Link with unencrypted protocol
Reports the links that use unencrypted protocols (such as HTTP), which can expose your data to man-in-the-middle attacks. These attacks are dangerous in general and may be especially harmful for artifact repositories. Use protocols with encryption, such as HTTPS, instead.
See HTTPS: Difference from HTTP (wikipedia.org).
Inspection options
Option | Type | Default |
---|---|---|
Ignore comments | Checkbox | true |
Ignore URLs with no top-level domain | Checkbox | true |
Ignore IP addresses | Checkbox | true |
Ignored URLs | StringList | [http://localhost, http://127.0.0.1, http://0.0.0.0, http://www.w3.org/, http://json-schema.org/draft, http://java.sun.com/, http://xmlns.jcp.org/, http://javafx.com/javafx/, http://javafx.com/fxml, http://maven.apache.org/xsd/, http://maven.apache.org/POM/, http://www.springframework.org/schema/, http://www.springframework.org/tags, http://www.springframework.org/security/tags, http://www.thymeleaf.org, http://www.jboss.org/j2ee/schema/, http://www.jboss.com/xml/ns/, http://www.ibm.com/webservices/xsd, http://activemq.apache.org/schema/, http://schema.cloudfoundry.org/spring/, http://schemas.xmlsoap.org/, http://cxf.apache.org/schemas/, http://primefaces.org/ui, http://tiles.apache.org/] |
Inspection Details | |
---|---|
Available in: | AppCode 2023.3, CLion 2023.3, DataSpell 2023.3, GoLand 2023.3, IntelliJ IDEA 2023.3, JetBrains Rider 2023.1, PhpStorm 2023.3, PyCharm 2023.3, Qodana for .NET 2023.1, Qodana for JS 2023.3, Qodana for JVM 2023.3, Qodana for PHP 2023.3, Qodana for Ruby 2023.3, RubyMine 2023.3, WebStorm 2023.3 |
Plugin: | HTTP Client, 233.SNAPSHOT |