use of eval can be insecure

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Metadata

ID: python-security/no-eval

Language: Python

Severity: Notice

Category: Security

CWE: 94

Description

eval() is insecure, and passing in unsanitized data could create a vulnerability, as reported by the official Python documentation. Generated code should be controlled as mentioned by CWE-94.

Learn More

  • CWE-94 - Improper Control of Generation of Code

Non-Compliant Code Examples

print("bla")
eval('[1, 2, 3]') # eval() can be unsafe

Compliant Code Examples

import foo
foo.eval('[1, 2, 3]')
from ast import literal_eval
print("bla")
literal_eval('[1, 2, 3]')
https://static.datadoghq.com/static/images/logos/github_avatar.svg https://static.datadoghq.com/static/images/logos/vscode_avatar.svg jetbrains

Seamless integrations. Try Datadog Code Analysis

PREVIEWING: mervebolat/span-id-preprocessing