提交 70919bb5 编写于 作者: J Justin Collins

Remove extra 'require' from checks

上级 bada08ac
require 'brakeman/checks/base_check'
require 'brakeman/processors/lib/find_call'
#Check for versions with vulnerable html escape method
#http://groups.google.com/group/rubyonrails-security/browse_thread/thread/56bffb5923ab1195
......
require 'brakeman/checks/base_check'
require 'brakeman/processors/lib/find_call'
#Checks for string interpolation and parameters in calls to
#Kernel#system, Kernel#exec, Kernel#syscall, and inside backticks.
......
require 'brakeman/checks/base_check'
require 'brakeman/processors/lib/find_call'
#Check for filter skipping vulnerability
#http://groups.google.com/group/rubyonrails-security/browse_thread/thread/3420ac71aed312d6
......
require 'brakeman/checks/base_check'
require 'brakeman/processors/lib/find_call'
#Check for cross site scripting vulnerability in mail_to :encode => :javascript
#with certain versions of Rails (< 2.3.11 or < 3.0.4).
......
require 'brakeman/checks/base_check'
require 'brakeman/processors/lib/find_call'
#Check for vulnerability in nested attributes in Rails 2.3.9 and 3.0.0
#http://groups.google.com/group/rubyonrails-security/browse_thread/thread/f9f913d328dafe0c
......
require 'brakeman/checks/base_check'
require 'brakeman/processors/lib/find_call'
#Check for uses of quote_table_name in Rails versions before 2.3.13 and 3.0.10
#http://groups.google.com/group/rubyonrails-security/browse_thread/thread/6a1e473744bc389b
......
require 'brakeman/checks/base_check'
require 'brakeman/processors/lib/find_call'
#Reports any calls to +redirect_to+ which include parameters in the arguments.
#
......
require 'brakeman/checks/base_check'
require 'brakeman/processors/lib/find_call'
#Warn about response splitting in Rails versions before 2.3.13
#http://groups.google.com/group/rubyonrails-security/browse_thread/thread/6ffc93bde0298768
......
require 'brakeman/checks/base_check'
require 'brakeman/processors/lib/find_call'
#This check tests for find calls which do not use Rails' auto SQL escaping
#
......
require 'brakeman/checks/base_check'
require 'brakeman/processors/lib/find_call'
#Checks for uses of strip_tags in Rails versions before 2.3.13 and 3.0.10
#http://groups.google.com/group/rubyonrails-security/browse_thread/thread/2b9130749b74ea12
......
require 'brakeman/checks/base_check'
require 'brakeman/processors/lib/find_call'
#Check for vulnerability in translate() helper that allows cross-site scripting
#http://groups.google.com/group/rubyonrails-security/browse_thread/thread/2b61d70fb73c7cc5
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册