This change log includes updates to detectors made in December 2025.
go-resource-leak-defer-after-early-return
python-resource-leak-detector
with statements)python-empty-container-check
len() operationspython-hardcoded-credentials-ide
bedrock_key, bedrock_token, etc.)java-poor-error-handling
java-path-traversal-ide
Files.createTempFile()java-spring-4-shell
@ModelAttribute for binding data from URL/query parameters@RequestBody, @PathVariable, or @RequestParam, which are not vulnerablejava-misconfigured-concurrency
CompletableFuture.allOf() patterns with proper timeout handlingorTimeout() for timeout managementjava-guice-insecure-thread-pool
ExecutorService parameter detection to focus on field assignmentsjava-null-dereference
java-shared-state-thread-safety
typescript-csrf-disabled
Authorization headerAuthorization header–based authentication as not vulnerable to CSRFtypescript-cdk-auto-scaling-group-health-check
typescript_cdk_ecs_cluster_cloud_watch_container_insights
aws-rds to aws-ecscontainerInsightsV2 when explicitly set to DISABLEDtypescript-cdk-neptune-cluster-multi-az
multiAz property for Neptune clustersc-cpp-incorrect-format-specifier
printf / fprintf calls to unbounded streams (stdout, stderr)go-nil-pointer-dereference
php-cross-site-scripting-ide
echo / print sinks already covered by the php-echoed-request ruleThe following rules were disabled because changing port numbers does not meaningfully improve security:
python-cdk-rds-non-default-portpython-cdk-elasticache-cluster-usage-of-default-portpython-cdk-redshift-cluster-usage-of-default-portpython-cdk-document-db-cluster-non-default-port