Create Qodana_code_quality.yml #1
Annotations
66 warnings and 9 notices
Catch block may ignore exception:
src/Deprecated/InsertXSSMenu.java#L122
Empty `catch` block
|
Catch block may ignore exception:
src/messageTab/U2C/ChinesePanel.java#L319
Empty `catch` block
|
Catch block may ignore exception:
src/Deprecated/U2CTabFactory.java#L131
Empty `catch` block
|
Catch block may ignore exception:
src/test/RobotInActionListener.java#L46
Empty `catch` block
|
Catch block may ignore exception:
src/test/RobotInActionListener.java#L72
Empty `catch` block
|
|
Constant values:
src/knife/FindUrlAndRequest.java#L24
Condition `url.startsWith("./")` is always `true`
|
Nullability and data flow problems:
src/messageTab/Info/InfoEntry.java#L23
Variable is already assigned to this value
|
Nullability and data flow problems:
src/burp/RobotInput.java#L232
Method invocation `waitFor` may produce `NullPointerException`
|
Statement with empty body:
src/burp/BurpExtender.java#L250
`if` statement has empty body
|
Statement with empty body:
src/messageTab/Info/InfoTableModel.java#L97
`if` statement has empty body
|
Statement with empty body:
src/base/FindUrlAction.java#L74
`if` statement has empty body
|
Statement with empty body:
src/knife/OpenWithBrowserMenu.java#L55
`if` statement has empty body
|
Statement with empty body:
src/config/ConfigTableModel.java#L296
`if` statement has empty body
|
Statement with empty body:
src/base/FindUrlAction.java#L166
`if` statement has empty body
|
Statement with empty body:
src/config/GUI.java#L403
`else` statement has empty body
|
Result of method call ignored:
src/Deprecated/RunSQLMapMenu.java#L189
Result of `File.createNewFile()` is ignored
|
Result of method call ignored:
src/config/GUI.java#L552
Result of `File.createNewFile()` is ignored
|
Result of method call ignored:
src/Deprecated/RunSQLMapMenu.java#L160
Result of `File.createNewFile()` is ignored
|
Result of method call ignored:
src/config/GUI.java#L557
Result of `File.createNewFile()` is ignored
|
Call to 'toString()' on array:
src/Deprecated/JSONBeautifier.java#L95
Call to 'toString()' on array
|
Inner class may be 'static':
src/config/GUI.java#L573
Inner class `JsonFileFilter` may be 'static'
|
Magic constant:
src/burp/Methods.java#L56
Should be one of: JOptionPane.INFORMATION_MESSAGE, JOptionPane.WARNING_MESSAGE, JOptionPane.ERROR_MESSAGE, ...
|
String concatenation in loop:
src/burp/Methods.java#L179
String concatenation `+=` in loop
|
String concatenation in loop:
src/burp/Methods.java#L154
String concatenation `+=` in loop
|
String concatenation in loop:
src/Deprecated/MessageEditor.java#L256
String concatenation `+=` in loop
|
String concatenation in loop:
src/burp/Methods.java#L156
String concatenation `+=` in loop
|
String concatenation as argument to 'StringBuilder.append()' call:
src/Deprecated/RunSQLMapMenu.java#L120
String concatenation as argument to `StringBuilder.append()` call
|
String concatenation as argument to 'StringBuilder.append()' call:
src/Deprecated/RunSQLMapMenu.java#L123
String concatenation as argument to `StringBuilder.append()` call
|
String concatenation as argument to 'StringBuilder.append()' call:
src/Deprecated/RunSQLMapMenu.java#L150
String concatenation as argument to `StringBuilder.append()` call
|
String concatenation as argument to 'StringBuilder.append()' call:
src/Deprecated/RunSQLMapMenu.java#L147
String concatenation as argument to `StringBuilder.append()` call
|
Suspicious date format pattern:
src/Deprecated/DownloadResponseMenu2.java#L202
Uppercase 'YY' (week year) pattern is used: probably 'yy' (year) was intended
|
Suspicious date format pattern:
src/knife/DownloadResponseMenu.java#L201
Uppercase 'YY' (week year) pattern is used: probably 'yy' (year) was intended
|
Suspicious 'System.arraycopy()' call:
src/base/FindUrlAction.java#L308
Source parameter type 'java.lang.Object\[\]' is not assignable to destination parameter `possibleValues` of type 'java.lang.String\[\]'
|
Synchronization on a non-final field:
src/config/ConfigTableModel.java#L316
Synchronization on a non-final field `configEntries`
|
Synchronization on a non-final field:
src/messageTab/Info/InfoTableModel.java#L138
Synchronization on a non-final field `infoEntries`
|
Synchronization on a non-final field:
src/messageTab/Info/InfoTableModel.java#L114
Synchronization on a non-final field `infoEntries`
|
Synchronization on a non-final field:
