agent-security-scanner-mcp 2.0.7 → 3.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +10 -1
- package/package.json +2 -2
- package/rules/c/lang/correctness/c-string-equality.yaml +18 -0
- package/rules/c/lang/correctness/goto-fail.yaml +13 -0
- package/rules/c/lang/correctness/incorrect-use-ato-fn.yaml +19 -0
- package/rules/c/lang/correctness/incorrect-use-sscanf-fn.yaml +21 -0
- package/rules/c/lang/security/double-free.yaml +45 -0
- package/rules/c/lang/security/function-use-after-free.yaml +44 -0
- package/rules/c/lang/security/info-leak-on-non-formatted-string.yaml +23 -0
- package/rules/c/lang/security/insecure-use-gets-fn.yaml +21 -0
- package/rules/c/lang/security/insecure-use-memset.yaml +36 -0
- package/rules/c/lang/security/insecure-use-printf-fn.yaml +44 -0
- package/rules/c/lang/security/insecure-use-scanf-fn.yaml +22 -0
- package/rules/c/lang/security/insecure-use-strcat-fn.yaml +25 -0
- package/rules/c/lang/security/insecure-use-string-copy-fn.yaml +29 -0
- package/rules/c/lang/security/insecure-use-strtok-fn.yaml +24 -0
- package/rules/c/lang/security/random-fd-exhaustion.yaml +39 -0
- package/rules/c/lang/security/use-after-free.yaml +39 -0
- package/rules/csharp/dotnet/security/audit/ldap-injection.yaml +44 -0
- package/rules/csharp/dotnet/security/audit/mass-assignment.yaml +51 -0
- package/rules/csharp/dotnet/security/audit/misconfigured-lockout-option.yaml +36 -0
- package/rules/csharp/dotnet/security/audit/missing-or-broken-authorization.yaml +60 -0
- package/rules/csharp/dotnet/security/audit/open-directory-listing.yaml +36 -0
- package/rules/csharp/dotnet/security/audit/razor-use-of-htmlstring.yaml +36 -0
- package/rules/csharp/dotnet/security/audit/xpath-injection.yaml +37 -0
- package/rules/csharp/dotnet/security/mvc-missing-antiforgery.yaml +51 -0
- package/rules/csharp/dotnet/security/net-webconfig-debug.yaml +35 -0
- package/rules/csharp/dotnet/security/net-webconfig-trace-enabled.yaml +32 -0
- package/rules/csharp/dotnet/security/razor-template-injection.yaml +38 -0
- package/rules/csharp/dotnet/security/use_deprecated_cipher_algorithm.yaml +32 -0
- package/rules/csharp/dotnet/security/use_ecb_mode.yaml +40 -0
- package/rules/csharp/dotnet/security/use_weak_rng_for_keygeneration.yaml +49 -0
- package/rules/csharp/dotnet/security/use_weak_rsa_encryption_padding.yaml +29 -0
- package/rules/csharp/dotnet/security/web-config-insecure-cookie-settings.yaml +43 -0
- package/rules/csharp/lang/best-practice/structured-logging.yaml +50 -0
- package/rules/csharp/lang/correctness/double/double-epsilon-equality.yaml +34 -0
- package/rules/csharp/lang/correctness/regioninfo/regioninfo-interop.yaml +37 -0
- package/rules/csharp/lang/correctness/sslcertificatetrust/sslcertificatetrust-handshake-no-trust.yaml +23 -0
- package/rules/csharp/lang/security/ad/jwt-tokenvalidationparameters-no-expiry-validation.yaml +45 -0
- package/rules/csharp/lang/security/cryptography/X509-subject-name-validation.yaml +74 -0
- package/rules/csharp/lang/security/cryptography/X509Certificate2-privkey.yaml +39 -0
- package/rules/csharp/lang/security/cryptography/unsigned-security-token.yaml +32 -0
- package/rules/csharp/lang/security/filesystem/unsafe-path-combine.yaml +61 -0
- package/rules/csharp/lang/security/http/http-listener-wildcard-bindings.yaml +35 -0
- package/rules/csharp/lang/security/injections/os-command.yaml +94 -0
- package/rules/csharp/lang/security/insecure-deserialization/binary-formatter.yaml +35 -0
- package/rules/csharp/lang/security/insecure-deserialization/data-contract-resolver.yaml +30 -0
- package/rules/csharp/lang/security/insecure-deserialization/fast-json.yaml +37 -0
- package/rules/csharp/lang/security/insecure-deserialization/fs-pickler.yaml +34 -0
- package/rules/csharp/lang/security/insecure-deserialization/insecure-typefilterlevel-full.yaml +49 -0
- package/rules/csharp/lang/security/insecure-deserialization/javascript-serializer.yaml +34 -0
- package/rules/csharp/lang/security/insecure-deserialization/los-formatter.yaml +36 -0
- package/rules/csharp/lang/security/insecure-deserialization/net-data-contract.yaml +36 -0
- package/rules/csharp/lang/security/insecure-deserialization/newtonsoft.yaml +46 -0
- package/rules/csharp/lang/security/insecure-deserialization/soap-formatter.yaml +36 -0
- package/rules/csharp/lang/security/memory/memory-marshal-create-span.yaml +30 -0
- package/rules/csharp/lang/security/missing-hsts-header.yaml +53 -0
- package/rules/csharp/lang/security/open-redirect.yaml +48 -0
- package/rules/csharp/lang/security/regular-expression-dos/regular-expression-dos-infinite-timeout.yaml +39 -0
- package/rules/csharp/lang/security/regular-expression-dos/regular-expression-dos.yaml +53 -0
- package/rules/csharp/lang/security/sqli/csharp-sqli.yaml +65 -0
- package/rules/csharp/lang/security/ssrf/http-client.yaml +67 -0
- package/rules/csharp/lang/security/ssrf/rest-client.yaml +45 -0
- package/rules/csharp/lang/security/ssrf/web-client.yaml +85 -0
- package/rules/csharp/lang/security/ssrf/web-request.yaml +60 -0
- package/rules/csharp/lang/security/stacktrace-disclosure.yaml +37 -0
- package/rules/csharp/lang/security/xxe/xmldocument-unsafe-parser-override.yaml +44 -0
- package/rules/csharp/lang/security/xxe/xmlreadersettings-unsafe-parser-override.yaml +44 -0
- package/rules/csharp/lang/security/xxe/xmltextreader-unsafe-defaults.yaml +45 -0
- package/rules/csharp/razor/security/html-raw-json.yaml +34 -0
- package/rules/generic/bicep/security/secure-parameter-for-secrets.yaml +36 -0
- package/rules/generic/ci/audit/changed-semgrepignore.yaml +24 -0
- package/rules/generic/ci/security/bash-reverse-shell.yaml +32 -0
- package/rules/generic/dockerfile/best-practice/missing-yum-clean-all.yaml +22 -0
- package/rules/generic/dockerfile/best-practice/use-absolute-workdir.yaml +35 -0
- package/rules/generic/dockerfile/correctness/alias-must-be-unique.yaml +40 -0
- package/rules/generic/dockerfile/correctness/copy-from-own-alias.yaml +33 -0
- package/rules/generic/dockerfile/correctness/multiple-cmd-instructions.yaml +54 -0
- package/rules/generic/dockerfile/missing-zypper-no-confirm-switch.yaml +25 -0
- package/rules/generic/gradle/security/build-gradle-password-hardcoded.yaml +39 -0
- package/rules/generic/html-templates/security/unquoted-attribute-var.yaml +41 -0
- package/rules/generic/html-templates/security/var-in-href.yaml +53 -0
- package/rules/generic/html-templates/security/var-in-script-src.yaml +46 -0
- package/rules/generic/html-templates/security/var-in-script-tag.yaml +47 -0
- package/rules/generic/hugo/best-practice/invalid-base-url.yaml +16 -0
- package/rules/generic/hugo/best-practice/localhost-base-url.yaml +14 -0
- package/rules/generic/nginx/security/alias-path-traversal.yaml +51 -0
- package/rules/generic/nginx/security/dynamic-proxy-host.yaml +36 -0
- package/rules/generic/nginx/security/dynamic-proxy-scheme.yaml +34 -0
- package/rules/generic/nginx/security/header-injection.yaml +39 -0
- package/rules/generic/nginx/security/header-redefinition.yaml +47 -0
- package/rules/generic/nginx/security/insecure-redirect.yaml +39 -0
- package/rules/generic/nginx/security/insecure-ssl-version.yaml +39 -0
- package/rules/generic/nginx/security/missing-internal.yaml +53 -0
- package/rules/generic/nginx/security/missing-ssl-version.yaml +37 -0
- package/rules/generic/nginx/security/possible-h2c-smuggling.yaml +61 -0
- package/rules/generic/nginx/security/request-host-used.yaml +36 -0
- package/rules/generic/unicode/security/bidi.yml +58 -0
- package/rules/generic/visualforce/security/ncino/html/UseSRIForCDNs.yaml +50 -0
- package/rules/generic/visualforce/security/ncino/vf/XSSFromUnescapedURLParam.yaml +48 -0
- package/rules/generic/visualforce/security/ncino/xml/CSPHeaderAttribute.yaml +36 -0
- package/rules/generic/visualforce/security/ncino/xml/VisualForceAPIVersion.yaml +36 -0
- package/rules/go/aws-lambda/security/database-sqli.yaml +63 -0
- package/rules/go/aws-lambda/security/tainted-sql-string.yaml +69 -0
- package/rules/go/gorilla/security/audit/handler-assignment-from-multiple-sources.yaml +48 -0
- package/rules/go/gorilla/security/audit/session-cookie-missing-httponly.yaml +40 -0
- package/rules/go/gorilla/security/audit/session-cookie-missing-secure.yaml +39 -0
- package/rules/go/gorilla/security/audit/session-cookie-samesitenone.yaml +37 -0
- package/rules/go/gorilla/security/audit/websocket-missing-origin-check.yaml +40 -0
- package/rules/go/gorm/security/audit/gorm-dangerous-methods-usage.yaml +70 -0
- package/rules/go/grpc/security/grpc-client-insecure-connection.yaml +34 -0
- package/rules/go/grpc/security/grpc-server-insecure-connection.yaml +44 -0
- package/rules/go/jwt-go/security/audit/jwt-parse-unverified.yaml +33 -0
- package/rules/go/jwt-go/security/jwt-none-alg.yaml +40 -0
- package/rules/go/jwt-go/security/jwt.yaml +43 -0
- package/rules/go/lang/best-practice/channel-guarded-with-mutex.yaml +22 -0
- package/rules/go/lang/best-practice/hidden-goroutine.yaml +27 -0
- package/rules/go/lang/correctness/looppointer.yaml +29 -0
- package/rules/go/lang/correctness/overflow/overflow.yaml +39 -0
- package/rules/go/lang/correctness/permissions/file_permission.yaml +31 -0
- package/rules/go/lang/correctness/use-filepath-join.yaml +50 -0
- package/rules/go/lang/correctness/useless-eqeq.yaml +31 -0
- package/rules/go/lang/maintainability/useless-ifelse.yaml +33 -0
- package/rules/go/lang/security/audit/crypto/bad_imports.yaml +33 -0
- package/rules/go/lang/security/audit/crypto/insecure_ssh.yaml +30 -0
- package/rules/go/lang/security/audit/crypto/math_random.yaml +41 -0
- package/rules/go/lang/security/audit/crypto/missing-ssl-minversion.yaml +39 -0
- package/rules/go/lang/security/audit/crypto/sha224-hash.yaml +45 -0
- package/rules/go/lang/security/audit/crypto/ssl.yaml +31 -0
- package/rules/go/lang/security/audit/crypto/tls.yaml +61 -0
- package/rules/go/lang/security/audit/crypto/use_of_weak_crypto.yaml +132 -0
- package/rules/go/lang/security/audit/crypto/use_of_weak_rsa_key.yaml +36 -0
- package/rules/go/lang/security/audit/dangerous-command-write.yaml +49 -0
- package/rules/go/lang/security/audit/dangerous-exec-cmd.yaml +86 -0
- package/rules/go/lang/security/audit/dangerous-exec-command.yaml +62 -0
- package/rules/go/lang/security/audit/dangerous-syscall-exec.yaml +98 -0
- package/rules/go/lang/security/audit/database/string-formatted-query.yaml +108 -0
- package/rules/go/lang/security/audit/md5-used-as-password.yaml +44 -0
- package/rules/go/lang/security/audit/net/bind_all.yaml +31 -0
- package/rules/go/lang/security/audit/net/cookie-missing-httponly.yaml +41 -0
- package/rules/go/lang/security/audit/net/cookie-missing-secure.yaml +40 -0
- package/rules/go/lang/security/audit/net/dynamic-httptrace-clienttrace.yaml +39 -0
- package/rules/go/lang/security/audit/net/formatted-template-string.yaml +56 -0
- package/rules/go/lang/security/audit/net/fs-directory-listing.yaml +49 -0
- package/rules/go/lang/security/audit/net/pprof.yaml +40 -0
- package/rules/go/lang/security/audit/net/unescaped-data-in-htmlattr.yaml +54 -0
- package/rules/go/lang/security/audit/net/unescaped-data-in-js.yaml +54 -0
- package/rules/go/lang/security/audit/net/unescaped-data-in-url.yaml +55 -0
- package/rules/go/lang/security/audit/net/use-tls.yaml +26 -0
- package/rules/go/lang/security/audit/net/wip-xss-using-responsewriter-and-printf.yaml +73 -0
- package/rules/go/lang/security/audit/reflect-makefunc.yaml +27 -0
- package/rules/go/lang/security/audit/sqli/gosql-sqli.yaml +64 -0
- package/rules/go/lang/security/audit/sqli/pg-orm-sqli.yaml +88 -0
- package/rules/go/lang/security/audit/sqli/pg-sqli.yaml +67 -0
- package/rules/go/lang/security/audit/sqli/pgx-sqli.yaml +71 -0
- package/rules/go/lang/security/audit/unsafe-reflect-by-name.yaml +43 -0
- package/rules/go/lang/security/audit/unsafe.yaml +24 -0
- package/rules/go/lang/security/audit/xss/import-text-template.yaml +43 -0
- package/rules/go/lang/security/audit/xss/no-direct-write-to-responsewriter.yaml +47 -0
- package/rules/go/lang/security/audit/xss/no-fprintf-to-responsewriter.yaml +41 -0
- package/rules/go/lang/security/audit/xss/no-interpolation-in-tag.yaml +39 -0
- package/rules/go/lang/security/audit/xss/no-interpolation-js-template-string.yaml +43 -0
- package/rules/go/lang/security/audit/xss/no-io-writestring-to-responsewriter.yaml +42 -0
- package/rules/go/lang/security/audit/xss/no-printf-in-responsewriter.yaml +41 -0
- package/rules/go/lang/security/audit/xss/template-html-does-not-escape.yaml +42 -0
- package/rules/go/lang/security/audit/xxe/parsing-external-entities-enabled.yaml +34 -0
- package/rules/go/lang/security/bad_tmp.yaml +29 -0
- package/rules/go/lang/security/decompression_bomb.yaml +62 -0
- package/rules/go/lang/security/deserialization/unsafe-deserialization-interface.yaml +41 -0
- package/rules/go/lang/security/filepath-clean-misuse.yaml +59 -0
- package/rules/go/lang/security/injection/open-redirect.yaml +58 -0
- package/rules/go/lang/security/injection/raw-html-format.yaml +55 -0
- package/rules/go/lang/security/injection/tainted-sql-string.yaml +84 -0
- package/rules/go/lang/security/injection/tainted-url-host.yaml +81 -0
- package/rules/go/lang/security/reverseproxy-director.yaml +33 -0
- package/rules/go/lang/security/shared-url-struct-mutation.yaml +52 -0
- package/rules/go/lang/security/zip.yaml +33 -0
- package/rules/go/otto/security/audit/dangerous-execution.yaml +34 -0
- package/rules/go/template/security/insecure-types.yaml +38 -0
- package/rules/go/template/security/ssti.yaml +56 -0
- package/rules/java/android/best-practice/manifest-security-features.yaml +52 -0
- package/rules/java/android/best-practice/network-security-config.yml +161 -0
- package/rules/java/android/security/exported_activity.yaml +38 -0
- package/rules/java/aws-lambda/security/tainted-sql-string.yaml +69 -0
- package/rules/java/aws-lambda/security/tainted-sqli.yaml +73 -0
- package/rules/java/java-jwt/security/audit/jwt-decode-without-verify.yaml +38 -0
- package/rules/java/java-jwt/security/jwt-hardcode.yaml +54 -0
- package/rules/java/java-jwt/security/jwt-none-alg.yaml +47 -0
- package/rules/java/jax-rs/security/insecure-resteasy.yaml +82 -0
- package/rules/java/jax-rs/security/jax-rs-path-traversal.yaml +45 -0
- package/rules/java/jboss/security/seam-log-injection.yaml +40 -0
- package/rules/java/jboss/security/session_sqli.yaml +50 -0
- package/rules/java/jjwt/security/jwt-none-alg.yaml +42 -0
- package/rules/java/lang/correctness/assignment-comparison.yaml +12 -0
- package/rules/java/lang/correctness/eqeq.yaml +20 -0
- package/rules/java/lang/correctness/hardcoded-conditional.yaml +19 -0
- package/rules/java/lang/correctness/no-string-eqeq.yaml +15 -0
- package/rules/java/lang/security/audit/anonymous-ldap-bind.yaml +34 -0
- package/rules/java/lang/security/audit/bad-hexa-conversion.yaml +32 -0
- package/rules/java/lang/security/audit/blowfish-insufficient-key-size.yaml +39 -0
- package/rules/java/lang/security/audit/cbc-padding-oracle.yaml +38 -0
- package/rules/java/lang/security/audit/command-injection-formatted-runtime-call.yaml +90 -0
- package/rules/java/lang/security/audit/command-injection-process-builder.yaml +148 -0
- package/rules/java/lang/security/audit/cookie-missing-httponly.yaml +38 -0
- package/rules/java/lang/security/audit/cookie-missing-secure-flag.yaml +38 -0
- package/rules/java/lang/security/audit/crlf-injection-logs.yaml +86 -0
- package/rules/java/lang/security/audit/crypto/des-is-deprecated.yaml +48 -0
- package/rules/java/lang/security/audit/crypto/desede-is-deprecated.yaml +35 -0
- package/rules/java/lang/security/audit/crypto/ecb-cipher.yaml +37 -0
- package/rules/java/lang/security/audit/crypto/gcm-detection.yaml +38 -0
- package/rules/java/lang/security/audit/crypto/gcm-nonce-reuse.yaml +29 -0
- package/rules/java/lang/security/audit/crypto/no-null-cipher.yaml +38 -0
- package/rules/java/lang/security/audit/crypto/no-static-initialization-vector.yaml +50 -0
- package/rules/java/lang/security/audit/crypto/rsa-no-padding.yaml +35 -0
- package/rules/java/lang/security/audit/crypto/ssl/avoid-implementing-custom-digests.yaml +36 -0
- package/rules/java/lang/security/audit/crypto/ssl/defaulthttpclient-is-deprecated.yaml +35 -0
- package/rules/java/lang/security/audit/crypto/ssl/insecure-hostname-verifier.yaml +44 -0
- package/rules/java/lang/security/audit/crypto/ssl/insecure-trust-manager.yaml +58 -0
- package/rules/java/lang/security/audit/crypto/unencrypted-socket.yaml +37 -0
- package/rules/java/lang/security/audit/crypto/use-of-aes-ecb.yaml +32 -0
- package/rules/java/lang/security/audit/crypto/use-of-blowfish.yaml +32 -0
- package/rules/java/lang/security/audit/crypto/use-of-default-aes.yaml +62 -0
- package/rules/java/lang/security/audit/crypto/use-of-md5-digest-utils.yaml +41 -0
- package/rules/java/lang/security/audit/crypto/use-of-md5.yaml +37 -0
- package/rules/java/lang/security/audit/crypto/use-of-rc2.yaml +32 -0
- package/rules/java/lang/security/audit/crypto/use-of-rc4.yaml +32 -0
- package/rules/java/lang/security/audit/crypto/use-of-sha1.yaml +43 -0
- package/rules/java/lang/security/audit/crypto/use-of-sha224.yaml +48 -0
- package/rules/java/lang/security/audit/crypto/weak-random.yaml +31 -0
- package/rules/java/lang/security/audit/crypto/weak-rsa.yaml +38 -0
- package/rules/java/lang/security/audit/dangerous-groovy-shell.yaml +46 -0
- package/rules/java/lang/security/audit/el-injection.yaml +137 -0
- package/rules/java/lang/security/audit/formatted-sql-string.yaml +95 -0
- package/rules/java/lang/security/audit/http-response-splitting.yaml +44 -0
- package/rules/java/lang/security/audit/insecure-smtp-connection.yaml +34 -0
- package/rules/java/lang/security/audit/java-reverse-shell.yaml +43 -0
- package/rules/java/lang/security/audit/jdbc-sql-formatted-string.yaml +120 -0
- package/rules/java/lang/security/audit/ldap-entry-poisoning.yaml +41 -0
- package/rules/java/lang/security/audit/ldap-injection.yaml +82 -0
- package/rules/java/lang/security/audit/md5-used-as-password.yaml +44 -0
- package/rules/java/lang/security/audit/object-deserialization.yaml +34 -0
- package/rules/java/lang/security/audit/ognl-injection.yaml +839 -0
- package/rules/java/lang/security/audit/overly-permissive-file-permission.yaml +49 -0
- package/rules/java/lang/security/audit/permissive-cors.yaml +77 -0
- package/rules/java/lang/security/audit/script-engine-injection.yaml +66 -0
- package/rules/java/lang/security/audit/sqli/hibernate-sqli.yaml +90 -0
- package/rules/java/lang/security/audit/sqli/jdbc-sqli.yaml +63 -0
- package/rules/java/lang/security/audit/sqli/jdo-sqli.yaml +96 -0
- package/rules/java/lang/security/audit/sqli/jpa-sqli.yaml +63 -0
- package/rules/java/lang/security/audit/sqli/tainted-sql-from-http-request.yaml +78 -0
- package/rules/java/lang/security/audit/sqli/turbine-sqli.yaml +95 -0
- package/rules/java/lang/security/audit/sqli/vertx-sqli.yaml +70 -0
- package/rules/java/lang/security/audit/tainted-cmd-from-http-request.yaml +74 -0
- package/rules/java/lang/security/audit/tainted-env-from-http-request.yaml +46 -0
- package/rules/java/lang/security/audit/tainted-ldapi-from-http-request.yaml +42 -0
- package/rules/java/lang/security/audit/tainted-session-from-http-request.yaml +70 -0
- package/rules/java/lang/security/audit/tainted-xpath-from-http-request.yaml +38 -0
- package/rules/java/lang/security/audit/unsafe-reflection.yaml +39 -0
- package/rules/java/lang/security/audit/unvalidated-redirect.yaml +127 -0
- package/rules/java/lang/security/audit/url-rewriting.yaml +82 -0
- package/rules/java/lang/security/audit/weak-ssl-context.yaml +34 -0
- package/rules/java/lang/security/audit/xml-decoder.yaml +53 -0
- package/rules/java/lang/security/audit/xss/jsf/autoescape-disabled.yaml +29 -0
- package/rules/java/lang/security/audit/xss/jsp/no-scriptlets.yaml +31 -0
- package/rules/java/lang/security/audit/xss/jsp/use-escapexml.yaml +33 -0
