Module UnsafeDeserializationQuery
Provides a taint-tracking configuration for detecting “code execution from deserialization” vulnerabilities.
Note, for performance reasons: only import this file if
UnsafeDeserialization::Configuration is needed, otherwise
UnsafeDeserializationCustomizations should be imported instead.
Import path
import semmle.python.security.dataflow.UnsafeDeserializationQueryImports
| DataFlow | Provides a library for local (intra-procedural) and global (inter-procedural) data flow analysis: deciding whether data can flow from a source to a sink. |
| TaintTracking | Provides classes for performing local (intra-procedural) and global (inter-procedural) taint-tracking analyses. |
| UnsafeDeserialization | Provides default sources, sinks and sanitizers for detecting “code execution from deserialization” vulnerabilities, as well as extension points for adding your own. |
Aliases
| UnsafeDeserializationFlow | Global taint-tracking for detecting “code execution from deserialization” vulnerabilities. |