eric6/Plugins/CheckerPlugins/CodeStyleChecker/Security/Checks/injectionParamiko.py

changeset 7614
646742c260bd
child 7923
91e843545d9a
diff -r 382f89c11e27 -r 646742c260bd eric6/Plugins/CheckerPlugins/CodeStyleChecker/Security/Checks/injectionParamiko.py
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/eric6/Plugins/CheckerPlugins/CodeStyleChecker/Security/Checks/injectionParamiko.py	Tue Jun 09 20:10:59 2020 +0200
@@ -0,0 +1,54 @@
+# -*- coding: utf-8 -*-
+
+# Copyright (c) 2020 Detlev Offenbach <detlev@die-offenbachs.de>
+#
+
+"""
+Module implementing a check for shell injection within Paramiko.
+"""
+
+#
+# This is a modified version of the one found in the bandit package.
+#
+# Original Copyright 2014 Hewlett-Packard Development Company, L.P.
+#
+# SPDX-License-Identifier: Apache-2.0
+#
+
+
+def getChecks():
+    """
+    Public method to get a dictionary with checks handled by this module.
+    
+    @return dictionary containing checker lists containing checker function and
+        list of codes
+    @rtype dict
+    """
+    return {
+        "Call": [
+            (checkParamikoCalls, ("S601",)),
+        ],
+    }
+
+
+def checkParamikoCalls(reportError, context, config):
+    """
+    Function to check for shell injection within Paramiko.
+    
+    @param reportError function to be used to report errors
+    @type func
+    @param context security context object
+    @type SecurityContext
+    @param config dictionary with configuration data
+    @type dict
+    """
+    for module in ['paramiko']:
+        if context.isModuleImportedLike(module):
+            if context.callFunctionName in ['exec_command']:
+                reportError(
+                    context.node.lineno - 1,
+                    context.node.col_offset,
+                    "S601",
+                    "M",
+                    "M",
+                )

eric ide

mercurial