Link with unencrypted protocol
Reports the links that use unencrypted protocols (such as HTTP), which can expose your data to man-in-the-middle attacks. These attacks are dangerous in general and may be especially harmful for artifact repositories. Use protocols with encryption, such as HTTPS, instead.
See HTTPS: Difference from HTTP (wikipedia.org).
Inspection options
Here you can find the description of settings available for the Link with unencrypted protocol inspection, and the reference of their default values.
- Ignore comments
Default: Selected
- Ignore URLs with no top-level domain
Default: Selected
- Ignore IP addresses
Default: Selected
- Ignored URLs
[http://localhost, http://127.0.0.1, http://0.0.0.0, http://www.w3.org/, http://json-schema.org/draft, http://java.sun.com/, http://xmlns.jcp.org/, http://javafx.com/javafx/, http://javafx.com/fxml, http://maven.apache.org/xsd/, http://maven.apache.org/POM/, http://www.springframework.org/schema/, http://www.springframework.org/tags, http://www.springframework.org/security/tags, http://www.thymeleaf.org, http://www.jboss.org/j2ee/schema/, http://www.jboss.com/xml/ns/, http://www.ibm.com/webservices/xsd, http://activemq.apache.org/schema/, http://schema.cloudfoundry.org/spring/, http://schemas.xmlsoap.org/, http://cxf.apache.org/schemas/, http://primefaces.org/ui, http://tiles.apache.org/]
Inspection Details | |
---|---|
By default bundled with: | CLion 2024.1, DataSpell 2024.1, GoLand 2024.1, IntelliJ IDEA 2024.1, JetBrains Rider 2023.3, PhpStorm 2024.1, PyCharm 2024.1, Qodana for .NET 2023.3, Qodana for Go 2024.1, Qodana for JS 2024.1, Qodana for JVM 2024.1, Qodana for PHP 2024.1, Qodana for Ruby 2024.1, RubyMine 2024.1, WebStorm 2024.1 |
Can be installed with plugin: | HTTP Client, 241.SNAPSHOT |