36 "S105", "S106", "S107" |
36 "S105", "S106", "S107" |
37 |
37 |
38 # hardcoded tmp directory |
38 # hardcoded tmp directory |
39 "S108", |
39 "S108", |
40 |
40 |
|
41 # try-except |
|
42 "S110", "S112", |
|
43 |
41 # flask app |
44 # flask app |
42 "S201", |
45 "S201", |
43 |
46 |
44 # insecure function calls (blacklisted) |
47 # insecure function calls (blacklisted) |
45 "S301", "S302", "S303", "S304", "S305", "S306", "S307", "S308", "S309", |
48 "S301", "S302", "S303", "S304", "S305", "S306", "S307", "S308", "S309", |
53 "S410", "S411", "S412", "S413", |
56 "S410", "S411", "S412", "S413", |
54 |
57 |
55 # insecure certificate usage |
58 # insecure certificate usage |
56 "S501", |
59 "S501", |
57 |
60 |
|
61 # insecure SSL/TLS protocol version |
|
62 "S502", "S503", "S504", |
|
63 |
58 # YAML load |
64 # YAML load |
59 "S506", |
65 "S506", |
60 |
66 |
|
67 # SSH host key verification |
|
68 "S507", |
|
69 |
61 # Shell injection |
70 # Shell injection |
62 "S601", "S602", "S603", "S604", "S605", "S606", "S607", |
71 "S601", "S602", "S603", "S604", "S605", "S606", "S607", |
63 |
72 |
|
73 # SQL injection |
|
74 "S608", |
|
75 |
|
76 # Wildcard injection |
|
77 "S609", |
|
78 |
64 # Django SQL injection |
79 # Django SQL injection |
65 "S610", "S611", |
80 "S610", "S611", |
66 |
81 |
|
82 # Jinja2 templates |
|
83 "S701", |
|
84 |
|
85 # Mako templates |
|
86 "S702", |
|
87 |
67 # Django XSS vulnerability |
88 # Django XSS vulnerability |
68 "S703", |
89 "S703", |
|
90 |
|
91 # Syntax error |
|
92 "S999", |
69 ] |
93 ] |
70 |
94 |
71 def __init__(self, source, filename, select, ignore, expected, repeat, |
95 def __init__(self, source, filename, select, ignore, expected, repeat, |
72 args): |
96 args): |
73 """ |
97 """ |