Security requirements by language | Fluid Attacks Help

Security requirements by language

In this page, you can see the security requirements assessed by Fluid Attacks' static application security testing (SAST) differentiating by the programming language in which the source code is written and by the scanner method that automates the check. To learn about support information, read the article Supported languages, frameworks and files in SAST.

Android

Bash

Scanner method name
Related security requirement verified
BASH_IMAGE_HAS_DIGEST

BASH_USING_SSHPASS

BASH_EXCESSIVE_PRIVILEGES_FOR_OTHERS

C#

Scanner method name
Related security requirement verified
CS_CERT_VALIDATION_DISABLED
CS_CHECK_HASHES_SALT
CS_CONFLICTING_ANNOTATIONS
CS_CREATE_TEMP_FILE
CS_DISABLED_HTTP_HEADER_CHECK
CS_DISABLED_STRONG_CRYPTO
CS_HARDCODED_SYMMETRIC_KEY
CS_HAS_PUBLIC_CACHE_HEADER
CS_HTTPCLIENT_NO_REVOCATION_LIST
CS_INFO_LEAK_ERRORS

CS_INSECURE_ASSEMBLY_LOAD
CS_INSECURE_AUTHENTICATION
CS_INSECURE_CERTIFICATE_VALIDATION
CS_INSECURE_CHANNEL
CS_INSECURE_CIPHER
CS_INSECURE_CORS
CS_INSECURE_CORS_ORIGIN
CS_INSECURE_DESERIAL
CS_INSECURE_HASH
CS_INSECURE_KEYS
CS_INSECURE_LOGGING
CS_INSECURE_SHARED_ACCESS_PROTOCOL
CS_INSEC_ADDHEADER_WRITE
CS_INSEC_COOKIES
CS_INSEC_CREATE
CS_JS_DESERIALIZATION

CS_JWT_SIGNED
CS_LDAP_CONN_AUTH
CS_LDAP_INJECTION
CS_MANAGED_SECURE_MODE
CS_OBSOLETE_KEY_DERIVATION

CS_OPEN_REDIRECT
CS_OVERRIDE_AUTH_MODIFIER
CS_PATH_INJECTION

CS_REGEX_INJECTION
CS_REMOTE_COMMAND_EXECUTION
CS_RSA_SECURE_MODE
CS_SCHEMA_BY_URL
CS_SERVICE_POINT_MANAGER_DISABLED
CS_SQL_INJECTION
CS_STORED_PASSWORD
CS_TYPE_NAME_HANDLING
CS_UNSAFE_PATH_TRAVERSAL
CS_UNSAFE_SQL_STATEMENT
CS_VERIFY_DECODER
CS_VULN_REGEX
CS_WEAK_CREDENTIAL
CS_WEAK_PROTOCOL
CS_XAML_INJECTION
CS_XML_SERIAL
CS_XPATH_INJECTION
CS_XPATH_INJECTION_EVALUATE
CS_XSL_TRANSFORM_OBJECT
C_SHARP_ACCEPTS_ANY_MIMETYPE
C_SHARP_PLAIN_TEXT_KEYS