- package/rules/java/lang/security/audit/xss/jsp/use-jstl-escaping.yaml +34 -0
- package/rules/java/lang/security/audit/xss/no-direct-response-writer.yaml +74 -0
- package/rules/java/lang/security/audit/xssrequestwrapper-is-insecure.yaml +40 -0
- package/rules/java/lang/security/audit/xxe/documentbuilderfactory-disallow-doctype-decl-false.yaml +74 -0
- package/rules/java/lang/security/audit/xxe/documentbuilderfactory-disallow-doctype-decl-missing.yaml +162 -0
- package/rules/java/lang/security/audit/xxe/documentbuilderfactory-external-general-entities-true.yaml +38 -0
- package/rules/java/lang/security/audit/xxe/documentbuilderfactory-external-parameter-entities-true.yaml +38 -0
- package/rules/java/lang/security/audit/xxe/saxparserfactory-disallow-doctype-decl-missing.yaml +165 -0
- package/rules/java/lang/security/audit/xxe/transformerfactory-dtds-not-disabled.yaml +191 -0
- package/rules/java/lang/security/do-privileged-use.yaml +35 -0
- package/rules/java/lang/security/httpservlet-path-traversal.yaml +64 -0
- package/rules/java/lang/security/insecure-jms-deserialization.yaml +50 -0
- package/rules/java/lang/security/jackson-unsafe-deserialization.yaml +74 -0
- package/rules/java/lang/security/java-pattern-from-string-parameter.yaml +37 -0
- package/rules/java/lang/security/servletresponse-writer-xss.yaml +40 -0
- package/rules/java/lang/security/use-snakeyaml-constructor.yaml +34 -0
- package/rules/java/lang/security/xmlinputfactory-external-entities-enabled.yaml +44 -0
- package/rules/java/lang/security/xmlinputfactory-possible-xxe.yaml +65 -0
- package/rules/java/mongodb/security/injection/audit/mongodb-nosqli.yaml +70 -0
- package/rules/java/rmi/security/server-dangerous-class-deserialization.yaml +38 -0
- package/rules/java/rmi/security/server-dangerous-object-deserialization.yaml +72 -0
- package/rules/java/servlets/security/cookie-issecure-false.yaml +37 -0
- package/rules/java/servlets/security/cookie-setSecure.yaml +42 -0
- package/rules/java/servlets/security/security-constraint-http-method.yaml +31 -0
- package/rules/java/spring/security/audit/spel-injection.yaml +101 -0
- package/rules/java/spring/security/audit/spring-actuator-fully-enabled-yaml.test.yaml +10 -0
- package/rules/java/spring/security/audit/spring-actuator-fully-enabled-yaml.yaml +40 -0
- package/rules/java/spring/security/audit/spring-actuator-fully-enabled.yaml +32 -0
- package/rules/java/spring/security/audit/spring-actuator-non-health-enabled-yaml.test.yaml +13 -0
- package/rules/java/spring/security/audit/spring-actuator-non-health-enabled-yaml.yaml +43 -0
- package/rules/java/spring/security/audit/spring-actuator-non-health-enabled.yaml +34 -0
- package/rules/java/spring/security/audit/spring-csrf-disabled.yaml +31 -0
- package/rules/java/spring/security/audit/spring-jsp-eval.yaml +29 -0
- package/rules/java/spring/security/audit/spring-sqli.yaml +68 -0
- package/rules/java/spring/security/audit/spring-unvalidated-redirect.yaml +51 -0
- package/rules/java/spring/security/injection/tainted-file-path.yaml +77 -0
- package/rules/java/spring/security/injection/tainted-html-string.yaml +107 -0
- package/rules/java/spring/security/injection/tainted-sql-string.yaml +90 -0
- package/rules/java/spring/security/injection/tainted-system-command.yaml +105 -0
- package/rules/java/spring/security/injection/tainted-url-host.yaml +85 -0
- package/rules/java/spring/security/unrestricted-request-mapping.yaml +39 -0
- package/rules/javascript/ajv/security/audit/ajv-allerrors-true.yaml +33 -0
- package/rules/javascript/angular/security/detect-angular-element-methods.yaml +64 -0
- package/rules/javascript/angular/security/detect-angular-element-taint.yaml +83 -0
- package/rules/javascript/angular/security/detect-angular-open-redirect.yaml +38 -0
- package/rules/javascript/angular/security/detect-angular-resource-loading.yaml +37 -0
- package/rules/javascript/angular/security/detect-angular-sce-disabled.yaml +31 -0
- package/rules/javascript/angular/security/detect-angular-trust-as-css.yaml +39 -0
- package/rules/javascript/angular/security/detect-angular-trust-as-html-method.yaml +39 -0
- package/rules/javascript/angular/security/detect-angular-trust-as-js-method.yaml +39 -0
- package/rules/javascript/angular/security/detect-angular-trust-as-method.yaml +39 -0
- package/rules/javascript/angular/security/detect-angular-trust-as-resourceurl-method.yaml +39 -0
- package/rules/javascript/angular/security/detect-angular-trust-as-url-method.yaml +39 -0
- package/rules/javascript/angular/security/detect-third-party-angular-translate.yaml +36 -0
- package/rules/javascript/apollo/security/apollo-axios-ssrf.yaml +47 -0
- package/rules/javascript/argon2/security/unsafe-argon2-config.yaml +47 -0
- package/rules/javascript/audit/detect-replaceall-sanitization.yaml +42 -0
- package/rules/javascript/aws-lambda/security/detect-child-process.yaml +67 -0
- package/rules/javascript/aws-lambda/security/dynamodb-request-object.yaml +70 -0
- package/rules/javascript/aws-lambda/security/knex-sqli.yaml +65 -0
- package/rules/javascript/aws-lambda/security/mysql-sqli.yaml +76 -0
- package/rules/javascript/aws-lambda/security/pg-sqli.yaml +63 -0
- package/rules/javascript/aws-lambda/security/sequelize-sqli.yaml +63 -0
- package/rules/javascript/aws-lambda/security/tainted-eval.yaml +52 -0
- package/rules/javascript/aws-lambda/security/tainted-html-response.yaml +52 -0
- package/rules/javascript/aws-lambda/security/tainted-html-string.yaml +72 -0
- package/rules/javascript/aws-lambda/security/tainted-sql-string.yaml +69 -0
- package/rules/javascript/aws-lambda/security/vm-runincontext-injection.yaml +68 -0
- package/rules/javascript/bluebird/security/audit/tofastproperties-code-execution.yaml +44 -0
- package/rules/javascript/browser/security/dom-based-xss.yaml +34 -0
- package/rules/javascript/browser/security/eval-detected.yaml +35 -0
- package/rules/javascript/browser/security/insecure-document-method.yaml +40 -0
- package/rules/javascript/browser/security/insecure-innerhtml.yaml +32 -0
- package/rules/javascript/browser/security/insufficient-postmessage-origin-validation.yaml +51 -0
- package/rules/javascript/browser/security/open-redirect-from-function.yaml +58 -0
- package/rules/javascript/browser/security/open-redirect.yaml +95 -0
- package/rules/javascript/browser/security/raw-html-concat.yaml +167 -0
- package/rules/javascript/browser/security/raw-html-join.yaml +43 -0
- package/rules/javascript/browser/security/wildcard-postmessage-configuration.yaml +26 -0
- package/rules/javascript/chrome-remote-interface/security/audit/chrome-remote-interface-compilescript-injection.yaml +55 -0
- package/rules/javascript/deno/security/audit/deno-dangerous-run.yaml +47 -0
- package/rules/javascript/express/security/audit/express-check-csurf-middleware-usage.yaml +50 -0
- package/rules/javascript/express/security/audit/express-check-directory-listing.yaml +54 -0
- package/rules/javascript/express/security/audit/express-cookie-settings.yaml +363 -0
- package/rules/javascript/express/security/audit/express-detect-notevil-usage.yaml +55 -0
- package/rules/javascript/express/security/audit/express-jwt-not-revoked.yaml +44 -0
- package/rules/javascript/express/security/audit/express-libxml-noent.yaml +91 -0
- package/rules/javascript/express/security/audit/express-libxml-vm-noent.yaml +53 -0
- package/rules/javascript/express/security/audit/express-open-redirect.yaml +114 -0
- package/rules/javascript/express/security/audit/express-path-join-resolve-traversal.yaml +97 -0
- package/rules/javascript/express/security/audit/express-res-sendfile.yaml +76 -0
- package/rules/javascript/express/security/audit/express-session-hardcoded-secret.yaml +57 -0
- package/rules/javascript/express/security/audit/express-ssrf.yaml +195 -0
- package/rules/javascript/express/security/audit/express-third-party-object-deserialization.yaml +90 -0
- package/rules/javascript/express/security/audit/express-xml2json-xxe-event.yaml +73 -0
- package/rules/javascript/express/security/audit/possible-user-input-redirect.yaml +42 -0
- package/rules/javascript/express/security/audit/remote-property-injection.yaml +75 -0
- package/rules/javascript/express/security/audit/res-render-injection.yaml +69 -0
- package/rules/javascript/express/security/audit/xss/direct-response-write.yaml +239 -0
- package/rules/javascript/express/security/audit/xss/ejs/explicit-unescape.yaml +38 -0
- package/rules/javascript/express/security/audit/xss/ejs/var-in-href.yaml +38 -0
- package/rules/javascript/express/security/audit/xss/ejs/var-in-script-src.yaml +43 -0
- package/rules/javascript/express/security/audit/xss/ejs/var-in-script-tag.yaml +43 -0
- package/rules/javascript/express/security/audit/xss/mustache/escape-function-overwrite.yaml +38 -0
- package/rules/javascript/express/security/audit/xss/mustache/explicit-unescape.yaml +40 -0
- package/rules/javascript/express/security/audit/xss/mustache/var-in-script-tag.yaml +42 -0
- package/rules/javascript/express/security/audit/xss/pug/and-attributes.yaml +34 -0
- package/rules/javascript/express/security/audit/xss/pug/explicit-unescape.yaml +37 -0
- package/rules/javascript/express/security/audit/xss/pug/var-in-href.yaml +37 -0
- package/rules/javascript/express/security/audit/xss/pug/var-in-script-tag.yaml +44 -0
- package/rules/javascript/express/security/cors-misconfiguration.yaml +73 -0
- package/rules/javascript/express/security/express-data-exfiltration.yaml +61 -0
- package/rules/javascript/express/security/express-expat-xxe.yaml +90 -0
- package/rules/javascript/express/security/express-insecure-template-usage.yaml +180 -0
- package/rules/javascript/express/security/express-jwt-hardcoded-secret.yaml +56 -0
- package/rules/javascript/express/security/express-phantom-injection.yaml +76 -0
- package/rules/javascript/express/security/express-puppeteer-injection.yaml +79 -0
- package/rules/javascript/express/security/express-sandbox-injection.yaml +74 -0
- package/rules/javascript/express/security/express-vm-injection.yaml +74 -0
- package/rules/javascript/express/security/express-vm2-injection.yaml +84 -0
- package/rules/javascript/express/security/express-wkhtml-injection.yaml +127 -0
- package/rules/javascript/express/security/express-xml2json-xxe.yaml +81 -0
- package/rules/javascript/express/security/injection/raw-html-format.yaml +93 -0
- package/rules/javascript/express/security/injection/tainted-sql-string.yaml +74 -0
- package/rules/javascript/express/security/require-request.yaml +66 -0
- package/rules/javascript/express/security/x-frame-options-misconfiguration.yaml +73 -0
- package/rules/javascript/fbjs/security/audit/insecure-createnodesfrommarkup.yaml +33 -0
- package/rules/javascript/grpc/security/grpc-nodejs-insecure-connection.yaml +49 -0
- package/rules/javascript/intercom/security/audit/intercom-settings-user-identifier-without-user-hash.yaml +49 -0
- package/rules/javascript/jose/security/audit/jose-exposed-data.yaml +49 -0
- package/rules/javascript/jose/security/jwt-hardcode.yaml +73 -0
- package/rules/javascript/jose/security/jwt-none-alg.yaml +55 -0
- package/rules/javascript/jquery/security/audit/jquery-insecure-method.yaml +53 -0
- package/rules/javascript/jquery/security/audit/jquery-insecure-selector.yaml +86 -0
- package/rules/javascript/jquery/security/audit/prohibit-jquery-html.yaml +45 -0
- package/rules/javascript/jsonwebtoken/security/audit/jwt-decode-without-verify.yaml +46 -0
- package/rules/javascript/jsonwebtoken/security/audit/jwt-exposed-data.yaml +41 -0
- package/rules/javascript/jsonwebtoken/security/jwt-hardcode.yaml +71 -0
- package/rules/javascript/jsonwebtoken/security/jwt-none-alg.yaml +40 -0
- package/rules/javascript/jwt-simple/security/jwt-simple-noverify.yaml +48 -0
- package/rules/javascript/lang/best-practice/assigned-undefined.yaml +18 -0
- package/rules/javascript/lang/best-practice/lazy-load-module.yaml +24 -0
- package/rules/javascript/lang/best-practice/leftover_debugging.yaml +50 -0
- package/rules/javascript/lang/best-practice/zlib-async-loop.yaml +41 -0
- package/rules/javascript/lang/correctness/missing-template-string-indicator.yaml +18 -0
- package/rules/javascript/lang/correctness/no-replaceall.yaml +18 -0
- package/rules/javascript/lang/correctness/no-stringify-keys.yaml +29 -0
- package/rules/javascript/lang/correctness/useless-assign.yaml +18 -0
- package/rules/javascript/lang/correctness/useless-eqeq.yaml +21 -0
- package/rules/javascript/lang/security/audit/code-string-concat.yaml +90 -0
- package/rules/javascript/lang/security/audit/dangerous-spawn-shell.yaml +67 -0
- package/rules/javascript/lang/security/audit/detect-non-literal-fs-filename.yaml +272 -0
- package/rules/javascript/lang/security/audit/detect-non-literal-regexp.yaml +45 -0
- package/rules/javascript/lang/security/audit/detect-non-literal-require.yaml +34 -0
- package/rules/javascript/lang/security/audit/detect-redos.yaml +43 -0
- package/rules/javascript/lang/security/audit/hardcoded-hmac-key.yaml +39 -0
- package/rules/javascript/lang/security/audit/incomplete-sanitization.yaml +32 -0
- package/rules/javascript/lang/security/audit/md5-used-as-password.yaml +40 -0
- package/rules/javascript/lang/security/audit/path-traversal/path-join-resolve-traversal.yaml +75 -0
- package/rules/javascript/lang/security/audit/prototype-pollution/prototype-pollution-assignment.yaml +74 -0
- package/rules/javascript/lang/security/audit/prototype-pollution/prototype-pollution-loop.yaml +71 -0
- package/rules/javascript/lang/security/audit/spawn-shell-true.yaml +50 -0
- package/rules/javascript/lang/security/audit/sqli/node-knex-sqli.yaml +90 -0
- package/rules/javascript/lang/security/audit/sqli/node-mssql-sqli.yaml +56 -0
- package/rules/javascript/lang/security/audit/sqli/node-mysql-sqli.yaml +72 -0
- package/rules/javascript/lang/security/audit/sqli/node-postgres-sqli.yaml +63 -0
- package/rules/javascript/lang/security/audit/unknown-value-with-script-tag.yaml +37 -0
- package/rules/javascript/lang/security/audit/unsafe-dynamic-method.yaml +55 -0
- package/rules/javascript/lang/security/audit/unsafe-formatstring.yaml +51 -0
- package/rules/javascript/lang/security/detect-buffer-noassert.yaml +32 -0
- package/rules/javascript/lang/security/detect-child-process.yaml +79 -0
- package/rules/javascript/lang/security/detect-disable-mustache-escape.yaml +27 -0
- package/rules/javascript/lang/security/detect-eval-with-expression.yaml +88 -0
- package/rules/javascript/lang/security/detect-insecure-websocket.yaml +32 -0
- package/rules/javascript/lang/security/detect-no-csrf-before-method-override.yaml +35 -0
- package/rules/javascript/lang/security/detect-pseudoRandomBytes.yaml +32 -0
- package/rules/javascript/lang/security/html-in-template-string.yaml +36 -0
- package/rules/javascript/lang/security/insecure-object-assign.yaml +33 -0
- package/rules/javascript/lang/security/spawn-git-clone.yaml +40 -0
- package/rules/javascript/monaco-editor/security/audit/monaco-hover-htmlsupport.yaml +47 -0
- package/rules/javascript/node-crypto/security/aead-no-final.yaml +38 -0
- package/rules/javascript/node-crypto/security/create-de-cipher-no-iv.yaml +31 -0
- package/rules/javascript/node-crypto/security/gcm-no-tag-length.yaml +34 -0
- package/rules/javascript/node-expat/security/audit/expat-xxe.yaml +86 -0
- package/rules/javascript/passport-jwt/security/passport-hardcode.yaml +107 -0
- package/rules/javascript/phantom/security/audit/phantom-injection.yaml +42 -0
- package/rules/javascript/playwright/security/audit/playwright-addinitscript-code-injection.yaml +37 -0
- package/rules/javascript/playwright/security/audit/playwright-evaluate-arg-injection.yaml +37 -0
- package/rules/javascript/playwright/security/audit/playwright-evaluate-code-injection.yaml +44 -0
- package/rules/javascript/playwright/security/audit/playwright-exposed-chrome-devtools.yaml +35 -0
- package/rules/javascript/playwright/security/audit/playwright-goto-injection.yaml +38 -0
- package/rules/javascript/playwright/security/audit/playwright-setcontent-injection.yaml +39 -0
- package/rules/javascript/puppeteer/security/audit/puppeteer-evaluate-arg-injection.yaml +38 -0
- package/rules/javascript/puppeteer/security/audit/puppeteer-evaluate-code-injection.yaml +44 -0
- package/rules/javascript/puppeteer/security/audit/puppeteer-exposed-chrome-devtools.yaml +35 -0
- package/rules/javascript/puppeteer/security/audit/puppeteer-goto-injection.yaml +38 -0
- package/rules/javascript/puppeteer/security/audit/puppeteer-setcontent-injection.yaml +38 -0
- package/rules/javascript/react/correctness/hooks/set-state-no-op.yaml +16 -0
- package/rules/javascript/sandbox/security/audit/sandbox-code-injection.yaml +46 -0
- package/rules/javascript/sax/security/audit/sax-xxe.yaml +41 -0
- package/rules/javascript/sequelize/security/audit/sequelize-enforce-tls.yaml +60 -0
- package/rules/javascript/sequelize/security/audit/sequelize-injection-express.yaml +82 -0
- package/rules/javascript/sequelize/security/audit/sequelize-raw-query.yaml +55 -0
- package/rules/javascript/sequelize/security/audit/sequelize-tls-disabled-cert-validation.yaml +52 -0
- package/rules/javascript/sequelize/security/audit/sequelize-weak-tls-version.yaml +56 -0
- package/rules/javascript/serialize-javascript/security/audit/unsafe-serialize-javascript.yaml +32 -0
- package/rules/javascript/shelljs/security/shelljs-exec-injection.yaml +38 -0
- package/rules/javascript/thenify/security/audit/multiargs-code-execution.yaml +46 -0
- package/rules/javascript/vm2/security/audit/vm2-code-injection.yaml +66 -0
- package/rules/javascript/vm2/security/audit/vm2-context-injection.yaml +350 -0
- package/rules/javascript/vue/security/audit/xss/templates/avoid-v-html.yaml +31 -0
- package/rules/javascript/wkhtmltoimage/security/audit/wkhtmltoimage-injection.yaml +36 -0
- package/rules/javascript/wkhtmltopdf/security/audit/wkhtmltopdf-injection.yaml +35 -0
- package/rules/javascript/xml2json/security/audit/xml2json-xxe.yaml +48 -0
- package/rules/php/doctrine/security/audit/doctrine-dbal-dangerous-query.yaml +43 -0
- package/rules/php/doctrine/security/audit/doctrine-orm-dangerous-query.yaml +71 -0
- package/rules/php/lang/correctness/empty-with-boolean-expression.yaml +16 -0
- package/rules/php/lang/security/assert-use.yaml +42 -0
- package/rules/php/lang/security/audit/assert-use-audit.yaml +30 -0
- package/rules/php/lang/security/audit/openssl-decrypt-validate.yaml +75 -0
- package/rules/php/lang/security/audit/sha224-hash.yaml +33 -0
- package/rules/php/lang/security/backticks-use.yaml +25 -0
- package/rules/php/lang/security/base-convert-loses-precision.yaml +50 -0
- package/rules/php/lang/security/curl-ssl-verifypeer-off.yaml +34 -0
- package/rules/php/lang/security/deserialization.yaml +36 -0
- package/rules/php/lang/security/eval-use.yaml +29 -0
- package/rules/php/lang/security/exec-use.yaml +29 -0
- package/rules/php/lang/security/file-inclusion.yaml +52 -0
- package/rules/php/lang/security/ftp-use.yaml +29 -0
- package/rules/php/lang/security/injection/echoed-request.yaml +63 -0
- package/rules/php/lang/security/injection/printed-request.yaml +63 -0
- package/rules/php/lang/security/injection/tainted-callable.yaml +116 -0
- package/rules/php/lang/security/injection/tainted-exec.yaml +52 -0
- package/rules/php/lang/security/injection/tainted-filename.yaml +176 -0
- package/rules/php/lang/security/injection/tainted-object-instantiation.yaml +37 -0
- package/rules/php/lang/security/injection/tainted-session.yaml +76 -0
- package/rules/php/lang/security/injection/tainted-sql-string.yaml +62 -0
- package/rules/php/lang/security/injection/tainted-url-host.yaml +65 -0
- package/rules/php/lang/security/ldap-bind-without-password.yaml +34 -0
- package/rules/php/lang/security/mb-ereg-replace-eval.yaml +29 -0
- package/rules/php/lang/security/mcrypt-use.yaml +26 -0
- package/rules/php/lang/security/md5-loose-equality.yaml +48 -0
- package/rules/php/lang/security/md5-used-as-password.yaml +42 -0
