AWS logo
Amazon QDetector LibrarySign in to Amazon Q
AWSbreadcrumb dividerDocumentationbreadcrumb dividerAmazon Qbreadcrumb dividerDetector Librarybreadcrumb dividerJSXbreadcrumb dividerTagsFeedbackFeedback icon

Q

Detector Library

JSX detectors (78/78)

Protection mechanism failureLog injectionInsecure connection using unencrypted protocolUse of a deprecated methodAWS credentials loggedImproper input validationInsecure cryptographyCatch and swallow exceptionFile and directory information exposureOrigins-verified cross-origin communicationsSQL injectionNon-literal regular expressionTypeof expressionBatch request with unchecked failuresPseudorandom number generatorsCryptographic key generatorServer-side request forgerySensitive information leakFile injectionString passed to `setInterval` or `setTimeout`Cross-site request forgeryUsage of an API that is not recommendedTainted input for Docker APICross-site scriptingWeak obfuscation of web requestsUnauthenticated Amazon SNS unsubscribe requests might succeedSet SNS Return Subscription ARNXML external entityResource leakImproper access controlLoose file permissionsOS command injectionClient-side KMS reencryptionInsecure CORS policyInefficient polling of AWS resourceNew function detectedMissing paginationAvoid nan in comparisonHeader injectionHardcoded credentialsFile extension validationNoSQL injectionMissing Amazon S3 bucket owner conditionDisabled HTML autoescapeLeast privilege violationURL redirection to untrusted siteInsufficiently protected credentialsInsecure hashingUnsanitized input is run as codeCheck failed records when using kinesisUntrusted Amazon Machine ImagesSession fixationData loss in a batch requestXPath injectionDeserialization of untrusted objectInvoke super appropriatelyStack trace exposureTiming attackLDAP injectionInsecure cookieSensitive data stored unencrypted due to partial encryptionUnvalidated expansion of archive filesInteger overflowSNS don't bind subscribe and publishUnverified hostnameImproper restriction of rendered UI layers or framesAWS client not reused in a Lambda functionPath traversalOverride of reserved variable names in a Lambda functionInsecure temporary file or directoryLogging of sensitive informationHardcoded IP addressInsecure object attribute modificationNumeric truncation errorDNS prefetchingLimit request lengthSendfile injectionImproper certificate validation

Tags

a
# access-control# amazon-dynamodb# amazon-ec2# amazon-kinesis# amazon-s3# amazon-sns# availability# aws-java-sdk# aws-javascript-sdk# aws-kms# aws-lambda# aws-python-sdk# aws-sdk
b
# batch-operations
c
# configuration# cookies# correctness# cryptography
d
# data-integrity# deserialization
e
# efficiency
i
# information-leak# injection
l
# ldap# logging
m
# maintainability
n
# networking
o
# owasp-top10
r
# race-condition# reliability# resource-leak
s
# secrets# security-context# security-misconfiguration# sql
t
# top25-cwes
x
# xml