UNPKG

mcp-server-semgrep

Version:

MCP Server for Semgrep Integration - static code analysis with AI

44 lines (43 loc) 1.32 kB
rules: - id: playwright-evaluate-code-injection message: >- If unverified user data can reach the `evaluate` method it can result in Server-Side Request Forgery vulnerabilities metadata: owasp: - A10:2021 - Server-Side Request Forgery (SSRF) cwe: - 'CWE-918: Server-Side Request Forgery (SSRF)' category: security technology: - playwright cwe2022-top25: true cwe2021-top25: true subcategory: - audit likelihood: LOW impact: LOW confidence: LOW references: - https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29 languages: - javascript - typescript severity: WARNING patterns: - pattern-inside: | require('playwright'); ... - pattern-not-inside: | var $INPUT = function $FNAME(...){...}; ... - pattern-either: - pattern: $PAGE.evaluate($INPUT,...) - pattern: $PAGE.evaluateHandle($INPUT,...) - pattern: $PAGE.evaluateOnNewDocument($INPUT,...) - pattern-not: $PAGE.evaluate("...",...) - pattern-not: $PAGE.evaluate(function(...){...},...) - pattern-not: $PAGE.evaluateHandle("...",...) - pattern-not: $PAGE.evaluateHandle(function(...){...},...) - pattern-not: $PAGE.evaluateOnNewDocument("...",...) - pattern-not: $PAGE.evaluateOnNewDocument(function(...){...},...)