Skip to content

Latest commit

 

History

History

snyk-code-security-rules

Snyk Code security rules

{% hint style="info" %} Snyk Code rules are updated continuously. The list expands continually, and the rules may change to provide the best protection and security solutions for your code. {% endhint %}

This page lists all security rules used by Snyk Code when scanning your source code for vulnerabilities.

Each rule includes the following information.

  • Rule Name: The Snyk name of the rule.
  • Languages: The programming languages to which this specific rule applies. Note that there might be two rules with the same name that apply to different languages.
  • CWE(s): The CWE numbers that are covered by this rule.
  • Security Categories: The OWASP Top 10 (2021 edition) category to which the rule belongs to, if any, and if it is included in SANS 25.
Rule Name Language(s) CWE(s) Security Categories
ASP SSL Disabled XML CWE-319 OWASP:A02
Access Violation Apex CWE-284, CWE-285 OWASP:A01
Allocation of Resources Without Limits or Throttling JavaScript, PHP CWE-770
An optimizing compiler may remove memset non-zero leaving data in memory C++ CWE-1330
Android Debug Mode Enabled XML CWE-489
Android Fragment Injection Java, Kotlin CWE-470 OWASP:A03
Android Intent Forwarding Java, Kotlin CWE-940 OWASP:A07
Android Uri Permission Manipulation Java, Kotlin CWE-266 OWASP:A04
Android World Writeable/Readable File Permission Found Java, Kotlin, Scala CWE-732
Anti-forgery token validation disabled C# CWE-352 Sans Top 25, OWASP:A01
Arbitrary File Write via Archive Extraction (Tar Slip) Python CWE-22 Sans Top 25, OWASP:A01
Arbitrary File Write via Archive Extraction (Zip Slip) C#, JavaScript, PHP CWE-22 Sans Top 25, OWASP:A01
Authentication Bypass by Spoofing C++ CWE-290 OWASP:A07
Authentication over HTTP Python CWE-319 OWASP:A02
Binding to all network interfaces may open service to unintended traffic Python CWE-284 OWASP:A01
Broken User Authentication Python CWE-287 Sans Top 25, OWASP:A07
Buffer Over-read JavaScript CWE-126
Buffer Overflow C++ CWE-122
Clear Text Logging Go, Swift CWE-200, CWE-312 OWASP:A01, OWASP:A04
Clear Text Sensitive Storage Apex, JavaScript CWE-200, CWE-312 OWASP:A01, OWASP:A04
Cleartext Storage of Sensitive Information in a Cookie C#, Java, Kotlin, Scala CWE-315 OWASP:A05
Cleartext Transmission of Sensitive Information Java, JavaScript, Kotlin, Scala CWE-319 OWASP:A02
Code Execution via Third Party Package Context Java, Kotlin CWE-94 Sans Top 25, OWASP:A03
Code Execution via Third Party Package Installation Java, Kotlin CWE-940 OWASP:A07
Code Injection C#, Java, JavaScript, Kotlin, PHP, Python, Ruby, Scala, Swift, Visual Basic CWE-94 Sans Top 25, OWASP:A03
Command Injection Apex, C#, C++, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, Visual Basic CWE-78 Sans Top 25, OWASP:A03
Cross-Site Request Forgery (CSRF) Java, JavaScript, Kotlin, Python, Scala CWE-352 Sans Top 25, OWASP:A01
Cross-site Scripting (XSS) Apex, C#, C++, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, Visual Basic CWE-79 Sans Top 25, OWASP:A03
Cryptographic Issues Java, JavaScript, Kotlin, Python, Scala CWE-310 OWASP:A02
Debug Features Enabled C#, Visual Basic, XML CWE-215
Debug Mode Enabled Python CWE-489
