• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

Bouke / django-two-factor-auth / 213 / 13
96%
master: 96%

Build:
DEFAULT BRANCH: master
Ran 20 May 2014 08:36PM UTC
Files 26
Run time 11s
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

20 May 2014 08:24PM UTC coverage: 94.825% (+0.09%) from 94.737%
DJANGO=1.7b3 COVERAGE=YES

push

travis-ci

Bouke
Fixed #54 -- Mitigate voicemail hack

See also [this blogpost][1] which uses the victim's voicemail
service to access OTP tokens. When the call goes to voicemail, the
tokens can be access through a vulnerable voicemail service (e.g.
requiring no PIN). Then the attacker will have access to the tokens
and is able to login. When requiring interaction (e.g. pressing a
button), this type of attack can be disarmed. Major services like
Google and Yahoo are still vulnerable to this type of attack.

[1]: http://shubh.am/how-i-bypassed-2-factor-authentication-on-google-yahoo-linkedin-and-many-others/

733 of 773 relevant lines covered (94.83%)

0.95 hits per line

Source Files on job 213.13 (DJANGO=1.7b3 COVERAGE=YES)
  • Tree
  • List 0
  • Changed 0
  • Source Changed 0
  • Coverage Changed 0
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Build 213
  • Travis Job 213.13
  • c93a3128 on github
  • Prev Job for DJANGO=1.7b3 COVERAGE=YES on master (#212.13)
  • Next Job for DJANGO=1.7b3 COVERAGE=YES on master (#214.13)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc