1
0
mirror of https://github.com/danog/psalm.git synced 2024-12-02 09:37:59 +01:00
This commit is contained in:
cgocast 2023-11-22 11:10:23 +01:00
parent 5095f4eb85
commit 7be610ef8c
7 changed files with 7 additions and 7 deletions

View File

@ -1,6 +1,6 @@
# TaintedEval
Emitted when user-controlled input can be passed into to an `eval` call.
Emitted when user-controlled input can be passed into an `eval` call.
Passing untrusted user input to `eval` calls is dangerous, as it allows arbitrary data to be executed on your server.

View File

@ -1,6 +1,6 @@
# TaintedHtml
Emitted when user-controlled input that can contain HTML can be passed into to an `echo` statement.
Emitted when user-controlled input that can contain HTML can be passed into an `echo` statement.
## Risk

View File

@ -1,6 +1,6 @@
# TaintedInclude
Emitted when user-controlled input can be passed into to an `include` or `require` expression.
Emitted when user-controlled input can be passed into an `include` or `require` expression.
Passing untrusted user input to `include` calls is dangerous, as it can allow an attacker to execute arbitrary scripts on your server.

View File

@ -1,6 +1,6 @@
# TaintedShell
Emitted when user-controlled input can be passed into to an `exec` call or similar.
Emitted when user-controlled input can be passed into an `exec` call or similar.
```php
<?php

View File

@ -1,6 +1,6 @@
# TaintedSql
Emitted when user-controlled input can be passed into to a SQL command.
Emitted when user-controlled input can be passed into a SQL command.
```php
<?php

View File

@ -1,6 +1,6 @@
# TaintedTextWithQuotes
Emitted when user-controlled input that can contain quotation marks can be passed into to an `echo` statement.
Emitted when user-controlled input that can contain quotation marks can be passed into an `echo` statement.
## Risk

View File

@ -1,6 +1,6 @@
# TaintedXpath
Emitted when user-controlled input can be passed into to a xpath query.
Emitted when user-controlled input can be passed into a xpath query.
```php
<?php