Denial of Service (DoS) through Nested GraphQL Queries JavaScript CWE-400
Dereference of a NULL Pointer C++ CWE-476 Sans Top 25
Deserialization of Untrusted Data C#, Java, JavaScript, Kotlin, PHP, Python, Ruby, Scala, Visual Basic CWE-502 Sans Top 25, OWASP:A08
Device Authentication Bypass Swift CWE-287 Sans Top 25, OWASP:A07
Disabled Neutralization of CRLF Sequences in HTTP Headers Java, Kotlin, Scala CWE-113 OWASP:A03
Disabling Strict Contextual escaping (SCE) could provide additional attack surface for Cross-site Scripting (XSS) JavaScript CWE-79 Sans Top 25, OWASP:A03
Division By Zero C++ CWE-369
Double Free C++ CWE-415
Electron Disable Security Warnings JavaScript CWE-16 OWASP:A05
Electron Insecure Web Preferences JavaScript CWE-16 OWASP:A05
Electron Load Insecure Content JavaScript CWE-16 OWASP:A05
Exposure of Private Personal Information to an Unauthorized Actor C#, C++ CWE-359 OWASP:A01
External Control of System or Configuration Setting Java, Kotlin, Scala CWE-15 OWASP:A05
File Access Enabled Java, Kotlin CWE-200 OWASP:A01
File Inclusion PHP CWE-98 OWASP:A03
Generation of Error Message Containing Sensitive Information Go, XML CWE-209 OWASP:A04
GraphQL Injection JavaScript CWE-89 Sans Top 25, OWASP:A03
Hardcoded Secret Apex, C#, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, Visual Basic CWE-547 OWASP:A05
Improper Access Control: Email Content Injection Apex, Go, PHP CWE-284 OWASP:A01
Improper Authentication Java, Kotlin, Scala CWE-287 Sans Top 25, OWASP:A07
Improper Certificate Validation Go, Java, Kotlin, Python, Ruby, Scala, Swift CWE-295 OWASP:A07
Improper Code Sanitization JavaScript CWE-116, CWE-79, CWE-94 Sans Top 25, OWASP:A03
Improper Handling of Insufficient Permissions or Privileges Java, Kotlin, Python CWE-280 OWASP:A04
Improper Input Validation Ruby CWE-20 Sans Top 25, OWASP:A03
Improper Neutralization of CRLF Sequences in HTTP Headers C#, Java, Kotlin, Scala, Visual Basic CWE-113 OWASP:A03
Improper Neutralization of Directives in Statically Saved Code Go, JavaScript, Python, Ruby CWE-96 OWASP:A03
Improper Null Termination C++ CWE-170
Improper Restriction of Rendered UI Layers or Frames JavaScript, PHP, XML CWE-1021 OWASP:A04
Improper Type Validation JavaScript CWE-1287
Improper Validation of Certificate with Host Mismatch Java, Kotlin, Scala CWE-297 OWASP:A07
Improperly Controlled Modification of Dynamically-Determined Object Attributes Ruby CWE-915 OWASP:A08
Inadequate Encryption Strength C#, C++, Go, Java, Kotlin, PHP, Python, Scala, Swift, Visual Basic CWE-326 OWASP:A02
Inadequate Padding for AES encryption Java, Kotlin, Scala CWE-326 OWASP:A02
Inadequate Padding for Public Key Encryption PHP, Rust CWE-326 OWASP:A02
Incorrect Permission Assignment Java, Kotlin CWE-732
Incorrect regular expression for validating values Ruby CWE-1286
Indirect Command Injection via User Controlled Environment Java, Kotlin, Scala CWE-78 Sans Top 25, OWASP:A03
Information Exposure C#, Java, JavaScript, Kotlin, PHP, Ruby, Scala, Swift CWE-200 OWASP:A01
Insecure Anonymous LDAP Binding C++ CWE-287 Sans Top 25, OWASP:A07
Insecure Data Storage Swift CWE-922 OWASP:A01
Insecure Data Transmission Apex, C#, Ruby CWE-319 OWASP:A02
Insecure Deserialization Swift CWE-502 Sans Top 25, OWASP:A08
