src/eric7/Plugins/CheckerPlugins/CodeStyleChecker/Security/SecurityChecker.py

branch
eric7
changeset 11147
dee6e106b4d3
parent 11145
d328a7b74fd8
child 11150
73d80859079c
--- a/src/eric7/Plugins/CheckerPlugins/CodeStyleChecker/Security/SecurityChecker.py	Sun Feb 23 12:42:47 2025 +0100
+++ b/src/eric7/Plugins/CheckerPlugins/CodeStyleChecker/Security/SecurityChecker.py	Mon Feb 24 15:11:18 2025 +0100
@@ -21,101 +21,101 @@
 
     Codes = [
         # assert used
-        "S101",
+        "S-101",
         # exec used
-        "S102",
+        "S-102",
         # bad file permissions
-        "S103",
+        "S-103",
         # bind to all interfaces
-        "S104",
+        "S-104",
         # hardcoded passwords
-        "S105",
-        "S106",
-        "S107"
+        "S-105",
+        "S-106",
+        "S-107"
         # hardcoded tmp directory
-        "S108",
+        "S-108",
         # try-except
-        "S110",
-        "S112",
+        "S-110",
+        "S-112",
         # flask app
-        "S201",
+        "S-201",
         # insecure function calls (prohibited)
-        "S301",
-        "S302",
-        "S303",
-        "S304",
-        "S305",
-        "S306",
-        "S307",
-        "S308",
-        "S310",
-        "S311",
-        "S312",
-        "S313",
-        "S314",
-        "S315",
-        "S316",
-        "S317",
-        "S318",
-        "S319",
-        "S321",
-        "S323",
+        "S-301",
+        "S-302",
+        "S-303",
+        "S-304",
+        "S-305",
+        "S-306",
+        "S-307",
+        "S-308",
+        "S-310",
+        "S-311",
+        "S-312",
+        "S-313",
+        "S-314",
+        "S-315",
+        "S-316",
+        "S-317",
+        "S-318",
+        "S-319",
+        "S-321",
+        "S-323",
         # hashlib functions
-        "S331",
-        "S332"
+        "S-331",
+        "S-332"
         # insecure imports (prohibited)
-        "S401",
-        "S402",
-        "S403",
-        "S404",
-        "S405",
-        "S406",
-        "S407",
-        "S408",
-        "S409",
-        "S411",
-        "S412",
-        "S413",
+        "S-401",
+        "S-402",
+        "S-403",
+        "S-404",
+        "S-405",
+        "S-406",
+        "S-407",
+        "S-408",
+        "S-409",
+        "S-411",
+        "S-412",
+        "S-413",
         # insecure certificate usage
-        "S501",
+        "S-501",
         # insecure SSL/TLS protocol version
-        "S502",
-        "S503",
-        "S504",
+        "S-502",
+        "S-503",
+        "S-504",
         # weak cryptographic keys
-        "S505",
+        "S-505",
         # YAML load
-        "S506",
+        "S-506",
         # SSH host key verification
-        "S507",
+        "S-507",
         # Shell injection
-        "S601",
-        "S602",
-        "S603",
-        "S604",
-        "S605",
-        "S606",
-        "S607",
+        "S-601",
+        "S-602",
+        "S-603",
+        "S-604",
+        "S-605",
+        "S-606",
+        "S-607",
         # SQL injection
-        "S608",
+        "S-608",
         # Wildcard injection
-        "S609",
+        "S-609",
         # Django SQL injection
-        "S610",
-        "S611",
+        "S-610",
+        "S-611",
         # insecure logging.config.listen()
-        "S612",
-        "S613",
-        "S614",
+        "S-612",
+        "S-613",
+        "S-614",
         # Jinja2 templates
-        "S701",
+        "S-701",
         # Mako templates
-        "S702",
+        "S-702",
         # Django XSS vulnerability
-        "S703",
+        "S-703",
         # hardcoded AWS passwords
-        "S801",
-        "S802",
+        "S-801",
+        "S-802",
     ]
 
     def __init__(self, source, filename, tree, select, ignore, expected, repeat, args):

eric ide

mercurial