- package/rules/php/lang/security/openssl-cbc-static-iv.yaml +31 -0
- package/rules/php/lang/security/php-permissive-cors.yaml +33 -0
- package/rules/php/lang/security/php-ssrf.yaml +50 -0
- package/rules/php/lang/security/phpinfo-use.yaml +25 -0
- package/rules/php/lang/security/redirect-to-request-uri.yaml +36 -0
- package/rules/php/lang/security/tainted-exec.yaml +42 -0
- package/rules/php/lang/security/unlink-use.yaml +31 -0
- package/rules/php/lang/security/unserialize-use.yaml +31 -0
- package/rules/php/lang/security/weak-crypto.yaml +34 -0
- package/rules/php/laravel/security/laravel-active-debug-code.yaml +36 -0
- package/rules/php/laravel/security/laravel-api-route-sql-injection.yaml +41 -0
- package/rules/php/laravel/security/laravel-blade-form-missing-csrf.yaml +68 -0
- package/rules/php/laravel/security/laravel-cookie-http-only.yaml +51 -0
- package/rules/php/laravel/security/laravel-cookie-long-timeout.yaml +45 -0
- package/rules/php/laravel/security/laravel-cookie-null-domain.yaml +51 -0
- package/rules/php/laravel/security/laravel-cookie-same-site.yaml +56 -0
- package/rules/php/laravel/security/laravel-cookie-secure-set.yaml +51 -0
- package/rules/php/laravel/security/laravel-dangerous-model-construction.yaml +33 -0
- package/rules/php/laravel/security/laravel-sql-injection.yaml +132 -0
- package/rules/php/laravel/security/laravel-unsafe-validator.yaml +65 -0
- package/rules/php/symfony/security/audit/symfony-csrf-protection-disabled.yaml +40 -0
- package/rules/php/symfony/security/audit/symfony-non-literal-redirect.yaml +30 -0
- package/rules/php/symfony/security/audit/symfony-permissive-cors.yaml +46 -0
- package/rules/php/wordpress-plugins/security/audit/wp-ajax-no-auth-and-auth-hooks-audit.yaml +34 -0
- package/rules/php/wordpress-plugins/security/audit/wp-authorisation-checks-audit.yaml +32 -0
- package/rules/php/wordpress-plugins/security/audit/wp-code-execution-audit.yaml +33 -0
- package/rules/php/wordpress-plugins/security/audit/wp-command-execution-audit.yaml +34 -0
- package/rules/php/wordpress-plugins/security/audit/wp-csrf-audit.yaml +29 -0
- package/rules/php/wordpress-plugins/security/audit/wp-file-download-audit.yaml +33 -0
- package/rules/php/wordpress-plugins/security/audit/wp-file-inclusion-audit.yaml +39 -0
- package/rules/php/wordpress-plugins/security/audit/wp-file-manipulation-audit.yaml +35 -0
- package/rules/php/wordpress-plugins/security/audit/wp-open-redirect-audit.yaml +30 -0
- package/rules/php/wordpress-plugins/security/audit/wp-php-object-injection-audit.yaml +33 -0
- package/rules/php/wordpress-plugins/security/audit/wp-sql-injection-audit.yaml +43 -0
- package/rules/php/wordpress-plugins/security/audit/wp-ssrf-audit.yaml +48 -0
- package/rules/python/airflow/security/audit/formatted-string-bashoperator.yaml +59 -0
- package/rules/python/attr/correctness/mutable-initializer.yaml +36 -0
- package/rules/python/aws-lambda/security/dangerous-asyncio-create-exec.yaml +59 -0
- package/rules/python/aws-lambda/security/dangerous-asyncio-exec.yaml +54 -0
- package/rules/python/aws-lambda/security/dangerous-asyncio-shell.yaml +51 -0
- package/rules/python/aws-lambda/security/dangerous-spawn-process.yaml +67 -0
- package/rules/python/aws-lambda/security/dangerous-subprocess-use.yaml +52 -0
- package/rules/python/aws-lambda/security/dangerous-system-call.yaml +52 -0
- package/rules/python/aws-lambda/security/dynamodb-filter-injection.yaml +56 -0
- package/rules/python/aws-lambda/security/mysql-sqli.yaml +53 -0
- package/rules/python/aws-lambda/security/psycopg-sqli.yaml +52 -0
- package/rules/python/aws-lambda/security/pymssql-sqli.yaml +46 -0
- package/rules/python/aws-lambda/security/pymysql-sqli.yaml +50 -0
- package/rules/python/aws-lambda/security/sqlalchemy-sqli.yaml +46 -0
- package/rules/python/aws-lambda/security/tainted-code-exec.yaml +43 -0
- package/rules/python/aws-lambda/security/tainted-html-response.yaml +41 -0
- package/rules/python/aws-lambda/security/tainted-html-string.yaml +62 -0
- package/rules/python/aws-lambda/security/tainted-pickle-deserialization.yaml +51 -0
- package/rules/python/aws-lambda/security/tainted-sql-string.yaml +54 -0
- package/rules/python/bokeh/maintainability/deprecated/deprecated_apis.yaml +15 -0
- package/rules/python/boto3/security/hardcoded-token.yaml +53 -0
- package/rules/python/click/best-practice/echo-style.yaml +10 -0
- package/rules/python/correctness/check-is-none-explicitly.yaml +19 -0
- package/rules/python/correctness/socket-shutdown-close.yaml +32 -0
- package/rules/python/correctness/suppressed-exception-handling-finally-break.yaml +46 -0
- package/rules/python/cryptography/security/empty-aes-key.yaml +32 -0
- package/rules/python/cryptography/security/insecure-cipher-algorithms-arc4.yaml +41 -0
- package/rules/python/cryptography/security/insecure-cipher-algorithms-blowfish.yaml +40 -0
- package/rules/python/cryptography/security/insecure-cipher-algorithms.yaml +42 -0
- package/rules/python/cryptography/security/insecure-cipher-mode-ecb.yaml +34 -0
- package/rules/python/cryptography/security/insecure-hash-algorithms-md5.yaml +41 -0
- package/rules/python/cryptography/security/insecure-hash-algorithms.yaml +43 -0
- package/rules/python/cryptography/security/insufficient-dsa-key-size.yaml +40 -0
- package/rules/python/cryptography/security/insufficient-ec-key-size.yaml +40 -0
- package/rules/python/cryptography/security/insufficient-rsa-key-size.yaml +39 -0
- package/rules/python/cryptography/security/mode-without-authentication.yaml +47 -0
- package/rules/python/distributed/security.yaml +35 -0
- package/rules/python/django/best-practice/json_response.yaml +17 -0
- package/rules/python/django/best-practice/upsell_django_environ.yaml +26 -0
- package/rules/python/django/best-practice/use-onetoonefield.yaml +16 -0
- package/rules/python/django/compatibility/django-2_0-compat.yaml +58 -0
- package/rules/python/django/correctness/model-save.yaml +24 -0
- package/rules/python/django/correctness/nontext-field-must-set-null-true.yaml +31 -0
- package/rules/python/django/correctness/string-field-null-checks.yaml +41 -0
- package/rules/python/django/correctness/use-decimalfield-for-money.yaml +17 -0
- package/rules/python/django/maintainability/duplicate-path-assignment.yaml +71 -0
- package/rules/python/django/performance/access-foreign-keys.yaml +22 -0
- package/rules/python/django/performance/upsell-count.yaml +15 -0
- package/rules/python/django/performance/upsell_earliest_latest.yaml +15 -0
- package/rules/python/django/security/audit/avoid-insecure-deserialization.yaml +66 -0
- package/rules/python/django/security/audit/avoid-mark-safe.yaml +34 -0
- package/rules/python/django/security/audit/csrf-exempt.yaml +29 -0
- package/rules/python/django/security/audit/custom-expression-as-sql.yaml +29 -0
- package/rules/python/django/security/audit/django-rest-framework/missing-throttle-config.yaml +37 -0
- package/rules/python/django/security/audit/extends-custom-expression.yaml +145 -0
- package/rules/python/django/security/audit/query-set-extra.yaml +34 -0
- package/rules/python/django/security/audit/raw-query.yaml +35 -0
- package/rules/python/django/security/audit/secure-cookies.yaml +59 -0
- package/rules/python/django/security/audit/templates/debug-template-tag.yaml +30 -0
- package/rules/python/django/security/audit/unvalidated-password.yaml +54 -0
- package/rules/python/django/security/audit/xss/class-extends-safestring.yaml +41 -0
- package/rules/python/django/security/audit/xss/context-autoescape-off.yaml +43 -0
- package/rules/python/django/security/audit/xss/direct-use-of-httpresponse.yaml +59 -0
- package/rules/python/django/security/audit/xss/filter-with-is-safe.yaml +38 -0
- package/rules/python/django/security/audit/xss/formathtml-fstring-parameter.yaml +35 -0
- package/rules/python/django/security/audit/xss/global-autoescape-off.yaml +40 -0
- package/rules/python/django/security/audit/xss/html-magic-method.yaml +39 -0
- package/rules/python/django/security/audit/xss/html-safe.yaml +39 -0
- package/rules/python/django/security/audit/xss/template-autoescape-off.yaml +33 -0
- package/rules/python/django/security/audit/xss/template-blocktranslate-no-escape.yaml +47 -0
- package/rules/python/django/security/audit/xss/template-translate-as-no-escape.yaml +130 -0
- package/rules/python/django/security/audit/xss/template-var-unescaped-with-safeseq.yaml +34 -0
- package/rules/python/django/security/django-no-csrf-token.yaml +34 -0
- package/rules/python/django/security/django-using-request-post-after-is-valid.yaml +27 -0
- package/rules/python/django/security/globals-as-template-context.yaml +40 -0
- package/rules/python/django/security/hashids-with-django-secret.yaml +28 -0
- package/rules/python/django/security/injection/code/globals-misuse-code-execution.yaml +221 -0
- package/rules/python/django/security/injection/code/user-eval-format-string.yaml +125 -0
- package/rules/python/django/security/injection/code/user-eval.yaml +46 -0
- package/rules/python/django/security/injection/code/user-exec-format-string.yaml +215 -0
- package/rules/python/django/security/injection/code/user-exec.yaml +65 -0
- package/rules/python/django/security/injection/command/command-injection-os-system.yaml +279 -0
- package/rules/python/django/security/injection/command/subprocess-injection.yaml +70 -0
- package/rules/python/django/security/injection/csv-writer-injection.yaml +55 -0
- package/rules/python/django/security/injection/email/xss-html-email-body.yaml +203 -0
- package/rules/python/django/security/injection/email/xss-send-mail-html-message.yaml +241 -0
- package/rules/python/django/security/injection/mass-assignment.yaml +32 -0
- package/rules/python/django/security/injection/open-redirect.yaml +550 -0
- package/rules/python/django/security/injection/path-traversal/path-traversal-file-name.yaml +79 -0
- package/rules/python/django/security/injection/path-traversal/path-traversal-join.yaml +102 -0
- package/rules/python/django/security/injection/path-traversal/path-traversal-open.yaml +441 -0
- package/rules/python/django/security/injection/raw-html-format.yaml +58 -0
- package/rules/python/django/security/injection/reflected-data-httpresponse.yaml +261 -0
- package/rules/python/django/security/injection/reflected-data-httpresponsebadrequest.yaml +255 -0
- package/rules/python/django/security/injection/request-data-fileresponse.yaml +84 -0
- package/rules/python/django/security/injection/request-data-write.yaml +199 -0
- package/rules/python/django/security/injection/sql/sql-injection-extra.yaml +295 -0
- package/rules/python/django/security/injection/sql/sql-injection-rawsql.yaml +295 -0
- package/rules/python/django/security/injection/sql/sql-injection-using-db-cursor-execute.yaml +296 -0
- package/rules/python/django/security/injection/sql/sql-injection-using-raw.yaml +296 -0
- package/rules/python/django/security/injection/ssrf/ssrf-injection-requests.yaml +259 -0
- package/rules/python/django/security/injection/ssrf/ssrf-injection-urllib.yaml +257 -0
- package/rules/python/django/security/injection/tainted-sql-string.yaml +47 -0
- package/rules/python/django/security/injection/tainted-url-host.yaml +70 -0
- package/rules/python/django/security/locals-as-template-context.yaml +40 -0
- package/rules/python/django/security/nan-injection.yaml +45 -0
- package/rules/python/django/security/passwords/password-empty-string.yaml +39 -0
- package/rules/python/django/security/passwords/use-none-for-password-default.yaml +42 -0
- package/rules/python/docker/security/audit/docker-arbitrary-container-run.yaml +38 -0
- package/rules/python/fastapi/security/wildcard-cors.yaml +38 -0
- package/rules/python/flask/best-practice/get-class-method-with-side-effects.yaml +23 -0
- package/rules/python/flask/best-practice/use-jsonify.yaml +32 -0
- package/rules/python/flask/caching/query-string.yaml +45 -0
- package/rules/python/flask/correctness/access-request-in-wrong-handler.yaml +21 -0
- package/rules/python/flask/correctness/same-handler-name.yaml +19 -0
- package/rules/python/flask/maintainability/deprecated/deprecated-apis.yaml +44 -0
- package/rules/python/flask/security/audit/app-run-param-config.yaml +24 -0
- package/rules/python/flask/security/audit/app-run-security-config.yaml +30 -0
- package/rules/python/flask/security/audit/debug-enabled.yaml +28 -0
- package/rules/python/flask/security/audit/directly-returned-format-string.yaml +73 -0
- package/rules/python/flask/security/audit/flask-cors-misconfiguration.yaml +39 -0
- package/rules/python/flask/security/audit/flask-url-for-external-true.yaml +34 -0
- package/rules/python/flask/security/audit/hardcoded-config.yaml +105 -0
- package/rules/python/flask/security/audit/host-header-injection-python.yaml +45 -0
- package/rules/python/flask/security/audit/render-template-string.yaml +23 -0
- package/rules/python/flask/security/audit/secure-set-cookie.yaml +43 -0
- package/rules/python/flask/security/audit/wtf-csrf-disabled.yaml +75 -0
- package/rules/python/flask/security/audit/xss/make-response-with-unknown-content.yaml +54 -0
- package/rules/python/flask/security/dangerous-template-string.yaml +62 -0
- package/rules/python/flask/security/flask-api-method-string-format.yaml +36 -0
- package/rules/python/flask/security/hashids-with-flask-secret.yaml +35 -0
- package/rules/python/flask/security/injection/csv-writer-injection.yaml +73 -0
- package/rules/python/flask/security/injection/nan-injection.yaml +42 -0
- package/rules/python/flask/security/injection/os-system-injection.yaml +72 -0
- package/rules/python/flask/security/injection/path-traversal-open.yaml +106 -0
- package/rules/python/flask/security/injection/raw-html-concat.yaml +72 -0
- package/rules/python/flask/security/injection/ssrf-requests.yaml +76 -0
- package/rules/python/flask/security/injection/subprocess-injection.yaml +87 -0
- package/rules/python/flask/security/injection/tainted-sql-string.yaml +57 -0
- package/rules/python/flask/security/injection/tainted-url-host.yaml +78 -0
- package/rules/python/flask/security/injection/user-eval.yaml +66 -0
- package/rules/python/flask/security/injection/user-exec.yaml +66 -0
- package/rules/python/flask/security/insecure-deserialization.yaml +43 -0
- package/rules/python/flask/security/open-redirect.yaml +64 -0
- package/rules/python/flask/security/secure-static-file-serve.yaml +29 -0
- package/rules/python/flask/security/unescaped-template-extension.yaml +55 -0
- package/rules/python/flask/security/unsanitized-input.yaml +47 -0
- package/rules/python/flask/security/xss/audit/direct-use-of-jinja2.yaml +43 -0
- package/rules/python/flask/security/xss/audit/explicit-unescape-with-markup.yaml +40 -0
- package/rules/python/flask/security/xss/audit/template-autoescape-off.yaml +34 -0
- package/rules/python/flask/security/xss/audit/template-unescaped-with-safe.yaml +33 -0
- package/rules/python/flask/security/xss/audit/template-unquoted-attribute-var.yaml +54 -0
- package/rules/python/jinja2/security/audit/autoescape-disabled-false.yaml +34 -0
- package/rules/python/jinja2/security/audit/missing-autoescape-disabled.yaml +33 -0
- package/rules/python/jwt/security/audit/jwt-exposed-data.yaml +32 -0
- package/rules/python/jwt/security/jwt-exposed-credentials.yaml +34 -0
- package/rules/python/jwt/security/jwt-hardcode.yaml +30 -0
- package/rules/python/jwt/security/jwt-none-alg.yaml +33 -0
- package/rules/python/jwt/security/unverified-jwt-decode.yaml +50 -0
- package/rules/python/lang/best-practice/hardcoded-tmp-path.yaml +14 -0
- package/rules/python/lang/best-practice/logging-error-without-handling.yaml +33 -0
- package/rules/python/lang/best-practice/manual-collections-create.yaml +94 -0
- package/rules/python/lang/best-practice/missing-hash-with-eq.yaml +23 -0
- package/rules/python/lang/best-practice/open-never-closed.yaml +95 -0
- package/rules/python/lang/best-practice/pass-body.yaml +30 -0
- package/rules/python/lang/best-practice/pdb.yaml +13 -0
- package/rules/python/lang/best-practice/sleep.yaml +16 -0
- package/rules/python/lang/best-practice/unspecified-open-encoding.yaml +36 -0
- package/rules/python/lang/compatibility/python36.yaml +28 -0
- package/rules/python/lang/compatibility/python37.yaml +192 -0
- package/rules/python/lang/correctness/baseclass-attribute-override.yaml +34 -0
- package/rules/python/lang/correctness/cannot-cache-generators.yaml +17 -0
- package/rules/python/lang/correctness/common-mistakes/default-mutable-dict.yaml +64 -0
- package/rules/python/lang/correctness/common-mistakes/default-mutable-list.yaml +66 -0
- package/rules/python/lang/correctness/common-mistakes/is-comparison-string.yaml +32 -0
- package/rules/python/lang/correctness/common-mistakes/is-not-is-not.yaml +12 -0
- package/rules/python/lang/correctness/common-mistakes/string-concat-in-list.yaml +20 -0
- package/rules/python/lang/correctness/concurrent.yaml +33 -0
- package/rules/python/lang/correctness/dict-modify-iterating.yaml +22 -0
- package/rules/python/lang/correctness/exceptions/exceptions.yaml +21 -0
- package/rules/python/lang/correctness/exit.yaml +19 -0
- package/rules/python/lang/correctness/file-object-redefined-before-close.yaml +22 -0
- package/rules/python/lang/correctness/list-modify-iterating.yaml +34 -0
- package/rules/python/lang/correctness/pdb.yaml +14 -0
- package/rules/python/lang/correctness/pytest-assert_match-after-path-patch.yaml +26 -0
- package/rules/python/lang/correctness/return-in-init.yaml +48 -0
- package/rules/python/lang/correctness/sync-sleep-in-async-code.yaml +18 -0
- package/rules/python/lang/correctness/tempfile/flush.yaml +79 -0
- package/rules/python/lang/correctness/tempfile/mktemp.yaml +13 -0
- package/rules/python/lang/correctness/test-is-missing-assert.yaml +41 -0
- package/rules/python/lang/correctness/unchecked-returns.yaml +23 -0
- package/rules/python/lang/correctness/useless-comparison.yaml +28 -0
- package/rules/python/lang/correctness/useless-eqeq.yaml +27 -0
- package/rules/python/lang/correctness/writing-to-file-in-read-mode.yaml +27 -0
- package/rules/python/lang/maintainability/improper-list-concat.yaml +18 -0
- package/rules/python/lang/maintainability/is-function-without-parentheses.yaml +18 -0
- package/rules/python/lang/maintainability/return.yaml +29 -0
- package/rules/python/lang/maintainability/useless-assign-keyed.yaml +16 -0
- package/rules/python/lang/maintainability/useless-ifelse.yaml +31 -0
- package/rules/python/lang/maintainability/useless-innerfunction.yaml +36 -0
- package/rules/python/lang/maintainability/useless-literal-set.yaml +15 -0
- package/rules/python/lang/maintainability/useless-literal.yaml +18 -0
- package/rules/python/lang/security/audit/conn_recv.yaml +35 -0
- package/rules/python/lang/security/audit/dangerous-annotations-usage.yaml +34 -0
- package/rules/python/lang/security/audit/dangerous-asyncio-create-exec-audit.yaml +62 -0
- package/rules/python/lang/security/audit/dangerous-asyncio-create-exec-tainted-env-args.yaml +110 -0
- package/rules/python/lang/security/audit/dangerous-asyncio-exec-audit.yaml +48 -0
- package/rules/python/lang/security/audit/dangerous-asyncio-exec-tainted-env-args.yaml +95 -0
- package/rules/python/lang/security/audit/dangerous-asyncio-shell-audit.yaml +48 -0
- package/rules/python/lang/security/audit/dangerous-asyncio-shell-tainted-env-args.yaml +96 -0
- package/rules/python/lang/security/audit/dangerous-code-run-audit.yaml +55 -0
- package/rules/python/lang/security/audit/dangerous-code-run-tainted-env-args.yaml +105 -0
- package/rules/python/lang/security/audit/dangerous-os-exec-audit.yaml +57 -0
- package/rules/python/lang/security/audit/dangerous-os-exec-tainted-env-args.yaml +109 -0
- package/rules/python/lang/security/audit/dangerous-spawn-process-audit.yaml +58 -0
- package/rules/python/lang/security/audit/dangerous-spawn-process-tainted-env-args.yaml +112 -0
- package/rules/python/lang/security/audit/dangerous-subinterpreters-run-string-audit.yaml +32 -0
