src/eric7/i18n/eric7_en.ts

branch
eric7
changeset 10507
d1c6608155ef
parent 10506
321555d0303b
child 10510
fa7b8ebfbe13
--- a/src/eric7/i18n/eric7_en.ts	Tue Jan 16 14:35:46 2024 +0100
+++ b/src/eric7/i18n/eric7_en.ts	Tue Jan 16 18:24:06 2024 +0100
@@ -71567,267 +71567,262 @@
     </message>
     <message>
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="109" />
-      <source>Use of HTTPSConnection on older versions of Python prior to 2.7.9 and 3.4.3 do not provide security, see https://wiki.openstack.org/wiki/OSSN/OSSN-0033</source>
-      <translation type="unfinished" />
-    </message>
-    <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="115" />
       <source>Audit url open for permitted schemes. Allowing use of file:/ or custom schemes is often unexpected.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="120" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="114" />
       <source>Standard pseudo-random generators are not suitable for security/cryptographic purposes.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="125" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="119" />
       <source>Telnet-related functions are being called. Telnet is considered insecure. Use SSH or some other encrypted protocol.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="166" />
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="160" />
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="154" />
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="148" />
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="142" />
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="136" />
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="130" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="124" />
       <source>Using '{0}' to parse untrusted XML data is known to be vulnerable to XML attacks. Replace '{0}' with its defusedxml equivalent function or make sure defusedxml.defuse_stdlib() is called.</source>
       <translation type="unfinished" />
     </message>
     <message>
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="166" />
+      <source>Using '{0}' to parse untrusted XML data is known to be vulnerable to XML attacks. Replace '{0}' with its defusedxml equivalent function.</source>
+      <translation type="unfinished" />
+    </message>
+    <message>
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="172" />
-      <source>Using '{0}' to parse untrusted XML data is known to be vulnerable to XML attacks. Replace '{0}' with its defusedxml equivalent function.</source>
-      <translation type="unfinished" />
-    </message>
-    <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="178" />
       <source>FTP-related functions are being called. FTP is considered insecure. Use SSH/SFTP/SCP or some other encrypted protocol.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="183" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="177" />
       <source>The input method in Python 2 will read from standard input, evaluate and run the resulting string as Python source code. This is similar, though in many ways worse, than using eval. On Python 2, use raw_input instead, input is safe in Python 3.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="190" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="184" />
       <source>By default, Python will create a secure, verified SSL context for use in such classes as HTTPSConnection. However, it still allows using an insecure context via the _create_unverified_context that reverts to the previous behavior that does not validate certificates or perform hostname checks.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="198" />
-      <source>Use of os.tempnam() and os.tmpnam() is vulnerable to symlink attacks. Consider using tmpfile() instead.</source>
-      <translation type="unfinished" />
-    </message>
-    <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="204" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="193" />
       <source>Use of insecure {0} hash function.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="207" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="196" />
       <source>Use of insecure {0} hash for security. Consider 'usedforsecurity=False'.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="212" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="201" />
       <source>A telnet-related module is being imported.  Telnet is considered insecure. Use SSH or some other encrypted protocol.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="217" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="206" />
       <source>A FTP-related module is being imported.  FTP is considered insecure. Use SSH/SFTP/SCP or some other encrypted protocol.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="226" />
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="222" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="215" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="211" />
       <source>Consider possible security implications associated with the '{0}' module.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="254" />
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="248" />
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="242" />
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="236" />
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="230" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="243" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="237" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="231" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="225" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="219" />
       <source>Using '{0}' to parse untrusted XML data is known to be vulnerable to XML attacks. Replace '{0}' with the equivalent defusedxml package, or make sure defusedxml.defuse_stdlib() is called.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="260" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="249" />