Insecure File Permissions Python, Rust CWE-732
Insecure JWT Verification Method JavaScript CWE-347 OWASP:A02
Insecure TLS Configuration Go, JavaScript CWE-327 OWASP:A02
Insecure Temporary File Python CWE-377 OWASP:A01
Insecure Xml Parser Python CWE-611 OWASP:A05
Insecure default value Python CWE-453
Insufficient Session Expiration Java, Kotlin, Scala CWE-613 OWASP:A07
Insufficient postMessage Validation JavaScript CWE-20 Sans Top 25, OWASP:A03
Integer Overflow C++ CWE-190 Sans Top 25
Introspection Enabled JavaScript CWE-200 OWASP:A01
JWT 'none' Algorithm Supported JavaScript CWE-347 OWASP:A02
JWT Signature Verification Bypass Java CWE-347 OWASP:A02
JWT Signature Verification Method Disabled JavaScript CWE-347 OWASP:A02
Java Naming and Directory Interface (JNDI) Injection Java, Kotlin, Scala CWE-074
JavaScript Enabled Java, Kotlin CWE-79 Sans Top 25, OWASP:A03
Jinja auto-escape is set to false. Python CWE-79 Sans Top 25, OWASP:A03
LDAP Injection C#, C++, Java, Kotlin, Python, Scala CWE-90 OWASP:A03
Log Forging C# CWE-117 OWASP:A09
Memory Allocation Of String Length C++ CWE-170
Memory Corruption Swift CWE-822
Missing Release of File Descriptor or Handle after Effective Lifetime C++ CWE-775
Missing Release of Memory after Effective Lifetime C++ CWE-401
No Weak Password Requirements Ruby CWE-521 OWASP:A07
NoSQL Injection Java, JavaScript, Python CWE-943
Observable Timing Discrepancy Rust CWE-208
Observable Timing Discrepancy (Timing Attack) Java, JavaScript, Kotlin, Scala CWE-208
Open Redirect Apex, C#, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Visual Basic CWE-601 OWASP:A01
Origin Validation Error Java, JavaScript, Kotlin, PHP, Python, Rust, Scala CWE-346, CWE-942 OWASP:A05, OWASP:A07
Password Requirements Not Enforced in Django Application Python CWE-521 OWASP:A07
Path Traversal C#, C++, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, Visual Basic CWE-23 OWASP:A01
Permissive Cross-domain Policy JavaScript CWE-942 OWASP:A05
Potential Negative Number Used as Index C++ CWE-125, CWE-787 Sans Top 25
Potential buffer overflow from usage of unsafe function C++ CWE-122
Privacy Leak Java CWE-532 OWASP:A09
Process Control Java, Kotlin, Scala CWE-114
Prototype Pollution JavaScript CWE-1321
Python 2 source code Python CWE-1104 OWASP:A06
Regular Expression Denial of Service (ReDoS) JavaScript, PHP, Python, Ruby CWE-400
Regular expression injection Apex, C#, Java, Kotlin, Scala, Visual Basic CWE-400, CWE-730
Remote Code Execution via Endpoint Ruby CWE-94 Sans Top 25, OWASP:A03
Request Validation Disabled C#, Visual Basic, XML CWE-554
SOQL Injection Apex CWE-89 Sans Top 25, OWASP:A03
SOSL Injection Apex CWE-89 Sans Top 25, OWASP:A03
SQL Injection C#, C++, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, Visual Basic CWE-89 Sans Top 25, OWASP:A03
Selection of Less-Secure Algorithm During Negotiation (Force SSL) Ruby CWE-311, CWE-757 OWASP:A04, OWASP:A02
Selection of Less-Secure Algorithm During Negotiation (SSL instead of TLS) Python CWE-757 OWASP:A02
Sensitive Cookie Without 'HttpOnly' Flag C#, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Scala, Visual Basic CWE-1004 OWASP:A05
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute Apex, C#, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Scala, Swift, Visual Basic CWE-614 OWASP:A05
