diff options
author | michaelbirnstiehl <michael.birnstiehl@sonarsource.com> | 2020-03-02 10:18:02 -0600 |
---|---|---|
committer | sonartech <sonartech@sonarsource.com> | 2020-04-02 20:03:31 +0000 |
commit | 847f94c93eb108f7a625a87e146d65076c0265cc (patch) | |
tree | 027f79989375cb3a497100b15aa710eadcb051be /server/sonar-docs/src/pages/analysis | |
parent | d99d5bbac90197728da8c129973b2d47f81cf189 (diff) | |
download | sonarqube-847f94c93eb108f7a625a87e146d65076c0265cc.tar.gz sonarqube-847f94c93eb108f7a625a87e146d65076c0265cc.zip |
SONAR-13138 Update Security Engine Custom Configuration docs for Python
Diffstat (limited to 'server/sonar-docs/src/pages/analysis')
-rw-r--r-- | server/sonar-docs/src/pages/analysis/security_configuration.md | 12 |
1 files changed, 12 insertions, 0 deletions
diff --git a/server/sonar-docs/src/pages/analysis/security_configuration.md b/server/sonar-docs/src/pages/analysis/security_configuration.md index 1cb05294455..692c9e99b93 100644 --- a/server/sonar-docs/src/pages/analysis/security_configuration.md +++ b/server/sonar-docs/src/pages/analysis/security_configuration.md @@ -88,6 +88,18 @@ The `RuleKey` value can be one of the following: * [S2631](https://rules.sonarsource.com/csharp/RSPEC-2631): RegExp Injection * [S5144](https://rules.sonarsource.com/csharp/RSPEC-5144): Server-Side Request Forgery (SSRF) * [S2091](https://rules.sonarsource.com/csharp/RSPEC-2091): XPath Injection +* For Python + * [S3649](https://rules.sonarsource.com/python/RSPEC-3649): SQL Injection + * [S5146](https://rules.sonarsource.com/python/RSPEC-5146): Open Redirect + * [S5167](https://rules.sonarsource.com/python/RSPEC-5167): HTTP Response Splitting + * [S2083](https://rules.sonarsource.com/python/RSPEC-2083): Path Traversal Injection + * [S2078](https://rules.sonarsource.com/python/RSPEC-2078): LDAP Injection + * [S5145](https://rules.sonarsource.com/python/RSPEC-5145): Log Injection + * [S2076](https://rules.sonarsource.com/python/RSPEC-2076): OS Command Injection + * [S5144](https://rules.sonarsource.com/python/RSPEC-5144): Server-Side Request Forgery (SSRF) + * [S2091](https://rules.sonarsource.com/python/RSPEC-2091): XPath Injection + * [S5135](https://rules.sonarsource.com/python/RSPEC-5135): Object Injection + * [S5334](https://rules.sonarsource.com/python/RSPEC-5334): Code Injection [[info]] | The configuration works per rule. There is no way to share configuration between rules. |