Link with unencrypted protocol
Reports the links that use unencrypted protocols (such as HTTP), which can expose your data to man-in-the-middle attacks. These attacks are dangerous in general and may be especially harmful for artifact repositories. Use protocols with encryption, such as HTTPS, instead.
See HTTPS: Difference from HTTP (wikipedia.org).
- By ID
Can be used to locate inspection in e.g. Qodana configuration files, where you can quickly enable or disable it, or adjust its settings.
HttpUrlsUsage
Here you can find the description of settings available for the Link with unencrypted protocol inspection, and the reference of their default values.
- Ignored URLs
[http://localhost, http://127.0.0.1, http://0.0.0.0, http://www.w3.org/, http://json-schema.org/draft, http://java.sun.com/, http://xmlns.jcp.org/, http://javafx.com/javafx/, http://javafx.com/fxml, http://maven.apache.org/xsd/, http://maven.apache.org/POM/, http://www.springframework.org/schema/, http://www.springframework.org/tags, http://www.springframework.org/security/tags, http://www.thymeleaf.org, http://www.jboss.org/j2ee/schema/, http://www.jboss.com/xml/ns/, http://www.ibm.com/webservices/xsd, http://activemq.apache.org/schema/, http://schema.cloudfoundry.org/spring/, http://schemas.xmlsoap.org/, http://cxf.apache.org/schemas/, http://primefaces.org/ui, http://tiles.apache.org/]
Inspection Details | |
---|---|
By default bundled with: | CLion 2024.3, DataSpell 2024.1, GoLand 2024.3, IntelliJ IDEA 2024.3, JetBrains Rider 2024.3, PhpStorm 2024.3, PyCharm 2024.3, Qodana for .NET 2024.3, Qodana for Go 2024.3, Qodana for JS 2024.3, Qodana for JVM 2024.3, Qodana for PHP 2024.3, Qodana for Ruby 2024.3, RubyMine 2024.3, WebStorm 2024.3 |
Can be installed with plugin: | HTTP Client, 241.SNAPSHOT |
Thanks for your feedback!