diff --git a/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S1523.html b/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S1523.html
index 67709f77f..41cf92a57 100644
--- a/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S1523.html
+++ b/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S1523.html
@@ -8,7 +8,7 @@
href="https://www.owasp.org/index.php/Code_Injection">Injected Code. Such attacks can either run on the server or in the client (exemple: XSS
attack) and have a huge impact on an application's security.
This rule marks for review each occurrence of such dynamic code execution. This rule does not detect code injections. It only highlights the use of
-APIs which should be used sparingly and very carefully. The goal is to guide security code reviews.
+APIs which should be used sparingly and very carefully.
Ask Yourself Whether
- the executed code may come from an untrusted source and hasn't been sanitized.
@@ -46,8 +46,6 @@ Sensitive Code Example
See
diff --git a/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S1523.json b/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S1523.json
index 7cc37a253..f3dc8d6bf 100644
--- a/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S1523.json
+++ b/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S1523.json
@@ -8,8 +8,7 @@
},
"tags": [
"cwe",
- "owasp-a1",
- "owasp-a7"
+ "owasp-a1"
],
"defaultSeverity": "Critical",
"ruleSpecification": "RSPEC-1523",
@@ -21,7 +20,6 @@
470
],
"OWASP": [
- "A7",
"A1"
]
}
diff --git a/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S3626.html b/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S3626.html
index e14fbc411..25cdccb08 100644
--- a/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S3626.html
+++ b/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S3626.html
@@ -6,7 +6,6 @@ Noncompliant Code Example
if x == 1:
print(True)
return # NonCompliant
-}
Compliant Solution
@@ -14,4 +13,21 @@ Compliant Solution
if x == 1:
print(True)
+Exceptions
+
+ - No issue is raised if the jump statement is the only statement of a statement suite:
+
+
+def my_function(x):
+ if x > 5:
+ do_something()
+ elif x == 0:
+ return # ok even it could be changed to "pass"
+ else:
+ do_something_else()
+
+
+ - No issue is raised for
return None
because this was certainly done on purpose to be explicit that a function is really returning
+ None
.
+
diff --git a/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S5439.html b/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S5439.html
index ba49812d0..153357b54 100644
--- a/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S5439.html
+++ b/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S5439.html
@@ -12,7 +12,7 @@
Modify presentation of content
User accounts takeover after disclosure of sensitive information like session cookies or passwords
-This rule raises supports the following libraries:
+This rule supports the following libraries:
- Django Templates
- Jinja2
diff --git a/sonarpedia.json b/sonarpedia.json
index 3bc325d68..382b3787c 100644
--- a/sonarpedia.json
+++ b/sonarpedia.json
@@ -3,7 +3,7 @@
"languages": [
"PY"
],
- "latest-update": "2019-09-27T09:04:56.450672Z",
+ "latest-update": "2019-10-14T09:49:30.490848Z",
"options": {
"no-language-in-filenames": true,
"preserve-filenames": true