Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove Security Hotspot rules which are not targeting developers #2385

Closed
nicolas-harraudeau-sonarsource opened this issue Apr 16, 2019 · 0 comments · Fixed by #2405
Closed
Assignees
Milestone

Comments

@nicolas-harraudeau-sonarsource

The following rules will be removed:

  • RSPEC-4797 Handling files is security-sensitive
  • RSPEC-4721 Executing OS commands is security-sensitive
  • RSPEC-4825 Sending HTTP requests is security-sensitive (will be replaced by RSPEC-5332 and the taint analysis rules using HTTP requests as sources and sinks)
  • RSPEC-4817 Executing XPath expressions is security-sensitive
  • RSPEC-4529 Exposing HTTP endpoints is security-sensitive
  • RSPEC-1523 Dynamically executing code is security-sensitive (because it only handles introspection, no eval or exec method in C#)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants