Detects SQL queries built with string concatenation or template literals that include user input. Attackers can inject malicious SQL to read, modify, or delete data.
CWE-89OWASP A03
Detects user input rendered in HTML without sanitization. Enables attackers to inject scripts that steal cookies, credentials, or perform actions as the victim.
CWE-79OWASP A03
Detects shell commands built with user input via exec, spawn, or system calls. Allows attackers to execute arbitrary commands on the server.
CWE-78OWASP A03
Detects file operations with unsanitized paths containing user input. Attackers can use "../" sequences to access files outside intended directories.
CWE-22OWASP A01
Detects HTTP requests where the URL comes from user input. Attackers can make the server request internal resources or cloud metadata endpoints.
CWE-918OWASP A10
Detects deserialization of untrusted data using pickle, yaml.load, or eval. Can lead to remote code execution when processing malicious payloads.
CWE-502OWASP A08
Detects XML parsers with external entity processing enabled. Attackers can read local files, perform SSRF, or cause denial of service.
CWE-611OWASP A05
Detects LDAP queries built with user input. Attackers can modify queries to bypass authentication or access unauthorized directory data.
CWE-90
Detects API keys, passwords, and tokens embedded in source code. Secrets in code are exposed in version control and compiled artifacts.
CWE-798OWASP A02
Detects state-changing endpoints without CSRF token validation. Attackers can trick authenticated users into performing unintended actions.
CWE-352OWASP A01
Detects weak authentication patterns: missing password hashing, weak algorithms (MD5/SHA1), or authentication bypasses.
CWE-287OWASP A07
Detects non-constant-time string comparisons for secrets. Attackers can guess secrets character-by-character by measuring response times.
CWE-208
Detects file uploads without extension/type validation. Attackers can upload executable files to achieve code execution.
CWE-434
Detects APIs returning sensitive fields (passwords, SSNs, tokens) without filtering. Overly verbose responses leak private data.
CWE-200OWASP A01
Detects authentication and sensitive endpoints without rate limiting. Enables brute force attacks and credential stuffing.
CWE-307OWASP A04
Detects typosquatted package names and suspicious dependencies. Attackers register similar names to inject malicious code via supply chain.
CWE-1357