Inspectopedia Help

Link with unencrypted protocol

Reports the links that use unencrypted protocols (such as HTTP), which can expose your data to man-in-the-middle attacks. These attacks are dangerous in general and may be especially harmful for artifact repositories. Use protocols with encryption, such as HTTPS, instead.

See HTTPS: Difference from HTTP (wikipedia.org).

Inspection options

Option

Type

Default

Ignore comments

Checkbox

true

Ignore URLs with no top-level domain

Checkbox

true

Ignore IP addresses

Checkbox

true

Ignored URLs

StringList

[http://localhost, http://127.0.0.1, http://0.0.0.0, http://www.w3.org/, http://json-schema.org/draft, http://java.sun.com/, http://xmlns.jcp.org/, http://javafx.com/javafx/, http://javafx.com/fxml, http://maven.apache.org/xsd/, http://maven.apache.org/POM/, http://www.springframework.org/schema/, http://www.springframework.org/tags, http://www.springframework.org/security/tags, http://www.thymeleaf.org, http://www.jboss.org/j2ee/schema/, http://www.jboss.com/xml/ns/, http://www.ibm.com/webservices/xsd, http://activemq.apache.org/schema/, http://schema.cloudfoundry.org/spring/, http://schemas.xmlsoap.org/, http://cxf.apache.org/schemas/, http://primefaces.org/ui, http://tiles.apache.org/]

Inspection Details

Available in:

AppCode 2023.3, CLion 2023.3, DataSpell 2023.3, GoLand 2023.3, IntelliJ IDEA 2023.3, JetBrains Rider 2023.1, PhpStorm 2023.3, PyCharm 2023.3, Qodana for .NET 2023.1, Qodana for JS 2023.3, Qodana for JVM 2023.3, Qodana for PHP 2023.3, Qodana for Ruby 2023.3, RubyMine 2023.3, WebStorm 2023.3

Plugin:

HTTP Client, 233.SNAPSHOT

Last modified: 13 July 2023