Skip to content

Commit 4359d03

Browse files
JS-1404 Add S8479: DOMPurify Misconfiguration (#6549)
Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com> Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
1 parent d5a9ecf commit 4359d03

6 files changed

Lines changed: 467 additions & 4 deletions

File tree

packages/jsts/src/rules/README.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ If you have any questions, encounter any bugs, or have feature requests, please
124124
| [assertions-in-tests](https://sonarsource.github.io/rspec/#/rspec/S2699/javascript) | Tests should include assertions || | | 💭 | |
125125
| [aws-apigateway-public-api](https://sonarsource.github.io/rspec/#/rspec/S6333/javascript) | Creating public APIs is security-sensitive || | | | |
126126
| [aws-ec2-rds-dms-public](https://sonarsource.github.io/rspec/#/rspec/S6329/javascript) | Allowing public network access to cloud resources is security-sensitive || | | | |
127-
| [aws-ec2-unencrypted-ebs-volume](https://sonarsource.github.io/rspec/#/rspec/S6275/javascript) | Using unencrypted EBS volumes is security-sensitive | | | | | |
127+
| [aws-ec2-unencrypted-ebs-volume](https://sonarsource.github.io/rspec/#/rspec/S6275/javascript) | Using unencrypted EBS volumes is security-sensitive | | | | | |
128128
| [aws-efs-unencrypted](https://sonarsource.github.io/rspec/#/rspec/S6332/javascript) | Using unencrypted EFS file systems is security-sensitive || | | | |
129129
| [aws-iam-all-privileges](https://sonarsource.github.io/rspec/#/rspec/S6302/javascript) | Policies granting all privileges are security-sensitive || | | | |
130130
| [aws-iam-all-resources-accessible](https://sonarsource.github.io/rspec/#/rspec/S6304/javascript) | Policies granting access to all resources of an account are security-sensitive | | | | | |
@@ -155,7 +155,7 @@ If you have any questions, encounter any bugs, or have feature requests, please
155155
| [comment-regex](https://sonarsource.github.io/rspec/#/rspec/S124/javascript) | Track comments matching a regular expression | | | | | |
156156
| [concise-regex](https://sonarsource.github.io/rspec/#/rspec/S6353/javascript) | Regular expression quantifiers and character classes should be used concisely || | | 💭 | |
157157
| [conditional-indentation](https://sonarsource.github.io/rspec/#/rspec/S3973/javascript) | A conditionally executed single line should be denoted by indentation | | | | ||
158-
| [confidential-information-logging](https://sonarsource.github.io/rspec/#/rspec/S5757/javascript) | Allowing confidential information to be logged is security-sensitive | | | | | |
158+
| [confidential-information-logging](https://sonarsource.github.io/rspec/#/rspec/S5757/javascript) | Allowing confidential information to be logged is security-sensitive | | | | | |
159159
| [constructor-for-side-effects](https://sonarsource.github.io/rspec/#/rspec/S1848/javascript) | Objects should not be created to be dropped immediately without being used || | | | |
160160
| [content-length](https://sonarsource.github.io/rspec/#/rspec/S5693/javascript) | Allowing requests with excessive content length is security-sensitive || | | | |
161161
| [content-security-policy](https://sonarsource.github.io/rspec/#/rspec/S5728/javascript) | Disabling content security policy fetch directives is security-sensitive || | | | |
@@ -172,6 +172,7 @@ If you have any questions, encounter any bugs, or have feature requests, please
172172
| [disabled-resource-integrity](https://sonarsource.github.io/rspec/#/rspec/S5725/javascript) | Using remote artifacts without integrity checks is security-sensitive || | | 💭 | |
173173
| [disabled-timeout](https://sonarsource.github.io/rspec/#/rspec/S6080/javascript) | Disabling Mocha timeouts should be explicit || | | | |
174174
| [dns-prefetching](https://sonarsource.github.io/rspec/#/rspec/S5743/javascript) | Allowing browsers to perform DNS prefetching is security-sensitive | | | | ||
175+
| [dompurify-unsafe-config](https://sonarsource.github.io/rspec/#/rspec/S8479/javascript) | DOMPurify configuration should not be bypassable || | | | |
175176
| [duplicates-in-character-class](https://sonarsource.github.io/rspec/#/rspec/S5869/javascript) | Character classes in regular expressions should not contain the same character twice || | | 💭 | |
176177
| [dynamically-constructed-templates](https://sonarsource.github.io/rspec/#/rspec/S7790/javascript) | Templates should not be constructed dynamically || | | | |
177178
| [elseif-without-else](https://sonarsource.github.io/rspec/#/rspec/S126/javascript) | "if ... else if" constructs should end with "else" clauses | | | | | |
@@ -248,7 +249,7 @@ If you have any questions, encounter any bugs, or have feature requests, please
248249
| [no-globals-shadowing](https://sonarsource.github.io/rspec/#/rspec/S2137/javascript) | Special identifiers should not be bound or assigned || | | | |
249250
| [no-gratuitous-expressions](https://sonarsource.github.io/rspec/#/rspec/S2589/javascript) | Boolean expressions should not be gratuitous || | | | |
250251
| [no-hardcoded-ip](https://sonarsource.github.io/rspec/#/rspec/S1313/javascript) | Using hardcoded IP addresses is security-sensitive || | | | |
251-
| [no-hardcoded-passwords](https://sonarsource.github.io/rspec/#/rspec/S2068/javascript) | Credentials should not be hard-coded | | | | | |
252+
| [no-hardcoded-passwords](https://sonarsource.github.io/rspec/#/rspec/S2068/javascript) | Credentials should not be hard-coded | | | | | |
252253
| [no-hardcoded-secrets](https://sonarsource.github.io/rspec/#/rspec/S6418/javascript) | Secrets should not be hard-coded || | | | |
253254
| [no-hook-setter-in-body](https://sonarsource.github.io/rspec/#/rspec/S6442/javascript) | React's useState hook should not be used directly in the render function or body of a component || | | | |
254255
| [no-identical-conditions](https://sonarsource.github.io/rspec/#/rspec/S1862/javascript) | "if/else if" chains and "switch" cases should not have the same condition || | | | |
@@ -342,7 +343,7 @@ If you have any questions, encounter any bugs, or have feature requests, please
342343
| [production-debug](https://sonarsource.github.io/rspec/#/rspec/S4507/javascript) | Delivering code in production with debug features activated is security-sensitive || | | | |
343344
| [pseudo-random](https://sonarsource.github.io/rspec/#/rspec/S2245/javascript) | Using pseudorandom number generators (PRNGs) is security-sensitive || | | | |
344345
| [public-static-readonly](https://sonarsource.github.io/rspec/#/rspec/S1444/javascript) | Public "static" fields should be read-only || | 💡 | | |
345-
| [publicly-writable-directories](https://sonarsource.github.io/rspec/#/rspec/S5443/javascript) | Using publicly writable directories is security-sensitive | | | | | |
346+
| [publicly-writable-directories](https://sonarsource.github.io/rspec/#/rspec/S5443/javascript) | Using publicly writable directories is security-sensitive | | | | | |
346347
| [reduce-initial-value](https://sonarsource.github.io/rspec/#/rspec/S6959/javascript) | "Array.reduce()" calls should include an initial value || | | 💭 | |
347348
| [redundant-type-aliases](https://sonarsource.github.io/rspec/#/rspec/S6564/javascript) | Redundant type aliases should not be used || | | | |
348349
| [regex-complexity](https://sonarsource.github.io/rspec/#/rspec/S5843/javascript) | Regular expressions should not be too complicated || | | 💭 | |

0 commit comments

Comments
 (0)