mcp-server-semgrep
Version:
MCP Server for Semgrep Integration - static code analysis with AI
44 lines (43 loc) • 1.32 kB
YAML
rules:
- id: insecure-document-method
message: >-
Detected the use of an inner/outerHTML assignment.
This can introduce a Cross-Site-Scripting (XSS) vulnerability if this
comes from user-provided input. If you have to use a dangerous web API,
consider using a sanitization library such as DOMPurify to sanitize
the HTML before it is assigned.
metadata:
cwe:
- "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
owasp:
- A07:2017 - Cross-Site Scripting (XSS)
- A03:2021 - Injection
category: security
technology:
- browser
cwe2022-top25: true
cwe2021-top25: true
subcategory:
- audit
likelihood: LOW
impact: MEDIUM
confidence: LOW
references:
- https://owasp.org/Top10/A03_2021-Injection
languages:
- html
severity: WARNING
patterns:
- pattern-inside: |
<script ...>$...A</script>
- metavariable-pattern:
metavariable: $...A
language: javascript
patterns:
- pattern-either:
- patterns:
- pattern-either:
- pattern: $X. ... .innerHTML = ...
- pattern: $X. ... .outerHTML = ...
- pattern-not: $X. ... .$V = "..."
- focus-metavariable: $X