- package/rules/python/lang/security/audit/dangerous-subinterpreters-run-string-tainted-env-args.yaml +81 -0
- package/rules/python/lang/security/audit/dangerous-subprocess-use-audit.yaml +75 -0
- package/rules/python/lang/security/audit/dangerous-subprocess-use-tainted-env-args.yaml +115 -0
- package/rules/python/lang/security/audit/dangerous-system-call-audit.yaml +63 -0
- package/rules/python/lang/security/audit/dangerous-system-call-tainted-env-args.yaml +110 -0
- package/rules/python/lang/security/audit/dangerous-testcapi-run-in-subinterp-audit.yaml +36 -0
- package/rules/python/lang/security/audit/dangerous-testcapi-run-in-subinterp-tainted-env-args.yaml +85 -0
- package/rules/python/lang/security/audit/dynamic-urllib-use-detected.yaml +57 -0
- package/rules/python/lang/security/audit/eval-detected.yaml +35 -0
- package/rules/python/lang/security/audit/exec-detected.yaml +34 -0
- package/rules/python/lang/security/audit/formatted-sql-query.yaml +42 -0
- package/rules/python/lang/security/audit/hardcoded-password-default-argument.yaml +33 -0
- package/rules/python/lang/security/audit/httpsconnection-detected.yaml +33 -0
- package/rules/python/lang/security/audit/insecure-file-permissions.yaml +63 -0
- package/rules/python/lang/security/audit/insecure-transport/ftplib/use-ftp-tls.yaml +40 -0
- package/rules/python/lang/security/audit/insecure-transport/requests/request-session-http-in-with-context.yaml +58 -0
- package/rules/python/lang/security/audit/insecure-transport/requests/request-session-with-http.yaml +56 -0
- package/rules/python/lang/security/audit/insecure-transport/requests/request-with-http.yaml +57 -0
- package/rules/python/lang/security/audit/insecure-transport/ssl/no-set-ciphers.yaml +32 -0
- package/rules/python/lang/security/audit/insecure-transport/urllib/insecure-openerdirector-open-ftp.yaml +56 -0
- package/rules/python/lang/security/audit/insecure-transport/urllib/insecure-openerdirector-open.yaml +58 -0
- package/rules/python/lang/security/audit/insecure-transport/urllib/insecure-request-object-ftp.yaml +36 -0
- package/rules/python/lang/security/audit/insecure-transport/urllib/insecure-request-object.yaml +39 -0
- package/rules/python/lang/security/audit/insecure-transport/urllib/insecure-urlopen-ftp.yaml +35 -0
- package/rules/python/lang/security/audit/insecure-transport/urllib/insecure-urlopen.yaml +37 -0
- package/rules/python/lang/security/audit/insecure-transport/urllib/insecure-urlopener-open-ftp.yaml +55 -0
- package/rules/python/lang/security/audit/insecure-transport/urllib/insecure-urlopener-open.yaml +58 -0
- package/rules/python/lang/security/audit/insecure-transport/urllib/insecure-urlopener-retrieve-ftp.yaml +55 -0
- package/rules/python/lang/security/audit/insecure-transport/urllib/insecure-urlopener-retrieve.yaml +58 -0
- package/rules/python/lang/security/audit/insecure-transport/urllib/insecure-urlretrieve-ftp.yaml +35 -0
- package/rules/python/lang/security/audit/insecure-transport/urllib/insecure-urlretrieve.yaml +37 -0
- package/rules/python/lang/security/audit/logging/listeneval.yaml +31 -0
- package/rules/python/lang/security/audit/logging/logger-credential-leak.yaml +37 -0
- package/rules/python/lang/security/audit/mako-templates-detected.yaml +32 -0
- package/rules/python/lang/security/audit/marshal.yaml +34 -0
- package/rules/python/lang/security/audit/md5-used-as-password.yaml +48 -0
- package/rules/python/lang/security/audit/network/bind.yaml +39 -0
- package/rules/python/lang/security/audit/network/disabled-cert-validation.yaml +35 -0
- package/rules/python/lang/security/audit/network/http-not-https-connection.yaml +28 -0
- package/rules/python/lang/security/audit/non-literal-import.yaml +30 -0
- package/rules/python/lang/security/audit/paramiko/paramiko-exec-command.yaml +36 -0
- package/rules/python/lang/security/audit/paramiko-implicit-trust-host-key.yaml +34 -0
- package/rules/python/lang/security/audit/python-reverse-shell.yaml +32 -0
- package/rules/python/lang/security/audit/regex-dos.yaml +34 -0
- package/rules/python/lang/security/audit/sha224-hash.yaml +30 -0
- package/rules/python/lang/security/audit/sqli/aiopg-sqli.yaml +103 -0
- package/rules/python/lang/security/audit/sqli/asyncpg-sqli.yaml +96 -0
- package/rules/python/lang/security/audit/sqli/pg8000-sqli.yaml +90 -0
- package/rules/python/lang/security/audit/sqli/psycopg-sqli.yaml +86 -0
- package/rules/python/lang/security/audit/ssl-wrap-socket-is-deprecated.yaml +27 -0
- package/rules/python/lang/security/audit/subprocess-list-passed-as-string.yaml +43 -0
- package/rules/python/lang/security/audit/subprocess-shell-true.yaml +42 -0
- package/rules/python/lang/security/audit/system-wildcard-detected.yaml +37 -0
- package/rules/python/lang/security/audit/telnetlib.yaml +27 -0
- package/rules/python/lang/security/audit/weak-ssl-version.yaml +43 -0
- package/rules/python/lang/security/dangerous-code-run.yaml +156 -0
- package/rules/python/lang/security/dangerous-globals-use.yaml +54 -0
- package/rules/python/lang/security/dangerous-os-exec.yaml +160 -0
- package/rules/python/lang/security/dangerous-spawn-process.yaml +206 -0
- package/rules/python/lang/security/dangerous-subinterpreters-run-string.yaml +132 -0
- package/rules/python/lang/security/dangerous-subprocess-use.yaml +164 -0
- package/rules/python/lang/security/dangerous-system-call.yaml +164 -0
- package/rules/python/lang/security/dangerous-testcapi-run-in-subinterp.yaml +136 -0
- package/rules/python/lang/security/deserialization/avoid-jsonpickle.yaml +33 -0
- package/rules/python/lang/security/deserialization/avoid-pyyaml-load.yaml +50 -0
- package/rules/python/lang/security/deserialization/avoid-unsafe-ruamel.yaml +32 -0
- package/rules/python/lang/security/deserialization/pickle.yaml +128 -0
- package/rules/python/lang/security/insecure-hash-algorithms-md5.yaml +39 -0
- package/rules/python/lang/security/insecure-hash-algorithms.yaml +40 -0
- package/rules/python/lang/security/insecure-hash-function.yaml +36 -0
- package/rules/python/lang/security/insecure-uuid-version.yaml +34 -0
- package/rules/python/lang/security/unverified-ssl-context.yaml +34 -0
- package/rules/python/lang/security/use-defused-xml-parse.yaml +34 -0
- package/rules/python/lang/security/use-defused-xml.yaml +30 -0
- package/rules/python/lang/security/use-defused-xmlrpc.yaml +31 -0
- package/rules/python/lang/security/use-defusedcsv.yaml +37 -0
- package/rules/python/pycryptodome/security/insecure-cipher-algorithm-blowfish.yaml +38 -0
- package/rules/python/pycryptodome/security/insecure-cipher-algorithm-des.yaml +40 -0
- package/rules/python/pycryptodome/security/insecure-cipher-algorithm-rc2.yaml +38 -0
- package/rules/python/pycryptodome/security/insecure-cipher-algorithm-rc4.yaml +36 -0
- package/rules/python/pycryptodome/security/insecure-cipher-algorithm.yaml +30 -0
- package/rules/python/pycryptodome/security/insecure-hash-algorithm-md2.yaml +40 -0
- package/rules/python/pycryptodome/security/insecure-hash-algorithm-md4.yaml +40 -0
- package/rules/python/pycryptodome/security/insecure-hash-algorithm-md5.yaml +40 -0
- package/rules/python/pycryptodome/security/insecure-hash-algorithm.yaml +33 -0
- package/rules/python/pycryptodome/security/insufficient-dsa-key-size.yaml +40 -0
- package/rules/python/pycryptodome/security/insufficient-rsa-key-size.yaml +40 -0
- package/rules/python/pycryptodome/security/mode-without-authentication.yaml +44 -0
- package/rules/python/pymongo/security/mongodb.yaml +26 -0
- package/rules/python/pyramid/audit/authtkt-cookie-httponly-unsafe-default.yaml +37 -0
- package/rules/python/pyramid/audit/authtkt-cookie-httponly-unsafe-value.yaml +40 -0
- package/rules/python/pyramid/audit/authtkt-cookie-samesite.yaml +35 -0
- package/rules/python/pyramid/audit/authtkt-cookie-secure-unsafe-default.yaml +38 -0
- package/rules/python/pyramid/audit/authtkt-cookie-secure-unsafe-value.yaml +40 -0
- package/rules/python/pyramid/audit/csrf-check-disabled.yaml +42 -0
- package/rules/python/pyramid/audit/csrf-origin-check-disabled-globally.yaml +37 -0
- package/rules/python/pyramid/audit/csrf-origin-check-disabled.yaml +44 -0
- package/rules/python/pyramid/audit/set-cookie-httponly-unsafe-default.yaml +44 -0
- package/rules/python/pyramid/audit/set-cookie-httponly-unsafe-value.yaml +49 -0
- package/rules/python/pyramid/audit/set-cookie-samesite-unsafe-default.yaml +44 -0
- package/rules/python/pyramid/audit/set-cookie-samesite-unsafe-value.yaml +46 -0
- package/rules/python/pyramid/audit/set-cookie-secure-unsafe-default.yaml +44 -0
- package/rules/python/pyramid/audit/set-cookie-secure-unsafe-value.yaml +47 -0
- package/rules/python/pyramid/security/csrf-check-disabled-globally.yaml +36 -0
- package/rules/python/pyramid/security/direct-use-of-response.yaml +54 -0
- package/rules/python/pyramid/security/sqlalchemy-sql-injection.yaml +62 -0
- package/rules/python/requests/best-practice/use-raise-for-status.yaml +62 -0
- package/rules/python/requests/best-practice/use-request-json-shortcut.yaml +19 -0
- package/rules/python/requests/best-practice/use-response-json-shortcut.yaml +20 -0
- package/rules/python/requests/best-practice/use-timeout.yaml +46 -0
- package/rules/python/requests/security/disabled-cert-validation.yaml +37 -0
- package/rules/python/requests/security/no-auth-over-http.yaml +38 -0
- package/rules/python/sh/security/string-concat.yaml +31 -0
- package/rules/python/sqlalchemy/correctness/bad-operator-in-filter.yaml +29 -0
- package/rules/python/sqlalchemy/correctness/delete-where.yaml +15 -0
- package/rules/python/sqlalchemy/performance/performance-improvements.yaml +23 -0
- package/rules/python/sqlalchemy/security/audit/avoid-sqlalchemy-text.yaml +60 -0
- package/rules/python/sqlalchemy/security/sqlalchemy-execute-raw-query.yaml +67 -0
- package/rules/python/sqlalchemy/security/sqlalchemy-sql-injection.yaml +59 -0
- package/rules/python/twilio/security/twiml-injection.yaml +50 -0
- package/rules/ruby/aws-lambda/security/activerecord-sqli.yaml +50 -0
- package/rules/ruby/aws-lambda/security/mysql2-sqli.yaml +50 -0
- package/rules/ruby/aws-lambda/security/pg-sqli.yaml +54 -0
- package/rules/ruby/aws-lambda/security/sequel-sqli.yaml +49 -0
- package/rules/ruby/aws-lambda/security/tainted-deserialization.yaml +54 -0
- package/rules/ruby/aws-lambda/security/tainted-sql-string.yaml +57 -0
- package/rules/ruby/jwt/security/audit/jwt-decode-without-verify.yaml +32 -0
- package/rules/ruby/jwt/security/audit/jwt-exposed-data.yaml +36 -0
- package/rules/ruby/jwt/security/jwt-exposed-credentials.yaml +35 -0
- package/rules/ruby/jwt/security/jwt-hardcode.yaml +53 -0
- package/rules/ruby/jwt/security/jwt-none-alg.yaml +34 -0
- package/rules/ruby/lang/security/audit/sha224-hash.yaml +41 -0
- package/rules/ruby/lang/security/bad-deserialization-env.yaml +46 -0
- package/rules/ruby/lang/security/bad-deserialization-yaml.yaml +63 -0
- package/rules/ruby/lang/security/bad-deserialization.yaml +47 -0
- package/rules/ruby/lang/security/cookie-serialization.yaml +33 -0
- package/rules/ruby/lang/security/create-with.yaml +33 -0
- package/rules/ruby/lang/security/dangerous-exec.yaml +53 -0
- package/rules/ruby/lang/security/dangerous-open.yaml +34 -0
- package/rules/ruby/lang/security/dangerous-open3-pipeline.yaml +34 -0
- package/rules/ruby/lang/security/dangerous-subshell.yaml +34 -0
- package/rules/ruby/lang/security/dangerous-syscall.yaml +26 -0
- package/rules/ruby/lang/security/divide-by-zero.yaml +31 -0
- package/rules/ruby/lang/security/file-disclosure.yaml +33 -0
- package/rules/ruby/lang/security/filter-skipping.yaml +33 -0
- package/rules/ruby/lang/security/force-ssl-false.yaml +31 -0
- package/rules/ruby/lang/security/hardcoded-http-auth-in-controller.yaml +37 -0
- package/rules/ruby/lang/security/hardcoded-secret-rsa-passphrase.yaml +103 -0
- package/rules/ruby/lang/security/insufficient-rsa-key-size.yaml +51 -0
- package/rules/ruby/lang/security/json-entity-escape.yaml +33 -0
- package/rules/ruby/lang/security/mass-assignment-protection-disabled.yaml +29 -0
- package/rules/ruby/lang/security/md5-used-as-password.yaml +37 -0
- package/rules/ruby/lang/security/missing-csrf-protection.yaml +43 -0
- package/rules/ruby/lang/security/model-attr-accessible.yaml +47 -0
- package/rules/ruby/lang/security/model-attributes-attr-accessible.yaml +47 -0
- package/rules/ruby/lang/security/no-eval.yaml +56 -0
- package/rules/ruby/lang/security/no-send.yaml +46 -0
- package/rules/ruby/lang/security/ssl-mode-no-verify.yaml +30 -0
- package/rules/ruby/lang/security/unprotected-mass-assign.yaml +39 -0
- package/rules/ruby/lang/security/weak-hashes-md5.yaml +36 -0
- package/rules/ruby/lang/security/weak-hashes-sha1.yaml +31 -0
- package/rules/ruby/rails/correctness/rails-no-render-after-save.yaml +29 -0
- package/rules/ruby/rails/performance/ruby-rails-performance-indexes-are-really-beneficial.yaml +27 -0
- package/rules/ruby/rails/security/audit/avoid-logging-everything.yaml +52 -0
- package/rules/ruby/rails/security/audit/avoid-session-manipulation.yaml +41 -0
- package/rules/ruby/rails/security/audit/avoid-tainted-file-access.yaml +71 -0
- package/rules/ruby/rails/security/audit/avoid-tainted-ftp-call.yaml +41 -0
- package/rules/ruby/rails/security/audit/avoid-tainted-http-request.yaml +79 -0
- package/rules/ruby/rails/security/audit/avoid-tainted-shell-call.yaml +80 -0
- package/rules/ruby/rails/security/audit/detailed-exceptions.yaml +47 -0
- package/rules/ruby/rails/security/audit/rails-skip-forgery-protection.yaml +25 -0
- package/rules/ruby/rails/security/audit/sqli/ruby-pg-sqli.yaml +64 -0
- package/rules/ruby/rails/security/audit/xss/avoid-content-tag.yaml +32 -0
- package/rules/ruby/rails/security/audit/xss/avoid-default-routes.yaml +34 -0
- package/rules/ruby/rails/security/audit/xss/avoid-html-safe.yaml +32 -0
- package/rules/ruby/rails/security/audit/xss/avoid-link-to.yaml +49 -0
- package/rules/ruby/rails/security/audit/xss/avoid-raw.yaml +30 -0
- package/rules/ruby/rails/security/audit/xss/avoid-redirect.yaml +60 -0
- package/rules/ruby/rails/security/audit/xss/avoid-render-dynamic-path.yaml +44 -0
- package/rules/ruby/rails/security/audit/xss/avoid-render-inline.yaml +30 -0
- package/rules/ruby/rails/security/audit/xss/avoid-render-text.yaml +33 -0
- package/rules/ruby/rails/security/audit/xss/manual-template-creation.yaml +30 -0
- package/rules/ruby/rails/security/audit/xss/templates/alias-for-html-safe.yaml +36 -0
- package/rules/ruby/rails/security/audit/xss/templates/avoid-content-tag.yaml +36 -0
- package/rules/ruby/rails/security/audit/xss/templates/avoid-html-safe.yaml +37 -0
- package/rules/ruby/rails/security/audit/xss/templates/avoid-raw.yaml +37 -0
- package/rules/ruby/rails/security/audit/xss/templates/dangerous-link-to.yaml +43 -0
- package/rules/ruby/rails/security/audit/xss/templates/unquoted-attribute.yaml +41 -0
- package/rules/ruby/rails/security/audit/xss/templates/var-in-href.yaml +39 -0
- package/rules/ruby/rails/security/audit/xss/templates/var-in-script-tag.yaml +43 -0
- package/rules/ruby/rails/security/audit/xxe/libxml-backend.yaml +30 -0
- package/rules/ruby/rails/security/audit/xxe/xml-external-entities-enabled.yaml +42 -0
- package/rules/ruby/rails/security/brakeman/check-before-filter.yaml +35 -0
- package/rules/ruby/rails/security/brakeman/check-cookie-store-session-security-attributes.yaml +39 -0
- package/rules/ruby/rails/security/brakeman/check-dynamic-render-local-file-include.yaml +38 -0
- package/rules/ruby/rails/security/brakeman/check-http-verb-confusion.yaml +39 -0
- package/rules/ruby/rails/security/brakeman/check-permit-attributes-high.yaml +30 -0
- package/rules/ruby/rails/security/brakeman/check-permit-attributes-medium.yaml +30 -0
- package/rules/ruby/rails/security/brakeman/check-rails-secret-yaml.secrets.test.yml +26 -0
- package/rules/ruby/rails/security/brakeman/check-rails-secret-yaml.yaml +43 -0
- package/rules/ruby/rails/security/brakeman/check-rails-session-secret-handling.yaml +43 -0
- package/rules/ruby/rails/security/brakeman/check-redirect-to.yaml +80 -0
- package/rules/ruby/rails/security/brakeman/check-regex-dos.yaml +66 -0
- package/rules/ruby/rails/security/brakeman/check-render-local-file-include.yaml +63 -0
- package/rules/ruby/rails/security/brakeman/check-reverse-tabnabbing.yaml +63 -0
- package/rules/ruby/rails/security/brakeman/check-secrets.yaml +36 -0
- package/rules/ruby/rails/security/brakeman/check-send-file.yaml +45 -0
- package/rules/ruby/rails/security/brakeman/check-sql.yaml +90 -0
- package/rules/ruby/rails/security/brakeman/check-unsafe-reflection-methods.yaml +60 -0
- package/rules/ruby/rails/security/brakeman/check-unsafe-reflection.yaml +55 -0
- package/rules/ruby/rails/security/brakeman/check-unscoped-find.yaml +52 -0
- package/rules/ruby/rails/security/brakeman/check-validation-regex.yaml +39 -0
- package/rules/ruby/rails/security/injection/raw-html-format.yaml +60 -0
- package/rules/ruby/rails/security/injection/tainted-sql-string.yaml +70 -0
- package/rules/ruby/rails/security/injection/tainted-url-host.yaml +59 -0
- package/rules/rust/lang/security/args-os.yml +21 -0
- package/rules/rust/lang/security/args.yml +21 -0
- package/rules/rust/lang/security/current-exe.yml +21 -0
- package/rules/rust/lang/security/insecure-hashes.yml +25 -0
- package/rules/rust/lang/security/reqwest-accept-invalid.yml +20 -0
- package/rules/rust/lang/security/reqwest-set-sensitive.yml +44 -0
- package/rules/rust/lang/security/rustls-dangerous.yml +24 -0
- package/rules/rust/lang/security/ssl-verify-none.yml +17 -0
- package/rules/rust/lang/security/temp-dir.yml +23 -0
- package/rules/rust/lang/security/unsafe-usage.yml +17 -0
- package/rules/third-party/go-extra/anon-struct-args.yml +12 -0
- package/rules/third-party/go-extra/badexponentiation.yml +9 -0
- package/rules/third-party/go-extra/badnilguard.yml +15 -0
- package/rules/third-party/go-extra/close-sql-query-rows.yml +57 -0
- package/rules/third-party/go-extra/contextCancelable.yml +22 -0
- package/rules/third-party/go-extra/contextTODO.yml +9 -0
- package/rules/third-party/go-extra/ctx-time.yml +24 -0
- package/rules/third-party/go-extra/errclosed.yml +10 -0
- package/rules/third-party/go-extra/errnilcheck.yml +18 -0
- package/rules/third-party/go-extra/errtodo.yml +22 -0
- package/rules/third-party/go-extra/gofuzz.yml +18 -0
- package/rules/third-party/go-extra/hashsum.yml +25 -0
- package/rules/third-party/go-extra/hmac-bytes.yml +19 -0
- package/rules/third-party/go-extra/hmac-hash.yml +21 -0
- package/rules/third-party/go-extra/hostport.yml +28 -0
- package/rules/third-party/go-extra/http-ctx-goroutine.yml +14 -0
- package/rules/third-party/go-extra/ioutil.yml +48 -0
- package/rules/third-party/go-extra/joinpath.yml +11 -0
- package/rules/third-party/go-extra/json-writer.yml +35 -0
- package/rules/third-party/go-extra/mail-address.yml +13 -0
- package/rules/third-party/go-extra/marshaljson.yml +31 -0
- package/rules/third-party/go-extra/marshalyaml.yml +22 -0
- package/rules/third-party/go-extra/mathbits.yml +23 -0
- package/rules/third-party/go-extra/netip.yml +9 -0
- package/rules/third-party/go-extra/nilerr.yml +15 -0
- package/rules/third-party/go-extra/nrtxn.yml +16 -0
- package/rules/third-party/go-extra/oddbitwise.yml +14 -0
- package/rules/third-party/go-extra/oddcompare.yml +59 -0
- package/rules/third-party/go-extra/oddcompound.yml +11 -0
- package/rules/third-party/go-extra/oddifsequence.yml +134 -0
- package/rules/third-party/go-extra/oddmathbits.yml +11 -0
- package/rules/third-party/go-extra/oserrors.yml +28 -0
- package/rules/third-party/go-extra/parseint-downcast.yml +31 -0
- package/rules/third-party/go-extra/readeof.yml +16 -0
- package/rules/third-party/go-extra/readfull.yml +17 -0
- package/rules/third-party/go-extra/returnnil.yml +16 -0
- package/rules/third-party/go-extra/sortslice.yml +40 -0
- package/rules/third-party/go-extra/sprinterr.yml +54 -0
- package/rules/third-party/go-extra/timeafter.yml +16 -0
