|
|
|||
File indexing completed on 2026-05-10 08:36:19
0001 //===--- CommandInterpreterCheck.h - clang-tidy------------------*- C++ -*-===// 0002 // 0003 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 0004 // See https://llvm.org/LICENSE.txt for license information. 0005 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 0006 // 0007 //===----------------------------------------------------------------------===// 0008 0009 #ifndef LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_CERT_COMMAND_PROCESSOR_CHECK_H 0010 #define LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_CERT_COMMAND_PROCESSOR_CHECK_H 0011 0012 #include "../ClangTidyCheck.h" 0013 0014 namespace clang::tidy::cert { 0015 0016 /// Execution of a command processor can lead to security vulnerabilities, 0017 /// and is generally not required. Instead, prefer to launch executables 0018 /// directly via mechanisms that give you more control over what executable is 0019 /// actually launched. 0020 /// 0021 /// For the user-facing documentation see: 0022 /// http://clang.llvm.org/extra/clang-tidy/checks/cert/env33-c.html 0023 class CommandProcessorCheck : public ClangTidyCheck { 0024 public: 0025 CommandProcessorCheck(StringRef Name, ClangTidyContext *Context) 0026 : ClangTidyCheck(Name, Context) {} 0027 void registerMatchers(ast_matchers::MatchFinder *Finder) override; 0028 void check(const ast_matchers::MatchFinder::MatchResult &Result) override; 0029 }; 0030 0031 } // namespace clang::tidy::cert 0032 0033 #endif // LLVM_CLANG_TOOLS_EXTRA_CLANG_TIDY_CERT_COMMAND_PROCESSOR_CHECK_H
| [ Source navigation ] | [ Diff markup ] | [ Identifier search ] | [ general search ] |
|
This page was automatically generated by the 2.3.7 LXR engine. The LXR team |
|