CodeQL library for Python
codeql/python-all 0.11.14 (changelog, source)
Search

Module UnsafeDeserializationQuery

Provides a taint-tracking configuration for detecting “code execution from deserialization” vulnerabilities.

Note, for performance reasons: only import this file if UnsafeDeserialization::Configuration is needed, otherwise UnsafeDeserializationCustomizations should be imported instead.

Import path

import semmle.python.security.dataflow.UnsafeDeserializationQuery

Imports

DataFlow

Provides a library for local (intra-procedural) and global (inter-procedural) data flow analysis: deciding whether data can flow from a source to a sink.

TaintTracking

Provides classes for performing local (intra-procedural) and global (inter-procedural) taint-tracking analyses.

UnsafeDeserialization

Provides default sources, sinks and sanitizers for detecting “code execution from deserialization” vulnerabilities, as well as extension points for adding your own.

Classes

Configuration

DEPRECATED: Use UnsafeDeserializationFlow module instead.

Aliases

UnsafeDeserializationFlow

Global taint-tracking for detecting “code execution from deserialization” vulnerabilities.