Securing Your Python Projects with Snyk

Securing Your Python Projects with Snyk


In this article, we will be covering an important topic, Security in Python. We often download and install packages from PyPi but we're not sure about the vulnerabilities that might come with them. So, in this tutorial, we will learn about an awesome tool called Snyk that helps us find vulnerabilities in our code and then fix them. So let's get started!

What is Snyk?

Snyk (pronounced sneak) is a developer security platform for securing code, dependencies, containers, and infrastructure as code. So what it does is, it scans your code, reads through it and tells you if you have any vulnerabilities in your code. Now it doesn't only check your code, it can check the installed dependencies, your Docker container, your Infrastructure as Code, and a few other things too. It is compatible with a lot of languages and comes with plugins supported by different IDEs. So, it is basically the Grammarly for your code.

Getting Started with Snyk

To get started, you need to create an account on Snyk. Head over to and register for a free account. I'd recommend you log in through Github. Once registered, you can log in to your account. After logging in, you will be able to see a similar dashboard.

Now you can go to this link and follow the instructions to download the Snyk CLI. There are various methods to download the Snyk CLI. You can go ahead with any one of them.

Now if you're here, I assume you have already installed Snyk CLI using any of the available methods. Now what we need to do is to authenticate ourselves with Snyk CLI. To do that, run the following command in the terminal:

snyk auth

When you run the command, an authentication page will be opened in your default browser as below:

Just click on the Authenticate button and wait for the page to show a success message. Once you see the message, you can go to your terminal where you'll find a similar output as below:

Now, the Synk CLI has been connected to your account.

Finding Vulnerabilities in Demo App

For the demo purpose, we're going to use a web application called PyGoat written in Django. A lot of vulnerabilities have been added to the app intentionally, so we can have a good demo of Snyk around it.

Here is the link to the Github repository: Open the repository link, click on Fork and then clone the forked repository to your local machine. When you go through the repository, you will find Dockerfile, Infrastructure as Code file as well as standard Python files. We'll go through the files later. You can install the Python dependencies from the requirements.txt file.

pip install -r requirements.txt

Snyk Plugins

Snyk has plugins available for different IDEs such as Eclipse, VS Code, Jetbrains (PyCharm, IntelliJ, etc). Since, I am on VS Code, I have installed the Snyk extension on my IDE. You can do the same for your IDE.

Once you install the extension, you may need to authenticate again. Once authenticated, the plugin will start scanning the code automatically, after few seconds, it will show the results similar to below:

You can see there are many 18 code security vulnerabilities and 2 code quality issues in the code. Each issue or vulnerability has an icon beside it. It can be C, H, M, and L meaning Critical, High, Medium, and Low respectively. You can click on any of them to learn more and it would even suggest fixes for the issue or vulnerability.

Snyk CLI Commands

We have already run one Synk CLI command i.e. snyk auth to authenticate ourselves with Snyk. Now let us look at some other important commands.

1. snyk test

This command will scan the code and show you any vulnerabilities. Let's run this and see what output we get:

You can see that it has finished scanning and has found the same vulnerabilities. The vulnerabilities are again marked as Low, Medium, High and Critical. Apart from that, it also provides us suggestions to fix the issue. For example, if you see the above image, it suggests us to upgrade Django from version 3.1.12 to 3.2.13 to resolve a lot of issues. Let us upgrade the Django and then rescan the application to see if those vulnerabilities have been fixed or not.

Let us first upgrade the Django version to 3.2.13 using the command:

pip install django==3.2.13

You will get a similar output:

Now let us rescan the code using snyk test command.

Now, if you notice, we don't have those vulnerabilities such as SQL Injection.

2. snyk monitor

What this command does is, it scans through the code and uploads a snapshot of it on the Snyk UI or Snyk Platform. Let's first run the command:

The command has taken a snapshot of the project and uploaded it to the Snyk Platform. It then gives us a URL where we can see a lot of other information regarding the project. If you open the URL, you will see a similar page:

It is now easier to see the vulnerabilities in the application. You can also retest the application by clicking on the Retest Now link. You can also see the Fixes and Dependencies of the application.

3. Scan Infrastructure as Code

If you look at the project, you will find a folder called infrastructure.Within that, we have application-load-balancer folder. So, this project can be deployed to AWS load balancer. There is a Python file that actually generates a template for the configuration of the load balancer on AWS. Then in the cdk.out folder, you can find a LoadBalancerStack.template.json file generated from the Python code.

To scan for any misconfigurations before deployment, we can actually test this file using Snyk. The command for the same is:

snyk iac test <template-file-path>

Let us run and see the output:

It shows all the issues and vulnerabilities in the template file.

4. Scan Dockerfile and Docker Images

In the project, we do have a Dockerfile. You can build the Docker image from the Dockerfile using the command:

docker build -t pygoat .

You can see the image being created below:

Once the image is built, you can scan for vulnerabilities using the command:

docker scan pygoat

The integration of the Snyk with Docker makes it incredibly simple to scan.

You will get the output as below:

The output is very large and it is not possible to show what all is there. But we can see the vulnerabilities in the image.

Snyk Integration with Github

Snyk can automatically fix issues for you. When you link a Github repository to Snyk, it will scan the entire project and if it has a fix around any vulnerability, it will create a Pull Request with the fix. Isn't that amazing?

Since we already logged in using Github, Snyk has already access to our repositories. We just need to select the repository we wish to scan.

Click on the Add project button, then click on Github and select your repository.

Once you add the project, you can find it on the Dashboard. Snyk will automatically scan the project. Once you see the issues, you will see a Fix this vulnerability (for each vulnerability)or Fix these vulnerabilities (for fixing all vulnerabilities)buttons.

When you click on it, you will see this page:

You can select the checkboxes to fix the vulnerabilities you want to fix and then click on the Open a Fix PR button. Once you click on it, a PR is created on your repository with the fix.

Now you are free to merge or reject the pull request.


In this article, we learned about Snyk, a tool that can help us find vulnerabilities and fix them. This was just a basic overview of it. There's much more to learn about it.

Thanks for reading!

Did you find this article valuable?

Support Ashutosh Krishna by becoming a sponsor. Any amount is appreciated!