The ssl module for TLS / SSL. SSLContext with verify_mode=CERT_NONE disables certificate validation (MITM risk). _create_unverified_context() is an explicit bypass — finding for any production code. Use create_default_context() for sane defaults.
.create_default_context()._create_unverified_context().wrap_socket()._create_unverified_context()Sinkssl._create_unverified_context() -> SSLContext
Returns a context that skips verification. Always a finding in production code.
.wrap_socket()Sinkssl.wrap_socket(sock, ssl_version=..., cert_reqs=CERT_NONE, ...) -> SSLSocket
Legacy socket wrapping. Finding when cert_reqs=CERT_NONE.
.create_default_context()Sanitizerssl.create_default_context(purpose=Purpose.SERVER_AUTH, ...) -> SSLContext
Creates a context with safe defaults (verify, hostname check). Sanitizer.
return.SSLContext()Neutralssl.SSLContext(protocol=PROTOCOL_TLS) -> SSLContext
TLS context. Finding when .check_hostname is False or .verify_mode is CERT_NONE.
| FQN | Field | |
|---|---|---|
| ssl | fqns[0] |
Wrong FQN → 0 findings. Verify with: change fqns to garbage → must produce 0 results.
from codepathfinder.go_rule import PySsl