mcp-server-semgrep
Version:
MCP Server for Semgrep Integration - static code analysis with AI
43 lines (42 loc) • 1.07 kB
YAML
rules:
- id: raw-html-join
message: >-
User controlled data in a HTML string may result in XSS
metadata:
cwe:
- "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
owasp:
- A07:2017 - Cross-Site Scripting (XSS)
- A03:2021 - Injection
references:
- https://owasp.org/www-community/attacks/xss/
category: security
technology:
- browser
cwe2022-top25: true
cwe2021-top25: true
subcategory:
- audit
likelihood: LOW
impact: LOW
confidence: LOW
languages:
- javascript
- typescript
severity: WARNING
patterns:
- pattern-either:
- patterns:
- pattern: |
[..., $STRING, ...].join(...)
- metavariable-pattern:
metavariable: $STRING
language: generic
patterns:
- pattern-either:
- pattern: |
... </$TAG
- pattern: |
<$TAG ...
- pattern-not: |
[..., "$HARDCODED", ...].join("...")