Skip to content

Commit c82eb9b

Browse files
r2c-argo[bot]kurt-r2cmjambonsemgreg0xDC0DE
authored
Merge Develop into Release (#3716)
* fix(rules): CODE-9032 (#3683) * fix for CODE-9032 * add test * Improve OCaml rule protecting against stray Not_founds (#3702) ## Link to an issue, if relevant (internal Slack thread) ### ~~Adding a new~~ Revising a rule? Look over this PR checklist - The issue or PR has links, references, or examples. - The rule has **true positive** and **true negative** test cases in a file that matches the rule name. > If the rule is `my-rule`, the test file name should be `my-rule.js`. > > True positives are marked by comments with `ruleid: <my-rule>` and true negatives are marked by comments with `ok: <my-rule>`. - The rule has a good message. A good message includes: > 1. A description of the pattern (e.g., missing parameter, dangerous flag, out-of-order function calls). > 1. A description of why this pattern was detected (e.g., logic bug, introduces a security vulnerability, bad practice). > 1. An alternative that resolves the issue (e.g., use another function, validate data first, discard the dangerous flag). * Update aws-cloudfront-insecure-tls rule (#3705) This updates aws-cloudfront-insecure-tls rule to account for the addition of aws cloudfront support for TLSv1.2_2025 and TLSv1.3_2025 * Add rule to detect backdoor github action placed by Sha1-Hulud (#3714) Co-authored-by: Pieter De Cremer <[email protected]> * Fixed message in shai hulud backdoor rule (#3715) Co-authored-by: Pieter De Cremer <[email protected]> * Add additional GitHub shell injections patterns (#3735) A GitHub Action may still be vulnerable when a more complicated pattern is used, like an || operator. * [go] Add CWE-502 unsafe deserialization rule (#3736) * Add owasp 2025 mapping (#3739) * Add owasp 2025 mapping * fix metadata of twilio twiml injection rule --------- Co-authored-by: Pieter De Cremer <[email protected]> --------- Co-authored-by: Kurt Boberg <[email protected]> Co-authored-by: Martin Jambon <[email protected]> Co-authored-by: Greg M <[email protected]> Co-authored-by: Pieter De Cremer (Semgrep) <[email protected]> Co-authored-by: Pieter De Cremer <[email protected]> Co-authored-by: Tom Piccirello <[email protected]> Co-authored-by: Ravi Sastry Kadali <[email protected]>
1 parent a8c6de7 commit c82eb9b

File tree

1,345 files changed

+1579
-60
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,345 files changed

+1579
-60
lines changed

apex/lang/security/ncino/dml/ApexCSRFConstructor.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ rules:
99
- 'CWE-352: Cross-Site Request Forgery (CSRF)'
1010
owasp:
1111
- A01:2021 - Broken Access Control
12+
- A01:2025 - Broken Access Control
1213
cwe2020-top25': true
1314
cwe2021-top25': true
1415
cwe2022-top25': true

apex/lang/security/ncino/dml/ApexCSRFStaticConstructor.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ rules:
99
- 'CWE-352: Cross-Site Request Forgery (CSRF)'
1010
owasp:
1111
- A01:2021 - Broken Access Control
12+
- A01:2025 - Broken Access Control
1213
cwe2020-top25': true
1314
cwe2021-top25': true
1415
cwe2022-top25': true

apex/lang/security/ncino/dml/DmlNativeStatements.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,8 @@ rules:
1010
owasp:
1111
- A01:2021 - Broken Access Control
1212
- A04:2021 - Insecure Design
13+
- A01:2025 - Broken Access Control
14+
- A06:2025 - Insecure Design
1315
impact: HIGH
1416
likelihood: LOW
1517
confidence: LOW

apex/lang/security/ncino/encryption/BadCrypto.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ rules:
99
- 'CWE-321: Use of Hard-coded Cryptographic Key'
1010
owasp:
1111
- A02:2021 - Cryptographic Failures
12+
- A04:2025 - Cryptographic Failures
1213
impact: HIGH
1314
likelihood: LOW
1415
confidence: LOW

apex/lang/security/ncino/injection/ApexSOQLInjectionFromUnescapedURLParam.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ rules:
1515
- 'CWE-943: Improper Neutralization of Special Elements in Data Query Logic'
1616
owasp:
1717
- A03:2021 - Injection
18+
- A05:2025 - Injection
1819
references:
1920
- https://cwe.mitre.org/data/definitions/943.html
2021
impact: HIGH

apex/lang/security/ncino/injection/ApexSOQLInjectionUnescapedParam.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ rules:
1515
- 'CWE-943: Improper Neutralization of Special Elements in Data Query Logic'
1616
owasp:
1717
- A03:2021 - Injection
18+
- A05:2025 - Injection
1819
references:
1920
- https://cwe.mitre.org/data/definitions/943.html
2021
impact: HIGH

apex/lang/security/ncino/sharing/SpecifySharingLevel.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ rules:
99
- 'CWE-284: Improper Access Control'
1010
owasp:
1111
- A04:2021 - Insecure Design
12+
- A06:2025 - Insecure Design
1213
references:
1314
- https://developer.salesforce.com/docs/atlas.en-us.apexcode.meta/apexcode/apex_classes_keywords_sharing.htm
1415
- https://cwe.mitre.org/data/definitions/284.html

bash/curl/security/curl-eval.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ rules:
1010
metadata:
1111
owasp:
1212
- A03:2021 - Injection
13+
- A05:2025 - Injection
1314
cwe:
1415
- "CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')"
1516
category: security

bash/curl/security/curl-pipe-bash.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ rules:
1212
metadata:
1313
owasp:
1414
- A03:2021 - Injection
15+
- A05:2025 - Injection
1516
cwe:
1617
- "CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')"
1718
category: security

bash/lang/security/ifs-tampering.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ rules:
1818
confidence: LOW
1919
owasp:
2020
- A03:2021 - Injection
21+
- A05:2025 - Injection
2122
references:
2223
- https://owasp.org/Top10/A03_2021-Injection
2324
cwe2022-top25: true

0 commit comments

Comments
 (0)