src/eric7/Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py

branch
eric7
changeset 10507
d1c6608155ef
parent 10503
6a37b6ac3928
child 10638
12558008c269
--- a/src/eric7/Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py	Tue Jan 16 14:35:46 2024 +0100
+++ b/src/eric7/Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py	Tue Jan 16 18:24:06 2024 +0100
@@ -106,12 +106,6 @@
         "Use of mark_safe() may expose cross-site scripting vulnerabilities"
         " and should be reviewed.",
     ),
-    "S309": QCoreApplication.translate(
-        "Security",
-        "Use of HTTPSConnection on older versions of Python prior to 2.7.9"
-        " and 3.4.3 do not provide security, see"
-        " https://wiki.openstack.org/wiki/OSSN/OSSN-0033",
-    ),
     "S310": QCoreApplication.translate(
         "Security",
         "Audit url open for permitted schemes. Allowing use of file:/ or"
@@ -195,11 +189,6 @@
         " reverts to the previous behavior that does not validate"
         " certificates or perform hostname checks.",
     ),
-    "S324": QCoreApplication.translate(
-        "Security",
-        "Use of os.tempnam() and os.tmpnam() is vulnerable to symlink"
-        " attacks. Consider using tmpfile() instead.",
-    ),
     # hashlib.new
     "S331": QCoreApplication.translate(
         "Security", "Use of insecure {0} hash function."
@@ -395,6 +384,11 @@
     "S611": QCoreApplication.translate(
         "Security", "Use of 'RawSQL()' opens a potential SQL attack vector."
     ),
+    # insecure logging.config.listen()
+    "S612": QCoreApplication.translate(
+        "Security",
+        "Use of insecure logging.config.listen() detected.",
+    ),
     # Jinja2 templates
     "S701.1": QCoreApplication.translate(
         "Security",

eric ide

mercurial