diff --git a/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S1523.html b/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S1523.html index 67709f77f..41cf92a57 100644 --- a/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S1523.html +++ b/python-checks/src/main/resources/org/sonar/l10n/py/rules/python/S1523.html @@ -8,7 +8,7 @@ href="https://www.owasp.org/index.php/Code_Injection">Injected Code. Such attacks can either run on the server or in the client (exemple: XSS attack) and have a huge impact on an application's security.

This rule marks for review each occurrence of such dynamic code execution. This rule does not detect code injections. It only highlights the use of -APIs which should be used sparingly and very carefully. The goal is to guide security code reviews.

+APIs which should be used sparingly and very carefully.

Ask Yourself Whether

-

This rule raises supports the following libraries:

+

This rule supports the following libraries: