Skip to content

Commit ce4b224

Browse files
SONARTEXT-10 Migrate rules to educational format (#112)
1 parent b1811af commit ce4b224

File tree

17 files changed

+24
-31
lines changed

17 files changed

+24
-31
lines changed

pom.xml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@
7171
<!-- dependency versions -->
7272
<sonar.version>9.8.0.63668</sonar.version>
7373
<sonar.api.version>9.13.0.360</sonar.api.version>
74-
<analyzer.commons.version>2.1.0.1111</analyzer.commons.version>
74+
<analyzer.commons.version>2.5.0.1358</analyzer.commons.version>
7575
<orchestrator.version>3.40.0.183</orchestrator.version>
7676
<junit.version>5.9.1</junit.version>
7777
<assertj.version>3.23.1</assertj.version>

sonar-text-plugin/src/main/resources/org/sonar/l10n/secrets/rules/secrets/S6290.html

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
<h2>Why is this an issue?</h2>
12
<p>AWS credentials are designed to authenticate and authorize requests to AWS.</p>
23
<p>If your application interacts with AWS then it requires AWS credentials to access all the resources it needs to function properly. Resources that
34
can be accessed depend on the permission granted to the AWS account. These credentials may authenticate to the AWS account root user who has
@@ -16,7 +17,7 @@ <h2>Recommended Secure Coding Practices</h2>
1617
<p>If possible, a better alternative is to use your cloud provider’s service for managing secrets. On AWS this service is called <a
1718
href="https://aws.amazon.com/fr/secrets-manager/">Secrets Manager</a>.</p>
1819
<p>When credentials are disclosed in the application code, consider them as compromised and revoke them immediately.</p>
19-
<h2>See</h2>
20+
<h2>Resources</h2>
2021
<ul>
2122
<li> <a href="https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures/">OWASP Top 10 2021 Category A7</a> - Identification and
2223
Authentication Failures </li>

sonar-text-plugin/src/main/resources/org/sonar/l10n/secrets/rules/secrets/S6290.json

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,7 @@
77
"constantCost": "30min"
88
},
99
"tags": [
10-
"cwe",
11-
"sans-top25-porous",
12-
"owasp-a3"
10+
"cwe"
1311
],
1412
"defaultSeverity": "Blocker",
1513
"ruleSpecification": "RSPEC-6290",

sonar-text-plugin/src/main/resources/org/sonar/l10n/secrets/rules/secrets/S6292.html

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
<h2>Why is this an issue?</h2>
12
<p>Amazon Marketplace Web Service credentials are designed to authenticate and authorize Amazon sellers.</p>
23
<p>If your application interacts with Amazon MWS then it requires credentials to access all the resources it needs to function properly. The
34
credentials authenticate to a seller account which can have access to resources like products, orders, price or shipment information.</p>
@@ -9,7 +10,7 @@ <h2>Recommended Secure Coding Practices</h2>
910
<p>If possible, a better alternative is to use your cloud provider’s service for managing secrets. On AWS this service is called <a
1011
href="https://aws.amazon.com/fr/secrets-manager/">Secrets Manager</a>.</p>
1112
<p>When credentials are disclosed in the application code, consider them as compromised and revoke them immediately.</p>
12-
<h2>See</h2>
13+
<h2>Resources</h2>
1314
<ul>
1415
<li> <a href="https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures/">OWASP Top 10 2021 Category A7</a> - Identification and
1516
Authentication Failures </li>

sonar-text-plugin/src/main/resources/org/sonar/l10n/secrets/rules/secrets/S6292.json

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,7 @@
77
"constantCost": "30min"
88
},
99
"tags": [
10-
"cwe",
11-
"sans-top25-porous",
12-
"owasp-a3"
10+
"cwe"
1311
],
1412
"defaultSeverity": "Blocker",
1513
"ruleSpecification": "RSPEC-6292",

sonar-text-plugin/src/main/resources/org/sonar/l10n/secrets/rules/secrets/S6334.html