CloudFormation

Scanner method name Related security requirement verified
CFN_ADMIN_POLICY_ATTACHED
CFN_ALLOWS_PRIV_ESCALATION_BY_ATTACH_POLICY 035. Manage privilege modifications
CFN_ALLOWS_PRIV_ESCALATION_BY_POLICIES_VERSIONS 035. Manage privilege modifications
CFN_ANYONE_ADMIN_PORTS 255. Allow access only to the necessary ports
CFN_API_GATEWAY_LOGGING_DISABLED
CFN_AWS_EBS_VOLUMES_UNENCRYPTED
CFN_AWS_EFS_UNENCRYPTED
CFN_AWS_ELB_LISTENER_ON_HTTP 181. Transmit data using secure protocols
CFN_AWS_SEC_GROUP_USING_TCP 181. Transmit data using secure protocols
CFN_BUCKET_ALLOWS_PUBLIC
CFN_BUCKET_POLICY_SEC_TRANSPORT 181. Transmit data using secure protocols
CFN_CF_DISTR_LOG_DISABLED
CFN_COGNITO_HAS_MFA_DISABLED
CFN_CONTENT_HTTP 181. Transmit data using secure protocols
CFN_DYNAMO_NOT_DEL_PROTEC
CFN_EC2_ASSOC_PUB_IP 266. Disable insecure functionalities
CFN_EC2_DEFAULT_SEC_GROUP 266. Disable insecure functionalities
CFN_EC2_NOT_TERMINATION_PROTEC
CFN_EC2_NO_IAM 266. Disable insecure functionalities
CFN_EC2_OPEN_ALL_PORTS_PUBLIC 255. Allow access only to the necessary ports
CFN_EC2_SEC_GROUPS_RFC1918 255. Allow access only to the necessary ports
CFN_EC2_TERMINATE_SHUTDOWN_BEHAVIOR 266. Disable insecure functionalities
CFN_EC2_UNENCRYPTED_BLOCK_DEVICES 266. Disable insecure functionalities
CFN_EC2_UNENCRYPTED_VOLUMES 266. Disable insecure functionalities
CFN_EC2_UNRESTRICTED_DNS 255. Allow access only to the necessary ports
CFN_EC2_UNRESTRICTED_FTP 255. Allow access only to the necessary ports
CFN_EC2_UNRESTRICTED_PORTS 255. Allow access only to the necessary ports
CFN_EKS_HAS_ENDPOINTS_PUBLICLY_ACCESSIBLE
CFN_ELASTICACHE_TRANSIT_ENCRYPTION_DISABLED
CFN_ELASTICACHE_USES_DEFAULT_PORT
CFN_ELB2_INSECURE_SEC_POLICY 266. Disable insecure functionalities
CFN_ELB2_INSEC_PROTO 181. Transmit data using secure protocols
CFN_ELB2_LOGS_S3_DISABLED
CFN_ELB2_NOT_DELETION_PROTEC
CFN_ELB_ACCESS_LOG_DISABLED
CFN_ELB_WITHOUT_SSLPOLICY
CFN_GROUPS_WITHOUT_EGRESS 255. Allow access only to the necessary ports
CFN_HTTP_METHODS_ENABLED 266. Disable insecure functionalities
CFN_IAM_EXCESSIVE_ROLE_POLICY
CFN_IAM_FULL_ACCESS_SSM
CFN_IAM_MISSING_SECURITY
CFN_IAM_PERMISSIONS_POLICY_NOT_ACTION
CFN_IAM_PERMISSIONS_POLICY_NOT_RESOURCE
CFN_IAM_PERMISSIONS_POLICY_WILDCARD_ACTIONS
CFN_IAM_PERMISSIONS_POLICY_WILDCARD_RESOURCES
CFN_IAM_POLICY_APPLY_TO_USERS
CFN_IAM_TRUST_POLICY_NOT_ACTION
CFN_IAM_TRUST_POLICY_NOT_PRINCIPAL
CFN_IAM_TRUST_POLICY_WILDCARD_ACTION
CFN_IAM_WILDCARD_WRITE
CFN_INSECURE_CERTIFICATE 266. Disable insecure functionalities
CFN_INSEC_GEN_SECRET
CFN_INSEC_PROTO
CFN_INST_WITHOUT_PROFILE 255. Allow access only to the necessary ports
CFN_KMS_KEY_ROTATION_DISABLED 266. Disable insecure functionalities
CFN_KMS_MASTER_KEYS_EXPOSED
CFN_LOG_CONF_DISABLED
CFN_LOG_NOT_VALIDATED 080. Prevent log modification
CFN_NEGATIVE_STATEMENT
CFN_NOT_POINT_TIME_RECOVERY
CFN_PERMISSIVE_POLICY
CFN_POLICY_SERVER_ENCRYP_DISABLED
CFN_RDS_NOT_AUTO_BACKUPS
CFN_RDS_NOT_INSIDE_DB_SUBNET 255. Allow access only to the necessary ports
CFN_RDS_NOT_TERMINATION_PROTEC
CFN_RDS_NOT_USES_IAM_AUTHENTICATION
CFN_RDS_PUB_ACCESSIBLE
CFN_RDS_UNENCRYPTED_STORAGE
CFN_REDSHIFT_HAS_AUDIT_LOGS_DISABLED
CFN_REDSHIFT_HAS_ENCRYPTION_DISABLED
CFN_REDSHIFT_HAS_PUBLIC_CLUSTERS
CFN_REDSHIFT_HAS_USER_ACTIVITY_LOG_DISABLED
CFN_REDSHIFT_NOT_REQUIRES_SSL
CFN_S3_BUCKETS_ALLOW_UNAUTHORIZED_PUBLIC_ACCESS
CFN_S3_VERSIONING_DISABLED 266. Disable insecure functionalities
CFN_SERVER_SSL_DISABLED 181. Transmit data using secure protocols
CFN_SNS_HAS_SERVER_SIDE_ENCRYPTION_DISABLED
CFN_SQS_HAS_ENCRYPTION_DISABLED
CFN_SQS_IS_PUBLIC
CFN_TRAILS_NOT_MULTIREGION
CFN_UNRESTRICTED_CIDRS 255. Allow access only to the necessary ports
CFN_UNRESTRICTED_IP_PROTO 255. Allow access only to the necessary ports
CFN_WILDCARD_IN_ALLOWED_ORIGINS
YML_SERVERLESS_CORS