- package/rules/third-party/go-extra/unixnano.yml +15 -0
- package/rules/third-party/go-extra/writestring.yml +19 -0
- package/rules/third-party/go-extra/wrongerrcall.yml +16 -0
- package/rules/third-party/go-extra/wronglock.yml +19 -0
- package/rules/third-party/shopify/go/gorilla/security/audit/handler-assignment-from-multiple-sources.yaml +54 -0
- package/rules/third-party/shopify/go/gorilla/security/audit/session-cookie-missing-httponly.yaml +32 -0
- package/rules/third-party/shopify/go/gorilla/security/audit/session-cookie-missing-secure.yaml +31 -0
- package/rules/third-party/shopify/go/grpc/security/grpc-client-insecure-connection.yaml +22 -0
- package/rules/third-party/shopify/go/grpc/security/grpc-server-insecure-connection.yaml +37 -0
- package/rules/third-party/shopify/go/jwt-go/security/audit/jwt-parse-unverified.yaml +21 -0
- package/rules/third-party/shopify/go/jwt-go/security/jwt-none-alg.yaml +25 -0
- package/rules/third-party/shopify/go/jwt-go/security/jwt.yaml +18 -0
- package/rules/third-party/shopify/go/lang/best-practice/channel-guarded-with-mutex.yaml +22 -0
- package/rules/third-party/shopify/go/lang/best-practice/hidden-goroutine.yaml +27 -0
- package/rules/third-party/shopify/go/lang/correctness/looppointer.yaml +29 -0
- package/rules/third-party/shopify/go/lang/correctness/overflow/overflow.yaml +35 -0
- package/rules/third-party/shopify/go/lang/correctness/permissions/file_permission.yaml +22 -0
- package/rules/third-party/shopify/go/lang/correctness/useless-eqeq.yaml +26 -0
- package/rules/third-party/shopify/go/lang/maintainability/useless-ifelse.yaml +31 -0
- package/rules/third-party/shopify/go/lang/security/audit/crypto/bad_imports.yaml +47 -0
- package/rules/third-party/shopify/go/lang/security/audit/crypto/insecure_ssh.yaml +22 -0
- package/rules/third-party/shopify/go/lang/security/audit/crypto/math_random.yaml +31 -0
- package/rules/third-party/shopify/go/lang/security/audit/crypto/missing-ssl-minversion.yaml +27 -0
- package/rules/third-party/shopify/go/lang/security/audit/crypto/ssl.yaml +22 -0
- package/rules/third-party/shopify/go/lang/security/audit/crypto/tls.yaml +44 -0
- package/rules/third-party/shopify/go/lang/security/audit/crypto/use_of_weak_crypto.yaml +72 -0
- package/rules/third-party/shopify/go/lang/security/audit/crypto/use_of_weak_rsa_key.yaml +23 -0
- package/rules/third-party/shopify/go/lang/security/audit/dangerous-command-write.yaml +34 -0
- package/rules/third-party/shopify/go/lang/security/audit/dangerous-exec-cmd.yaml +75 -0
- package/rules/third-party/shopify/go/lang/security/audit/dangerous-exec-command.yaml +46 -0
- package/rules/third-party/shopify/go/lang/security/audit/dangerous-syscall-exec.yaml +87 -0
- package/rules/third-party/shopify/go/lang/security/audit/database/string-formatted-query.yaml +154 -0
- package/rules/third-party/shopify/go/lang/security/audit/net/bind_all.yaml +18 -0
- package/rules/third-party/shopify/go/lang/security/audit/net/cookie-missing-httponly.yaml +33 -0
- package/rules/third-party/shopify/go/lang/security/audit/net/cookie-missing-secure.yaml +32 -0
- package/rules/third-party/shopify/go/lang/security/audit/net/dynamic-httptrace-clienttrace.yaml +31 -0
- package/rules/third-party/shopify/go/lang/security/audit/net/formatted-template-string.yaml +46 -0
- package/rules/third-party/shopify/go/lang/security/audit/net/pprof.yaml +30 -0
- package/rules/third-party/shopify/go/lang/security/audit/net/unescaped-data-in-htmlattr.yaml +43 -0
- package/rules/third-party/shopify/go/lang/security/audit/net/unescaped-data-in-js.yaml +43 -0
- package/rules/third-party/shopify/go/lang/security/audit/net/unescaped-data-in-url.yaml +43 -0
- package/rules/third-party/shopify/go/lang/security/audit/net/use-tls.yaml +17 -0
- package/rules/third-party/shopify/go/lang/security/audit/net/wip-xss-using-responsewriter-and-printf.yaml +60 -0
- package/rules/third-party/shopify/go/lang/security/audit/reflect-makefunc.yaml +17 -0
- package/rules/third-party/shopify/go/lang/security/audit/sqli/gosql-sqli.yaml +51 -0
- package/rules/third-party/shopify/go/lang/security/audit/sqli/pg-orm-sqli.yaml +53 -0
- package/rules/third-party/shopify/go/lang/security/audit/sqli/pg-sqli.yaml +54 -0
- package/rules/third-party/shopify/go/lang/security/audit/sqli/pgx-sqli.yaml +58 -0
- package/rules/third-party/shopify/go/lang/security/audit/unsafe-reflect-by-name.yaml +33 -0
- package/rules/third-party/shopify/go/lang/security/audit/unsafe.yaml +15 -0
- package/rules/third-party/shopify/go/lang/security/audit/xss/import-text-template.yaml +18 -0
- package/rules/third-party/shopify/go/lang/security/audit/xss/no-direct-write-to-responsewriter.yaml +37 -0
- package/rules/third-party/shopify/go/lang/security/audit/xss/no-fprintf-to-responsewriter.yaml +30 -0
- package/rules/third-party/shopify/go/lang/security/audit/xss/no-interpolation-in-tag.yaml +21 -0
- package/rules/third-party/shopify/go/lang/security/audit/xss/no-interpolation-js-template-string.yaml +25 -0
- package/rules/third-party/shopify/go/lang/security/audit/xss/no-io-writestring-to-responsewriter.yaml +31 -0
- package/rules/third-party/shopify/go/lang/security/audit/xss/no-printf-in-responsewriter.yaml +30 -0
- package/rules/third-party/shopify/go/lang/security/audit/xss/template-html-does-not-escape.yaml +31 -0
- package/rules/third-party/shopify/go/lang/security/bad_tmp.yaml +14 -0
- package/rules/third-party/shopify/go/lang/security/decompression_bomb.yaml +58 -0
- package/rules/third-party/shopify/go/lang/security/injection/raw-html-format.yaml +41 -0
- package/rules/third-party/shopify/go/lang/security/injection/tainted-url-host.yaml +38 -0
- package/rules/third-party/shopify/go/lang/security/zip.yaml +19 -0
- package/rules/third-party/shopify/go/otto/security/audit/dangerous-execution.yaml +23 -0
- package/rules/third-party/shopify/go/template/security/insecure-types.yaml +25 -0
- package/rules/third-party/shopify/javascript/ajv/security/audit/ajv-allerrors-true.yaml +22 -0
- package/rules/third-party/shopify/javascript/angular/security/detect-angular-element-methods.yaml +31 -0
- package/rules/third-party/shopify/javascript/angular/security/detect-angular-open-redirect.yaml +25 -0
- package/rules/third-party/shopify/javascript/angular/security/detect-angular-resource-loading.yaml +24 -0
- package/rules/third-party/shopify/javascript/angular/security/detect-angular-sce-disabled.yaml +17 -0
- package/rules/third-party/shopify/javascript/angular/security/detect-angular-trust-as-css.yaml +27 -0
- package/rules/third-party/shopify/javascript/angular/security/detect-angular-trust-as-html-method.yaml +27 -0
- package/rules/third-party/shopify/javascript/angular/security/detect-angular-trust-as-js-method.yaml +27 -0
- package/rules/third-party/shopify/javascript/angular/security/detect-angular-trust-as-method.yaml +26 -0
- package/rules/third-party/shopify/javascript/angular/security/detect-angular-trust-as-resourceurl-method.yaml +27 -0
- package/rules/third-party/shopify/javascript/angular/security/detect-angular-trust-as-url-method.yaml +27 -0
- package/rules/third-party/shopify/javascript/angular/security/detect-third-party-angular-translate.yaml +43 -0
- package/rules/third-party/shopify/javascript/apollo/security/apollo-axios-ssrf.yaml +37 -0
- package/rules/third-party/shopify/javascript/bluebird/security/audit/tofastproperties-code-execution.yaml +29 -0
- package/rules/third-party/shopify/javascript/browser/security/dom-based-xss.yaml +23 -0
- package/rules/third-party/shopify/javascript/browser/security/eval-detected.yaml +25 -0
- package/rules/third-party/shopify/javascript/browser/security/insecure-document-method.yaml +26 -0
- package/rules/third-party/shopify/javascript/browser/security/insecure-innerhtml.yaml +19 -0
- package/rules/third-party/shopify/javascript/browser/security/insufficient-postmessage-origin-validation.yaml +40 -0
- package/rules/third-party/shopify/javascript/browser/security/new-function-detected.yaml +24 -0
- package/rules/third-party/shopify/javascript/browser/security/open-redirect.yaml +37 -0
- package/rules/third-party/shopify/javascript/browser/security/raw-html-concat.yaml +62 -0
- package/rules/third-party/shopify/javascript/browser/security/raw-html-join.yaml +32 -0
- package/rules/third-party/shopify/javascript/browser/security/wildcard-postmessage-configuration.yaml +15 -0
- package/rules/third-party/shopify/javascript/chrome-remote-interface/security/audit/chrome-remote-interface-compilescript-injection.yaml +23 -0
- package/rules/third-party/shopify/javascript/chrome-remote-interface/security/audit/chrome-remote-interface-evaluate-injection.yaml +23 -0
- package/rules/third-party/shopify/javascript/chrome-remote-interface/security/audit/chrome-remote-interface-navigate-injection.yaml +23 -0
- package/rules/third-party/shopify/javascript/chrome-remote-interface/security/audit/chrome-remote-interface-printtopdf-injection.yaml +28 -0
- package/rules/third-party/shopify/javascript/chrome-remote-interface/security/audit/chrome-remote-interface-setdocumentcontent-injection.yaml +23 -0
- package/rules/third-party/shopify/javascript/deno/security/audit/deno-dangerous-run.yaml +36 -0
- package/rules/third-party/shopify/javascript/express/security/audit/express-cookie-settings.yaml +291 -0
- package/rules/third-party/shopify/javascript/express/security/audit/express-jwt-not-revoked.yaml +29 -0
- package/rules/third-party/shopify/javascript/express/security/audit/express-path-join-resolve-traversal.yaml +47 -0
- package/rules/third-party/shopify/javascript/express/security/audit/express-xml2json-xxe-event.yaml +28 -0
- package/rules/third-party/shopify/javascript/express/security/audit/possible-user-input-redirect.yaml +32 -0
- package/rules/third-party/shopify/javascript/express/security/audit/remote-property-injection.yaml +35 -0
- package/rules/third-party/shopify/javascript/express/security/audit/res-render-injection.yaml +25 -0
- package/rules/third-party/shopify/javascript/express/security/audit/xss/direct-response-write.yaml +38 -0
- package/rules/third-party/shopify/javascript/express/security/audit/xss/ejs/explicit-unescape.yaml +27 -0
- package/rules/third-party/shopify/javascript/express/security/audit/xss/ejs/var-in-href.yaml +27 -0
- package/rules/third-party/shopify/javascript/express/security/audit/xss/ejs/var-in-script-src.yaml +32 -0
- package/rules/third-party/shopify/javascript/express/security/audit/xss/ejs/var-in-script-tag.yaml +32 -0
- package/rules/third-party/shopify/javascript/express/security/audit/xss/mustache/escape-function-overwrite.yaml +25 -0
- package/rules/third-party/shopify/javascript/express/security/audit/xss/mustache/explicit-unescape.yaml +28 -0
- package/rules/third-party/shopify/javascript/express/security/audit/xss/mustache/var-in-href.yaml +28 -0
- package/rules/third-party/shopify/javascript/express/security/audit/xss/mustache/var-in-script-tag.yaml +31 -0
- package/rules/third-party/shopify/javascript/express/security/audit/xss/pug/and-attributes.yaml +23 -0
- package/rules/third-party/shopify/javascript/express/security/audit/xss/pug/explicit-unescape.yaml +26 -0
- package/rules/third-party/shopify/javascript/express/security/audit/xss/pug/var-in-href.yaml +26 -0
- package/rules/third-party/shopify/javascript/express/security/audit/xss/pug/var-in-script-tag.yaml +33 -0
- package/rules/third-party/shopify/javascript/express/security/cors-misconfiguration.yaml +43 -0
- package/rules/third-party/shopify/javascript/express/security/express-data-exfiltration.yaml +34 -0
- package/rules/third-party/shopify/javascript/express/security/express-expat-xxe.yaml +48 -0
- package/rules/third-party/shopify/javascript/express/security/express-jwt-hardcoded-secret.yaml +31 -0
- package/rules/third-party/shopify/javascript/express/security/express-phantom-injection.yaml +79 -0
- package/rules/third-party/shopify/javascript/express/security/express-puppeteer-injection.yaml +109 -0
- package/rules/third-party/shopify/javascript/express/security/express-sandbox-injection.yaml +43 -0
- package/rules/third-party/shopify/javascript/express/security/express-vm-injection.yaml +43 -0
- package/rules/third-party/shopify/javascript/express/security/express-vm2-injection.yaml +53 -0
- package/rules/third-party/shopify/javascript/express/security/express-wkhtml-injection.yaml +77 -0
- package/rules/third-party/shopify/javascript/express/security/express-xml2json-xxe.yaml +42 -0
- package/rules/third-party/shopify/javascript/express/security/require-request.yaml +26 -0
- package/rules/third-party/shopify/javascript/express/security/x-frame-options-misconfiguration.yaml +44 -0
- package/rules/third-party/shopify/javascript/fbjs/security/audit/insecure-createnodesfrommarkup.yaml +20 -0
- package/rules/third-party/shopify/javascript/grpc/security/grpc-nodejs-insecure-connection.yaml +24 -0
- package/rules/third-party/shopify/javascript/jose/security/audit/jose-exposed-data.yaml +35 -0
- package/rules/third-party/shopify/javascript/jose/security/jwt-exposed-credentials.yaml +233 -0
- package/rules/third-party/shopify/javascript/jose/security/jwt-hardcode.yaml +160 -0
- package/rules/third-party/shopify/javascript/jose/security/jwt-none-alg.yaml +42 -0
- package/rules/third-party/shopify/javascript/jquery/security/audit/jquery-insecure-method.yaml +40 -0
- package/rules/third-party/shopify/javascript/jquery/security/audit/jquery-insecure-selector.yaml +70 -0
- package/rules/third-party/shopify/javascript/jquery/security/audit/prohibit-jquery-html.yaml +23 -0
- package/rules/third-party/shopify/javascript/jsonwebtoken/security/audit/jwt-decode-without-verify.yaml +34 -0
- package/rules/third-party/shopify/javascript/jsonwebtoken/security/audit/jwt-exposed-data.yaml +27 -0
- package/rules/third-party/shopify/javascript/jsonwebtoken/security/jwt-exposed-credentials.yaml +60 -0
- package/rules/third-party/shopify/javascript/jsonwebtoken/security/jwt-hardcode.yaml +36 -0
- package/rules/third-party/shopify/javascript/jsonwebtoken/security/jwt-none-alg.yaml +27 -0
- package/rules/third-party/shopify/javascript/lang/best-practice/assigned-undefined.yaml +17 -0
- package/rules/third-party/shopify/javascript/lang/best-practice/lazy-load-module.yaml +24 -0
- package/rules/third-party/shopify/javascript/lang/best-practice/leftover_debugging.yaml +50 -0
- package/rules/third-party/shopify/javascript/lang/best-practice/zlib-async-loop.yaml +41 -0
- package/rules/third-party/shopify/javascript/lang/correctness/missing-template-string-indicator.yaml +18 -0
- package/rules/third-party/shopify/javascript/lang/correctness/no-replaceall.yaml +16 -0
- package/rules/third-party/shopify/javascript/lang/correctness/useless-assign.yaml +18 -0
- package/rules/third-party/shopify/javascript/lang/correctness/useless-eqeq.yaml +21 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/code-string-concat.yaml +34 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/dangerous-spawn-shell.yaml +55 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/detect-bracket-object-injection.yaml +22 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/detect-non-literal-fs-filename.yaml +70 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/detect-non-literal-regexp.yaml +23 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/incomplete-sanitization.yaml +19 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/non-constant-sql-query.yaml +18 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/path-traversal/path-join-resolve-traversal.yaml +53 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/prototype-pollution/prototype-pollution-assignment.yaml +61 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/prototype-pollution/prototype-pollution-function.yaml +82 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/prototype-pollution/prototype-pollution-loop.yaml +62 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/spawn-shell-true.yaml +37 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/sqli/node-mssql-sqli.yaml +62 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/sqli/node-postgres-sqli.yaml +64 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/unknown-value-with-script-tag.yaml +25 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/unsafe-dynamic-method.yaml +42 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/unsafe-formatstring.yaml +39 -0
- package/rules/third-party/shopify/javascript/lang/security/audit/vm-injection.yaml +495 -0
- package/rules/third-party/shopify/javascript/lang/security/detect-buffer-noassert.yaml +22 -0
- package/rules/third-party/shopify/javascript/lang/security/detect-child-process.yaml +30 -0
- package/rules/third-party/shopify/javascript/lang/security/detect-disable-mustache-escape.yaml +17 -0
- package/rules/third-party/shopify/javascript/lang/security/detect-eval-with-expression.yaml +30 -0
- package/rules/third-party/shopify/javascript/lang/security/detect-insecure-websocket.yaml +15 -0
- package/rules/third-party/shopify/javascript/lang/security/detect-no-csrf-before-method-override.yaml +23 -0
- package/rules/third-party/shopify/javascript/lang/security/detect-non-literal-require.yaml +20 -0
- package/rules/third-party/shopify/javascript/lang/security/detect-pseudoRandomBytes.yaml +22 -0
- package/rules/third-party/shopify/javascript/lang/security/insecure-object-assign.yaml +25 -0
- package/rules/third-party/shopify/javascript/lang/security/spawn-git-clone.yaml +27 -0
- package/rules/third-party/shopify/javascript/monaco-editor/security/audit/monaco-hover-htmlsupport.yaml +33 -0
- package/rules/third-party/shopify/javascript/node-expat/security/audit/expat-xxe.yaml +71 -0
- package/rules/third-party/shopify/javascript/passport-jwt/security/passport-hardcode.yaml +805 -0
- package/rules/third-party/shopify/javascript/phantom/security/audit/phantom-injection.yaml +27 -0
- package/rules/third-party/shopify/javascript/playwright/security/audit/playwright-addinitscript-code-injection.yaml +22 -0
- package/rules/third-party/shopify/javascript/playwright/security/audit/playwright-evaluate-arg-injection.yaml +22 -0
- package/rules/third-party/shopify/javascript/playwright/security/audit/playwright-evaluate-code-injection.yaml +29 -0
- package/rules/third-party/shopify/javascript/playwright/security/audit/playwright-exposed-chrome-devtools.yaml +21 -0
- package/rules/third-party/shopify/javascript/playwright/security/audit/playwright-goto-injection.yaml +24 -0
- package/rules/third-party/shopify/javascript/playwright/security/audit/playwright-setcontent-injection.yaml +24 -0
- package/rules/third-party/shopify/javascript/puppeteer/security/audit/puppeteer-evaluate-arg-injection.yaml +23 -0
- package/rules/third-party/shopify/javascript/puppeteer/security/audit/puppeteer-evaluate-code-injection.yaml +29 -0
- package/rules/third-party/shopify/javascript/puppeteer/security/audit/puppeteer-exposed-chrome-devtools.yaml +21 -0
- package/rules/third-party/shopify/javascript/puppeteer/security/audit/puppeteer-goto-injection.yaml +24 -0
- package/rules/third-party/shopify/javascript/puppeteer/security/audit/puppeteer-setcontent-injection.yaml +23 -0
- package/rules/third-party/shopify/javascript/react/correctness/hooks/set-state-no-op.yaml +16 -0
- package/rules/third-party/shopify/javascript/sandbox/security/audit/sandbox-code-injection.yaml +33 -0
- package/rules/third-party/shopify/javascript/sax/security/audit/sax-xxe.yaml +28 -0
- package/rules/third-party/shopify/javascript/sequelize/security/audit/sequelize-enforce-tls.yaml +50 -0
- package/rules/third-party/shopify/javascript/sequelize/security/audit/sequelize-raw-query.yaml +32 -0
- package/rules/third-party/shopify/javascript/sequelize/security/audit/sequelize-tls-disabled-cert-validation.yaml +44 -0
- package/rules/third-party/shopify/javascript/sequelize/security/audit/sequelize-weak-tls-version.yaml +46 -0
