AWS logo
Amazon QDetector LibrarySign in to Amazon Q
AWSbreadcrumb dividerDocumentationbreadcrumb dividerAmazon Qbreadcrumb dividerDetector Librarybreadcrumb dividerRubybreadcrumb dividerTagsbreadcrumb dividerTag: access-controlFeedbackFeedback icon

Q

Detector Library

Ruby detectors (21/21)

SQL InjectionDivide by ZeroSensitive HTTP ActionInsufficient Protected CredentialsSensitive Information LeakUntrusted DeserializationLog InjectionXML External EntityPath InjectionHttp to File AccessCode InjectionOS Command InjectionResource leakCross Site Scripting (XSS)Untrusted OpenImproper Input ValidationStack Trace ExposureImproper Certificate Validationsend_file InjectionUnsafe File PermissionsTainted Format

Tag: access-control

Improper Certificate Validation

Lack of validation of a security certificate can lead to host impersonation and sensitive data leaks.