diff options
author | michaelbirnstiehl <michael.birnstiehl@sonarsource.com> | 2020-06-22 12:06:32 -0500 |
---|---|---|
committer | sonartech <sonartech@sonarsource.com> | 2020-06-23 20:04:36 +0000 |
commit | 4d7129d0e279333fb64f7d57be5e8f6863906bdb (patch) | |
tree | a63f91c9334556268b3a415ac25d6d6039a04ab0 /server/sonar-docs/src | |
parent | 8916a6f74145eaa347ca808f2a5f60628b3e9dec (diff) | |
download | sonarqube-4d7129d0e279333fb64f7d57be5e8f6863906bdb.tar.gz sonarqube-4d7129d0e279333fb64f7d57be5e8f6863906bdb.zip |
SONAR-13560 Add Python Rules S5131 and S2631 to Security Engine Docs
Diffstat (limited to 'server/sonar-docs/src')
-rw-r--r-- | server/sonar-docs/src/pages/analysis/security_configuration.md | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/server/sonar-docs/src/pages/analysis/security_configuration.md b/server/sonar-docs/src/pages/analysis/security_configuration.md index 692c9e99b93..6af08e11e5d 100644 --- a/server/sonar-docs/src/pages/analysis/security_configuration.md +++ b/server/sonar-docs/src/pages/analysis/security_configuration.md @@ -45,6 +45,7 @@ The `RuleRepository` value can be one of the following: * `javasecurity`: if you want to customize the Java Security Engine * `phpsecurity`: if you want to customize the PHP Security Engine * `roslyn.sonaranalyzer.security.cs`: if you want to customize the C# Security Engine +* `pythonsecurity`: if you want to customize the Python Security Engine The `RuleKey` value can be one of the following: * For Java @@ -90,12 +91,14 @@ The `RuleKey` value can be one of the following: * [S2091](https://rules.sonarsource.com/csharp/RSPEC-2091): XPath Injection * For Python * [S3649](https://rules.sonarsource.com/python/RSPEC-3649): SQL Injection + * [S5131](https://rules.sonarsource.com/python/RSPEC-5131): XSS * [S5146](https://rules.sonarsource.com/python/RSPEC-5146): Open Redirect * [S5167](https://rules.sonarsource.com/python/RSPEC-5167): HTTP Response Splitting * [S2083](https://rules.sonarsource.com/python/RSPEC-2083): Path Traversal Injection * [S2078](https://rules.sonarsource.com/python/RSPEC-2078): LDAP Injection * [S5145](https://rules.sonarsource.com/python/RSPEC-5145): Log Injection * [S2076](https://rules.sonarsource.com/python/RSPEC-2076): OS Command Injection + * [S2631](https://rules.sonarsource.com/python/RSPEC-2631): RegExp Injection * [S5144](https://rules.sonarsource.com/python/RSPEC-5144): Server-Side Request Forgery (SSRF) * [S2091](https://rules.sonarsource.com/python/RSPEC-2091): XPath Injection * [S5135](https://rules.sonarsource.com/python/RSPEC-5135): Object Injection |