While this is obviously a bad practice in any production codebase, this all looks like "learning python" kind of code, where confusing people with security implications isn't really going to help anything.<p>Besides, this isn't even low hanging fruit. If you want to really find some terrifying github contents, try to think of a library that is used to access the TTY, say to enter passphrases for ssh/telnet/mount/sudo/etc. in a PRODUCTION environment. Then think how it's api would be used, and search for that. Example below: using expect to enter passphrases:<p>Example:<p><a href="https://github.com/search?q=+expect+send+root+ssh&type=Code&ref=searchresults" rel="nofollow">https://github.com/search?q=+expect+send+root+ssh&type=Code&...</a><p>There is a ton of low hanging fruit out there.