eric6/Plugins/CheckerPlugins/CodeStyleChecker/Security/SecurityChecker.py

changeset 7615
ca2949b1a29a
parent 7614
646742c260bd
child 7616
01d646569115
equal deleted inserted replaced
7614:646742c260bd 7615:ca2949b1a29a
36 "S105", "S106", "S107" 36 "S105", "S106", "S107"
37 37
38 # hardcoded tmp directory 38 # hardcoded tmp directory
39 "S108", 39 "S108",
40 40
41 # try-except
42 "S110", "S112",
43
41 # flask app 44 # flask app
42 "S201", 45 "S201",
43 46
44 # insecure function calls (blacklisted) 47 # insecure function calls (blacklisted)
45 "S301", "S302", "S303", "S304", "S305", "S306", "S307", "S308", "S309", 48 "S301", "S302", "S303", "S304", "S305", "S306", "S307", "S308", "S309",
53 "S410", "S411", "S412", "S413", 56 "S410", "S411", "S412", "S413",
54 57
55 # insecure certificate usage 58 # insecure certificate usage
56 "S501", 59 "S501",
57 60
61 # insecure SSL/TLS protocol version
62 "S502", "S503", "S504",
63
58 # YAML load 64 # YAML load
59 "S506", 65 "S506",
60 66
67 # SSH host key verification
68 "S507",
69
61 # Shell injection 70 # Shell injection
62 "S601", "S602", "S603", "S604", "S605", "S606", "S607", 71 "S601", "S602", "S603", "S604", "S605", "S606", "S607",
63 72
73 # SQL injection
74 "S608",
75
76 # Wildcard injection
77 "S609",
78
64 # Django SQL injection 79 # Django SQL injection
65 "S610", "S611", 80 "S610", "S611",
66 81
82 # Jinja2 templates
83 "S701",
84
85 # Mako templates
86 "S702",
87
67 # Django XSS vulnerability 88 # Django XSS vulnerability
68 "S703", 89 "S703",
90
91 # Syntax error
92 "S999",
69 ] 93 ]
70 94
71 def __init__(self, source, filename, select, ignore, expected, repeat, 95 def __init__(self, source, filename, select, ignore, expected, repeat,
72 args): 96 args):
73 """ 97 """

eric ide

mercurial