- package/rules/third-party/shopify/javascript/serialize-javascript/security/audit/unsafe-serialize-javascript.yaml +20 -0
- package/rules/third-party/shopify/javascript/shelljs/security/shelljs-exec-injection.yaml +23 -0
- package/rules/third-party/shopify/javascript/thenify/security/audit/multiargs-code-execution.yaml +35 -0
- package/rules/third-party/shopify/javascript/vm2/security/audit/vm2-code-injection.yaml +53 -0
- package/rules/third-party/shopify/javascript/vm2/security/audit/vm2-context-injection.yaml +337 -0
- package/rules/third-party/shopify/javascript/vue/security/audit/xss/templates/avoid-v-html.yaml +16 -0
- package/rules/third-party/shopify/javascript/wkhtmltoimage/security/audit/wkhtmltoimage-injection.yaml +21 -0
- package/rules/third-party/shopify/javascript/wkhtmltopdf/security/audit/wkhtmltopdf-injection.yaml +21 -0
- package/rules/third-party/shopify/javascript/xml2json/security/audit/xml2json-xxe.yaml +33 -0
- package/rules/third-party/shopify/python/airflow/security/audit/formatted-string-bashoperator.yaml +46 -0
- package/rules/third-party/shopify/python/attr/correctness/mutable-initializer.yaml +31 -0
- package/rules/third-party/shopify/python/bokeh/maintainability/deprecated/deprecated_apis.yaml +15 -0
- package/rules/third-party/shopify/python/boto3/security/hardcoded-token.yaml +22 -0
- package/rules/third-party/shopify/python/click/best-practice/echo-style.yaml +10 -0
- package/rules/third-party/shopify/python/cryptography/security/insecure-cipher-algorithms.yaml +56 -0
- package/rules/third-party/shopify/python/cryptography/security/insecure-cipher-mode-ecb.yaml +19 -0
- package/rules/third-party/shopify/python/cryptography/security/insecure-hash-algorithms.yaml +44 -0
- package/rules/third-party/shopify/python/cryptography/security/insufficient-dsa-key-size.yaml +23 -0
- package/rules/third-party/shopify/python/cryptography/security/insufficient-ec-key-size.yaml +23 -0
- package/rules/third-party/shopify/python/cryptography/security/insufficient-rsa-key-size.yaml +23 -0
- package/rules/third-party/shopify/python/distributed/security.yaml +17 -0
- package/rules/third-party/shopify/python/django/best-practice/json_response.yaml +17 -0
- package/rules/third-party/shopify/python/django/best-practice/upsell_django_environ.yaml +26 -0
- package/rules/third-party/shopify/python/django/best-practice/use-onetoonefield.yaml +16 -0
- package/rules/third-party/shopify/python/django/compatibility/django-2_0-compat.yaml +58 -0
- package/rules/third-party/shopify/python/django/correctness/model-save.yaml +24 -0
- package/rules/third-party/shopify/python/django/correctness/nontext-field-must-set-null-true.yaml +25 -0
- package/rules/third-party/shopify/python/django/correctness/string-field-null-checks.yaml +40 -0
- package/rules/third-party/shopify/python/django/correctness/use-decimalfield-for-money.yaml +17 -0
- package/rules/third-party/shopify/python/django/maintainability/duplicate-path-assignment.yaml +69 -0
- package/rules/third-party/shopify/python/django/performance/access-foreign-keys.yaml +10 -0
- package/rules/third-party/shopify/python/django/performance/upsell-count.yaml +14 -0
- package/rules/third-party/shopify/python/django/performance/upsell_earliest_latest.yaml +14 -0
- package/rules/third-party/shopify/python/django/security/audit/avoid-insecure-deserialization.yaml +50 -0
- package/rules/third-party/shopify/python/django/security/audit/avoid-mark-safe.yaml +22 -0
- package/rules/third-party/shopify/python/django/security/audit/csrf-exempt.yaml +15 -0
- package/rules/third-party/shopify/python/django/security/audit/custom-expression-as-sql.yaml +18 -0
- package/rules/third-party/shopify/python/django/security/audit/django-ratelimit/missing-ratelimit.yaml +25 -0
- package/rules/third-party/shopify/python/django/security/audit/django-rest-framework/missing-throttle-config.yaml +26 -0
- package/rules/third-party/shopify/python/django/security/audit/extends-custom-expression.yaml +134 -0
- package/rules/third-party/shopify/python/django/security/audit/query-set-extra.yaml +18 -0
- package/rules/third-party/shopify/python/django/security/audit/raw-query.yaml +20 -0
- package/rules/third-party/shopify/python/django/security/audit/secure-cookies.yaml +51 -0
- package/rules/third-party/shopify/python/django/security/audit/templates/debug-template-tag.yaml +20 -0
- package/rules/third-party/shopify/python/django/security/audit/unvalidated-password.yaml +46 -0
- package/rules/third-party/shopify/python/django/security/audit/xss/class-extends-safestring.yaml +30 -0
- package/rules/third-party/shopify/python/django/security/audit/xss/context-autoescape-off.yaml +25 -0
- package/rules/third-party/shopify/python/django/security/audit/xss/direct-use-of-httpresponse.yaml +33 -0
- package/rules/third-party/shopify/python/django/security/audit/xss/filter-with-is-safe.yaml +27 -0
- package/rules/third-party/shopify/python/django/security/audit/xss/formathtml-fstring-parameter.yaml +24 -0
- package/rules/third-party/shopify/python/django/security/audit/xss/global-autoescape-off.yaml +24 -0
- package/rules/third-party/shopify/python/django/security/audit/xss/html-magic-method.yaml +28 -0
- package/rules/third-party/shopify/python/django/security/audit/xss/html-safe.yaml +28 -0
- package/rules/third-party/shopify/python/django/security/audit/xss/template-autoescape-off.yaml +22 -0
- package/rules/third-party/shopify/python/django/security/audit/xss/template-blocktranslate-no-escape.yaml +36 -0
- package/rules/third-party/shopify/python/django/security/audit/xss/template-href-var.yaml +27 -0
- package/rules/third-party/shopify/python/django/security/audit/xss/template-translate-as-no-escape.yaml +119 -0
- package/rules/third-party/shopify/python/django/security/audit/xss/template-translate-no-escape.yaml +40 -0
- package/rules/third-party/shopify/python/django/security/audit/xss/template-var-unescaped-with-safeseq.yaml +23 -0
- package/rules/third-party/shopify/python/django/security/audit/xss/var-in-script-tag.yaml +28 -0
- package/rules/third-party/shopify/python/django/security/globals-as-template-context.yaml +32 -0
- package/rules/third-party/shopify/python/django/security/injection/code/globals-misuse-code-execution.yaml +213 -0
- package/rules/third-party/shopify/python/django/security/injection/code/user-eval-format-string.yaml +117 -0
- package/rules/third-party/shopify/python/django/security/injection/code/user-eval.yaml +36 -0
- package/rules/third-party/shopify/python/django/security/injection/code/user-exec-format-string.yaml +203 -0
- package/rules/third-party/shopify/python/django/security/injection/code/user-exec.yaml +34 -0
- package/rules/third-party/shopify/python/django/security/injection/command/command-injection-os-system.yaml +268 -0
- package/rules/third-party/shopify/python/django/security/injection/email/xss-html-email-body.yaml +195 -0
- package/rules/third-party/shopify/python/django/security/injection/email/xss-send-mail-html-message.yaml +233 -0
- package/rules/third-party/shopify/python/django/security/injection/mass-assignment.yaml +26 -0
- package/rules/third-party/shopify/python/django/security/injection/open-redirect.yaml +531 -0
- package/rules/third-party/shopify/python/django/security/injection/path-traversal/path-traversal-file-name.yaml +68 -0
- package/rules/third-party/shopify/python/django/security/injection/path-traversal/path-traversal-join.yaml +91 -0
- package/rules/third-party/shopify/python/django/security/injection/path-traversal/path-traversal-open.yaml +427 -0
- package/rules/third-party/shopify/python/django/security/injection/raw-html-format.yaml +49 -0
- package/rules/third-party/shopify/python/django/security/injection/reflected-data-httpresponse.yaml +249 -0
- package/rules/third-party/shopify/python/django/security/injection/reflected-data-httpresponsebadrequest.yaml +243 -0
- package/rules/third-party/shopify/python/django/security/injection/request-data-fileresponse.yaml +71 -0
- package/rules/third-party/shopify/python/django/security/injection/request-data-write.yaml +188 -0
- package/rules/third-party/shopify/python/django/security/injection/sql/sql-injection-extra.yaml +283 -0
- package/rules/third-party/shopify/python/django/security/injection/sql/sql-injection-rawsql.yaml +283 -0
- package/rules/third-party/shopify/python/django/security/injection/sql/sql-injection-using-db-cursor-execute.yaml +283 -0
- package/rules/third-party/shopify/python/django/security/injection/sql/sql-injection-using-raw.yaml +283 -0
- package/rules/third-party/shopify/python/django/security/injection/ssrf/ssrf-injection-requests.yaml +249 -0
- package/rules/third-party/shopify/python/django/security/injection/ssrf/ssrf-injection-urllib.yaml +249 -0
- package/rules/third-party/shopify/python/django/security/locals-as-template-context.yaml +32 -0
- package/rules/third-party/shopify/python/django/security/passwords/password-empty-string.yaml +31 -0
- package/rules/third-party/shopify/python/django/security/passwords/use-none-for-password-default.yaml +30 -0
- package/rules/third-party/shopify/python/docker/security/audit/docker-arbitrary-container-run.yaml +28 -0
- package/rules/third-party/shopify/python/flask/best-practice/get-class-method-with-side-effects.yaml +23 -0
- package/rules/third-party/shopify/python/flask/best-practice/use-jsonify.yaml +24 -0
- package/rules/third-party/shopify/python/flask/caching/query-string.yaml +45 -0
- package/rules/third-party/shopify/python/flask/correctness/access-request-in-wrong-handler.yaml +21 -0
- package/rules/third-party/shopify/python/flask/correctness/same-handler-name.yaml +18 -0
- package/rules/third-party/shopify/python/flask/maintainability/deprecated/deprecated-apis.yaml +44 -0
- package/rules/third-party/shopify/python/flask/security/audit/app-run-param-config.yaml +16 -0
- package/rules/third-party/shopify/python/flask/security/audit/app-run-security-config.yaml +20 -0
- package/rules/third-party/shopify/python/flask/security/audit/debug-enabled.yaml +22 -0
- package/rules/third-party/shopify/python/flask/security/audit/directly-returned-format-string.yaml +46 -0
- package/rules/third-party/shopify/python/flask/security/audit/hardcoded-config.yaml +74 -0
- package/rules/third-party/shopify/python/flask/security/audit/render-template-string.yaml +15 -0
- package/rules/third-party/shopify/python/flask/security/audit/secure-set-cookie.yaml +31 -0
- package/rules/third-party/shopify/python/flask/security/audit/wtf-csrf-disabled.yaml +16 -0
- package/rules/third-party/shopify/python/flask/security/audit/xss/make-response-with-unknown-content.yaml +41 -0
- package/rules/third-party/shopify/python/flask/security/dangerous-template-string.yaml +54 -0
- package/rules/third-party/shopify/python/flask/security/flask-api-method-string-format.yaml +27 -0
- package/rules/third-party/shopify/python/flask/security/injection/os-system-injection.yaml +60 -0
- package/rules/third-party/shopify/python/flask/security/injection/path-traversal-open.yaml +94 -0
- package/rules/third-party/shopify/python/flask/security/injection/raw-html-concat.yaml +55 -0
- package/rules/third-party/shopify/python/flask/security/injection/ssrf-requests.yaml +62 -0
- package/rules/third-party/shopify/python/flask/security/injection/user-eval.yaml +58 -0
- package/rules/third-party/shopify/python/flask/security/injection/user-exec.yaml +58 -0
- package/rules/third-party/shopify/python/flask/security/insecure-deserialization.yaml +32 -0
- package/rules/third-party/shopify/python/flask/security/open-redirect.yaml +53 -0
- package/rules/third-party/shopify/python/flask/security/secure-static-file-serve.yaml +21 -0
- package/rules/third-party/shopify/python/flask/security/unescaped-template-extension.yaml +44 -0
- package/rules/third-party/shopify/python/flask/security/unsanitized-input.yaml +36 -0
- package/rules/third-party/shopify/python/flask/security/xss/audit/direct-use-of-jinja2.yaml +32 -0
- package/rules/third-party/shopify/python/flask/security/xss/audit/explicit-unescape-with-markup.yaml +23 -0
- package/rules/third-party/shopify/python/flask/security/xss/audit/template-autoescape-off.yaml +23 -0
- package/rules/third-party/shopify/python/flask/security/xss/audit/template-href-var.yaml +33 -0
- package/rules/third-party/shopify/python/flask/security/xss/audit/template-unescaped-with-safe.yaml +22 -0
- package/rules/third-party/shopify/python/flask/security/xss/audit/template-unquoted-attribute-var.yaml +28 -0
- package/rules/third-party/shopify/python/jinja2/security/audit/autoescape-disabled.yaml +25 -0
- package/rules/third-party/shopify/python/jwt/security/audit/jwt-exposed-data.yaml +20 -0
- package/rules/third-party/shopify/python/jwt/security/jwt-exposed-credentials.yaml +24 -0
- package/rules/third-party/shopify/python/jwt/security/jwt-hardcode.yaml +22 -0
- package/rules/third-party/shopify/python/jwt/security/jwt-none-alg.yaml +22 -0
- package/rules/third-party/shopify/python/jwt/security/unverified-jwt-decode.yaml +22 -0
- package/rules/third-party/shopify/python/lang/best-practice/hardcoded-tmp-path.yaml +14 -0
- package/rules/third-party/shopify/python/lang/best-practice/manual-collections-create.yaml +94 -0
- package/rules/third-party/shopify/python/lang/best-practice/missing-hash-with-eq.yaml +23 -0
- package/rules/third-party/shopify/python/lang/best-practice/open-never-closed.yaml +95 -0
- package/rules/third-party/shopify/python/lang/best-practice/pass-body.yaml +30 -0
- package/rules/third-party/shopify/python/lang/best-practice/pdb.yaml +13 -0
- package/rules/third-party/shopify/python/lang/best-practice/sleep.yaml +16 -0
- package/rules/third-party/shopify/python/lang/compatibility/python36.yaml +28 -0
- package/rules/third-party/shopify/python/lang/compatibility/python37.yaml +171 -0
- package/rules/third-party/shopify/python/lang/correctness/baseclass-attribute-override.yaml +22 -0
- package/rules/third-party/shopify/python/lang/correctness/common-mistakes/default-mutable-dict.yaml +198 -0
- package/rules/third-party/shopify/python/lang/correctness/common-mistakes/default-mutable-list.yaml +215 -0
- package/rules/third-party/shopify/python/lang/correctness/common-mistakes/is-comparison-string.yaml +32 -0
- package/rules/third-party/shopify/python/lang/correctness/common-mistakes/is-not-is-not.yaml +12 -0
- package/rules/third-party/shopify/python/lang/correctness/common-mistakes/string-concat-in-list.yaml +20 -0
- package/rules/third-party/shopify/python/lang/correctness/concurrent.yaml +33 -0
- package/rules/third-party/shopify/python/lang/correctness/dict-modify-iterating.yaml +21 -0
- package/rules/third-party/shopify/python/lang/correctness/exceptions/exceptions.yaml +20 -0
- package/rules/third-party/shopify/python/lang/correctness/exit.yaml +15 -0
- package/rules/third-party/shopify/python/lang/correctness/file-object-redefined-before-close.yaml +22 -0
- package/rules/third-party/shopify/python/lang/correctness/list-modify-iterating.yaml +28 -0
- package/rules/third-party/shopify/python/lang/correctness/pdb.yaml +14 -0
- package/rules/third-party/shopify/python/lang/correctness/return-in-init.yaml +48 -0
- package/rules/third-party/shopify/python/lang/correctness/tempfile/flush.yaml +78 -0
- package/rules/third-party/shopify/python/lang/correctness/tempfile/mktemp.yaml +12 -0
- package/rules/third-party/shopify/python/lang/correctness/unchecked-returns.yaml +16 -0
- package/rules/third-party/shopify/python/lang/correctness/useless-comparison.yaml +28 -0
- package/rules/third-party/shopify/python/lang/correctness/useless-eqeq.yaml +27 -0
- package/rules/third-party/shopify/python/lang/correctness/writing-to-file-in-read-mode.yaml +27 -0
- package/rules/third-party/shopify/python/lang/maintainability/improper-list-concat.yaml +18 -0
- package/rules/third-party/shopify/python/lang/maintainability/is-function-without-parentheses.yaml +17 -0
- package/rules/third-party/shopify/python/lang/maintainability/return.yaml +29 -0
- package/rules/third-party/shopify/python/lang/maintainability/useless-assign-keyed.yaml +16 -0
- package/rules/third-party/shopify/python/lang/maintainability/useless-ifelse.yaml +27 -0
- package/rules/third-party/shopify/python/lang/maintainability/useless-innerfunction.yaml +37 -0
- package/rules/third-party/shopify/python/lang/maintainability/useless-literal.yaml +24 -0
- package/rules/third-party/shopify/python/lang/security/audit/conn_recv.yaml +23 -0
- package/rules/third-party/shopify/python/lang/security/audit/dangerous-annotations-usage.yaml +25 -0
- package/rules/third-party/shopify/python/lang/security/audit/dangerous-asyncio-create-exec.yaml +46 -0
- package/rules/third-party/shopify/python/lang/security/audit/dangerous-asyncio-exec.yaml +35 -0
- package/rules/third-party/shopify/python/lang/security/audit/dangerous-asyncio-shell.yaml +36 -0
- package/rules/third-party/shopify/python/lang/security/audit/dangerous-code-run.yaml +45 -0
- package/rules/third-party/shopify/python/lang/security/audit/dangerous-os-exec.yaml +44 -0
- package/rules/third-party/shopify/python/lang/security/audit/dangerous-spawn-process.yaml +44 -0
- package/rules/third-party/shopify/python/lang/security/audit/dangerous-subinterpreters-run-string.yaml +23 -0
- package/rules/third-party/shopify/python/lang/security/audit/dangerous-subprocess-use.yaml +44 -0
- package/rules/third-party/shopify/python/lang/security/audit/dangerous-system-call.yaml +28 -0
- package/rules/third-party/shopify/python/lang/security/audit/dangerous-testcapi-run-in-subinterp.yaml +26 -0
- package/rules/third-party/shopify/python/lang/security/audit/dynamic-urllib-use-detected.yaml +49 -0
- package/rules/third-party/shopify/python/lang/security/audit/eval-detected.yaml +23 -0
- package/rules/third-party/shopify/python/lang/security/audit/exec-detected.yaml +23 -0
- package/rules/third-party/shopify/python/lang/security/audit/formatted-sql-query.yaml +31 -0
- package/rules/third-party/shopify/python/lang/security/audit/ftplib.yaml +19 -0
- package/rules/third-party/shopify/python/lang/security/audit/hardcoded-password-default-argument.yaml +15 -0
- package/rules/third-party/shopify/python/lang/security/audit/httpsconnection-detected.yaml +24 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-file-permissions.yaml +53 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-transport/ftplib/use-ftp-tls.yaml +19 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-transport/requests/request-session-http-in-with-context.yaml +36 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-transport/requests/request-session-with-http.yaml +50 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-transport/requests/request-with-http.yaml +50 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-transport/ssl/no-set-ciphers.yaml +23 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-transport/urllib/insecure-openerdirector-open-ftp.yaml +47 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-transport/urllib/insecure-openerdirector-open.yaml +49 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-transport/urllib/insecure-request-object-ftp.yaml +27 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-transport/urllib/insecure-request-object.yaml +30 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-transport/urllib/insecure-urlopen-ftp.yaml +26 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-transport/urllib/insecure-urlopen.yaml +28 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-transport/urllib/insecure-urlopener-open-ftp.yaml +46 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-transport/urllib/insecure-urlopener-open.yaml +49 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-transport/urllib/insecure-urlopener-retrieve-ftp.yaml +46 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-transport/urllib/insecure-urlopener-retrieve.yaml +49 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-transport/urllib/insecure-urlretrieve-ftp.yaml +26 -0
