#0602
Your service accepts YAML configuration strings from user-controlled input.
Using `yaml.load` (the unsafe loader) allows YAML tags like `!!python/object/apply:os.system` to execute arbitrary shell commands during parsing — before any business logic runs.
PyYAML's unsafe loader has been a well-known RCE vector for over a decade. Any application that passes user input to `yaml.load` without `Loader=yaml.SafeLoader` is vulnerable.
parseConfig("!!python/object/apply:os.system ['id']")# raises: ValueError('Unsafe YAML content')
parseConfig('host: localhost\nport: 5432')# returns: {'parsed': True}