@@ -93,9 +93,9 @@ ignore = [
93
93
" S101" , # todo: Use of `assert` detected
94
94
" S105" , " S106" , " S107" , # todo: Possible hardcoded password: ...
95
95
" S113" , # todo: Probable use of requests call without timeout
96
- " S301" , # todo: `pickle` and modules that wrap it can be unsafe when used to deserialize untrusted data, possible security issue
97
- " S324" , # todo: Probable use of insecure hash functions in `hashlib`
98
- " S403" , # todo: `pickle`, `cPickle`, `dill`, and `shelve` modules are possibly insecure
96
+ # "S301", # todo: `pickle` and modules that wrap it can be unsafe when used to deserialize untrusted data, possible security issue
97
+ # "S324", # todo: Probable use of insecure hash functions in `hashlib`
98
+ # "S403", # todo: `pickle`, `cPickle`, `dill`, and `shelve` modules are possibly insecure
99
99
" S404" , # todo: `subprocess` module is possibly insecure
100
100
" S602" , # todo: `subprocess` call with `shell=True` identified, security issue
101
101
" S603" , # todo: `subprocess` call: check for execution of untrusted input
@@ -106,20 +106,20 @@ ignore = [
106
106
]
107
107
"tests/**" = [
108
108
" S101" , # Use of `assert` detected
109
- " S105" , " S106" , # todo: Possible hardcoded password: ...
109
+ # "S105", "S106", # todo: Possible hardcoded password: ...
110
110
" S301" , # `pickle` and modules that wrap it can be unsafe when used to deserialize untrusted data, possible security issue
111
- " S113" , # todo: Probable use of requests call without timeout
111
+ # "S113", # todo: Probable use of requests call without timeout
112
112
" S311" , # todo: Standard pseudo-random generators are not suitable for cryptographic purposes
113
113
" S108" , # todo: Probable insecure usage of temporary file or directory: "/tmp/sys-customizations-sync"
114
- " S202" , # Uses of `tarfile.extractall()`
114
+ # "S202", # Uses of `tarfile.extractall()`
115
115
" S403" , # `pickle`, `cPickle`, `dill`, and `shelve` modules are possibly insecure
116
116
" S404" , # `subprocess` module is possibly insecure
117
117
" S602" , # todo: `subprocess` call with `shell=True` identified, security issue
118
118
" S603" , # todo: `subprocess` call: check for execution of untrusted input
119
119
" S605" , # todo: Starting a process with a shell: seems safe, but may be changed in the future; consider rewriting without `shell`
120
120
" S607" , # todo: Starting a process with a partial executable path
121
- " RET504" , # todo:Unnecessary variable assignment before `return` statement
122
- " PT004" , # todo: Fixture `tmpdir_unittest_fixture` does not return anything, add leading underscore
121
+ # "RET504", # todo:Unnecessary variable assignment before `return` statement
122
+ # "PT004", # todo: Fixture `tmpdir_unittest_fixture` does not return anything, add leading underscore
123
123
" PT012" , # todo: `pytest.raises()` block should contain a single simple statement
124
124
" PT019" , # todo: Fixture `_` without value is injected as parameter, use `@pytest.mark.usefixtures` instead
125
125
]
0 commit comments