From 847f94c93eb108f7a625a87e146d65076c0265cc Mon Sep 17 00:00:00 2001 From: michaelbirnstiehl Date: Mon, 2 Mar 2020 10:18:02 -0600 Subject: [PATCH] SONAR-13138 Update Security Engine Custom Configuration docs for Python --- .../src/pages/analysis/security_configuration.md | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/server/sonar-docs/src/pages/analysis/security_configuration.md b/server/sonar-docs/src/pages/analysis/security_configuration.md index 1cb05294455..692c9e99b93 100644 --- a/server/sonar-docs/src/pages/analysis/security_configuration.md +++ b/server/sonar-docs/src/pages/analysis/security_configuration.md @@ -88,6 +88,18 @@ The `RuleKey` value can be one of the following: * [S2631](https://rules.sonarsource.com/csharp/RSPEC-2631): RegExp Injection * [S5144](https://rules.sonarsource.com/csharp/RSPEC-5144): Server-Side Request Forgery (SSRF) * [S2091](https://rules.sonarsource.com/csharp/RSPEC-2091): XPath Injection +* For Python + * [S3649](https://rules.sonarsource.com/python/RSPEC-3649): SQL Injection + * [S5146](https://rules.sonarsource.com/python/RSPEC-5146): Open Redirect + * [S5167](https://rules.sonarsource.com/python/RSPEC-5167): HTTP Response Splitting + * [S2083](https://rules.sonarsource.com/python/RSPEC-2083): Path Traversal Injection + * [S2078](https://rules.sonarsource.com/python/RSPEC-2078): LDAP Injection + * [S5145](https://rules.sonarsource.com/python/RSPEC-5145): Log Injection + * [S2076](https://rules.sonarsource.com/python/RSPEC-2076): OS Command Injection + * [S5144](https://rules.sonarsource.com/python/RSPEC-5144): Server-Side Request Forgery (SSRF) + * [S2091](https://rules.sonarsource.com/python/RSPEC-2091): XPath Injection + * [S5135](https://rules.sonarsource.com/python/RSPEC-5135): Object Injection + * [S5334](https://rules.sonarsource.com/python/RSPEC-5334): Code Injection [[info]] | The configuration works per rule. There is no way to share configuration between rules. -- 2.39.5