{% hint style="info" %} Snyk Code rules are updated continuously. The list expands continually, and the rules may change to provide the best protection and security solutions for your code. {% endhint %}
This page lists all security rules used by Snyk Code when scanning your source code for vulnerabilities.
Each rule includes the following information.
- Rule Name: The Snyk name of the rule.
- Languages: The programming languages to which this specific rule applies. Note that there might be two rules with the same name that apply to different languages.
- CWE(s): The CWE numbers that are covered by this rule.
- Security Categories: The OWASP Top 10 (2021 edition) category to which the rule belongs to, if any, and if it is included in SANS 25.
Rule Name | Language(s) | CWE(s) | Security Categories |
---|---|---|---|
ASP SSL Disabled | XML | CWE-319 | OWASP:A02 |
Access Violation | Apex | CWE-284, CWE-285 | OWASP:A01 |
Allocation of Resources Without Limits or Throttling | JavaScript, PHP | CWE-770 | |
An optimizing compiler may remove memset non-zero leaving data in memory | C++ | CWE-1330 | |
Android Debug Mode Enabled | XML | CWE-489 | |
Android Fragment Injection | Java, Kotlin | CWE-470 | OWASP:A03 |
Android Intent Forwarding | Java, Kotlin | CWE-940 | OWASP:A07 |
Android Uri Permission Manipulation | Java, Kotlin | CWE-266 | OWASP:A04 |
Android World Writeable/Readable File Permission Found | Java, Kotlin, Scala | CWE-732 | |
Anti-forgery token validation disabled | C# | CWE-352 | Sans Top 25, OWASP:A01 |
Arbitrary File Write via Archive Extraction (Tar Slip) | Python | CWE-22 | Sans Top 25, OWASP:A01 |
Arbitrary File Write via Archive Extraction (Zip Slip) | C#, JavaScript, PHP | CWE-22 | Sans Top 25, OWASP:A01 |
Authentication Bypass by Spoofing | C++ | CWE-290 | OWASP:A07 |
Authentication over HTTP | Python | CWE-319 | OWASP:A02 |
Binding to all network interfaces may open service to unintended traffic | Python | CWE-284 | OWASP:A01 |
Broken User Authentication | Python | CWE-287 | Sans Top 25, OWASP:A07 |
Buffer Over-read | JavaScript | CWE-126 | |
Buffer Overflow | C++ | CWE-122 | |
Clear Text Logging | Go, Swift | CWE-200, CWE-312 | OWASP:A01, OWASP:A04 |
Clear Text Sensitive Storage | Apex, JavaScript | CWE-200, CWE-312 | OWASP:A01, OWASP:A04 |
Cleartext Storage of Sensitive Information in a Cookie | C#, Java, Kotlin, Scala | CWE-315 | OWASP:A05 |
Cleartext Transmission of Sensitive Information | Java, JavaScript, Kotlin, Scala | CWE-319 | OWASP:A02 |
Code Execution via Third Party Package Context | Java, Kotlin | CWE-94 | Sans Top 25, OWASP:A03 |
Code Execution via Third Party Package Installation | Java, Kotlin | CWE-940 | OWASP:A07 |
Code Injection | C#, Java, JavaScript, Kotlin, PHP, Python, Ruby, Scala, Swift, Visual Basic | CWE-94 | Sans Top 25, OWASP:A03 |
Command Injection | Apex, C#, C++, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, Visual Basic | CWE-78 | Sans Top 25, OWASP:A03 |
Cross-Site Request Forgery (CSRF) | Java, JavaScript, Kotlin, Python, Scala | CWE-352 | Sans Top 25, OWASP:A01 |
Cross-site Scripting (XSS) | Apex, C#, C++, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, Visual Basic | CWE-79 | Sans Top 25, OWASP:A03 |
Cryptographic Issues | Java, JavaScript, Kotlin, Python, Scala | CWE-310 | OWASP:A02 |
Debug Features Enabled | C#, Visual Basic, XML | CWE-215 | |
Debug Mode Enabled | Python | CWE-489 | |
Denial of Service (DoS) through Nested GraphQL Queries | JavaScript | CWE-400 | |
Dereference of a NULL Pointer | C++ | CWE-476 | Sans Top 25 |
