UNPKG

mcp-server-semgrep

Version:

MCP Server for Semgrep Integration - static code analysis with AI

37 lines (36 loc) 1.06 kB
rules: - id: missing-ssl-version patterns: - pattern: server { ... listen $PORT ssl; ... } - pattern-not-inside: server { ... ssl_protocols ... } paths: include: - '*.conf' - '*.vhost' - sites-available/* - sites-enabled/* languages: - generic severity: WARNING message: >- This server configuration is missing the 'ssl_protocols' directive. By default, this server will use 'ssl_protocols TLSv1 TLSv1.1 TLSv1.2', and versions older than TLSv1.2 are known to be broken. Explicitly specify 'ssl_protocols TLSv1.2 TLSv1.3' to use secure TLS versions. metadata: cwe: - 'CWE-326: Inadequate Encryption Strength' references: - https://www.acunetix.com/blog/web-security-zone/hardening-nginx/ - https://nginx.org/en/docs/http/configuring_https_servers.html category: security technology: - nginx confidence: MEDIUM owasp: - A03:2017 - Sensitive Data Exposure - A02:2021 - Cryptographic Failures subcategory: - audit likelihood: LOW impact: MEDIUM