use of eval can be insecure This product is not supported for your selected
Datadog site . (
).
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、
お気軽にご連絡ください 。
このルールを試す ID: python-security/no-eval
Language: Python
Severity: Notice
Category: Security
CWE : 94
Related CWEs :
Description eval() is insecure, and passing in unsanitized data could create a vulnerability, as reported by the official Python documentation . Generated code should be controlled as mentioned by CWE-94.
Learn More CWE-94 - Improper Control of Generation of CodeNon-Compliant Code Examples print ( "bla" )
eval ( '[1, 2, 3]' ) # eval() can be unsafe
Compliant Code Examples import foo
foo . eval ( '[1, 2, 3]' )
from ast import literal_eval
print ( "bla" )
literal_eval ( '[1, 2, 3]' )
シームレスな統合。 Datadog Code Security をお試しください