       <source>Using '{0}' to parse untrusted XML data is known to be vulnerable to XML attacks. Replace '{0}' with the equivalent defusedxml package.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="266" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="255" />
       <source>Using '{0}' to parse untrusted XML data is known to be vulnerable to XML attacks. Use defused.xmlrpc.monkey_patch() function to monkey-patch xmlrpclib and mitigate XML vulnerabilities.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="272" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="261" />
       <source>Consider possible security implications associated with '{0}' module.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="276" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="265" />
       <source>The pyCrypto library and its module '{0}' are no longer actively maintained and have been deprecated. Consider using pyca/cryptography library.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="282" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="271" />
       <source>An IPMI-related module is being imported. IPMI is considered insecure. Use an encrypted protocol.</source>
       <translation type="unfinished" />
     </message>
     <message>
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="277" />
+      <source>'requests' call with verify=False disabling SSL certificate checks, security issue.</source>
+      <translation type="unfinished" />
+    </message>
+    <message>
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="283" />
+      <source>'ssl.wrap_socket' call with insecure SSL/TLS protocol version identified, security issue.</source>
+      <translation type="unfinished" />
+    </message>
+    <message>
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="288" />
-      <source>'requests' call with verify=False disabling SSL certificate checks, security issue.</source>
-      <translation type="unfinished" />
-    </message>
-    <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="294" />
-      <source>'ssl.wrap_socket' call with insecure SSL/TLS protocol version identified, security issue.</source>
-      <translation type="unfinished" />
-    </message>
-    <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="299" />
       <source>'SSL.Context' call with insecure SSL/TLS protocol version identified, security issue.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="304" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="293" />
       <source>Function call with insecure SSL/TLS protocol version identified, security issue.</source>
       <translation type="unfinished" />
     </message>
     <message>
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="298" />
+      <source>Function definition identified with insecure SSL/TLS protocol version by default, possible security issue.</source>
+      <translation type="unfinished" />
+    </message>
+    <message>
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="303" />
+      <source>'ssl.wrap_socket' call with no SSL/TLS protocol version specified, the default 'SSLv23' could be insecure, possible security issue.</source>
+      <translation type="unfinished" />
+    </message>
+    <message>
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="309" />
-      <source>Function definition identified with insecure SSL/TLS protocol version by default, possible security issue.</source>
-      <translation type="unfinished" />
-    </message>
-    <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="314" />
-      <source>'ssl.wrap_socket' call with no SSL/TLS protocol version specified, the default 'SSLv23' could be insecure, possible security issue.</source>
-      <translation type="unfinished" />
-    </message>
-    <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="320" />
       <source>{0} key sizes below {1:d} bits are considered breakable.</source>
       <translation type="unfinished" />
     </message>
     <message>
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="313" />
+      <source>Use of unsafe 'yaml.load()'. Allows instantiation of arbitrary objects. Consider 'yaml.safe_load()'.</source>
+      <translation type="unfinished" />
+    </message>
+    <message>
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="319" />
+      <source>Paramiko call with policy set to automatically trust the unknown host key.</source>
+      <translation type="unfinished" />
+    </message>
+    <message>
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="324" />
-      <source>Use of unsafe 'yaml.load()'. Allows instantiation of arbitrary objects. Consider 'yaml.safe_load()'.</source>
-      <translation type="unfinished" />
-    </message>
-    <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="330" />
-      <source>Paramiko call with policy set to automatically trust the unknown host key.</source>
-      <translation type="unfinished" />
-    </message>
-    <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="335" />
       <source>The use of SNMPv1 and SNMPv2 is insecure. You should use SNMPv3 if possible.</source>
       <translation type="unfinished" />
     </message>
     <message>
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="328" />
+      <source>You should not use SNMPv3 without encryption. noAuthNoPriv &amp; authNoPriv is insecure.</source>
+      <translation type="unfinished" />
+    </message>
+    <message>
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="334" />
+      <source>Possible shell injection via 'Paramiko' call, check inputs are properly sanitized.</source>
+      <translation type="unfinished" />
+    </message>
+    <message>
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="339" />
-      <source>You should not use SNMPv3 without encryption. noAuthNoPriv &amp; authNoPriv is insecure.</source>
-      <translation type="unfinished" />
-    </message>
-    <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="345" />
-      <source>Possible shell injection via 'Paramiko' call, check inputs are properly sanitized.</source>
