rspec/rules/S4823/comments-and-links.adoc

72 lines
1.4 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

=== on 4 Sep 2018, 10:57:29 Alexandre Gigleux wrote:
\[~nicolas.harraudeau] Review
On which part of the code are we going to raise issues? Each time there is a command line executed taking some arguments or on each arguments of the command line? This needs to be clarify maybe by providing an example of command line execution using arguments.
=== on 25 Sep 2019, 16:55:57 Prakash Reddy Barri wrote:
Hi Team,
We have this security hotspot in our python source code and have validators framework configured to validate the command line arguments.
Here is the sample snippet.
*pip install validator-collection*
*from validator_collection import validators, checkers*
*validators.ipv4(sys.argv[1])*
But sonar still complains about input sanity, Please let us know which framework to use.
Thanks,
ABC
 
 
 
 
 
=== on 30 Sep 2019, 17:55:24 Nicolas Harraudeau wrote:
Hi [~prakash951],
Security Hotspots guide developers during their Code Review so that they can easily spot security sensitive code. You can find more information in [the documentation| \https://docs.sonarqube.org/latest/user-guide/security-hotspots/].
Next time could you please post your question on https://community.sonarsource.com/? It is our community support forum.
=== on 1 Oct 2019, 08:48:00 Prakash Reddy Barri wrote:
Hi Nicolas,
Thanks for the information.
 
 
=== on 27 May 2020, 16:43:45 Eric Therond wrote:
Deprecated because it overlaps with SonarSecurity