We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent af23fb0 commit c0ef675Copy full SHA for c0ef675
pyt/vulnerabilities/vulnerabilities.py
@@ -336,11 +336,15 @@ def how_vulnerable(
336
return VulnerabilityType.FALSE
337
elif interactive:
338
user_says = input(
339
- 'Is the return value of {} with tainted argument "{}" vulnerable? (Y/n)'.format(
+ 'Is the return value of {} with tainted argument "{}" vulnerable? ([Y]es/[N]o/[S]top)'.format(
340
current_node.label,
341
chain[i - 1].left_hand_side
342
)
343
).lower()
344
+ if user_says.startswith('s'):
345
+ interactive = False
346
+ vuln_deets['unknown_assignment'] = current_node
347
+ return VulnerabilityType.UNKNOWN
348
if user_says.startswith('n'):
349
blackbox_mapping['does_not_propagate'].append(current_node.func_name)
350
AltStyle によって変換されたページ (->オリジナル) / アドレス: モード: デフォルト 音声ブラウザ ルビ付き 配色反転 文字拡大 モバイル
0 commit comments