Query
Relevant PR: github/codeql#5442
Report
Constructing regular expressions directly from tainted data enables attackers to craft regular expressions in order to cause a Denial of Service or change the behaviour of the application depending on the matched string.
This query identifies cases in which a regular expression is used without being escaped before by re.escape (see python re documentation).
Result(s)
Query
Relevant PR: github/codeql#5442
Report
Constructing regular expressions directly from tainted data enables attackers to craft regular expressions in order to cause a Denial of Service or change the behaviour of the application depending on the matched string.
This query identifies cases in which a regular expression is used without being escaped before by
re.escape(see python re documentation).Result(s)