You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: packages/jsts/src/rules/README.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -124,7 +124,7 @@ If you have any questions, encounter any bugs, or have feature requests, please
124
124
|[assertions-in-tests](https://sonarsource.github.io/rspec/#/rspec/S2699/javascript)| Tests should include assertions | ✅ ||| 💭 ||
125
125
|[aws-apigateway-public-api](https://sonarsource.github.io/rspec/#/rspec/S6333/javascript)| Creating public APIs is security-sensitive | ✅ |||||
126
126
|[aws-ec2-rds-dms-public](https://sonarsource.github.io/rspec/#/rspec/S6329/javascript)| Allowing public network access to cloud resources is security-sensitive | ✅ |||||
127
-
|[aws-ec2-unencrypted-ebs-volume](https://sonarsource.github.io/rspec/#/rspec/S6275/javascript)| Using unencrypted EBS volumes is security-sensitive ||||||
127
+
|[aws-ec2-unencrypted-ebs-volume](https://sonarsource.github.io/rspec/#/rspec/S6275/javascript)| Using unencrypted EBS volumes is security-sensitive |✅|||||
128
128
|[aws-efs-unencrypted](https://sonarsource.github.io/rspec/#/rspec/S6332/javascript)| Using unencrypted EFS file systems is security-sensitive | ✅ |||||
129
129
|[aws-iam-all-privileges](https://sonarsource.github.io/rspec/#/rspec/S6302/javascript)| Policies granting all privileges are security-sensitive | ✅ |||||
130
130
|[aws-iam-all-resources-accessible](https://sonarsource.github.io/rspec/#/rspec/S6304/javascript)| Policies granting access to all resources of an account are security-sensitive ||||||
@@ -155,7 +155,7 @@ If you have any questions, encounter any bugs, or have feature requests, please
155
155
|[comment-regex](https://sonarsource.github.io/rspec/#/rspec/S124/javascript)| Track comments matching a regular expression ||||||
156
156
|[concise-regex](https://sonarsource.github.io/rspec/#/rspec/S6353/javascript)| Regular expression quantifiers and character classes should be used concisely | ✅ ||| 💭 ||
157
157
|[conditional-indentation](https://sonarsource.github.io/rspec/#/rspec/S3973/javascript)| A conditionally executed single line should be denoted by indentation ||||| ❌ |
158
-
|[confidential-information-logging](https://sonarsource.github.io/rspec/#/rspec/S5757/javascript)| Allowing confidential information to be logged is security-sensitive ||||||
158
+
|[confidential-information-logging](https://sonarsource.github.io/rspec/#/rspec/S5757/javascript)| Allowing confidential information to be logged is security-sensitive |✅|||||
159
159
|[constructor-for-side-effects](https://sonarsource.github.io/rspec/#/rspec/S1848/javascript)| Objects should not be created to be dropped immediately without being used | ✅ |||||
160
160
|[content-length](https://sonarsource.github.io/rspec/#/rspec/S5693/javascript)| Allowing requests with excessive content length is security-sensitive | ✅ |||||
@@ -249,7 +249,7 @@ If you have any questions, encounter any bugs, or have feature requests, please
249
249
|[no-globals-shadowing](https://sonarsource.github.io/rspec/#/rspec/S2137/javascript)| Special identifiers should not be bound or assigned | ✅ |||||
250
250
|[no-gratuitous-expressions](https://sonarsource.github.io/rspec/#/rspec/S2589/javascript)| Boolean expressions should not be gratuitous | ✅ |||||
251
251
|[no-hardcoded-ip](https://sonarsource.github.io/rspec/#/rspec/S1313/javascript)| Using hardcoded IP addresses is security-sensitive | ✅ |||||
252
-
|[no-hardcoded-passwords](https://sonarsource.github.io/rspec/#/rspec/S2068/javascript)| Credentials should not be hard-coded ||||||
252
+
|[no-hardcoded-passwords](https://sonarsource.github.io/rspec/#/rspec/S2068/javascript)| Credentials should not be hard-coded |✅|||||
253
253
|[no-hardcoded-secrets](https://sonarsource.github.io/rspec/#/rspec/S6418/javascript)| Secrets should not be hard-coded | ✅ |||||
254
254
|[no-hook-setter-in-body](https://sonarsource.github.io/rspec/#/rspec/S6442/javascript)| React's useState hook should not be used directly in the render function or body of a component | ✅ |||||
255
255
|[no-identical-conditions](https://sonarsource.github.io/rspec/#/rspec/S1862/javascript)| "if/else if" chains and "switch" cases should not have the same condition | ✅ |||||
@@ -343,7 +343,7 @@ If you have any questions, encounter any bugs, or have feature requests, please
343
343
|[production-debug](https://sonarsource.github.io/rspec/#/rspec/S4507/javascript)| Delivering code in production with debug features activated is security-sensitive | ✅ |||||
344
344
|[pseudo-random](https://sonarsource.github.io/rspec/#/rspec/S2245/javascript)| Using pseudorandom number generators (PRNGs) is security-sensitive | ✅ |||||
345
345
|[public-static-readonly](https://sonarsource.github.io/rspec/#/rspec/S1444/javascript)| Public "static" fields should be read-only | ✅ || 💡 |||
346
-
|[publicly-writable-directories](https://sonarsource.github.io/rspec/#/rspec/S5443/javascript)| Using publicly writable directories is security-sensitive ||||||
346
+
|[publicly-writable-directories](https://sonarsource.github.io/rspec/#/rspec/S5443/javascript)| Using publicly writable directories is security-sensitive |✅|||||
347
347
|[reduce-initial-value](https://sonarsource.github.io/rspec/#/rspec/S6959/javascript)| "Array.reduce()" calls should include an initial value | ✅ ||| 💭 ||
348
348
|[redundant-type-aliases](https://sonarsource.github.io/rspec/#/rspec/S6564/javascript)| Redundant type aliases should not be used | ✅ |||||
349
349
|[regex-complexity](https://sonarsource.github.io/rspec/#/rspec/S5843/javascript)| Regular expressions should not be too complicated | ✅ ||| 💭 ||
0 commit comments