JSX detectors
Showing all detectors for the JSX language.
Browse by tags
Browse all detectors by tags.
Browse by severity
Browse all detectors by severity.
Browse by category
Browse all detectors by category.
Browse all detectors
Disabled or incorrectly used protection mechanism can lead to security vulnerabilities.
Using untrusted inputs in a log statement can enable attackers to break the log's format, forge log entries, and bypass log monitors.
Connections that use insecure protocols transmit data in cleartext, which can leak sensitive information.
This code uses deprecated methods, which suggests that it has not been recently reviewed or maintained.
Logging unencrypted AWS credentials can expose them to an attacker.
Improper input validation can enable attacks and lead to unwanted behavior.
Weak, broken, or misconfigured cryptography can lead to security vulnerabilities.
Swallowing exceptions, without rethrowing or logging them, can make it hard to understand why your application is failing.
Allowing hidden files while serving files from a given root directory can cause information leakage.
Unverified origins of messages and identities in cross-origin communications can lead to security vulnerabilities.
The use of untrusted inputs in a SQL database query can enable attackers to read, modify, or delete sensitive data in the database.
Non-literal input to a regular expression might lead to a denial of service attack.
The typeof operator should only be compared to valid values.
Unchecked failures can lead to data loss.
Using pseudorandom number generators (PRNGs) is security-sensitive.
Insufficient key sizes can lead to brute force attacks.
Insufficient sanitization of potentially untrusted URLs on the server side can allow server requests to unwanted destinations.
Exposure of sensitive information can lead to an unauthorized actor having access to the information.
Writing unsanitized user data to a file is unsafe.
String passed to setInterval
or setTimeout
can cause the JavaScript engine to evaluate, which can lead to a security risk.
Insecure configuration can lead to a cross-site request forgery (CRSF) vulnerability.
APIs that are not recommended were found.
Passing an unsanitized user argument to a function call makes your code insecure.
Relying on potentially untrusted user inputs when constructing web application outputs can lead to cross-site scripting vulnerabilities.
Weak obfuscation of web requests makes your application vulnerable.
Failing to set the AuthenticateOnUnsubscribe
flag to True
when confirming an SNS subscription can lead to unauthenticated cancellations.
To always return the subscription ARN, set the ReturnSubscriptionArn
argument to True
.
Objects that parse or handle XML can lead to XML external entity (XXE) attacks when they are misconfigured.
Allocated resources are not released properly.
The software does not restrict or incorrectly restrict access to a resource from an unauthorized actor.
Weak file permissions can lead to privilege escalation.
Constructing operating system or shell commands with unsanitized user input can lead to inadvertently running malicious code.
Client-side decryption followed by encryption is inefficient and can lead to sensitive data leaks.
Cross-origin resource sharing policies that are too permissive could lead to security vulnerabilities.
Custom polling can be inefficient and prone to error. Consider using AWS waiters instead.
Use of new Function()
can be dangerous if used to evaluate dynamic content.
Missing pagination on a paginated call can lead to inaccurate results.
Checks if nan is used is comparison.
Constructing HTTP response headers from user-controlled data is unsafe.
Hardcoded credentials can be intercepted by malicious actors.
Checks if the extension of a file uploaded by a user is validated before the file is saved.
User input can be vulnerable to injection attacks.
Not setting the Amazon S3 bucket owner condition could lead to accidentally using the wrong bucket.
Disabling the HTML autoescape mechanism exposes your web applications to attacks.
The elevated privilege level should be dropped immediately after the operation is performed.
User-controlled input that specifies a link to an external site could lead to phishing attacks and allow user credentials to be stolen.
An object attribute constructed from a user-provided input should not be passed directly to a method.
Obsolete, broken, or weak hashing algorithms can lead to security vulnerabilities.
Scripts generated from unsanitized inputs can lead to malicious behavior and inadvertently running code remotely.
A batch request that doesn't check for failed records can lead to loss of data.
Improper filtering of Amazon Machine Images (AMIs) can result in loading an untrusted image, which is a potential security vulnerability.
Session fixation might allow an attacker to steal authenticated session IDs.
A batch request that doesn't check for failed items can lead to loss of data.
Potentially unsanitized user input in XPath queries can allow an attacker to control the query in unwanted or insecure ways.
Deserialization of untrusted objects can lead to security vulnerabilities such as, inadvertently running remote code.
The incorrect use of super()
causes problems.
Stack traces can be hard to use for debugging.
Insecure string comparison can lead to a timing-attack.
LDAP queries that rely on potentially untrusted inputs can allow attackers to read or modify sensitive data, run code, and perform other unwanted actions.
Insecure cookies can lead to unencrypted transmission of sensitive data.
Encryption that is dependent on conditional logic, such as an if...then
clause, might cause unencrypted sensitive data to be stored.
Expanding unverified archive files without controlling the size of the expanded data can lead to zip bomb attacks.
An integer overflow might cause security issues when it is used for resource management or execution control.
Do not bind the SNS Publish operation with the SNS Subscribe or Create Topic operation.
Unverified hostnames lead to security vulnerabilities.
The application incorrectly restricts frame objects or UI layers that belong to another application or domain.
Recreating AWS clients in each Lambda function invocation is expensive.
Creating file paths from untrusted input might give a malicious actor access to sensitive files.
Overriding environment variables that are reserved by AWS Lambda might lead to unexpected behavior.
Insecure ways of creating temporary files and directories can lead to race conditions, privilege escalation, and other security vulnerabilities.
The logging of sensitive information can expose the information to potential attackers.
Hardcoding an IP address can cause security problems.
Updating object attributes obtained from external sources is security sensitive.
Truncation errors occur when a primitive is cast to a primitive of a smaller size and data is lost in the conversion.
DNS prefetching can cause latency and privacy issues.
Significant content length can lead to denial of service.
The software allows user input to control or influence paths or file names that are used in file system operations.
Lack of validation of a security certificate can lead to host impersonation and sensitive data leaks.