src/config/ConfigTableModel.java#L371
Synchronization on a non-final field `configEntries`
|
Synchronization on a non-final field:
src/config/ConfigTableModel.java#L341
Synchronization on a non-final field `configEntries`
|
Synchronization on a non-final field:
src/messageTab/Info/InfoTableModel.java#L127
Synchronization on a non-final field `infoEntries`
|
Synchronization on a non-final field:
src/messageTab/Info/InfoTableModel.java#L153
Synchronization on a non-final field `infoEntries`
|
Synchronization on a non-final field:
src/config/ConfigTableModel.java#L330
Synchronization on a non-final field `configEntries`
|
Unused assignment:
src/knife/OpenWithBrowserMenu.java#L171
Variable `source` initializer `null` is redundant
|
Unused assignment:
src/config/ProcessManager.java#L132
Variable `url1` initializer `""` is redundant
|
Unused assignment:
src/knife/OpenWithBrowserMenu.java#L124
Variable `source` initializer `null` is redundant
|
Vulnerable API usage:
src/base/RequestTask.java#L67
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L33
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L47
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L59
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L40
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L66
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L50
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L61
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L55
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L28
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L43
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L25
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L49
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L31
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L45
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L35
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L58
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable API usage:
src/base/RequestTask.java#L63
Vulnerable API usage
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable declared dependency:
pom.xml#L154
Dependency maven:org.beanshell:bsh:2.0b5 is vulnerable
* [CVE-2016-2510](https://devhub.checkmarx.com/cve-details/CVE-2016-2510?utm_source=jetbrains&utm_medium=referral) 8.1 Data Processing Errors vulnerability with High severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable declared dependency:
pom.xml#L161
Provides transitive vulnerable dependency maven:commons-collections:commons-collections:3.2.2
* [Cx78f40514-81ff](https://devhub.checkmarx.com/cve-details/Cx78f40514-81ff?utm_source=jetbrains&utm_medium=referral) 7.5 Uncontrolled Recursion vulnerability with High severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
qodana
Node.js 16 actions are deprecated. Please update the following actions to use Node.js 20: actions/checkout@v3. For more information see: https://github.blog/changelog/2023-09-22-github-actions-transitioning-from-node-16-to-node-20/.
|
Constant values:
src/config/ConfigEntry.java#L392
Value `messageIsRequest` is always 'false'
|
Constant values:
src/burp/BurpExtender.java#L259
Value `messageIsRequest` is always 'true'
|
Constant values:
src/base/FindUrlAction.java#L325
Value `selectedValue` is always 'null'
|
Constant values:
src/burp/BurpExtender.java#L238
Value `messageIsRequest` is always 'true'
|
Constant values:
src/messageTab/Info/InfoTab.java#L72
Value `isRequest` is always 'false'
|
Constant values:
src/burp/BurpExtender.java#L263
Value `messageIsRequest` is always 'true'
|
'if' statement with identical branches:
src/test/render.java#L16
'if' statement can be collapsed
|
Vulnerable declared dependency:
pom.xml#L72
Dependency maven:com.github.kevinsawicki:http-request:6.0 is vulnerable
* [CVE-2019-1010206](https://devhub.checkmarx.com/cve-details/CVE-2019-1010206?utm_source=jetbrains&utm_medium=referral) 5.9 Improper Certificate Validation vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|
Vulnerable declared dependency:
pom.xml#L86
Provides transitive vulnerable dependency maven:com.github.seancfoley:ipaddress:5.3.3
* [CVE-2023-50570](https://devhub.checkmarx.com/cve-details/CVE-2023-50570?utm_source=jetbrains&utm_medium=referral) 5.5 Loop with Unreachable Exit Condition ("Infinite Loop") vulnerability with Medium severity found
Results powered by [Checkmarx](https://checkmarx.com)(c)
|