Deserialization of Untrusted Data | C#, Java, JavaScript, Kotlin, PHP, Python, Ruby, Scala, Visual Basic | CWE-502 | Sans Top 25, OWASP:A08 |
Device Authentication Bypass | Swift | CWE-287 | Sans Top 25, OWASP:A07 |
Disabled Neutralization of CRLF Sequences in HTTP Headers | Java, Kotlin, Scala | CWE-113 | OWASP:A03 |
Disabling Strict Contextual escaping (SCE) could provide additional attack surface for Cross-site Scripting (XSS) | JavaScript | CWE-79 | Sans Top 25, OWASP:A03 |
Division By Zero | C++ | CWE-369 | |
Double Free | C++ | CWE-415 | |
Electron Disable Security Warnings | JavaScript | CWE-16 | OWASP:A05 |
Electron Insecure Web Preferences | JavaScript | CWE-16 | OWASP:A05 |
Electron Load Insecure Content | JavaScript | CWE-16 | OWASP:A05 |
Exposure of Private Personal Information to an Unauthorized Actor | C#, C++ | CWE-359 | OWASP:A01 |
External Control of System or Configuration Setting | Java, Kotlin, Scala | CWE-15 | OWASP:A05 |
File Access Enabled | Java, Kotlin | CWE-200 | OWASP:A01 |
File Inclusion | PHP | CWE-98 | OWASP:A03 |
Generation of Error Message Containing Sensitive Information | Go, XML | CWE-209 | OWASP:A04 |
GraphQL Injection | JavaScript | CWE-89 | Sans Top 25, OWASP:A03 |
Hardcoded Secret | Apex, C#, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, Visual Basic | CWE-547 | OWASP:A05 |
Improper Access Control: Email Content Injection | Apex, Go, PHP | CWE-284 | OWASP:A01 |
Improper Authentication | Java, Kotlin, Scala | CWE-287 | Sans Top 25, OWASP:A07 |
Improper Certificate Validation | Go, Java, Kotlin, Python, Ruby, Scala, Swift | CWE-295 | OWASP:A07 |
Improper Code Sanitization | JavaScript | CWE-116, CWE-79, CWE-94 | Sans Top 25, OWASP:A03 |
Improper Handling of Insufficient Permissions or Privileges | Java, Kotlin, Python | CWE-280 | OWASP:A04 |
Improper Input Validation | Ruby | CWE-20 | Sans Top 25, OWASP:A03 |
Improper Neutralization of CRLF Sequences in HTTP Headers | C#, Java, Kotlin, Scala, Visual Basic | CWE-113 | OWASP:A03 |
Improper Neutralization of Directives in Statically Saved Code | Go, JavaScript, Python, Ruby | CWE-96 | OWASP:A03 |
Improper Null Termination | C++ | CWE-170 | |
Improper Restriction of Rendered UI Layers or Frames | JavaScript, PHP, XML | CWE-1021 | OWASP:A04 |
Improper Type Validation | JavaScript | CWE-1287 | |
Improper Validation of Certificate with Host Mismatch | Java, Kotlin, Scala | CWE-297 | OWASP:A07 |
Improperly Controlled Modification of Dynamically-Determined Object Attributes | Ruby | CWE-915 | OWASP:A08 |
Inadequate Encryption Strength | C#, C++, Go, Java, Kotlin, PHP, Python, Scala, Swift, Visual Basic | CWE-326 | OWASP:A02 |
Inadequate Padding for AES encryption | Java, Kotlin, Scala | CWE-326 | OWASP:A02 |
Inadequate Padding for Public Key Encryption | PHP, Rust | CWE-326 | OWASP:A02 |
Incorrect Permission Assignment | Java, Kotlin | CWE-732 | |
Incorrect regular expression for validating values | Ruby | CWE-1286 | |
Indirect Command Injection via User Controlled Environment | Java, Kotlin, Scala | CWE-78 | Sans Top 25, OWASP:A03 |
Information Exposure | C#, Java, JavaScript, Kotlin, PHP, Ruby, Scala, Swift | CWE-200 | OWASP:A01 |
Insecure Anonymous LDAP Binding | C++ | CWE-287 | Sans Top 25, OWASP:A07 |
Insecure Data Storage | Swift | CWE-922 | OWASP:A01 |
Insecure Data Transmission | Apex, C#, Ruby | CWE-319 | OWASP:A02 |
Insecure Deserialization | Swift | CWE-502 | Sans Top 25, OWASP:A08 |
Insecure File Permissions | Python, Rust | CWE-732 | |
Insecure JWT Verification Method | JavaScript | CWE-347 | OWASP:A02 |
