mcp-server-semgrep
Version:
MCP Server for Semgrep Integration - static code analysis with AI
66 lines (65 loc) • 1.43 kB
YAML
rules:
- id: vm2-code-injection
message: >-
Make sure that unverified user data can not reach `vm2`.
metadata:
owasp:
- A03:2021 - Injection
cwe:
- "CWE-94: Improper Control of Generation of Code ('Code Injection')"
category: security
technology:
- vm2
cwe2022-top25: true
subcategory:
- audit
likelihood: LOW
impact: HIGH
confidence: LOW
references:
- https://owasp.org/Top10/A03_2021-Injection
languages:
- javascript
- typescript
severity: WARNING
patterns:
- pattern-inside: |
require('vm2');
...
- pattern-not-inside: |
$CODE = "...";
...
- pattern-not-inside: |
require('vm2');
...
$CODE = new VMScript(...);
...
- pattern-either:
- pattern: |
$VM = new VM(...);
...
$VM.run($CODE,...);
- pattern: |
new VM(...).run($CODE,...);
- pattern: |
$VM = new NodeVM(...);
...
$VM.run($CODE,...);
- pattern: |
new NodeVM(...).run($CODE,...);
- pattern: |
new VMScript($CODE,...);
- pattern-not: |
$VM = new VM(...);
...
$VM.run("...",...);
- pattern-not: |
$VM = new NodeVM(...);
...
$VM.run("...",...);
- pattern-not: |
(new VM(...)).run("...",...);
- pattern-not: |
(new NodeVM(...)).run("...",...);
- pattern-not: |-
new VMScript("...",...);