• Home
  • Features
  • Pricing
  • Docs
  • Announcements
  • Sign In

Bouke / django-two-factor-auth / 213 / 14
96%
master: 96%

Build:
DEFAULT BRANCH: master
Ran 20 May 2014 08:38PM UTC
Files 26
Run time 13s
Badge
Embed ▾
README BADGES
x

If you need to use a raster PNG badge, change the '.svg' to '.png' in the link

Markdown

Textile

RDoc

HTML

Rst

20 May 2014 08:24PM UTC coverage: 95.472% (+0.08%) from 95.395%
DJANGO=1.7b3 AUTH_USER_MODEL=tests.User YUBIKEY=YES COVERAGE=YES

push

travis-ci

Bouke
Fixed #54 -- Mitigate voicemail hack

See also [this blogpost][1] which uses the victim's voicemail
service to access OTP tokens. When the call goes to voicemail, the
tokens can be access through a vulnerable voicemail service (e.g.
requiring no PIN). Then the attacker will have access to the tokens
and is able to login. When requiring interaction (e.g. pressing a
button), this type of attack can be disarmed. Major services like
Google and Yahoo are still vulnerable to this type of attack.

[1]: http://shubh.am/how-i-bypassed-2-factor-authentication-on-google-yahoo-linkedin-and-many-others/

738 of 773 relevant lines covered (95.47%)

0.95 hits per line

Source Files on job 213.14 (DJANGO=1.7b3 AUTH_USER_MODEL=tests.User YUBIKEY=YES COVERAGE=YES)
  • Tree
  • List 0
  • Changed 2
  • Source Changed 2
  • Coverage Changed 2
Coverage ∆ File Lines Relevant Covered Missed Hits/Line
  • Back to Build 213
  • Travis Job 213.14
  • c93a3128 on github
  • Prev Job for DJANGO=1.7b3 AUTH_USER_MODEL=tests.User YUBIKEY=YES COVERAGE=YES on master (#212.14)
  • Next Job for DJANGO=1.7b3 AUTH_USER_MODEL=tests.User YUBIKEY=YES COVERAGE=YES on master (#214.14)
STATUS · Troubleshooting · Open an Issue · Sales · Support · CAREERS · ENTERPRISE · START FREE · SCHEDULE DEMO
ANNOUNCEMENTS · TWITTER · TOS & SLA · Supported CI Services · What's a CI service? · Automated Testing

© 2026 Coveralls, Inc