--- a/src/eric7/i18n/eric7_de.ts Mon Oct 21 16:21:24 2024 +0200 +++ b/src/eric7/i18n/eric7_de.ts Mon Oct 21 19:31:11 2024 +0200 @@ -74002,13 +74002,13 @@ </message> <message> <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="50" /> - <source>Requests call without timeout.</source> - <translation>Requests Aufruf ohne Timeout.</translation> + <source>Call to {0} without timeout.</source> + <translation>Aufruf von {0} ohne Timeout.</translation> </message> <message> <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="51" /> - <source>Requests call with timeout set to None.</source> - <translation>Requests Aufruf mit Timeout auf None gesetzt.</translation> + <source>Call to {0} with timeout set to None.</source> + <translation>Aufruf von {0} mit Timeout auf None gesetzt.</translation> </message> <message> <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="56" /> @@ -74303,31 +74303,41 @@ </message> <message> <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="393" /> + <source>The Python source file contains bidirectional control characters ({0}).</source> + <translation>Die Python Quelledatei enthält bidirektionale Kontrollzeichen ({0}).</translation> + </message> + <message> + <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="398" /> + <source>Use of unsafe PyTorch load or save.</source> + <translation>Verwendung von unsicherem PyTorch 'load' oder 'save'.</translation> + </message> + <message> + <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="402" /> <source>Using jinja2 templates with 'autoescape=False' is dangerous and can lead to XSS. Use 'autoescape=True' or use the 'select_autoescape' function to mitigate XSS vulnerabilities.</source> <translation>Verwendung von Jinja Templates mit 'autoescape=False' ist gefährlich und führt zu XSS. Verwende 'autoescaoe=True' oder wähle die 'select_autoescape' Funktion zur Abschwächung von XSS Verwundbarkeiten.</translation> </message> <message> - <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="399" /> + <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="408" /> <source>By default, jinja2 sets 'autoescape' to False. Consider using 'autoescape=True' or use the 'select_autoescape' function to mitigate XSS vulnerabilities.</source> <translation>Als Standard setzt Jinja2 'autoescape' auf False. Verwende 'autoescaoe=True' oder wähle die 'select_autoescape' Funktion zur Abschwächung von XSS Verwundbarkeiten.</translation> </message> <message> - <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="406" /> + <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="415" /> <source>Mako templates allow HTML/JS rendering by default and are inherently open to XSS attacks. Ensure variables in all templates are properly sanitized via the 'n', 'h' or 'x' flags (depending on context). For example, to HTML escape the variable 'data' do ${{ data |h }}.</source> <translation>Mako Templates als Standard das Rendering von HTML/JS und sind damit offen für XSS Angriffe. Stelle sicher, dass alle in Templates verwendeten Variablen über die 'n', 'h' oder 'x' Flags abgesichert sind (abhängig vom Kontext). Verwende z.B. zur Absicherung der HTML Variablen 'data' den Ausdruck '${{ data |h }}.</translation> </message> <message> - <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="414" /> + <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="423" /> <source>Potential XSS on 'mark_safe()' function.</source> <translation>Potentielle XSS auf die 'mark_safe()' Funktion.</translation> </message> <message> - <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="418" /> + <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="427" /> <source>Possible hardcoded AWS access key ID: {0}</source> <translation>Mögliche einprogrammierte AWS Zugriffsschlüssel-ID: {0}</translation> </message> <message> - <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="421" /> + <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="430" /> <source>Possible hardcoded AWS secret access key: {0}</source> <translation>Möglicher einprogrammierter geheimer AWS Zugriffsschlüssel: {0}</translation> </message>