← all rules

code/py-yaml-load

Insecure deserialization: yaml.load without SafeLoader

highCode regexdeserializationCWE-502python

What it detects

yaml.load (without Loader=SafeLoader) deserializes Python objects and can execute code. Use yaml.safe_load.

How it runs

Applied line-by-line via a tagged regex with language-specific gating. Comments are skipped. Designed for high-confidence patterns where AST parsing would be overkill.

Found a false positive or want this rule tuned? File an issue. You can also suppress per-repo via a .repoguardignore line.