Server Information Exposure Java, Kotlin, Python, Scala CWE-209 OWASP:A04
Server-Side Request Forgery (SSRF) Apex, C#, C++, Go, Java, JavaScript, Kotlin, PHP, Python, Rust, Scala, Swift, Visual Basic CWE-918 Sans Top 25, OWASP:A10
Session Manipulation Ruby CWE-285 OWASP:A01
Sinatra Protection Layers Disabled Ruby CWE-1021, CWE-16, CWE-348, CWE-35, CWE-352, CWE-693, CWE-79 Sans Top 25, OWASP:A01, OWASP:A05, OWASP:A03, OWASP:A04
Size Used as Index C++ CWE-125, CWE-787 Sans Top 25
Spring Cross-Site Request Forgery (CSRF) Java CWE-352 Sans Top 25, OWASP:A01
Struts Development Mode Enabled XML CWE-489
The cipher text is equal to the provided input plain text Java, Kotlin, Scala CWE-311 OWASP:A04
Trust Boundary Violation Java, Kotlin, Scala CWE-501 OWASP:A04
Unauthorized File Access Java, Kotlin CWE-79 Sans Top 25, OWASP:A03
Unchecked Input for Loop Condition JavaScript CWE-400, CWE-606
Unprotected Storage of Credentials Java, Kotlin, Scala CWE-256 OWASP:A04
Unrestricted Android Broadcast Java, Kotlin CWE-862 Sans Top 25, OWASP:A01
Unsafe JQuery Plugin JavaScript CWE-116, CWE-79 Sans Top 25, OWASP:A03
Unsafe Reflection Java, Ruby CWE-470 OWASP:A03
Unsafe SOQL Concatenation Apex CWE-89 Sans Top 25, OWASP:A03
Unsafe SOSL Concatenation Apex CWE-89 Sans Top 25, OWASP:A03
Unverified Password Change Apex CWE-620 OWASP:A07
Usage of BinaryFormatter C#, Visual Basic CWE-502 Sans Top 25, OWASP:A08
Use After Free C++ CWE-416 Sans Top 25
Use dangerouslySetInnerHTML to Explicitly Handle XSS Risks JavaScript CWE-79 Sans Top 25, OWASP:A03
Use of Expired File Descriptor C++ CWE-910
Use of Externally-Controlled Format String C++, Java, JavaScript, Kotlin, Scala CWE-134
Use of Hardcoded Credentials Apex, C#, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, Visual Basic CWE-259, CWE-798 Sans Top 25, OWASP:A07
Use of Hardcoded Cryptographic Initialization Value Python CWE-329 OWASP:A02
Use of Hardcoded Cryptographic Key C++, Python, Ruby CWE-321 OWASP:A02
Use of Hardcoded Passwords Apex, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, XML CWE-259, CWE-798 Sans Top 25, OWASP:A07
Use of Hardcoded, Security-relevant Constants Java, Kotlin, Scala CWE-547 OWASP:A05
Use of Insufficiently Random Values C#, Go, Java, JavaScript, Kotlin, PHP, Ruby, Rust, Scala, Swift, Visual Basic CWE-330 OWASP:A02
Use of Password Hash With Insufficient Computational Effort Apex, C#, C++, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, Visual Basic CWE-916 OWASP:A02
Use of Potentially Dangerous Function Java, Kotlin, Scala CWE-676
Use of Sticky broadcasts Java, Kotlin CWE-265
Use of a Broken or Risky Cryptographic Algorithm C#, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, Visual Basic CWE-327 OWASP:A02
User Controlled Pointer C++ CWE-1285
Weak Password Recovery Mechanism for Forgotten Password JavaScript CWE-640 OWASP:A07
XAML Injection C# CWE-611 OWASP:A05
XML External Entity (XXE) Injection C#, C++, Java, JavaScript, Kotlin, PHP, Ruby, Scala, Swift, Visual Basic CWE-611 OWASP:A05
XML Injection Apex, C#, Visual Basic CWE-91 OWASP:A03
XPath Injection C#, C++, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Scala, Visual Basic CWE-643 OWASP:A03