You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: packages/jsts/src/rules/README.md
+5-4Lines changed: 5 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -124,7 +124,7 @@ If you have any questions, encounter any bugs, or have feature requests, please
124
124
|[assertions-in-tests](https://sonarsource.github.io/rspec/#/rspec/S2699/javascript)| Tests should include assertions | ✅ ||| 💭 ||
125
125
|[aws-apigateway-public-api](https://sonarsource.github.io/rspec/#/rspec/S6333/javascript)| Creating public APIs is security-sensitive | ✅ |||||
126
126
|[aws-ec2-rds-dms-public](https://sonarsource.github.io/rspec/#/rspec/S6329/javascript)| Allowing public network access to cloud resources is security-sensitive | ✅ |||||
127
-
|[aws-ec2-unencrypted-ebs-volume](https://sonarsource.github.io/rspec/#/rspec/S6275/javascript)| Using unencrypted EBS volumes is security-sensitive |✅|||||
127
+
|[aws-ec2-unencrypted-ebs-volume](https://sonarsource.github.io/rspec/#/rspec/S6275/javascript)| Using unencrypted EBS volumes is security-sensitive ||||||
128
128
|[aws-efs-unencrypted](https://sonarsource.github.io/rspec/#/rspec/S6332/javascript)| Using unencrypted EFS file systems is security-sensitive | ✅ |||||
129
129
|[aws-iam-all-privileges](https://sonarsource.github.io/rspec/#/rspec/S6302/javascript)| Policies granting all privileges are security-sensitive | ✅ |||||
130
130
|[aws-iam-all-resources-accessible](https://sonarsource.github.io/rspec/#/rspec/S6304/javascript)| Policies granting access to all resources of an account are security-sensitive ||||||
@@ -155,7 +155,7 @@ If you have any questions, encounter any bugs, or have feature requests, please
155
155
|[comment-regex](https://sonarsource.github.io/rspec/#/rspec/S124/javascript)| Track comments matching a regular expression ||||||
156
156
|[concise-regex](https://sonarsource.github.io/rspec/#/rspec/S6353/javascript)| Regular expression quantifiers and character classes should be used concisely | ✅ ||| 💭 ||
157
157
|[conditional-indentation](https://sonarsource.github.io/rspec/#/rspec/S3973/javascript)| A conditionally executed single line should be denoted by indentation ||||| ❌ |
158
-
|[confidential-information-logging](https://sonarsource.github.io/rspec/#/rspec/S5757/javascript)| Allowing confidential information to be logged is security-sensitive |✅|||||
158
+
|[confidential-information-logging](https://sonarsource.github.io/rspec/#/rspec/S5757/javascript)| Allowing confidential information to be logged is security-sensitive ||||||
159
159
|[constructor-for-side-effects](https://sonarsource.github.io/rspec/#/rspec/S1848/javascript)| Objects should not be created to be dropped immediately without being used | ✅ |||||
160
160
|[content-length](https://sonarsource.github.io/rspec/#/rspec/S5693/javascript)| Allowing requests with excessive content length is security-sensitive | ✅ |||||
@@ -172,6 +172,7 @@ If you have any questions, encounter any bugs, or have feature requests, please
172
172
|[disabled-resource-integrity](https://sonarsource.github.io/rspec/#/rspec/S5725/javascript)| Using remote artifacts without integrity checks is security-sensitive | ✅ ||| 💭 ||
173
173
|[disabled-timeout](https://sonarsource.github.io/rspec/#/rspec/S6080/javascript)| Disabling Mocha timeouts should be explicit | ✅ |||||
174
174
|[dns-prefetching](https://sonarsource.github.io/rspec/#/rspec/S5743/javascript)| Allowing browsers to perform DNS prefetching is security-sensitive ||||| ❌ |
175
+
|[dompurify-unsafe-config](https://sonarsource.github.io/rspec/#/rspec/S8479/javascript)| DOMPurify configuration should not be bypassable | ✅ |||||
175
176
|[duplicates-in-character-class](https://sonarsource.github.io/rspec/#/rspec/S5869/javascript)| Character classes in regular expressions should not contain the same character twice | ✅ ||| 💭 ||
176
177
|[dynamically-constructed-templates](https://sonarsource.github.io/rspec/#/rspec/S7790/javascript)| Templates should not be constructed dynamically | ✅ |||||
177
178
|[elseif-without-else](https://sonarsource.github.io/rspec/#/rspec/S126/javascript)| "if ... else if" constructs should end with "else" clauses ||||||
@@ -248,7 +249,7 @@ If you have any questions, encounter any bugs, or have feature requests, please
248
249
|[no-globals-shadowing](https://sonarsource.github.io/rspec/#/rspec/S2137/javascript)| Special identifiers should not be bound or assigned | ✅ |||||
249
250
|[no-gratuitous-expressions](https://sonarsource.github.io/rspec/#/rspec/S2589/javascript)| Boolean expressions should not be gratuitous | ✅ |||||
250
251
|[no-hardcoded-ip](https://sonarsource.github.io/rspec/#/rspec/S1313/javascript)| Using hardcoded IP addresses is security-sensitive | ✅ |||||
251
-
|[no-hardcoded-passwords](https://sonarsource.github.io/rspec/#/rspec/S2068/javascript)| Credentials should not be hard-coded |✅|||||
252
+
|[no-hardcoded-passwords](https://sonarsource.github.io/rspec/#/rspec/S2068/javascript)| Credentials should not be hard-coded ||||||
252
253
|[no-hardcoded-secrets](https://sonarsource.github.io/rspec/#/rspec/S6418/javascript)| Secrets should not be hard-coded | ✅ |||||
253
254
|[no-hook-setter-in-body](https://sonarsource.github.io/rspec/#/rspec/S6442/javascript)| React's useState hook should not be used directly in the render function or body of a component | ✅ |||||
254
255
|[no-identical-conditions](https://sonarsource.github.io/rspec/#/rspec/S1862/javascript)| "if/else if" chains and "switch" cases should not have the same condition | ✅ |||||
@@ -342,7 +343,7 @@ If you have any questions, encounter any bugs, or have feature requests, please
342
343
|[production-debug](https://sonarsource.github.io/rspec/#/rspec/S4507/javascript)| Delivering code in production with debug features activated is security-sensitive | ✅ |||||
343
344
|[pseudo-random](https://sonarsource.github.io/rspec/#/rspec/S2245/javascript)| Using pseudorandom number generators (PRNGs) is security-sensitive | ✅ |||||
344
345
|[public-static-readonly](https://sonarsource.github.io/rspec/#/rspec/S1444/javascript)| Public "static" fields should be read-only | ✅ || 💡 |||
345
-
|[publicly-writable-directories](https://sonarsource.github.io/rspec/#/rspec/S5443/javascript)| Using publicly writable directories is security-sensitive |✅|||||
346
+
|[publicly-writable-directories](https://sonarsource.github.io/rspec/#/rspec/S5443/javascript)| Using publicly writable directories is security-sensitive ||||||
346
347
|[reduce-initial-value](https://sonarsource.github.io/rspec/#/rspec/S6959/javascript)| "Array.reduce()" calls should include an initial value | ✅ ||| 💭 ||
347
348
|[redundant-type-aliases](https://sonarsource.github.io/rspec/#/rspec/S6564/javascript)| Redundant type aliases should not be used | ✅ |||||
348
349
|[regex-complexity](https://sonarsource.github.io/rspec/#/rspec/S5843/javascript)| Regular expressions should not be too complicated | ✅ ||| 💭 ||
0 commit comments