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
<h2>Why is this an issue?</h2>
12
<p>Google API keys are used to authenticate applications that consume Google Cloud APIs. They are especially useful for accessing public data
23
anonymously (like Google Maps), and are used to associate API requests with your project for quota and billing.</p>
34
<p>API keys are not strictly secret as they are often embedded into client side code or mobile applications that consume Google Cloud APIs. Still,
@@ -17,7 +18,7 @@ <h2>Recommended Secure Coding Practices</h2>
1718
<p>In addition to secure storage, it’s important to apply <a
1819
href="https://cloud.google.com/docs/authentication/api-keys#api_key_restrictions">restrictions</a> to API keys in order to mitigate the impacts when
1920
they are discovered by malicious actors.</p>
20-
<h2>See</h2>
21+
<h2>Resources</h2>
2122
<ul>
2223
<li> <a href="https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures/">OWASP Top 10 2021 Category A7</a> - Identification and
2324
Authentication Failures </li>

sonar-text-plugin/src/main/resources/org/sonar/l10n/secrets/rules/secrets/S6334.json

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,7 @@
77
"constantCost": "30min"
88
},
99
"tags": [
10-
"cwe",
11-
"sans-top25-porous",
12-
"owasp-a3"
10+
"cwe"
1311
],
1412
"defaultSeverity": "Blocker",
1513
"ruleSpecification": "RSPEC-6334",

sonar-text-plugin/src/main/resources/org/sonar/l10n/secrets/rules/secrets/S6335.html

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
<h2>Why is this an issue?</h2>
12
<p>Google Cloud service accounts are designed to authenticate and authorize requests to Google APIs.</p>
23
<p>If your application interacts with Google Cloud services then it requires a service account to access all the resources it needs to function
34
properly. Resources that can be accessed depend on the permission granted to the service account. Establishing the identity of a service account
@@ -13,7 +14,7 @@ <h2>Recommended Secure Coding Practices</h2>
1314
<p>If possible, a better alternative is to use your cloud provider’s service for managing secrets. On Google Cloud this service is called <a
1415
href="https://cloud.google.com/secret-manager">Secret Manager</a>.</p>
1516
<p>When keys are disclosed in the application code, consider them as compromised and revoke them immediately.</p>
16-
<h2>See</h2>
17+
<h2>Resources</h2>
1718
<ul>
1819
<li> <a href="https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures/">OWASP Top 10 2021 Category A7</a> - Identification and
1920
Authentication Failures </li>

sonar-text-plugin/src/main/resources/org/sonar/l10n/secrets/rules/secrets/S6335.json

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,7 @@
77
"constantCost": "30min"
88
},
99
"tags": [
10-
"cwe",
11-
"sans-top25-porous",
12-
"owasp-a3"
10+
"cwe"
1311
],
1412
"defaultSeverity": "Blocker",
1513
"ruleSpecification": "RSPEC-6335",

sonar-text-plugin/src/main/resources/org/sonar/l10n/secrets/rules/secrets/S6336.html

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
<h2>Why is this an issue?</h2>
12
<p>AccessKeys are long term credentials designed to authenticate and authorize requests to Alibaba Cloud.</p>
23
<p>If your application interacts with Alibaba Cloud then it requires AccessKeys to access all the resources it needs to function properly. Resources
34
that can be accessed depend on the permissions granted to the Alibaba Cloud account. These credentials may authenticate to the account root user who
@@ -15,7 +16,7 @@ <h2>Recommended Secure Coding Practices</h2>
1516
<p>If possible, a better alternative is to use your cloud provider’s service for managing secrets. On AlibabaCloud this service is called <a
1617
href="https://www.alibabacloud.com/help/doc-detail/152001.htm">Secrets Manager</a>.</p>
1718
<p>When credentials are disclosed in the application code, consider them as compromised and revoke them immediately.</p>
18-
<h2>See</h2>
19+
<h2>Resources</h2>
1920
<ul>
2021
<li> <a href="https://owasp.org/Top10/A07_2021-Identification_and_Authentication_Failures/">OWASP Top 10 2021 Category A7</a> - Identification and
2122
Authentication Failures </li>

0 commit comments

Comments
 (0)