Configuration files

Scanner method name
Related security requirement verified
CONF_FILES_CREDENTIALS_EXPOSED_IN_CODE
JMX_HEADER_BASIC
JSON_ALLOWED_HOSTS
JSON_ANON_CONNECTION_CONFIG
JSON_DB_CREDENTIALS_EXPOSED_IN_CODE
JSON_DISABLE_HOST_CHECK
JSON_HTTPS_FLAG_MISSING
JSON_PRINCIPAL_WILDCARD
JSON_SSL_PORT_MISSING
JWT_TOKEN
SONAR_CREDENTIALS_EXPOSED
SENSITIVE_INFO_DOTNET_JSON
SENSITIVE_INFO_JSON
SENSITIVE_KEY_JSON
TSCONFIG_SOURCEMAP_ENABLED
WEB_DB_CONN
WEB_USER_PASS
XML_ACCEPT_HEADER
XML_ALLOWS_ALL_DOMAINS
XML_BASIC_AUTH_METHOD
XML_HAS_X_XSS_PROTECTION_HEADER
XML_HEADER_ALLOW_ALL_METHODS
XML_HEADER_ALLOW_DANGER_METHODS
XML_INSECURE_CONFIGURATION
XML_NETWORK_SSL_DISABLED
XML_X_FRAME_OPTIONS

Dart

Scanner method name
Related security requirement verified
DART_INSECURE_LOGGING
DART_SALT_IS_HARDCODED

Docker

Scanner method name
Related security requirement verified
CONTAINER_DISABLED_SSL
CONTAINER_USING_SSHPASS
CONTAINER_WITHOUT_USER
CONTAINER_WITH_USER_ROOT
DOCKER_ENV_SECRETS
DOCKER_PORT_EXPOSED
DOCKER_USING_ADD_COMMAND
UNPINNED_DOCKER_IMAGE

Docker Compose

Scanner method name
Related security requirement verified
DOCKER_COMPOSE_ENV_SECRETS
DOCKER_COMPOSE_IMAGE_HAS_DIGEST
DOCKER_COMPOSE_READ_ONLY
DOCKER_COMPOSE_SSH_PASS

Go

Scanner method name
Related security requirement verified

GO_ACCEPTS_ANY_MIME_TYPE

GO_HARDCODED_SYMMETRIC_KEY
GO_INSECURE_CIPHER
GO_INSECURE_HASH
GO_INSECURE_QUERY
GO_SALT_IS_HARDCODED

HTML

Scanner method name
Related security requirement verified
HTML_HAS_AUTOCOMPLETE
HTML_HAS_NOT_SUB_RESOURCE_INTEGRITY
HTML_HAS_REVERSE_TABNABBING

