diff -r f94a27bbf6c4 -r a3dc181d14e1 src/eric7/i18n/eric7_pt.ts --- a/src/eric7/i18n/eric7_pt.ts Mon Oct 21 16:21:24 2024 +0200 +++ b/src/eric7/i18n/eric7_pt.ts Mon Oct 21 19:31:11 2024 +0200 @@ -73848,12 +73848,12 @@ </message> <message> <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="50" /> - <source>Requests call without timeout.</source> + <source>Call to {0} without timeout.</source> <translation type="unfinished" /> </message> <message> <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="51" /> - <source>Requests call with timeout set to None.</source> + <source>Call to {0} with timeout set to None.</source> <translation type="unfinished" /> </message> <message> @@ -74149,31 +74149,41 @@ </message> <message> <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="393" /> + <source>The Python source file contains bidirectional control characters ({0}).</source> + <translation type="unfinished" /> + </message> + <message> + <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="398" /> + <source>Use of unsafe PyTorch load or save.</source> + <translation type="unfinished" /> + </message> + <message> + <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="402" /> <source>Using jinja2 templates with 'autoescape=False' is dangerous and can lead to XSS. Use 'autoescape=True' or use the 'select_autoescape' function to mitigate XSS vulnerabilities.</source> <translation type="unfinished" /> </message> <message> - <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="399" /> + <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="408" /> <source>By default, jinja2 sets 'autoescape' to False. Consider using 'autoescape=True' or use the 'select_autoescape' function to mitigate XSS vulnerabilities.</source> <translation type="unfinished" /> </message> <message> - <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="406" /> + <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="415" /> <source>Mako templates allow HTML/JS rendering by default and are inherently open to XSS attacks. Ensure variables in all templates are properly sanitized via the 'n', 'h' or 'x' flags (depending on context). For example, to HTML escape the variable 'data' do ${{ data |h }}.</source> <translation type="unfinished" /> </message> <message> - <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="414" /> + <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="423" /> <source>Potential XSS on 'mark_safe()' function.</source> <translation type="unfinished" /> </message> <message> - <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="418" /> + <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="427" /> <source>Possible hardcoded AWS access key ID: {0}</source> <translation type="unfinished" /> </message> <message> - <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="421" /> + <location filename="../Plugins/CheckerPlugins/CodeStyleChecker/Security/translations.py" line="430" /> <source>Possible hardcoded AWS secret access key: {0}</source> <translation type="unfinished" /> </message>