mcp-server-semgrep
Version:
MCP Server for Semgrep Integration - static code analysis with AI
41 lines (40 loc) • 1.14 kB
YAML
rules:
- id: tainted-html-response
mode: taint
pattern-sources:
- patterns:
- pattern: event
- pattern-inside: |
def $HANDLER(event, context):
...
pattern-sinks:
- patterns:
- pattern: $BODY
- pattern-inside: |
{..., "headers": {..., "Content-Type": "text/html", ...}, "body": $BODY, ... }
message: >-
Detected user input flowing into an HTML response. You may be
accidentally bypassing secure methods
of rendering HTML by manually constructing HTML and this could create a cross-site
scripting vulnerability, which could let attackers steal sensitive user data.
metadata:
cwe:
- "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
owasp:
- A07:2017 - Cross-Site Scripting (XSS)
- A03:2021 - Injection
category: security
technology:
- aws-lambda
references:
- https://owasp.org/Top10/A03_2021-Injection
cwe2022-top25: true
cwe2021-top25: true
subcategory:
- vuln
likelihood: HIGH
impact: MEDIUM
confidence: MEDIUM
languages:
- python
severity: WARNING