- package/rules/third-party/shopify/python/lang/security/audit/insecure-transport/urllib/insecure-urlretrieve.yaml +28 -0
- package/rules/third-party/shopify/python/lang/security/audit/logging/listeneval.yaml +21 -0
- package/rules/third-party/shopify/python/lang/security/audit/logging/logger-credential-leak.yaml +19 -0
- package/rules/third-party/shopify/python/lang/security/audit/mako-templates-detected.yaml +21 -0
- package/rules/third-party/shopify/python/lang/security/audit/marshal.yaml +23 -0
- package/rules/third-party/shopify/python/lang/security/audit/network/bind.yaml +28 -0
- package/rules/third-party/shopify/python/lang/security/audit/network/disabled-cert-validation.yaml +24 -0
- package/rules/third-party/shopify/python/lang/security/audit/network/http-not-https-connection.yaml +19 -0
- package/rules/third-party/shopify/python/lang/security/audit/non-literal-import.yaml +20 -0
- package/rules/third-party/shopify/python/lang/security/audit/paramiko/paramiko-exec-command.yaml +25 -0
- package/rules/third-party/shopify/python/lang/security/audit/paramiko-implicit-trust-host-key.yaml +26 -0
- package/rules/third-party/shopify/python/lang/security/audit/sqli/aiopg-sqli.yaml +91 -0
- package/rules/third-party/shopify/python/lang/security/audit/sqli/asyncpg-sqli.yaml +79 -0
- package/rules/third-party/shopify/python/lang/security/audit/sqli/pg8000-sqli.yaml +77 -0
- package/rules/third-party/shopify/python/lang/security/audit/sqli/psycopg-sqli.yaml +73 -0
- package/rules/third-party/shopify/python/lang/security/audit/ssl-wrap-socket-is-deprecated.yaml +18 -0
- package/rules/third-party/shopify/python/lang/security/audit/subprocess-shell-true.yaml +26 -0
- package/rules/third-party/shopify/python/lang/security/audit/system-wildcard-detected.yaml +31 -0
- package/rules/third-party/shopify/python/lang/security/audit/telnetlib.yaml +18 -0
- package/rules/third-party/shopify/python/lang/security/audit/weak-ssl-version.yaml +34 -0
- package/rules/third-party/shopify/python/lang/security/dangerous-globals-use.yaml +46 -0
- package/rules/third-party/shopify/python/lang/security/deserialization/avoid-jsonpickle.yaml +22 -0
- package/rules/third-party/shopify/python/lang/security/deserialization/avoid-pyyaml-load.yaml +36 -0
- package/rules/third-party/shopify/python/lang/security/deserialization/avoid-unsafe-ruamel.yaml +21 -0
- package/rules/third-party/shopify/python/lang/security/deserialization/pickle.yaml +78 -0
- package/rules/third-party/shopify/python/lang/security/insecure-hash-algorithms.yaml +54 -0
- package/rules/third-party/shopify/python/lang/security/insecure-hash-function.yaml +27 -0
- package/rules/third-party/shopify/python/lang/security/unquoted-csv-writer.yaml +19 -0
- package/rules/third-party/shopify/python/lang/security/unverified-ssl-context.yaml +19 -0
- package/rules/third-party/shopify/python/lang/security/use-defused-xml.yaml +23 -0
- package/rules/third-party/shopify/python/lang/security/use-defused-xmlrpc.yaml +23 -0
- package/rules/third-party/shopify/python/pycryptodome/security/insecure-cipher-algorithm.yaml +102 -0
- package/rules/third-party/shopify/python/pycryptodome/security/insecure-hash-algorithm.yaml +87 -0
- package/rules/third-party/shopify/python/pycryptodome/security/insufficient-dsa-key-size.yaml +25 -0
- package/rules/third-party/shopify/python/pycryptodome/security/insufficient-rsa-key-size.yaml +25 -0
- package/rules/third-party/shopify/python/pymongo/security/mongodb.yaml +16 -0
- package/rules/third-party/shopify/python/requests/best-practice/use-raise-for-status.yaml +50 -0
- package/rules/third-party/shopify/python/requests/best-practice/use-request-json-shortcut.yaml +19 -0
- package/rules/third-party/shopify/python/requests/best-practice/use-response-json-shortcut.yaml +20 -0
- package/rules/third-party/shopify/python/requests/best-practice/use-timeout.yaml +59 -0
- package/rules/third-party/shopify/python/requests/security/disabled-cert-validation.yaml +25 -0
- package/rules/third-party/shopify/python/requests/security/no-auth-over-http.yaml +29 -0
- package/rules/third-party/shopify/python/sh/security/string-concat.yaml +18 -0
- package/rules/third-party/shopify/python/sqlalchemy/correctness/bad-operator-in-filter.yaml +29 -0
- package/rules/third-party/shopify/python/sqlalchemy/correctness/delete-where.yaml +14 -0
- package/rules/third-party/shopify/python/sqlalchemy/performance/performance-improvements.yaml +22 -0
- package/rules/third-party/shopify/python/sqlalchemy/security/sqlalchemy-execute-raw-query.yaml +53 -0
- package/rules/third-party/shopify/python/sqlalchemy/security/sqlalchemy-sql-injection.yaml +42 -0
- package/rules/third-party/shopify/ruby/jwt/security/audit/jwt-decode-without-verify.yaml +22 -0
- package/rules/third-party/shopify/ruby/jwt/security/audit/jwt-exposed-data.yaml +24 -0
- package/rules/third-party/shopify/ruby/jwt/security/jwt-exposed-credentials.yaml +25 -0
- package/rules/third-party/shopify/ruby/jwt/security/jwt-hardcode.yaml +36 -0
- package/rules/third-party/shopify/ruby/jwt/security/jwt-none-alg.yaml +23 -0
- package/rules/third-party/shopify/ruby/lang/security/bad-deserialization.yaml +45 -0
- package/rules/third-party/shopify/ruby/lang/security/cookie-serialization.yaml +22 -0
- package/rules/third-party/shopify/ruby/lang/security/create-with.yaml +23 -0
- package/rules/third-party/shopify/ruby/lang/security/dangerous-exec.yaml +72 -0
- package/rules/third-party/shopify/ruby/lang/security/dangerous-open.yaml +23 -0
- package/rules/third-party/shopify/ruby/lang/security/dangerous-open3-pipeline.yaml +23 -0
- package/rules/third-party/shopify/ruby/lang/security/dangerous-subshell.yaml +23 -0
- package/rules/third-party/shopify/ruby/lang/security/dangerous-syscall.yaml +15 -0
- package/rules/third-party/shopify/ruby/lang/security/divide-by-zero.yaml +22 -0
- package/rules/third-party/shopify/ruby/lang/security/file-disclosure.yaml +17 -0
- package/rules/third-party/shopify/ruby/lang/security/filter-skipping.yaml +23 -0
- package/rules/third-party/shopify/ruby/lang/security/force-ssl-false.yaml +17 -0
- package/rules/third-party/shopify/ruby/lang/security/hardcoded-http-auth-in-controller.yaml +22 -0
- package/rules/third-party/shopify/ruby/lang/security/jruby-xml.yaml +22 -0
- package/rules/third-party/shopify/ruby/lang/security/json-encoding.yaml +23 -0
- package/rules/third-party/shopify/ruby/lang/security/json-entity-escape.yaml +19 -0
- package/rules/third-party/shopify/ruby/lang/security/mass-assignment-protection-disabled.yaml +19 -0
- package/rules/third-party/shopify/ruby/lang/security/missing-csrf-protection.yaml +31 -0
- package/rules/third-party/shopify/ruby/lang/security/model-attr-accessible.yaml +37 -0
- package/rules/third-party/shopify/ruby/lang/security/model-attributes-attr-accessible.yaml +32 -0
- package/rules/third-party/shopify/ruby/lang/security/model-attributes-attr-protected.yaml +19 -0
- package/rules/third-party/shopify/ruby/lang/security/nested-attributes-bypass.yaml +22 -0
- package/rules/third-party/shopify/ruby/lang/security/nested-attributes.yaml +19 -0
- package/rules/third-party/shopify/ruby/lang/security/no-eval.yaml +41 -0
- package/rules/third-party/shopify/ruby/lang/security/no-send.yaml +35 -0
- package/rules/third-party/shopify/ruby/lang/security/ssl-mode-no-verify.yaml +17 -0
- package/rules/third-party/shopify/ruby/lang/security/timing-attack.yaml +19 -0
- package/rules/third-party/shopify/ruby/lang/security/unprotected-mass-assign.yaml +31 -0
- package/rules/third-party/shopify/ruby/lang/security/weak-hashes-md5.yaml +25 -0
- package/rules/third-party/shopify/ruby/lang/security/weak-hashes-sha1.yaml +22 -0
- package/rules/third-party/shopify/ruby/lang/security/yaml-parsing.yaml +17 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/avoid-session-manipulation.yaml +23 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/avoid-tainted-file-access.yaml +59 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/avoid-tainted-ftp-call.yaml +29 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/avoid-tainted-http-request.yaml +68 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/avoid-tainted-shell-call.yaml +69 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/sqli/ruby-pg-sqli.yaml +66 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/avoid-content-tag.yaml +20 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/avoid-default-routes.yaml +24 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/avoid-html-safe.yaml +20 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/avoid-link-to.yaml +37 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/avoid-raw.yaml +18 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/avoid-redirect.yaml +51 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/avoid-render-dynamic-path.yaml +31 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/avoid-render-inline.yaml +18 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/avoid-render-text.yaml +21 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/manual-template-creation.yaml +18 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/templates/alias-for-html-safe.yaml +23 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/templates/avoid-content-tag.yaml +23 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/templates/avoid-html-safe.yaml +23 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/templates/avoid-raw.yaml +23 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/templates/dangerous-link-to.yaml +31 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/templates/unquoted-attribute.yaml +29 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/templates/var-in-href.yaml +28 -0
- package/rules/third-party/shopify/ruby/rails/security/audit/xss/templates/var-in-script-tag.yaml +30 -0
- package/rules/third-party/shopify/ruby/rails/security/injection/raw-html-format.yaml +48 -0
- package/rules/typescript/angular/security/audit/angular-domsanitizer.yaml +133 -0
- package/rules/typescript/aws-cdk/security/audit/awscdk-bucket-encryption.yml +49 -0
- package/rules/typescript/aws-cdk/security/audit/awscdk-bucket-enforcessl.yml +39 -0
- package/rules/typescript/aws-cdk/security/audit/awscdk-sqs-unencryptedqueue.yml +44 -0
- package/rules/typescript/aws-cdk/security/awscdk-bucket-grantpublicaccessmethod.yml +42 -0
- package/rules/typescript/aws-cdk/security/awscdk-codebuild-project-public.yml +39 -0
- package/rules/typescript/lang/best-practice/moment-deprecated.yaml +17 -0
- package/rules/typescript/lang/correctness/useless-ternary.yaml +15 -0
- package/rules/typescript/lang/security/audit/cors-regex-wildcard.yaml +33 -0
- package/rules/typescript/nestjs/security/audit/nestjs-header-cors-any.yaml +45 -0
- package/rules/typescript/nestjs/security/audit/nestjs-header-xss-disabled.yaml +35 -0
- package/rules/typescript/nestjs/security/audit/nestjs-open-redirect.yaml +35 -0
- package/rules/typescript/react/best-practice/define-styled-components-on-module-level.yaml +32 -0
- package/rules/typescript/react/best-practice/react-find-dom.yaml +20 -0
- package/rules/typescript/react/best-practice/react-legacy-component.yaml +20 -0
- package/rules/typescript/react/best-practice/react-props-in-state.yaml +58 -0
- package/rules/typescript/react/best-practice/react-props-spreading.yaml +22 -0
- package/rules/typescript/react/portability/i18next/i18next-key-format.yaml +57 -0
- package/rules/typescript/react/portability/i18next/jsx-label-not-i18n.yaml +26 -0
- package/rules/typescript/react/portability/i18next/jsx-not-internationalized.yaml +26 -0
- package/rules/typescript/react/portability/i18next/mui-snackbar-message.yaml +20 -0
- package/rules/typescript/react/portability/i18next/useselect-label-not-i18n.yaml +25 -0
- package/rules/typescript/react/security/audit/react-dangerouslysetinnerhtml.yaml +147 -0
- package/rules/typescript/react/security/audit/react-href-var.yaml +90 -0
- package/rules/typescript/react/security/audit/react-jwt-decoded-property.yaml +32 -0
- package/rules/typescript/react/security/audit/react-jwt-in-localstorage.yaml +38 -0
- package/rules/typescript/react/security/audit/react-unsanitized-method.yaml +148 -0
- package/rules/typescript/react/security/audit/react-unsanitized-property.yaml +162 -0
- package/rules/typescript/react/security/react-insecure-request.yaml +62 -0
- package/rules/typescript/react/security/react-markdown-insecure-html.yaml +51 -0
|
@@ -0,0 +1,60 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: avoid-sqlalchemy-text
|
|
3
|
+
mode: taint
|
|
4
|
+
pattern-sinks:
|
|
5
|
+
- pattern: |
|
|
6
|
+
sqlalchemy.text(...)
|
|
7
|
+
pattern-sources:
|
|
8
|
+
- patterns:
|
|
9
|
+
- pattern: |
|
|
10
|
+
$X + $Y
|
|
11
|
+
- metavariable-type:
|
|
12
|
+
metavariable: $X
|
|
13
|
+
type: string
|
|
14
|
+
- patterns:
|
|
15
|
+
- pattern: |
|
|
16
|
+
$X + $Y
|
|
17
|
+
- metavariable-type:
|
|
18
|
+
metavariable: $Y
|
|
19
|
+
type: string
|
|
20
|
+
- patterns:
|
|
21
|
+
- pattern: |
|
|
22
|
+
f"..."
|
|
23
|
+
- patterns:
|
|
24
|
+
- pattern: |
|
|
25
|
+
$X.format(...)
|
|
26
|
+
- metavariable-type:
|
|
27
|
+
metavariable: $X
|
|
28
|
+
type: string
|
|
29
|
+
- patterns:
|
|
30
|
+
- pattern: |
|
|
31
|
+
$X % $Y
|
|
32
|
+
- metavariable-type:
|
|
33
|
+
metavariable: $X
|
|
34
|
+
type: string
|
|
35
|
+
message: sqlalchemy.text passes the constructed SQL statement to the database mostly unchanged. This
|
|
36
|
+
means that the usual SQL injection protections are not applied and this function is vulnerable to
|
|
37
|
+
SQL injection if user input can reach here. Use normal SQLAlchemy operators (such as `or_()`, `and_()`, etc.)
|
|
38
|
+
to construct SQL.
|
|
39
|
+
metadata:
|
|
40
|
+
owasp:
|
|
41
|
+
- A01:2017 - Injection
|
|
42
|
+
- A03:2021 - Injection
|
|
43
|
+
- A05:2025 - Injection
|
|
44
|
+
cwe:
|
|
45
|
+
- "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
|
|
46
|
+
category: security
|
|
47
|
+
technology:
|
|
48
|
+
- sqlalchemy
|
|
49
|
+
confidence: MEDIUM
|
|
50
|
+
references:
|
|
51
|
+
- https://docs.sqlalchemy.org/en/14/core/tutorial.html#using-textual-sql
|
|
52
|
+
cwe2022-top25: true
|
|
53
|
+
cwe2021-top25: true
|
|
54
|
+
subcategory:
|
|
55
|
+
- audit
|
|
56
|
+
likelihood: LOW
|
|
57
|
+
impact: LOW
|
|
58
|
+
languages:
|
|
59
|
+
- python
|
|
60
|
+
severity: ERROR
|
|
@@ -0,0 +1,67 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: sqlalchemy-execute-raw-query
|
|
3
|
+
message: >-
|
|
4
|
+
Avoiding SQL string concatenation: untrusted input concatenated with raw
|
|
5
|
+
SQL query can result in SQL Injection. In order to execute raw query
|
|
6
|
+
safely, prepared statement should be used.
|
|
7
|
+
SQLAlchemy provides TextualSQL to easily used prepared statement with
|
|
8
|
+
named parameters. For complex SQL composition, use SQL Expression
|
|
9
|
+
Language or Schema Definition Language. In most cases, SQLAlchemy ORM
|
|
10
|
+
will be a better option.
|
|
11
|
+
metadata:
|
|
12
|
+
cwe:
|
|
13
|
+
- "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
|
|
14
|
+
owasp:
|
|
15
|
+
- A01:2017 - Injection
|
|
16
|
+
- A03:2021 - Injection
|
|
17
|
+
- A05:2025 - Injection
|
|
18
|
+
references:
|
|
19
|
+
- https://docs.sqlalchemy.org/en/14/core/tutorial.html#using-textual-sql
|
|
20
|
+
- https://www.tutorialspoint.com/sqlalchemy/sqlalchemy_quick_guide.htm
|
|
21
|
+
- https://docs.sqlalchemy.org/en/14/core/tutorial.html#using-more-specific-text-with-table-expression-literal-column-and-expression-column
|
|
22
|
+
category: security
|
|
23
|
+
technology:
|
|
24
|
+
- sqlalchemy
|
|
25
|
+
cwe2022-top25: true
|
|
26
|
+
cwe2021-top25: true
|
|
27
|
+
subcategory:
|
|
28
|
+
- audit
|
|
29
|
+
likelihood: LOW
|
|
30
|
+
impact: HIGH
|
|
31
|
+
confidence: LOW
|
|
32
|
+
severity: ERROR
|
|
33
|
+
languages:
|
|
34
|
+
- python
|
|
35
|
+
pattern-either:
|
|
36
|
+
- pattern: |
|
|
37
|
+
$CONNECTION.execute( $SQL + ..., ... )
|
|
38
|
+
- pattern: |
|
|
39
|
+
$CONNECTION.execute( $SQL % (...), ...)
|
|
40
|
+
- pattern: |
|
|
41
|
+
$CONNECTION.execute( $SQL.format(...), ... )
|
|
42
|
+
- pattern: |
|
|
43
|
+
$CONNECTION.execute(f"...{...}...", ...)
|
|
44
|
+
- patterns:
|
|
45
|
+
- pattern-inside: |
|
|
46
|
+
$QUERY = $SQL + ...
|
|
47
|
+
...
|
|
48
|
+
- pattern: |
|
|
49
|
+
$CONNECTION.execute($QUERY, ...)
|
|
50
|
+
- patterns:
|
|
51
|
+
- pattern-inside: |
|
|
52
|
+
$QUERY = $SQL % (...)
|
|
53
|
+
...
|
|
54
|
+
- pattern: |
|
|
55
|
+
$CONNECTION.execute($QUERY, ...)
|
|
56
|
+
- patterns:
|
|
57
|
+
- pattern-inside: |
|
|
58
|
+
$QUERY = $SQL.format(...)
|
|
59
|
+
...
|
|
60
|
+
- pattern: |
|
|
61
|
+
$CONNECTION.execute($QUERY, ...)
|
|
62
|
+
- patterns:
|
|
63
|
+
- pattern-inside: |
|
|
64
|
+
$QUERY = f"...{...}..."
|
|
65
|
+
...
|
|
66
|
+
- pattern: |
|
|
67
|
+
$CONNECTION.execute($QUERY, ...)
|
|
@@ -0,0 +1,59 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: sqlalchemy-sql-injection
|
|
3
|
+
patterns:
|
|
4
|
+
- pattern-either:
|
|
5
|
+
- pattern: |
|
|
6
|
+
def $FUNC(...,$VAR,...):
|
|
7
|
+
...
|
|
8
|
+
$SESSION.query(...).$SQLFUNC("...".$FORMATFUNC(...,$VAR,...))
|
|
9
|
+
- pattern: |
|
|
10
|
+
def $FUNC(...,$VAR,...):
|
|
11
|
+
...
|
|
12
|
+
$SESSION.query.join(...).$SQLFUNC("...".$FORMATFUNC(...,$VAR,...))
|
|
13
|
+
- pattern: |
|
|
14
|
+
def $FUNC(...,$VAR,...):
|
|
15
|
+
...
|
|
16
|
+
$SESSION.query.$SQLFUNC("...".$FORMATFUNC(...,$VAR,...))
|
|
17
|
+
- pattern: |
|
|
18
|
+
def $FUNC(...,$VAR,...):
|
|
19
|
+
...
|
|
20
|
+
query.$SQLFUNC("...".$FORMATFUNC(...,$VAR,...))
|
|
21
|
+
- metavariable-regex:
|
|
22
|
+
metavariable: $SQLFUNC
|
|
23
|
+
regex: (group_by|order_by|distinct|having|filter)
|
|
24
|
+
- metavariable-regex:
|
|
25
|
+
metavariable: $FORMATFUNC
|
|
26
|
+
regex: (?!bindparams)
|
|
27
|
+
message: >-
|
|
28
|
+
Distinct, Having, Group_by, Order_by, and Filter in SQLAlchemy can cause sql injections
|
|
29
|
+
if the developer inputs raw SQL into the before-mentioned clauses.
|
|
30
|
+
This pattern captures relevant cases in which the developer inputs raw SQL into the distinct, having,
|
|
31
|
+
group_by, order_by or filter clauses and
|
|
32
|
+
injects user-input into the raw SQL with any function besides "bindparams". Use bindParams to securely
|
|
33
|
+
bind user-input
|
|
34
|
+
to SQL statements.
|
|
35
|
+
fix-regex:
|
|
36
|
+
regex: format
|
|
37
|
+
replacement: bindparams
|
|
38
|
+
languages:
|
|
39
|
+
- python
|
|
40
|
+
severity: WARNING
|
|
41
|
+
metadata:
|
|
42
|
+
cwe:
|
|
43
|
+
- "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
|
|
44
|
+
category: security
|
|
45
|
+
technology:
|
|
46
|
+
- sqlalchemy
|
|
47
|
+
owasp:
|
|
48
|
+
- A01:2017 - Injection
|
|
49
|
+
- A03:2021 - Injection
|
|
50
|
+
- A05:2025 - Injection
|
|
51
|
+
references:
|
|
52
|
+
- https://owasp.org/Top10/A03_2021-Injection
|
|
53
|
+
cwe2022-top25: true
|
|
54
|
+
cwe2021-top25: true
|
|
55
|
+
subcategory:
|
|
56
|
+
- vuln
|
|
57
|
+
likelihood: LOW
|
|
58
|
+
impact: HIGH
|
|
59
|
+
confidence: MEDIUM
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: twiml-injection
|
|
3
|
+
languages: [python]
|
|
4
|
+
severity: WARNING
|
|
5
|
+
message: >-
|
|
6
|
+
Using non-constant TwiML (Twilio Markup Language) argument when creating a
|
|
7
|
+
Twilio conversation could allow the injection of additional TwiML commands
|
|
8
|
+
metadata:
|
|
9
|
+
cwe:
|
|
10
|
+
- "CWE-91: XML Injection"
|
|
11
|
+
owasp:
|
|
12
|
+
- "A03:2021 - Injection"
|
|
13
|
+
- A05:2025 - Injection
|
|
14
|
+
category: security
|
|
15
|
+
technology:
|
|
16
|
+
- python
|
|
17
|
+
- twilio
|
|
18
|
+
- twiml
|
|
19
|
+
confidence: MEDIUM
|
|
20
|
+
likelihood: HIGH
|
|
21
|
+
impact: MEDIUM
|
|
22
|
+
subcategory:
|
|
23
|
+
- vuln
|
|
24
|
+
references:
|
|
25
|
+
- https://codeberg.org/fennix/funjection
|
|
26
|
+
mode: taint
|
|
27
|
+
pattern-sources:
|
|
28
|
+
- pattern: |
|
|
29
|
+
f"..."