+      <source>'subprocess' call with shell=True seems safe, but may be changed in the future, consider rewriting without shell</source>
+      <translation type="unfinished" />
+    </message>
+    <message>
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="344" />
+      <source>'subprocess' call with shell=True identified, security issue.</source>
+      <translation type="unfinished" />
+    </message>
+    <message>
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="347" />
+      <source>'subprocess' call - check for execution of untrusted input.</source>
       <translation type="unfinished" />
     </message>
     <message>
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="350" />
-      <source>'subprocess' call with shell=True seems safe, but may be changed in the future, consider rewriting without shell</source>
+      <source>Function call with shell=True parameter identified, possible security issue.</source>
       <translation type="unfinished" />
     </message>
     <message>
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="355" />
-      <source>'subprocess' call with shell=True identified, security issue.</source>
-      <translation type="unfinished" />
-    </message>
-    <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="358" />
-      <source>'subprocess' call - check for execution of untrusted input.</source>
-      <translation type="unfinished" />
-    </message>
-    <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="361" />
-      <source>Function call with shell=True parameter identified, possible security issue.</source>
-      <translation type="unfinished" />
-    </message>
-    <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="366" />
       <source>Starting a process with a shell: Seems safe, but may be changed in the future, consider rewriting without shell</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="371" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="360" />
       <source>Starting a process with a shell, possible injection detected, security issue.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="376" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="365" />
       <source>Starting a process without a shell.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="379" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="368" />
       <source>Starting a process with a partial executable path.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="383" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="372" />
       <source>Possible SQL injection vector through string-based query construction.</source>
       <translation type="unfinished" />
     </message>
     <message>
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="377" />
+      <source>Possible wildcard injection in call: {0}</source>
+      <translation type="unfinished" />
+    </message>
+    <message>
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="381" />
+      <source>Use of 'extra()' opens a potential SQL attack vector.</source>
+      <translation type="unfinished" />
+    </message>
+    <message>
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="384" />
+      <source>Use of 'RawSQL()' opens a potential SQL attack vector.</source>
+      <translation type="unfinished" />
+    </message>
+    <message>
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="388" />
-      <source>Possible wildcard injection in call: {0}</source>
-      <translation type="unfinished" />
-    </message>
-    <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="392" />
-      <source>Use of 'extra()' opens a potential SQL attack vector.</source>
-      <translation type="unfinished" />
-    </message>
-    <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="395" />
-      <source>Use of 'RawSQL()' opens a potential SQL attack vector.</source>
+      <source>Use of insecure logging.config.listen() detected.</source>
+      <translation type="unfinished" />
+    </message>
+    <message>
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="393" />
+      <source>Using jinja2 templates with 'autoescape=False' is dangerous and can lead to XSS. Use 'autoescape=True' or use the 'select_autoescape' function to mitigate XSS vulnerabilities.</source>
       <translation type="unfinished" />
     </message>
     <message>
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="399" />
-      <source>Using jinja2 templates with 'autoescape=False' is dangerous and can lead to XSS. Use 'autoescape=True' or use the 'select_autoescape' function to mitigate XSS vulnerabilities.</source>
-      <translation type="unfinished" />
-    </message>
-    <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="405" />
       <source>By default, jinja2 sets 'autoescape' to False. Consider using 'autoescape=True' or use the 'select_autoescape' function to mitigate XSS vulnerabilities.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="412" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="406" />
       <source>Mako templates allow HTML/JS rendering by default and are inherently open to XSS attacks. Ensure variables in all templates are properly sanitized via the 'n', 'h' or 'x' flags (depending on context). For example, to HTML escape the variable 'data' do ${{ data |h }}.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="420" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="414" />
       <source>Potential XSS on 'mark_safe()' function.</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="424" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="418" />
       <source>Possible hardcoded AWS access key ID: {0}</source>
       <translation type="unfinished" />
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="427" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="421" />
       <source>Possible hardcoded AWS secret access key: {0}</source>
       <translation type="unfinished" />
     </message>

eric ide

mercurial