Le mar. 9 nov. 2021 à 21:01, Jérémy Lal <kapo...@melix.org> a écrit :

>
>
> Le mar. 9 nov. 2021 à 20:55, Felix Lechner <felix.lech...@lease-up.com> a
> écrit :
>
>> Hi Jérémy,
>>
>> On Tue, Nov 9, 2021 at 11:48 AM Jérémy Lal <kapo...@melix.org> wrote:
>> >
>> > Ok, but the potential targets are source code files, like *.c *.cpp,
>> *.js, *.py, *.rb etc...
>
>
>> It was only a stopgap measure. We held a release due to the large
>> number of false positives.
>>
>>
Actually only source code files need to be tested.
Others like
- .po, .pod
- .xml, .html, .xhtml, .svg, .md, .txt,
- copyright, documentation, plain text
can be ignored.
I suppose that also *.ini, *.desktop, *.toml could be ignored, but i'm not
sure.
Maybe for a start, testing only high-level scripts should be done (py, js,
rb).



> Please just let me know what you would like to see, and I will change
>> it again. Have you heard from the security team?
>
>
> No, but as far as i can understand this CVE is difficult to evaluate,
> It's a potential threat against source code... that's about it...
>

Reply via email to