|
|
30
|
+
- pattern: |
|
|
31
|
+
"..." % ...
|
|
32
|
+
- pattern: |
|
|
33
|
+
"...".format(...)
|
|
34
|
+
|
|
35
|
+
- patterns:
|
|
36
|
+
- pattern: $ARG
|
|
37
|
+
- pattern-inside: |
|
|
38
|
+
def $F(..., $ARG, ...):
|
|
39
|
+
...
|
|
40
|
+
|
|
41
|
+
pattern-sanitizers:
|
|
42
|
+
- pattern: xml.sax.saxutils.escape(...)
|
|
43
|
+
- pattern: html.escape(...)
|
|
44
|
+
|
|
45
|
+
pattern-sinks:
|
|
46
|
+
- patterns:
|
|
47
|
+
- pattern: |
|
|
48
|
+
$CLIENT.calls.create(..., twiml=$SINK, ...)
|
|
49
|
+
|
|
50
|
+
- focus-metavariable: $SINK
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: activerecord-sqli
|
|
3
|
+
languages:
|
|
4
|
+
- ruby
|
|
5
|
+
message: >-
|
|
6
|
+
Detected SQL statement that is tainted by `event` object. This could lead to SQL injection if the
|
|
7
|
+
variable is user-controlled
|
|
8
|
+
and not properly sanitized. In order to prevent SQL injection,
|
|
9
|
+
use parameterized queries or prepared statements instead.
|
|
10
|
+
You can use parameterized statements like so:
|
|
11
|
+
`Example.find_by_sql ["SELECT title FROM posts WHERE author = ? AND created > ?", author_id, start_date]`
|
|
12
|
+
mode: taint
|
|
13
|
+
metadata:
|
|
14
|
+
references:
|
|
15
|
+
- https://guides.rubyonrails.org/active_record_querying.html#finding-by-sql
|
|
16
|
+
category: security
|
|
17
|
+
owasp:
|
|
18
|
+
- A01:2017 - Injection
|
|
19
|
+
- A03:2021 - Injection
|
|
20
|
+
- A05:2025 - Injection
|
|
21
|
+
cwe:
|
|
22
|
+
- "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
|
|
23
|
+
technology:
|
|
24
|
+
- aws-lambda
|
|
25
|
+
- active-record
|
|
26
|
+
cwe2022-top25: true
|
|
27
|
+
cwe2021-top25: true
|
|
28
|
+
subcategory:
|
|
29
|
+
- vuln
|
|
30
|
+
likelihood: MEDIUM
|
|
31
|
+
impact: HIGH
|
|
32
|
+
confidence: MEDIUM
|
|
33
|
+
pattern-sinks:
|
|
34
|
+
- patterns:
|
|
35
|
+
- pattern: $QUERY
|
|
36
|
+
- pattern-either:
|
|
37
|
+
- pattern: ActiveRecord::Base.connection.execute($QUERY,...)
|
|
38
|
+
- pattern: $MODEL.find_by_sql($QUERY,...)
|
|
39
|
+
- pattern: $MODEL.select_all($QUERY,...)
|
|
40
|
+
- pattern-inside: |
|
|
41
|
+
require 'active_record'
|
|
42
|
+
...
|
|
43
|
+
pattern-sources:
|
|
44
|
+
- patterns:
|
|
45
|
+
- pattern: event
|
|
46
|
+
- pattern-inside: |
|
|
47
|
+
def $HANDLER(event, context)
|
|
48
|
+
...
|
|
49
|
+
end
|
|
50
|
+
severity: WARNING
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: mysql2-sqli
|
|
3
|
+
languages:
|
|
4
|
+
- ruby
|
|
5
|
+
message: >-
|
|
6
|
+
Detected SQL statement that is tainted by `event` object. This could lead to SQL injection if the
|
|
7
|
+
variable is user-controlled
|
|
8
|
+
and not properly sanitized. In order to prevent SQL injection,
|
|
9
|
+
use parameterized queries or prepared statements instead.
|
|
10
|
+
You can use sanitize statements like so: `escaped = client.escape(user_input)`
|
|
11
|
+
mode: taint
|
|
12
|
+
metadata:
|
|
13
|
+
references:
|
|
14
|
+
- https://github.com/brianmario/mysql2
|
|
15
|
+
category: security
|
|
16
|
+
owasp:
|
|
17
|
+
- A01:2017 - Injection
|
|
18
|
+
- A03:2021 - Injection
|
|
19
|
+
- A05:2025 - Injection
|
|
20
|
+
cwe:
|
|
21
|
+
- "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
|
|
22
|
+
technology:
|
|
23
|
+
- aws-lambda
|
|
24
|
+
- mysql2
|
|
25
|
+
cwe2022-top25: true
|
|
26
|
+
cwe2021-top25: true
|
|
27
|
+
subcategory:
|
|
28
|
+
- vuln
|
|
29
|
+
likelihood: MEDIUM
|
|
30
|
+
impact: HIGH
|
|
31
|
+
confidence: MEDIUM
|
|
32
|
+
pattern-sinks:
|
|
33
|
+
- patterns:
|
|
34
|
+
- pattern: $QUERY
|
|
35
|
+
- pattern-either:
|
|
36
|
+
- pattern: $CLIENT.query($QUERY,...)
|
|
37
|
+
- pattern: $CLIENT.prepare($QUERY,...)
|
|
38
|
+
- pattern-inside: |
|
|
39
|
+
require 'mysql2'
|
|
40
|
+
...
|
|
41
|
+
pattern-sanitizers:
|
|
42
|
+
- pattern: $CLIENT.escape(...)
|
|
43
|
+
pattern-sources:
|
|
44
|
+
- patterns:
|
|
45
|
+
- pattern: event
|
|
46
|
+
- pattern-inside: |
|
|
47
|
+
def $HANDLER(event, context)
|
|
48
|
+
...
|
|
49
|
+
end
|
|
50
|
+
severity: WARNING
|
|
@@ -0,0 +1,54 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: pg-sqli
|
|
3
|
+
languages:
|
|
4
|
+
- ruby
|
|
5
|
+
message: >-
|
|
6
|
+
Detected SQL statement that is tainted by `event` object. This could lead to SQL injection if the
|
|
7
|
+
variable is user-controlled
|
|
8
|
+
and not properly sanitized. In order to prevent SQL injection,
|
|
9
|
+
use parameterized queries or prepared statements instead.
|
|
10
|
+
You can use parameterized statements like so:
|
|
11
|
+
`conn.exec_params('SELECT $1 AS a, $2 AS b, $3 AS c', [1, 2, nil])`
|
|
12
|
+
mode: taint
|
|
13
|
+
metadata:
|
|
14
|
+
references:
|
|
15
|
+
- https://www.rubydoc.info/gems/pg/PG/Connection
|
|
16
|
+
category: security
|
|
17
|
+
owasp:
|
|
18
|
+
- A01:2017 - Injection
|
|
19
|
+
- A03:2021 - Injection
|
|
20
|
+
- A05:2025 - Injection
|
|
21
|
+
cwe:
|
|
22
|
+
- "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
|
|
23
|
+
technology:
|
|
24
|
+
- aws-lambda
|
|
25
|
+
- postgres
|
|
26
|
+
- pg
|
|
27
|
+
cwe2022-top25: true
|
|
28
|
+
cwe2021-top25: true
|
|
29
|
+
subcategory:
|
|
30
|
+
- vuln
|
|
31
|
+
likelihood: MEDIUM
|
|
32
|
+
impact: HIGH
|
|
33
|
+
confidence: MEDIUM
|
|
34
|
+
pattern-sinks:
|
|
35
|
+
- patterns:
|
|
36
|
+
- pattern: $QUERY
|
|
37
|
+
- pattern-either:
|
|
38
|
+
- pattern: $CONN.exec($QUERY,...)
|
|
39
|
+
- pattern: $CONN.exec_params($QUERY,...)
|
|
40
|
+
- pattern: $CONN.exec_prepared($QUERY,...)
|
|
41
|
+
- pattern: $CONN.async_exec($QUERY,...)
|
|
42
|
+
- pattern: $CONN.async_exec_params($QUERY,...)
|
|
43
|
+
- pattern: $CONN.async_exec_prepared($QUERY,...)
|
|
44
|
+
- pattern-inside: |
|
|
45
|
+
require 'pg'
|
|
46
|
+
...
|
|
47
|
+
pattern-sources:
|
|
48
|
+
- patterns:
|
|
49
|
+
- pattern: event
|
|
50
|
+
- pattern-inside: |
|
|
51
|
+
def $HANDLER(event, context)
|
|
52
|
+
...
|
|
53
|
+
end
|
|
54
|
+
severity: WARNING
|
|
@@ -0,0 +1,49 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: sequel-sqli
|
|
3
|
+
languages:
|
|
4
|
+
- ruby
|
|
5
|
+
message: >-
|
|
6
|
+
Detected SQL statement that is tainted by `event` object. This could lead to SQL injection if the
|
|
7
|
+
variable is user-controlled
|
|
8
|
+
and not properly sanitized. In order to prevent SQL injection,
|
|
9
|
+
use parameterized queries or prepared statements instead.
|
|
10
|
+
You can use parameterized statements like so:
|
|
11
|
+
`DB['select * from items where name = ?', name]`
|
|
12
|
+
mode: taint
|
|
13
|
+
metadata:
|
|
14
|
+
references:
|
|
15
|
+
- https://github.com/jeremyevans/sequel#label-Arbitrary+SQL+queries
|
|
16
|
+
category: security
|
|
17
|
+
owasp:
|
|
18
|
+
- A01:2017 - Injection
|
|
19
|
+
- A03:2021 - Injection
|
|
20
|
+
- A05:2025 - Injection
|
|
21
|
+
cwe:
|
|
22
|
+
- "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
|
|
23
|
+
technology:
|
|
24
|
+
- aws-lambda
|
|
25
|
+
- sequel
|
|
26
|
+
cwe2022-top25: true
|
|
27
|
+
cwe2021-top25: true
|
|
28
|
+
subcategory:
|
|
29
|
+
- vuln
|
|
30
|
+
likelihood: MEDIUM
|
|
31
|
+
impact: HIGH
|
|
32
|
+
confidence: MEDIUM
|
|
33
|
+
pattern-sinks:
|
|
34
|
+
- patterns:
|
|
35
|
+
- pattern: $QUERY
|
|
36
|
+
- pattern-either:
|
|
37
|
+
- pattern: DB[$QUERY,...]
|
|
38
|
+
- pattern: DB.run($QUERY,...)
|
|
39
|
+
- pattern-inside: |
|
|
40
|
+
require 'sequel'
|
|
41
|
+
...
|
|
42
|
+
pattern-sources:
|
|
43
|
+
- patterns:
|
|
44
|
+
- pattern: event
|
|
45
|
+
- pattern-inside: |
|
|
46
|
+
def $HANDLER(event, context)
|
|
47
|
+
...
|
|
48
|
+
end
|
|
49
|
+
severity: WARNING
|
|
@@ -0,0 +1,54 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: tainted-deserialization
|
|
3
|
+
mode: taint
|
|
4
|
+
languages: [ruby]
|
|
5
|
+
message: >-
|
|
6
|
+
Deserialization of a string tainted by `event` object found. Objects in Ruby can be serialized into
|
|
7
|
+
strings,
|
|
8
|
+
then later loaded from strings. However, uses of `load` can cause remote code execution.
|
|
9
|
+
Loading user input with MARSHAL, YAML or CSV can potentially be dangerous.
|
|
10
|
+
If you need to deserialize untrusted data, you should use JSON as it is only capable of returning
|
|
11
|
+
'primitive' types
|
|
12
|
+
such as strings, arrays, hashes, numbers and nil.
|
|
13
|
+
metadata:
|
|
14
|
+
references:
|
|
15
|
+
- https://ruby-doc.org/core-3.1.2/doc/security_rdoc.html
|
|
16
|
+
- https://groups.google.com/g/rubyonrails-security/c/61bkgvnSGTQ/m/nehwjA8tQ8EJ
|
|
17
|
+
- https://github.com/presidentbeef/brakeman/blob/main/lib/brakeman/checks/check_deserialize.rb
|
|
18
|
+
category: security
|
|
19
|
+
owasp:
|
|
20
|
+
- A08:2017 - Insecure Deserialization
|
|
21
|
+
- A08:2021 - Software and Data Integrity Failures
|
|
22
|
+
- A08:2025 - Software or Data Integrity Failures
|
|
23
|
+
cwe:
|
|
24
|
+
- 'CWE-502: Deserialization of Untrusted Data'
|
|
25
|
+
technology:
|
|
26
|
+
- ruby
|
|
27
|
+
- aws-lambda
|
|
28
|
+
cwe2022-top25: true
|
|
29
|
+
cwe2021-top25: true
|
|
30
|
+
subcategory:
|
|
31
|
+
- vuln
|
|
32
|
+
likelihood: MEDIUM
|
|
33
|
+
impact: HIGH
|
|
34
|
+
confidence: MEDIUM
|
|
35
|
+
pattern-sinks:
|
|
36
|
+
- patterns:
|
|
37
|
+
- pattern: $SINK
|
|
38
|
+
- pattern-either:
|
|
39
|
+
- pattern-inside: |
|
|
40
|
+
YAML.load($SINK,...)
|
|
41
|
+
- pattern-inside: |
|
|
42
|
+
CSV.load($SINK,...)
|
|
43
|
+
- pattern-inside: |
|
|
44
|
+
Marshal.load($SINK,...)
|
|
45
|
+
- pattern-inside: |
|
|
46
|
+
Marshal.restore($SINK,...)
|
|
47
|
+
pattern-sources:
|
|
48
|
+
- patterns:
|
|
49
|
+
- pattern: event
|
|
50
|
+
- pattern-inside: |
|
|
51
|
+
def $HANDLER(event, context)
|
|
52
|
+
...
|
|
53
|
+
end
|
|
54
|
+
severity: WARNING
|
|
@@ -0,0 +1,57 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: tainted-sql-string
|
|
3
|
+
languages: [ruby]
|
|
4
|
+
severity: ERROR
|
|
5
|
+
message: >-
|
|
6
|
+
Detected user input used to manually construct a SQL string. This is usually
|
|
7
|
+
bad practice because manual construction could accidentally result in a SQL
|
|
8
|
+
injection. An attacker could use a SQL injection to steal or modify contents
|
|
9
|
+
of the database. Instead, use a parameterized query which is available
|
|
10
|
+
by default in most database engines. Alternatively, consider using an
|
|
11
|
+
object-relational mapper (ORM) such as Sequelize which will protect your queries.
|
|
12
|
+
metadata:
|
|
13
|
+
references:
|
|
14
|
+
- https://rorsecurity.info/portfolio/ruby-on-rails-sql-injection-cheat-sheet
|
|
15
|
+
category: security
|
|
16
|
+
owasp:
|
|
17
|
+
- A01:2017 - Injection
|
|
18
|
+
- A03:2021 - Injection
|
|
19
|
+
- A05:2025 - Injection
|
|
20
|
+
cwe:
|
|
21
|
+
- "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
|
|
22
|
+
technology:
|
|
23
|
+
- aws-lambda
|
|
24
|
+
cwe2022-top25: true
|
|
25
|
+
cwe2021-top25: true
|
|
26
|
+
subcategory:
|
|
27
|
+
- vuln
|
|
28
|
+
likelihood: MEDIUM
|
|
29
|
+
impact: HIGH
|
|
30
|
+
confidence: MEDIUM
|
|
31
|
+
mode: taint
|
|
32
|
+
pattern-sources:
|
|
33
|
+
- patterns:
|
|
34
|
+
- pattern: event
|
|
35
|
+
- pattern-inside: |
|
|
36
|
+
def $HANDLER(event, context)
|
|
37
|
+
...
|
|
38
|
+
end
|
|
39
|
+
pattern-sinks:
|
|
40
|
+
- patterns:
|
|
41
|
+
- pattern-either:
|
|
42
|
+
- patterns:
|
|
43
|
+
- pattern: |
|
|
44
|
+
"...#{...}..."
|
|
45
|
+
- pattern-regex: (?i)(select|delete|insert|create|update|alter|drop)\b|\w+\s*!?[<>=].*
|
|
46
|
+
- patterns:
|
|
47
|
+
- pattern-either:
|
|
48
|
+
- pattern: Kernel::sprintf("$SQLSTR", ...)
|
|
49
|
+
- pattern: |
|
|
50
|
+
"$SQLSTR" + $EXPR
|
|
51
|
+
- pattern: |
|
|
52
|
+
"$SQLSTR" % $EXPR
|
|
53
|
+
- metavariable-regex:
|
|
54
|
+
metavariable: $SQLSTR
|
|
55
|
+
regex: (?i)(select|delete|insert|create|update|alter|drop)\b|\w+\s*!?[<>=].*
|
|
56
|
+
- pattern-not-inside: |
|
|
57
|
+
puts(...)
|
|
@@ -0,0 +1,32 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: ruby-jwt-decode-without-verify
|
|
3
|
+
message: >-
|
|
4
|
+
Detected the decoding of a JWT token without a verify step.
|
|
5
|
+
JWT tokens must be verified before use, otherwise the token's
|
|
6
|
+
integrity is unknown. This means a malicious actor could forge
|
|
7
|
+
a JWT token with any claims.
|
|
8
|
+
metadata:
|
|
9
|
+
cwe:
|
|
10
|
+
- 'CWE-345: Insufficient Verification of Data Authenticity'
|
|
11
|
+
owasp:
|
|
12
|
+
- A08:2021 - Software and Data Integrity Failures
|
|
13
|
+
- A08:2025 - Software or Data Integrity Failures
|
|
14
|
+
source-rule-url: https://semgrep.dev/blog/2020/hardcoded-secrets-unverified-tokens-and-other-common-jwt-mistakes/
|
|
15
|
+
category: security
|
|
16
|
+
technology:
|
|
17
|
+
- jwt
|
|
18
|
+
references:
|
|
19
|
+
- https://owasp.org/Top10/A08_2021-Software_and_Data_Integrity_Failures
|
|
20
|
+
subcategory:
|
|
21
|
+
- audit
|
|
22
|
+
likelihood: LOW
|
|
23
|
+
impact: LOW
|
|
24
|
+
confidence: LOW
|
|
25
|
+
languages: [ruby]
|
|
26
|
+
severity: WARNING
|
|
27
|
+
patterns:
|
|
28
|
+
- pattern-inside: |
|
|
29
|
+
require 'jwt'
|
|
30
|
+
...
|
|
31
|
+
- pattern: |-
|
|
32
|
+
JWT.decode($PAYLOAD,$SECRET,false,...)
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: ruby-jwt-exposed-data
|
|
3
|
+
message: >-
|
|
4
|
+
The object is passed strictly to jsonwebtoken.sign(...)
|
|
5
|
+
Make sure that sensitive information is not exposed through JWT token payload.
|
|
6
|
+
severity: WARNING
|
|
7
|
+
metadata:
|
|
8
|
+
owasp:
|
|
9
|
+
- A02:2017 - Broken Authentication
|
|
10
|
+
- A04:2021 - Insecure Design
|
|
11
|
+
- A06:2025 - Insecure Design
|
|
12
|
+
cwe:
|
|
13
|
+
- 'CWE-522: Insufficiently Protected Credentials'
|
|
14
|
+
source-rule-url: https://semgrep.dev/blog/2020/hardcoded-secrets-unverified-tokens-and-other-common-jwt-mistakes/
|
|
15
|
+
category: security
|
|
16
|
+
technology:
|
|
17
|
+
- jwt
|
|
18
|
+
references:
|
|
19
|
+
- https://owasp.org/Top10/A04_2021-Insecure_Design
|
|
20
|
+
cwe2021-top25: true
|
|
21
|
+
subcategory:
|
|
22
|
+
- audit
|
|
23
|
+
likelihood: LOW
|
|
24
|
+
impact: LOW
|
|
25
|
+
confidence: LOW
|
|
26
|
+
languages: [ruby]
|
|
27
|
+
patterns:
|
|
28
|
+
- pattern-inside: |
|
|
29
|
+
require 'jwt'
|
|
30
|
+
...
|
|
31
|
+
- pattern-inside: |
|
|
32
|
+
def $FUNC(...,$INPUT,...)
|
|
33
|
+
...
|
|
34
|
+
end
|
|
35
|
+
- pattern: |
|
|
36
|
+
JWT.encode($INPUT,...)
|
|
@@ -0,0 +1,35 @@
|
|
|
1
|
+
rules:
|
|
2
|
+
- id: ruby-jwt-exposed-credentials
|
|
3
|
+
languages:
|
|
4
|
+
- ruby
|
|
5
|
+
metadata:
|
|
6
|
+
cwe:
|
|
7
|
+
- 'CWE-522: Insufficiently Protected Credentials'
|
|
8
|
+
owasp:
|
|
9
|
+
- A02:2017 - Broken Authentication
|
|
10
|
+
- A04:2021 - Insecure Design
|
|
11
|
+
- A06:2025 - Insecure Design
|
|
12
|
+
source-rule-url: https://semgrep.dev/blog/2020/hardcoded-secrets-unverified-tokens-and-other-common-jwt-mistakes/
|
|
13
|
+
references:
|
|
14
|
+
- https://cwe.mitre.org/data/definitions/522.html
|
|
15
|
+
category: security
|
|
16
|
+
technology:
|
|
17
|
+
- jwt
|
|
18
|
+
cwe2021-top25: true
|
|
19
|
+
subcategory:
|
|
20
|
+
- audit
|
|
21
|
+
likelihood: LOW
|
|
22
|
+
impact: LOW
|
|
23
|
+
confidence: LOW
|
|
24
|
+
message: >-
|
|
25
|
+
Password is exposed through JWT token payload. This is not encrypted and
|
|
26
|
+
the password could be compromised. Do not store passwords in JWT tokens.
|
|
27
|
+
patterns:
|
|
28
|
+
- pattern-inside: |
|
|
29
|
+
require 'jwt'
|
|
30
|
+
...
|
|
31
|
+
- pattern: |
|
|
32
|
+
$PAYLOAD = {...,password:...,...}
|
|
33
|
+
...
|
|
34
|
+
JWT.encode($PAYLOAD,...)
|
|
35
|
+
severity: ERROR
|