Java

Machine method name
Related security requirement verified
JAVA_ACCEPTS_ANY_MIMETYPE_CHAIN
JAVA_ACCEPTS_ANY_MIMETYPE_OBJ
JAVA_BASIC_AUTHENTICATION
JAVA_CREATE_TEMP_FILE
JAVA_CREDENTIALS_EXPOSED_IN_CODE
JAVA_CSRF_PROTECTIONS_DISABLED
JAVA_HOSTNAME_VERIFICATION_OFF
JAVA_HOST_KEY_CHECKING
JAVA_HTTP_ONLY_COOKIE
JAVA_HTTP_REQ_ACCEPTS_ANY_MIMETYPE
JAVA_INSECURE_AUTHENTICATION
JAVA_INSECURE_CIPHER
JAVA_INSECURE_CIPHER_JMQI
JAVA_INSECURE_CIPHER_MODE
JAVA_INSECURE_CIPHER_SSL
JAVA_INSECURE_CONNECTION
JAVA_INSECURE_CORS_ORIGIN
JAVA_INSECURE_ENGINE_CIPHER_SSL
JAVA_INSECURE_HASH
JAVA_INSECURE_KEY
JAVA_INSECURE_KEY_EC
AVA_INSECURE_KEY_RSA
JAVA_INSECURE_KEY_SECRET
JAVA_INSECURE_PASS
JAVA_INSECURE_TRUST_MANAGER
JAVA_INSEC_SIGN_ALGORITHM
JAVA_JPA_LIKE
JAVA_JWT_UNSAFE_DECODE
JAVA_JWT_WITHOUT_PROPER_SIGN
JAVA_LDAP_INJECTION
JAVA_PROP_MISSING_SSL
JAVA_PROP_SENSITIVE
JAVA_PROP_UNENCRYPTED_TRANSPORT
JAVA_PROP_WEAK_CIPHER
JAVA_REMOTE_COMMAND_EXECUTION
JAVA_SALT_IS_HARDCODED
JAVA_SECURE_COOKIE
JAVA_SQL_INJECTION
JAVA_TRUST_BOUNDARY_VIOLATION
JAVA_UNSAFE_PATH_TRAVERSAL
JAVA_UNSAFE_XSS_CONTENT
JAVA_UPLOAD_SIZE_LIMIT
JAVA_USES_SYSTEM_EXIT
JAVA_VULN_REGEX
JAVA_WEAK_RANDOM_COOKIE
JAVA_XML_PARSER
JAVA_XPATH_INJECTION_EVALUATE
JAVA_ZIP_SLIP_PATH_INJECTION

JavaScript

Scanner method name
Related security requirement verified
JAVASCRIPT_ACCEPTS_ANY_MIME_DEFAULT
JAVASCRIPT_ACCEPTS_ANY_MIME_METHOD
JAVASCRIPT_EXPRESS_ACCEPTS_ANY_MIME

JAVASCRIPT_INSECURE_CORS_ORIGIN

JSX_LACK_OF_VALIDATION_EVENT_LISTENER
JS_CLIENT_STORAGE
JS_CREDENTIALS_EXPOSED_IN_CODE
JS_CRYPTO_CREDENTIALS
JS_DEBUGGER_ENABLED
JS_DECODE_INSECURE_JWT_TOKEN
JS_DYNAMIC_X_PATH
JS_HAS_REVERSE_TABNABBING
JS_INSECURE_COMPRESSION_ALGORITHM
JS_INSECURE_COOKIE
JS_INSECURE_CREATE_CIPHER
JS_INSECURE_ECDH_KEY
JS_INSECURE_EC_KEYPAIR
JS_INSECURE_ENCRYPT
JS_INSECURE_HASH
JS_INSECURE_HASH_LIBRARY
JS_INSECURE_JWT_TOKEN
JS_INSECURE_RSA_KEYPAIR
JS_INSEC_COOKIES
JS_INSEC_MSG_AUTH_MECHANISM
JS_JSON_PARSE_UNVALIDATED_DATA
JS_JWT_INSEC_SIGN_ALGORITHM
JS_JWT_INSEC_SIGN_ALGO_ASYNC
JS_LOCAL_STORAGE_SENS_DATA_ASSIGNMENT
JS_LOCAL_STORAGE_WITH_SENSITIVE_DATA
JS_NON_SECURE_CONSTRUCTION_OF_COOKIES
JS_PATH_TRAVERSAL
JS_REGEX_INJECTION
JS_REMOTE_COMMAND_EXECUTION
JS_SALT_IS_HARDCODED
JS_SQL_API_INJECTION
JS_SQL_INJECTION
JS_UNSAFE_HTTP_XSS_PROTECTION
JS_UNSAFE_HTTP_X_FRAME_OPTIONS
JS_UNSAFE_ORIGIN
JS_UNSAFE_XSS_CONTENT
JS_USES_BYPASS_SECURITY_TRUST_URL
JS_USES_DANGEROUSLY_SET_HTML
JS_USES_EVAL
JS_USES_INNERHTML
JS_WEAK_RANDOM
JS_XML_PARSER
JS_ZIP_SLIP

