Security Scanning
The security scanner detects vulnerabilities aligned with OWASP Top 10.
Supported Rules
A01:2021 – Broken Access Control
| Rule |
Severity |
Description |
| SEC001 |
HIGH |
Hardcoded credentials (passwords, API keys) |
| SEC002 |
HIGH |
Exposed private keys |
A02:2021 – Cryptographic Failures
| Rule |
Severity |
Description |
| SEC003 |
MEDIUM |
Weak hash algorithms (MD5, SHA1) |
| SEC004 |
MEDIUM |
Non-cryptographic random for security |
A03:2021 – Injection
| Rule |
Severity |
Description |
| SEC005 |
HIGH |
SQL injection via string formatting |
| SEC006 |
HIGH |
Command injection in subprocess |
| SEC007 |
HIGH |
eval() usage |
| SEC008 |
MEDIUM |
XSS via innerHTML |
A04:2021 – Insecure Design
| Rule |
Severity |
Description |
| SEC009 |
MEDIUM |
Debug mode enabled |
A05:2021 – Security Misconfiguration
| Rule |
Severity |
Description |
| SEC010 |
MEDIUM |
CORS wildcard (*) |
| SEC011 |
HIGH |
SSL verification disabled |
A07:2021 – Authentication Failures
| Rule |
Severity |
Description |
| SEC012 |
HIGH |
Hardcoded JWT secrets |
A08:2021 – Integrity Failures
| Rule |
Severity |
Description |
| SEC013 |
MEDIUM |
Pickle deserialization |
A09:2021 – Logging Failures
| Rule |
Severity |
Description |
| SEC014 |
MEDIUM |
Logging sensitive data |
A10:2021 – Server-Side Request Forgery
| Rule |
Severity |
Description |
| SEC015 |
MEDIUM |
SSRF via dynamic URLs |
Additional Rules
| Rule |
Severity |
Description |
| SEC016 |
LOW |
Hardcoded IP addresses |
| SEC017 |
MEDIUM |
Security-related TODO/FIXME |
Usage
In PR Reviews
Security scanning runs automatically during PR review:
Standalone
Get Summary
Custom Rules
Create security/security_rules.yml:
Load custom rules:
CI Integration
Fail CI on HIGH severity findings:
Or in code:
CWE References
All rules include CWE (Common Weakness Enumeration) references: