aboutsummaryrefslogtreecommitdiffstats
path: root/server/sonar-docs/src
diff options
context:
space:
mode:
authormichaelbirnstiehl <michael.birnstiehl@sonarsource.com>2020-06-22 12:06:32 -0500
committersonartech <sonartech@sonarsource.com>2020-06-23 20:04:36 +0000
commit4d7129d0e279333fb64f7d57be5e8f6863906bdb (patch)
treea63f91c9334556268b3a415ac25d6d6039a04ab0 /server/sonar-docs/src
parent8916a6f74145eaa347ca808f2a5f60628b3e9dec (diff)
downloadsonarqube-4d7129d0e279333fb64f7d57be5e8f6863906bdb.tar.gz
sonarqube-4d7129d0e279333fb64f7d57be5e8f6863906bdb.zip
SONAR-13560 Add Python Rules S5131 and S2631 to Security Engine Docs
Diffstat (limited to 'server/sonar-docs/src')
-rw-r--r--server/sonar-docs/src/pages/analysis/security_configuration.md3
1 files changed, 3 insertions, 0 deletions
diff --git a/server/sonar-docs/src/pages/analysis/security_configuration.md b/server/sonar-docs/src/pages/analysis/security_configuration.md
index 692c9e99b93..6af08e11e5d 100644
--- a/server/sonar-docs/src/pages/analysis/security_configuration.md
+++ b/server/sonar-docs/src/pages/analysis/security_configuration.md
@@ -45,6 +45,7 @@ The `RuleRepository` value can be one of the following:
* `javasecurity`: if you want to customize the Java Security Engine
* `phpsecurity`: if you want to customize the PHP Security Engine
* `roslyn.sonaranalyzer.security.cs`: if you want to customize the C# Security Engine
+* `pythonsecurity`: if you want to customize the Python Security Engine
The `RuleKey` value can be one of the following:
* For Java
@@ -90,12 +91,14 @@ The `RuleKey` value can be one of the following:
* [S2091](https://rules.sonarsource.com/csharp/RSPEC-2091): XPath Injection
* For Python
* [S3649](https://rules.sonarsource.com/python/RSPEC-3649): SQL Injection
+ * [S5131](https://rules.sonarsource.com/python/RSPEC-5131): XSS
* [S5146](https://rules.sonarsource.com/python/RSPEC-5146): Open Redirect
* [S5167](https://rules.sonarsource.com/python/RSPEC-5167): HTTP Response Splitting
* [S2083](https://rules.sonarsource.com/python/RSPEC-2083): Path Traversal Injection
* [S2078](https://rules.sonarsource.com/python/RSPEC-2078): LDAP Injection
* [S5145](https://rules.sonarsource.com/python/RSPEC-5145): Log Injection
* [S2076](https://rules.sonarsource.com/python/RSPEC-2076): OS Command Injection
+ * [S2631](https://rules.sonarsource.com/python/RSPEC-2631): RegExp Injection
* [S5144](https://rules.sonarsource.com/python/RSPEC-5144): Server-Side Request Forgery (SSRF)
* [S2091](https://rules.sonarsource.com/python/RSPEC-2091): XPath Injection
* [S5135](https://rules.sonarsource.com/python/RSPEC-5135): Object Injection