Insecure TLS Configuration | Go, JavaScript | CWE-327 | OWASP:A02 |
Insecure Temporary File | Python | CWE-377 | OWASP:A01 |
Insecure Xml Parser | Python | CWE-611 | OWASP:A05 |
Insecure default value | Python | CWE-453 | |
Insufficient Session Expiration | Java, Kotlin, Scala | CWE-613 | OWASP:A07 |
Insufficient postMessage Validation | JavaScript | CWE-20 | Sans Top 25, OWASP:A03 |
Integer Overflow | C++ | CWE-190 | Sans Top 25 |
Introspection Enabled | JavaScript | CWE-200 | OWASP:A01 |
JWT 'none' Algorithm Supported | JavaScript | CWE-347 | OWASP:A02 |
JWT Signature Verification Bypass | Java | CWE-347 | OWASP:A02 |
JWT Signature Verification Method Disabled | JavaScript | CWE-347 | OWASP:A02 |
Java Naming and Directory Interface (JNDI) Injection | Java, Kotlin, Scala | CWE-074 | |
JavaScript Enabled | Java, Kotlin | CWE-79 | Sans Top 25, OWASP:A03 |
Jinja auto-escape is set to false. | Python | CWE-79 | Sans Top 25, OWASP:A03 |
LDAP Injection | C#, C++, Java, Kotlin, Python, Scala | CWE-90 | OWASP:A03 |
Log Forging | C# | CWE-117 | OWASP:A09 |
Memory Allocation Of String Length | C++ | CWE-170 | |
Memory Corruption | Swift | CWE-822 | |
Missing Release of File Descriptor or Handle after Effective Lifetime | C++ | CWE-775 | |
Missing Release of Memory after Effective Lifetime | C++ | CWE-401 | |
No Weak Password Requirements | Ruby | CWE-521 | OWASP:A07 |
NoSQL Injection | Java, JavaScript, Python | CWE-943 | |
Observable Timing Discrepancy | Rust | CWE-208 | |
Observable Timing Discrepancy (Timing Attack) | Java, JavaScript, Kotlin, Scala | CWE-208 | |
Open Redirect | Apex, C#, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Visual Basic | CWE-601 | OWASP:A01 |
Origin Validation Error | Java, JavaScript, Kotlin, PHP, Python, Rust, Scala | CWE-346, CWE-942 | OWASP:A05, OWASP:A07 |
Password Requirements Not Enforced in Django Application | Python | CWE-521 | OWASP:A07 |
Path Traversal | C#, C++, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, Visual Basic | CWE-23 | OWASP:A01 |
Permissive Cross-domain Policy | JavaScript | CWE-942 | OWASP:A05 |
Potential Negative Number Used as Index | C++ | CWE-125, CWE-787 | Sans Top 25 |
Potential buffer overflow from usage of unsafe function | C++ | CWE-122 | |
Privacy Leak | Java | CWE-532 | OWASP:A09 |
Process Control | Java, Kotlin, Scala | CWE-114 | |
Prototype Pollution | JavaScript | CWE-1321 | |
Python 2 source code | Python | CWE-1104 | OWASP:A06 |
Regular Expression Denial of Service (ReDoS) | JavaScript, PHP, Python, Ruby | CWE-400 | |
Regular expression injection | Apex, C#, Java, Kotlin, Scala, Visual Basic | CWE-400, CWE-730 | |
Remote Code Execution via Endpoint | Ruby | CWE-94 | Sans Top 25, OWASP:A03 |
Request Validation Disabled | C#, Visual Basic, XML | CWE-554 | |
SOQL Injection | Apex | CWE-89 | Sans Top 25, OWASP:A03 |
SOSL Injection | Apex | CWE-89 | Sans Top 25, OWASP:A03 |
SQL Injection | C#, C++, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, Visual Basic | CWE-89 | Sans Top 25, OWASP:A03 |
Selection of Less-Secure Algorithm During Negotiation (Force SSL) | Ruby | CWE-311, CWE-757 | OWASP:A04, OWASP:A02 |
Selection of Less-Secure Algorithm During Negotiation (SSL instead of TLS) | Python | CWE-757 | OWASP:A02 |
Sensitive Cookie Without 'HttpOnly' Flag | C#, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Scala, Visual Basic | CWE-1004 | OWASP:A05 |
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute | Apex, C#, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Scala, Swift, Visual Basic | CWE-614 | OWASP:A05 |
