-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Dev #39
Dev #39
Conversation
Signed-off-by: Romain Kieffer <[email protected]>
Signed-off-by: Romain Kieffer <[email protected]>
Signed-off-by: Romain Kieffer <[email protected]>
Signed-off-by: Romain Kieffer <[email protected]>
Signed-off-by: Romain Kieffer <[email protected]>
Signed-off-by: Romain Kieffer <[email protected]>
Signed-off-by: Romain Kieffer <[email protected]>
Signed-off-by: Romain Kieffer <[email protected]>
Signed-off-by: Romain Kieffer <[email protected]>
Signed-off-by: Romain Kieffer <[email protected]>
Signed-off-by: Romain Kieffer <[email protected]>
Signed-off-by: Romain Kieffer <[email protected]>
Signed-off-by: Romain Kieffer <[email protected]>
Signed-off-by: Romain Kieffer <[email protected]>
|
||
const href = this.getAttribute('data-href'); | ||
if (href) { | ||
window.location.href = href; |
Check warning
Code scanning / CodeQL
DOM text reinterpreted as HTML Medium
DOM text
results[f"{server}:{port}"] = "TLS not supported" | ||
elif port == 465: | ||
# For 465, it should be SSL/TLS from the start | ||
with context.wrap_socket(sock, server_hostname=server) as ssock: |
Check failure
Code scanning / CodeQL
Use of insecure SSL/TLS version High test
call to ssl.create_default_context
Insecure SSL/TLS protocol version TLSv1_1 allowed by
call to ssl.create_default_context
dict: A dictionary with detailed CSP analysis results. | ||
""" | ||
try: | ||
response = requests.get(f"https://{domain}", timeout=10) |
Check failure
Code scanning / CodeQL
Full server-side request forgery Critical test
user-provided value
|
||
|
||
def check_csp_syntax(csp, result, header_name): | ||
if not re.match(r'^[a-zA-Z0-9\-]+\s+[^;]+(?:;\s*[a-zA-Z0-9\-]+\s+[^;]+)*$', csp): |
Check failure
Code scanning / CodeQL
Inefficient regular expression High test
|
||
|
||
def check_csp_syntax(csp, result, header_name): | ||
if not re.match(r'^[a-zA-Z0-9\-]+\s+[^;]+(?:;\s*[a-zA-Z0-9\-]+\s+[^;]+)*$', csp): |
Check failure
Code scanning / CodeQL
Polynomial regular expression used on uncontrolled data High test
regular expression
user-provided value
This
regular expression
user-provided value
This
regular expression
user-provided value
bool: True if the integrity is valid, False otherwise. | ||
""" | ||
try: | ||
response = requests.get(src, timeout=10) |
Check failure
Code scanning / CodeQL
Full server-side request forgery Critical test
user-provided value
- 'message' (str): Additional information or error message. | ||
""" | ||
try: | ||
response = requests.get(f"https://{domain}", timeout=10) |
Check failure
Code scanning / CodeQL
Full server-side request forgery Critical test
user-provided value
""" | ||
url = f'https://{domain}' | ||
try: | ||
response = requests.get(url, timeout=10) |
Check failure
Code scanning / CodeQL
Full server-side request forgery Critical test
user-provided value
url = f'https://{domain}/.well-known/security.txt' | ||
try: | ||
# First, check if the file exists using HEAD request | ||
head_response = requests.head(url, timeout=10) |
Check failure
Code scanning / CodeQL
Full server-side request forgery Critical test
user-provided value
if head_response.status_code == 200: | ||
# If it exists, attempt to get the content | ||
try: | ||
response = requests.get(url, timeout=10) |
Check failure
Code scanning / CodeQL
Full server-side request forgery Critical test
Generic requirements in order to contribute:
What does it do?
If it fixes an existing issue, please use GitHub syntax:
#<IssueID>
Questions
Release Type: