Class RegexInjection::Sink
A sink for “regular expression injection” vulnerabilities is the execution of a regular expression.
If you have a custom way to execute regular expressions, you can extend RegexExecution::Range
.
Import path
import semmle.python.security.dataflow.RegexInjectionCustomizations
Direct supertypes
Indirect supertypes
Fields
Predicates
getRegexExecution | Gets the call that executes the regular expression marked by this sink. |
Inherited predicates
asCfgNode | Gets the control-flow node corresponding to this node, if any. | from Node |
asExpr | Gets the expression corresponding to this node, if any. | from Node |
getALocalSource | Gets a local source node from which data may flow to this node in zero or more local data-flow steps. | from Node |
getEnclosingCallable | Gets the enclosing callable of this node. | from Node |
getLocation | Gets the location of this node | from Node |
getScope | Gets the scope of this node. | from Node |
hasLocationInfo | Holds if this element is at the specified location. The location spans column | from Node |
toString | Gets a textual representation of this element. | from Node |