Skip to content

Commit

Permalink
Fix subcategory
Browse files Browse the repository at this point in the history
  • Loading branch information
p4p3r committed Jul 8, 2024
1 parent cfbec3b commit 645c9dc
Show file tree
Hide file tree
Showing 5 changed files with 12 additions and 9 deletions.
2 changes: 1 addition & 1 deletion go/lang/security/audit/crypto/missing-ssl-minversion.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ rules:
- go
confidence: HIGH
subcategory:
- guardrail
- audit
likelihood: MEDIUM
impact: LOW
languages: [go]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ rules:
...
Intercom('boot', $VAR);
message: Found an initialization of the Intercom Messenger that identifies a
User, but does not specify a `user_hash`.This configuration allows users
User, but does not specify a `user_hash`. This configuration allows users
to impersonate one another. See the Intercom Identity Verification docs
for more context
https://www.intercom.com/help/en/articles/183-set-up-identity-verification-for-web-and-mobile
Expand All @@ -37,7 +37,7 @@ rules:
metadata:
category: security
subcategory:
- guardrail
- audit
cwe:
- "CWE-287: Improper Authentication"
confidence: MEDIUM
Expand Down
4 changes: 2 additions & 2 deletions python/django/security/django-no-csrf-token.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ rules:
regex: (?i)(post|put|delete|patch)
- pattern-not-inside: "<form...>...{% csrf_token %}...</form>"
- pattern-not-inside: "<form...>...{{ $VAR.csrf_token }}...</form>"
message: Manually-created forms in django templates should specify a csrf_token to prevent CSRF attacks
message: Manually-created forms in django templates should specify a csrf_token to prevent CSRF attacks.
languages: [generic]
severity: WARNING
metadata:
Expand All @@ -26,7 +26,7 @@ rules:
likelihood: MEDIUM
impact: MEDIUM
subcategory:
- guardrail
- audit
technology:
- django
paths:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,6 @@ rules:
likelihood: MEDIUM
impact: MEDIUM
subcategory:
- guardrail
- audit
technology:
- django
- django
7 changes: 5 additions & 2 deletions terraform/aws/security/aws-provisioner-exec.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,10 @@ rules:
...
}
id: aws-provisioner-exec
message: Provisioners are a tool of last resort and should be avoided where possible. Provisioner behavior cannot be mapped by Terraform as part of a plan, and execute arbitrary shell commands by design.
message: >-
Provisioners are a tool of last resort and should be avoided where possible.
Provisioner behavior cannot be mapped by Terraform as part of a plan,
and execute arbitrary shell commands by design.
languages:
- terraform
severity: WARNING
Expand All @@ -27,7 +30,7 @@ rules:
- "CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')"
- "CWE-94: Improper Control of Generation of Code ('Code Injection')"
subcategory:
- guardrail
- audit
confidence: HIGH
likelihood: HIGH
impact: MEDIUM
Expand Down

0 comments on commit 645c9dc

Please sign in to comment.