| rules: |
| - id: frappe-codeinjection-eval |
| patterns: |
| - pattern-not: eval("...") |
| - pattern: eval(...) |
| message: | |
| Detected the use of eval(). eval() can be dangerous if used to evaluate |
| dynamic content. Avoid it or use safe_eval(). |
| languages: [python] |
| severity: ERROR |
| |
| - id: frappe-sqli-format-strings |
| patterns: |
| - pattern-inside: | |
| @frappe.whitelist() |
| def $FUNC(...): |
| ... |
| - pattern-either: |
| - pattern: frappe.db.sql("..." % ...) |
| - pattern: frappe.db.sql(f"...", ...) |
| - pattern: frappe.db.sql("...".format(...), ...) |
| message: | |
| Detected use of raw string formatting for SQL queries. This can lead to sql injection vulnerabilities. Refer security guidelines - https://github.com/frappe/erpnext/wiki/Code-Security-Guidelines |
| languages: [python] |
| severity: WARNING |