Package: tweepy Severity: important Tags: security Justification: user security hole Please see Section 9 of this paper: http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf Cheers, Moritz