mcp-server-semgrep
Version:
MCP Server for Semgrep Integration - static code analysis with AI
37 lines (36 loc) • 1.06 kB
YAML
rules:
- id: missing-ssl-version
patterns:
- pattern: server { ... listen $PORT ssl; ... }
- pattern-not-inside: server { ... ssl_protocols ... }
paths:
include:
- '*.conf'
- '*.vhost'
- sites-available/*
- sites-enabled/*
languages:
- generic
severity: WARNING
message: >-
This server configuration is missing the 'ssl_protocols' directive. By default,
this server will use 'ssl_protocols TLSv1 TLSv1.1 TLSv1.2', and versions older
than TLSv1.2 are known to be broken. Explicitly specify 'ssl_protocols TLSv1.2 TLSv1.3'
to use secure TLS versions.
metadata:
cwe:
- 'CWE-326: Inadequate Encryption Strength'
references:
- https://www.acunetix.com/blog/web-security-zone/hardening-nginx/
- https://nginx.org/en/docs/http/configuring_https_servers.html
category: security
technology:
- nginx
confidence: MEDIUM
owasp:
- A03:2017 - Sensitive Data Exposure
- A02:2021 - Cryptographic Failures
subcategory:
- audit
likelihood: LOW
impact: MEDIUM