1
0
mirror of https://github.com/danog/psalm.git synced 2024-12-03 10:07:52 +01:00
This commit is contained in:
cgocast 2023-11-22 11:10:23 +01:00
parent 5095f4eb85
commit 7be610ef8c
7 changed files with 7 additions and 7 deletions

View File

@ -1,6 +1,6 @@
# TaintedEval # TaintedEval
Emitted when user-controlled input can be passed into to an `eval` call. Emitted when user-controlled input can be passed into an `eval` call.
Passing untrusted user input to `eval` calls is dangerous, as it allows arbitrary data to be executed on your server. Passing untrusted user input to `eval` calls is dangerous, as it allows arbitrary data to be executed on your server.

View File

@ -1,6 +1,6 @@
# TaintedHtml # TaintedHtml
Emitted when user-controlled input that can contain HTML can be passed into to an `echo` statement. Emitted when user-controlled input that can contain HTML can be passed into an `echo` statement.
## Risk ## Risk

View File

@ -1,6 +1,6 @@
# TaintedInclude # TaintedInclude
Emitted when user-controlled input can be passed into to an `include` or `require` expression. Emitted when user-controlled input can be passed into an `include` or `require` expression.
Passing untrusted user input to `include` calls is dangerous, as it can allow an attacker to execute arbitrary scripts on your server. Passing untrusted user input to `include` calls is dangerous, as it can allow an attacker to execute arbitrary scripts on your server.

View File

@ -1,6 +1,6 @@
# TaintedShell # TaintedShell
Emitted when user-controlled input can be passed into to an `exec` call or similar. Emitted when user-controlled input can be passed into an `exec` call or similar.
```php ```php
<?php <?php

View File

@ -1,6 +1,6 @@
# TaintedSql # TaintedSql
Emitted when user-controlled input can be passed into to a SQL command. Emitted when user-controlled input can be passed into a SQL command.
```php ```php
<?php <?php

View File

@ -1,6 +1,6 @@
# TaintedTextWithQuotes # TaintedTextWithQuotes
Emitted when user-controlled input that can contain quotation marks can be passed into to an `echo` statement. Emitted when user-controlled input that can contain quotation marks can be passed into an `echo` statement.
## Risk ## Risk

View File

@ -1,6 +1,6 @@
# TaintedXpath # TaintedXpath
Emitted when user-controlled input can be passed into to a xpath query. Emitted when user-controlled input can be passed into a xpath query.
```php ```php
<?php <?php