104 "S308": QCoreApplication.translate( |
104 "S308": QCoreApplication.translate( |
105 "Security", |
105 "Security", |
106 "Use of mark_safe() may expose cross-site scripting vulnerabilities" |
106 "Use of mark_safe() may expose cross-site scripting vulnerabilities" |
107 " and should be reviewed.", |
107 " and should be reviewed.", |
108 ), |
108 ), |
109 "S309": QCoreApplication.translate( |
|
110 "Security", |
|
111 "Use of HTTPSConnection on older versions of Python prior to 2.7.9" |
|
112 " and 3.4.3 do not provide security, see" |
|
113 " https://wiki.openstack.org/wiki/OSSN/OSSN-0033", |
|
114 ), |
|
115 "S310": QCoreApplication.translate( |
109 "S310": QCoreApplication.translate( |
116 "Security", |
110 "Security", |
117 "Audit url open for permitted schemes. Allowing use of file:/ or" |
111 "Audit url open for permitted schemes. Allowing use of file:/ or" |
118 " custom schemes is often unexpected.", |
112 " custom schemes is often unexpected.", |
119 ), |
113 ), |
193 " use in such classes as HTTPSConnection. However, it still allows" |
187 " use in such classes as HTTPSConnection. However, it still allows" |
194 " using an insecure context via the _create_unverified_context that" |
188 " using an insecure context via the _create_unverified_context that" |
195 " reverts to the previous behavior that does not validate" |
189 " reverts to the previous behavior that does not validate" |
196 " certificates or perform hostname checks.", |
190 " certificates or perform hostname checks.", |
197 ), |
191 ), |
198 "S324": QCoreApplication.translate( |
|
199 "Security", |
|
200 "Use of os.tempnam() and os.tmpnam() is vulnerable to symlink" |
|
201 " attacks. Consider using tmpfile() instead.", |
|
202 ), |
|
203 # hashlib.new |
192 # hashlib.new |
204 "S331": QCoreApplication.translate( |
193 "S331": QCoreApplication.translate( |
205 "Security", "Use of insecure {0} hash function." |
194 "Security", "Use of insecure {0} hash function." |
206 ), |
195 ), |
207 "S332": QCoreApplication.translate( |
196 "S332": QCoreApplication.translate( |
392 "S610": QCoreApplication.translate( |
381 "S610": QCoreApplication.translate( |
393 "Security", "Use of 'extra()' opens a potential SQL attack vector." |
382 "Security", "Use of 'extra()' opens a potential SQL attack vector." |
394 ), |
383 ), |
395 "S611": QCoreApplication.translate( |
384 "S611": QCoreApplication.translate( |
396 "Security", "Use of 'RawSQL()' opens a potential SQL attack vector." |
385 "Security", "Use of 'RawSQL()' opens a potential SQL attack vector." |
|
386 ), |
|
387 # insecure logging.config.listen() |
|
388 "S612": QCoreApplication.translate( |
|
389 "Security", |
|
390 "Use of insecure logging.config.listen() detected.", |
397 ), |
391 ), |
398 # Jinja2 templates |
392 # Jinja2 templates |
399 "S701.1": QCoreApplication.translate( |
393 "S701.1": QCoreApplication.translate( |
400 "Security", |
394 "Security", |
401 "Using jinja2 templates with 'autoescape=False' is dangerous and can" |
395 "Using jinja2 templates with 'autoescape=False' is dangerous and can" |