Module UnsafeDeserializationQuery
Provides a taint-tracking configuration for detecting “code execution from deserialization” vulnerabilities.
Note, for performance reasons: only import this file if
UnsafeDeserialization::Configuration
is needed, otherwise
UnsafeDeserializationCustomizations
should be imported instead.
Import path
import semmle.python.security.dataflow.UnsafeDeserializationQuery
Imports
DataFlow | Provides a library for local (intra-procedural) and global (inter-procedural) data flow analysis: deciding whether data can flow from a source to a sink. |
TaintTracking | Provides classes for performing local (intra-procedural) and global (inter-procedural) taint-tracking analyses. |
UnsafeDeserialization | Provides default sources, sinks and sanitizers for detecting “code execution from deserialization” vulnerabilities, as well as extension points for adding your own. |
Aliases
UnsafeDeserializationFlow | Global taint-tracking for detecting “code execution from deserialization” vulnerabilities. |