mcp-server-semgrep
Version:
MCP Server for Semgrep Integration - static code analysis with AI
44 lines (43 loc) • 1.32 kB
YAML
rules:
- id: playwright-evaluate-code-injection
message: >-
If unverified user data can reach the `evaluate` method it can result in Server-Side Request Forgery
vulnerabilities
metadata:
owasp:
- A10:2021 - Server-Side Request Forgery (SSRF)
cwe:
- 'CWE-918: Server-Side Request Forgery (SSRF)'
category: security
technology:
- playwright
cwe2022-top25: true
cwe2021-top25: true
subcategory:
- audit
likelihood: LOW
impact: LOW
confidence: LOW
references:
- https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29
languages:
- javascript
- typescript
severity: WARNING
patterns:
- pattern-inside: |
require('playwright');
...
- pattern-not-inside: |
var $INPUT = function $FNAME(...){...};
...
- pattern-either:
- pattern: $PAGE.evaluate($INPUT,...)
- pattern: $PAGE.evaluateHandle($INPUT,...)
- pattern: $PAGE.evaluateOnNewDocument($INPUT,...)
- pattern-not: $PAGE.evaluate("...",...)
- pattern-not: $PAGE.evaluate(function(...){...},...)
- pattern-not: $PAGE.evaluateHandle("...",...)
- pattern-not: $PAGE.evaluateHandle(function(...){...},...)
- pattern-not: $PAGE.evaluateOnNewDocument("...",...)
- pattern-not: $PAGE.evaluateOnNewDocument(function(...){...},...)