From 4da919bed41f14531588d1a5c49c76af5463a526 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?St=C3=A9phane=20Brunner?= Date: Sat, 4 Jan 2025 17:29:38 +0100 Subject: [PATCH] Fix ast.literal_eval --- prospector_profile_duplicated/pylint.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/prospector_profile_duplicated/pylint.yaml b/prospector_profile_duplicated/pylint.yaml index 682ff45..3cce4f8 100644 --- a/prospector_profile_duplicated/pylint.yaml +++ b/prospector_profile_duplicated/pylint.yaml @@ -24,10 +24,10 @@ pyflakes: ruff: disable: - - B307 # Use of possibly insecure function - consider using safer ast.literal_eval [See: https://docs.astral.sh/ruff/rules/suspicious-eval-usage] - B904 # Within an `except` clause, raise exceptions with `raise ... from err` or `raise ... from None` to distinguish them from errors in exception handling [See: https://docs.astral.sh/ruff/rules/raise-without-from-inside-except] - E722 # Do not use bare `except` [See: https://docs.astral.sh/ruff/rules/bare-except] - S110 # `try`-`except`-`pass` detected, consider logging the exception [See: https://docs.astral.sh/ruff/rules/try-except-pass] + - S307 # Use of possibly insecure function - consider using safer ast.literal_eval [See: https://docs.astral.sh/ruff/rules/suspicious-eval-usage] - S602 # `subprocess` call with `shell=True` identified, security issue [See: https://docs.astral.sh/ruff/rules/subprocess-popen-with-shell-equals-true] - S603 # `subprocess` call: check for execution of untrusted input [See: https://docs.astral.sh/ruff/rules/subprocess-without-shell-equals-true] - S607 # Starting a process with a partial executable path [See: https://docs.astral.sh/ruff/rules/start-process-with-partial-path]-