eric6/Plugins/CheckerPlugins/CodeStyleChecker/Security/Checks/injectionParamiko.py

Sat, 27 Feb 2021 12:08:23 +0100

author
Detlev Offenbach <detlev@die-offenbachs.de>
date
Sat, 27 Feb 2021 12:08:23 +0100
changeset 8138
169e65a6787c
parent 7923
91e843545d9a
child 8222
5994b80b8760
permissions
-rw-r--r--

Shell: added functionality to show a prompt when the main client process has exited (e.g. a script ended).

# -*- coding: utf-8 -*-

# Copyright (c) 2020 - 2021 Detlev Offenbach <detlev@die-offenbachs.de>
#

"""
Module implementing a check for shell injection within Paramiko.
"""

#
# This is a modified version of the one found in the bandit package.
#
# Original Copyright 2014 Hewlett-Packard Development Company, L.P.
#
# SPDX-License-Identifier: Apache-2.0
#


def getChecks():
    """
    Public method to get a dictionary with checks handled by this module.
    
    @return dictionary containing checker lists containing checker function and
        list of codes
    @rtype dict
    """
    return {
        "Call": [
            (checkParamikoCalls, ("S601",)),
        ],
    }


def checkParamikoCalls(reportError, context, config):
    """
    Function to check for shell injection within Paramiko.
    
    @param reportError function to be used to report errors
    @type func
    @param context security context object
    @type SecurityContext
    @param config dictionary with configuration data
    @type dict
    """
    for module in ['paramiko']:
        if context.isModuleImportedLike(module):
            if context.callFunctionName in ['exec_command']:
                reportError(
                    context.node.lineno - 1,
                    context.node.col_offset,
                    "S601",
                    "M",
                    "M",
                )

eric ide

mercurial