Module StackTraceExposureQuery
Provides a taint-tracking configuration for detecting “stack trace exposure” vulnerabilities.
Note, for performance reasons: only import this file if
StackTraceExposure::Configuration
is needed, otherwise
StackTraceExposureCustomizations
should be imported instead.
Import path
import semmle.python.security.dataflow.StackTraceExposureQuery
Imports
DataFlow | Provides a library for local (intra-procedural) and global (inter-procedural) data flow analysis: deciding whether data can flow from a source to a sink. |
StackTraceExposure | Provides default sources, sinks and sanitizers for detecting “stack trace exposure” vulnerabilities, as well as extension points for adding your own. |
TaintTracking | Provides classes for performing local (intra-procedural) and global (inter-procedural) taint-tracking analyses. |
Classes
Configuration | DEPRECATED: Use |
Aliases
StackTraceExposureFlow | Global taint-tracking for detecting “stack trace exposure” vulnerabilities. |