CURRENT SECURITY RULES

Comprehensive coverage of common security vulnerabilities with detailed explanations and remediation guidance.

Showing all 28 rules
SQL_INJECTION

SQL Injection

Detects SQL injection vulnerabilities where user input is directly concatenated into SQL queries.

Critical Database Web
XSS_DETECTION

XSS Detection

Identifies Cross-Site Scripting vulnerabilities where user input is rendered without proper sanitization.

High Web Client
EXPOSED_SECRETS

Exposed Secrets

Finds exposed API keys, passwords, tokens, and other sensitive credentials in source code.

Critical Secrets Config
DIRECTORY_TRAVERSAL

Directory Traversal

Detects path traversal attacks where attackers can access files outside intended directories.

High File Web
CSRF_PROTECTION

CSRF Protection

Identifies missing CSRF protection in web applications that handle state-changing requests.

High Web Auth
INSECURE_DEPENDENCIES

Insecure Dependencies

Checks for known vulnerable dependencies and outdated packages with security issues.

Medium Dependencies Packages
MISSING_AUTHENTICATION

Missing Authentication

Identifies endpoints and resources that lack proper authentication mechanisms.

High Auth Access
BROKEN_ACCESS_CONTROL

Broken Access Control

Detects authorization bypasses and improper access control implementations.

High Auth Access
INSECURE_LOGGING

Insecure Logging

Identifies logging of sensitive information like passwords, tokens, and personal data.

Medium Logging Privacy
UNVALIDATED_INPUT

Unvalidated Input

Detects user input that lacks proper validation, sanitization, or type checking.

Medium Input Validation
INSECURE_HTTP

Insecure HTTP

Identifies usage of HTTP instead of HTTPS for transmitting sensitive data.

Medium Transport Web
MISSING_SECURITY_HEADERS

Missing Security Headers

Checks for missing security headers like CSP, HSTS, X-Frame-Options, and others.

Medium Headers Web
OPEN_CORS

Open CORS

Detects overly permissive CORS configurations that allow unauthorized cross-origin requests.

Medium CORS API
INSECURE_FILE_UPLOAD

Insecure File Upload

Identifies file upload vulnerabilities that could allow malicious file execution.

High File Upload
INSECURE_DESERIALIZATION

Insecure Deserialization

Detects unsafe deserialization of user-controlled data that could lead to code execution.

High Data Serialization
INSECURE_ERROR_HANDLING

Insecure Error Handling

Identifies error messages that leak sensitive information about the application.

Medium Errors Info
INSECURE_RANDOM_GENERATION

Insecure Random Generation

Detects usage of cryptographically weak random number generators for security purposes.

Medium Crypto Random
INSECURE_SESSION_MANAGEMENT

Insecure Session Management

Identifies weak session management practices like predictable session IDs.

High Session Auth
HARDCODED_SENSITIVE_DATA

Hardcoded Sensitive Data

Finds hardcoded passwords, API keys, and other sensitive data in source code.

Critical Hardcoded Secrets
INSECURE_CONFIGURATION

Insecure Configuration

Identifies insecure configuration settings that could compromise application security.

Medium Config Settings
PROMPT_INJECTION_DETECTION

Prompt Injection Detection

Detects potential prompt injection vulnerabilities in AI-powered applications.

High AI Prompt
AI_GENERATED_CODE_VALIDATION

AI-Generated Code Validation

Identifies potential security issues in AI-generated code that may lack proper validation.

Medium AI Code
AI_AGENT_ACCESS_CONTROL

AI Agent Access Control

Detects missing access controls for AI agents that could lead to unauthorized actions.

High AI Agent
AI_DATA_LEAKAGE_PREVENTION

AI Data Leakage Prevention

Identifies potential data leakage vulnerabilities in AI systems and applications.

Critical AI Data
MCP_SERVER_SECURITY

MCP Server Security

Detects security vulnerabilities in Model Context Protocol (MCP) server implementations.

High MCP Server
KUBERNETES_SECURITY

Kubernetes Security

Detects security misconfigurations in Kubernetes manifests including privileged containers, root users, and dangerous capabilities.

High Kubernetes Container
DOCKERFILE_SECURITY

Dockerfile Security

Identifies security vulnerabilities in Dockerfiles including root user execution, latest tags, and insecure configurations.

High Dockerfile Container
CONTAINER_REGISTRY_SECURITY

Container Registry Security

Detects container registry security misconfigurations including missing image digests, insecure registries, and missing scanning.

Medium Registry Container