src/eric7/i18n/eric7_es.ts

branch
eric7
changeset 10996
a3dc181d14e1
parent 10990
31677cc3713e
child 10999
c3cf24fe9113
diff -r f94a27bbf6c4 -r a3dc181d14e1 src/eric7/i18n/eric7_es.ts
--- a/src/eric7/i18n/eric7_es.ts	Mon Oct 21 16:21:24 2024 +0200
+++ b/src/eric7/i18n/eric7_es.ts	Mon Oct 21 19:31:11 2024 +0200
@@ -74007,13 +74007,13 @@
     </message>
     <message>
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="50" />
-      <source>Requests call without timeout.</source>
-      <translation>Solicita llamada sin timeout.</translation>
+      <source>Call to {0} without timeout.</source>
+      <translation type="unfinished" />
     </message>
     <message>
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="51" />
-      <source>Requests call with timeout set to None.</source>
-      <translation>Solicita llamada con timeout establecido a None.</translation>
+      <source>Call to {0} with timeout set to None.</source>
+      <translation type="unfinished" />
     </message>
     <message>
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="56" />
@@ -74308,34 +74308,52 @@
     </message>
     <message>
       <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="393" />
+      <source>The Python source file contains bidirectional control characters ({0}).</source>
+      <translation type="unfinished" />
+    </message>
+    <message>
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="398" />
+      <source>Use of unsafe PyTorch load or save.</source>
+      <translation type="unfinished" />
+    </message>
+    <message>
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="402" />
       <source>Using jinja2 templates with 'autoescape=False' is dangerous and can lead to XSS. Use 'autoescape=True' or use the 'select_autoescape' function to mitigate XSS vulnerabilities.</source>
       <translation>El uso de plantillas jinja2 con 'autoescape=False' es peligroso y puede conducir a XSS. Usar 'autoescape=True' o usar la función 'select_autoescape' para mitigar vulnerabilidades XSS.</translation>
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="399" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="408" />
       <source>By default, jinja2 sets 'autoescape' to False. Consider using 'autoescape=True' or use the 'select_autoescape' function to mitigate XSS vulnerabilities.</source>
       <translation>Por defecto, jinja2 establece 'autoescape' a False. Considerar el uso de 'autoescape=True' o de la función 'select_autoescape' para mitigar vulnerabilidades XSS.</translation>
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="406" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="415" />
       <source>Mako templates allow HTML/JS rendering by default and are inherently open to XSS attacks. Ensure variables in all templates are properly sanitized via the 'n', 'h' or 'x' flags (depending on context). For example, to HTML escape the variable 'data' do ${{ data |h }}.</source>
       <translation>Las plantillas Mako permiten dibujado de HTML/JS por defecto y son inherentemente abiertas a ataques XSS. Asegurar que las variables en todas las plantillas se sanitizan apropiadamente con la flags 'n', 'h' o 'x' (dependiendo del contexto). Por ejemplo, para hacer un HTML escape de la avariable 'data', hacer ${{ data |h }}.</translation>
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="414" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="423" />
       <source>Potential XSS on 'mark_safe()' function.</source>
       <translation>Potencial XSS en la función 'mark_safe()'.</translation>
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="418" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="427" />
       <source>Possible hardcoded AWS access key ID: {0}</source>
       <translation>Posible clave de acceso a AWS con código duro: {0}</translation>
     </message>
     <message>
-      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="421" />
+      <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="430" />
       <source>Possible hardcoded AWS secret access key: {0}</source>
       <translation>Posible clave secreta de acceso a AWS con código duro: {0}</translation>
     </message>
+    <message>
+      <source>Requests call without timeout.</source>
+      <translation type="vanished">Solicita llamada sin timeout.</translation>
+    </message>
+    <message>
+      <source>Requests call with timeout set to None.</source>
+      <translation type="vanished">Solicita llamada con timeout establecido a None.</translation>
+    </message>
   </context>
   <context>
     <name>SecurityPage</name>

eric ide

mercurial