UNPKG

mcp-server-semgrep

Version:

MCP Server for Semgrep Integration - static code analysis with AI

53 lines (52 loc) 1.66 kB
rules: - id: jquery-insecure-method message: >- User controlled data in a jQuery's `.$METHOD(...)` is an anti-pattern that can lead to XSS vulnerabilities metadata: cwe: - "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" owasp: - A07:2017 - Cross-Site Scripting (XSS) - A03:2021 - Injection references: - https://owasp.org/www-community/attacks/xss/ - https://bugs.jquery.com/ticket/9521 category: security technology: - jquery cwe2022-top25: true cwe2021-top25: true subcategory: - audit likelihood: LOW impact: MEDIUM confidence: LOW languages: - javascript - typescript severity: WARNING options: symbolic_propagation: true pattern-either: - patterns: - pattern-either: - pattern: $.$METHOD($VAR,...) - pattern: $(...).$METHOD($VAR,...) - pattern: jQuery.$METHOD($VAR,...) - pattern: jQuery(...).$METHOD($VAR,...) - pattern-not: $.$METHOD("...",...) - pattern-not: $(...).$METHOD("...",...) - pattern-not: jQuery.$METHOD("...",...) - pattern-not: jQuery(...).$METHOD("...",...) - metavariable-regex: metavariable: $METHOD regex: ^(html|append|prepend|wrap|wrapInner|wrapAll|before|after|globalEval|getScript)$ - patterns: - pattern-either: - pattern: $(...).$METHOD($VAR,...) - pattern: jQuery(...).$METHOD($VAR,...) - pattern-not: $("...",...).$METHOD(...) - pattern-not: jQuery("...",...).$METHOD(...) - metavariable-regex: metavariable: $METHOD regex: ^(appendTo|insertAfter|insertBefore|prependTo)$