You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Either this is a false positive on function post_to_clbin, or the post_to_0x0 function below is being missed by the analysis despite containing nearly identical code.
I'm not really sure what we're doing in that code actually has anything to do with URL substring sanitization, but what actually bugs me is the reporting inconsistency.
So, the reason there is a difference between the two functions is that ://clbin.com/ is recognised as a probable URL due to the presence of the .com (and various other parts). We do not recognise .st in the same way, and hence we do not match ://0x0.st as a URL. We would recognise it if it were instead something like http://0x0.st.
I think this counts as a false positive. Even though there is matching on URL-like strings going on, these strings are not being used to e.g. redirect to the given URL, and so they are not really unsafe. We'll look into how to fix the query to eliminate these false positives.
Description of the false positive
Either this is a false positive on function
post_to_clbin
, or thepost_to_0x0
function below is being missed by the analysis despite containing nearly identical code.I'm not really sure what we're doing in that code actually has anything to do with URL substring sanitization, but what actually bugs me is the reporting inconsistency.
URL to the alert on the project page on LGTM.com
https://lgtm.com/projects/g/sopel-irc/sopel/snapshot/182754526ebc14910cf4082e664542155d4460d9/files/sopel/modules/help.py?sort=name&dir=ASC&mode=heatmap#x284805de091dcebc:1
The text was updated successfully, but these errors were encountered: