Delivering code in production with debug features activated is security-sensitive. It has led in the past to the following vulnerabilities:
An application's debug features enable developers to find bugs more easily and thus facilitate also the work of attackers. It often gives access to detailed information on both the system running the application and users.
You are at risk if you answered yes to any of these questions.
Do not enable debug features on production servers.
Django
from django.conf import settings
settings.configure(DEBUG=True) # Sensitive when set to True
settings.configure(DEBUG_PROPAGATE_EXCEPTIONS=True) # Sensitive when set to True
def custom_config(config):
settings.configure(default_settings=config, DEBUG=True) # Sensitive
Django's "settings.py" or "global_settings.py" configuration file
# NOTE: The following code raises issues only if the file is named "settings.py" or "global_settings.py". This is the default # name of Django configuration file DEBUG = True # Sensitive DEBUG_PROPAGATE_EXCEPTIONS = True # Sensitive