diff --git a/gradle/validation/forbidden-apis/defaults.all.txt b/gradle/validation/forbidden-apis/defaults.all.txt index 0a81d03e8a3..1e9a706366b 100644 --- a/gradle/validation/forbidden-apis/defaults.all.txt +++ b/gradle/validation/forbidden-apis/defaults.all.txt @@ -58,3 +58,7 @@ java.lang.Float#(double) java.lang.Float#(java.lang.String) java.lang.Double#(double) java.lang.Double#(java.lang.String) + +@defaultMessage Java deserialization is unsafe when the data is untrusted. The java developer is powerless: no checks or casts help, exploitation can happen in places such as clinit or finalize! +java.io.ObjectInputStream +java.io.ObjectOutputStream