Module UnsafeDeserializationQuery
Provides a taint-tracking configuration for detecting “code execution from deserialization” vulnerabilities.
Note, for performance reasons: only import this file if
UnsafeDeserialization::Configuration
is needed, otherwise
UnsafeDeserializationCustomizations
should be imported instead.
Import path
import semmle.python.security.dataflow.UnsafeDeserializationQuery
Imports
DataFlow |
Provides a library for local (intra-procedural) and global (inter-procedural) data flow analysis: deciding whether data can flow from a source to a sink. |
TaintTracking |
Provides classes for performing local (intra-procedural) and global (inter-procedural) taint-tracking analyses. |
UnsafeDeserialization |
Provides default sources, sinks and sanitizers for detecting “code execution from deserialization” vulnerabilities, as well as extension points for adding your own. |
Classes
Configuration |
A taint-tracking configuration for detecting “code execution from deserialization” vulnerabilities. |