Server Information Exposure | Java, Kotlin, Python, Scala | CWE-209 | OWASP:A04 |
Server-Side Request Forgery (SSRF) | Apex, C#, C++, Go, Java, JavaScript, Kotlin, PHP, Python, Rust, Scala, Swift, Visual Basic | CWE-918 | Sans Top 25, OWASP:A10 |
Session Manipulation | Ruby | CWE-285 | OWASP:A01 |
Sinatra Protection Layers Disabled | Ruby | CWE-1021, CWE-16, CWE-348, CWE-35, CWE-352, CWE-693, CWE-79 | Sans Top 25, OWASP:A01, OWASP:A05, OWASP:A03, OWASP:A04 |
Size Used as Index | C++ | CWE-125, CWE-787 | Sans Top 25 |
Spring Cross-Site Request Forgery (CSRF) | Java | CWE-352 | Sans Top 25, OWASP:A01 |
Struts Development Mode Enabled | XML | CWE-489 | |
The cipher text is equal to the provided input plain text | Java, Kotlin, Scala | CWE-311 | OWASP:A04 |
Trust Boundary Violation | Java, Kotlin, Scala | CWE-501 | OWASP:A04 |
Unauthorized File Access | Java, Kotlin | CWE-79 | Sans Top 25, OWASP:A03 |
Unchecked Input for Loop Condition | JavaScript | CWE-400, CWE-606 | |
Unprotected Storage of Credentials | Java, Kotlin, Scala | CWE-256 | OWASP:A04 |
Unrestricted Android Broadcast | Java, Kotlin | CWE-862 | Sans Top 25, OWASP:A01 |
Unsafe JQuery Plugin | JavaScript | CWE-116, CWE-79 | Sans Top 25, OWASP:A03 |
Unsafe Reflection | Java, Ruby | CWE-470 | OWASP:A03 |
Unsafe SOQL Concatenation | Apex | CWE-89 | Sans Top 25, OWASP:A03 |
Unsafe SOSL Concatenation | Apex | CWE-89 | Sans Top 25, OWASP:A03 |
Unverified Password Change | Apex | CWE-620 | OWASP:A07 |
Usage of BinaryFormatter | C#, Visual Basic | CWE-502 | Sans Top 25, OWASP:A08 |
Use After Free | C++ | CWE-416 | Sans Top 25 |
Use dangerouslySetInnerHTML to Explicitly Handle XSS Risks | JavaScript | CWE-79 | Sans Top 25, OWASP:A03 |
Use of Expired File Descriptor | C++ | CWE-910 | |
Use of Externally-Controlled Format String | C++, Java, JavaScript, Kotlin, Scala | CWE-134 | |
Use of Hardcoded Credentials | Apex, C#, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, Visual Basic | CWE-259, CWE-798 | Sans Top 25, OWASP:A07 |
Use of Hardcoded Cryptographic Initialization Value | Python | CWE-329 | OWASP:A02 |
Use of Hardcoded Cryptographic Key | C++, Python, Ruby | CWE-321 | OWASP:A02 |
Use of Hardcoded Passwords | Apex, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, XML | CWE-259, CWE-798 | Sans Top 25, OWASP:A07 |
Use of Hardcoded, Security-relevant Constants | Java, Kotlin, Scala | CWE-547 | OWASP:A05 |
Use of Insufficiently Random Values | C#, Go, Java, JavaScript, Kotlin, PHP, Ruby, Rust, Scala, Swift, Visual Basic | CWE-330 | OWASP:A02 |
Use of Password Hash With Insufficient Computational Effort | Apex, C#, C++, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, Visual Basic | CWE-916 | OWASP:A02 |
Use of Potentially Dangerous Function | Java, Kotlin, Scala | CWE-676 | |
Use of Sticky broadcasts | Java, Kotlin | CWE-265 | |
Use of a Broken or Risky Cryptographic Algorithm | C#, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Rust, Scala, Swift, Visual Basic | CWE-327 | OWASP:A02 |
User Controlled Pointer | C++ | CWE-1285 | |
Weak Password Recovery Mechanism for Forgotten Password | JavaScript | CWE-640 | OWASP:A07 |
XAML Injection | C# | CWE-611 | OWASP:A05 |
XML External Entity (XXE) Injection | C#, C++, Java, JavaScript, Kotlin, PHP, Ruby, Scala, Swift, Visual Basic | CWE-611 | OWASP:A05 |
XML Injection | Apex, C#, Visual Basic | CWE-91 | OWASP:A03 |
XPath Injection | C#, C++, Go, Java, JavaScript, Kotlin, PHP, Python, Ruby, Scala, Visual Basic | CWE-643 | OWASP:A03 |