Kotlin

Scanner method name
Related security requirement verified
KOTLIN_ACCEPTS_ANY_MIME_TYPE
KOTLIN_CREDENTIALS_EXPOSED_IN_CODE
KOTLIN_HTTP_ONLY_COOKIE
KOTLIN_SALT_IS_HARDCODED
KOTLIN_SECURE_COOKIE
KOTLIN_VULN_REGEX
KT_ANONYMOUS_LDAP
KT_DEFAULT_HTTP_CLIENT_DEPRECATED
KT_HC_SECRET_ALG_INSTANCE
KT_INSECURE_CERTIFICATE_VALIDATION
KT_INSECURE_CIPHER
KT_INSECURE_CIPHER_HTTP
KT_INSECURE_CIPHER_MODE
KT_INSECURE_CIPHER_SSL
KT_INSECURE_ENCRYPTION_KEY
KT_INSECURE_HASH
KT_INSECURE_HOST_VERIFICATION
KT_INSECURE_INIT_VECTOR
KT_INSECURE_KEY
KT_INSECURE_KEY_EC
KT_INSECURE_KEY_GEN
KT_INSECURE_KEY_PAIR_GEN
KT_INSECURE_PARAMETER_SPEC
KT_REMOTE_COMMAND_EXECUTION
KT_UNENCRYPTED_CHANNEL
KT_WEAK_RANDOM
KT_XML_PARSER

Kubernetes

Scanner method name
Related security requirement verified
K8S_CHECK_ADD_CAPABILITY
K8S_CHECK_DROP_CAPABILITY
K8S_CHECK_HOST_PID
K8S_CHECK_IF_CAPABILITY_EXISTS
K8S_CHECK_IF_SYS_ADMIN_EXISTS
K8S_CHECK_PRIVILEGED_USED
K8S_CHECK_RUN_AS_USER
K8S_CHECK_SECCOMP_PROFILE
K8S_CONTAINER_WITHOUT_SECURITYCONTEXT
K8S_IMAGE_HAS_DIGEST
K8S_PRIVILEGE_ESCALATION_ENABLED
K8S_ROOT_CONTAINER
K8S_ROOT_FILESYSTEM_READ_ONLY
KUBERNETES_INSECURE_PORT
KUBERNETES_USES_HTTP
KUBERNETES_USES_HTTP_SERVER

PHP

Scanner method name
Related security requirement verified
PHP_REMOTE_COMMAND_EXECUTION
PHP_UNSAFE_XSS_CONTENT
PHP_BASIC_AUTHENTICATION
PHP_INSECURE_HASH
PHP_INSECURE_CORS
PHP_INFO_LEAK_ERRORS
PHP_INSECURE_ENCRYPT_AES

Python

Scanner method name
Related security requirement verified

PYTHON_ACCEPTS_ANY_MIME

PYTHON_CREDENTIALS_EXPOSED_IN_CODE
PYTHON_DESERIALIZATION_INJECTION
PYTHON_EXPOSED_AUTH_TOKEN
PYTHON_HTTP_ONLY_COOKIE
PYTHON_INSECURE_AUTHENTICATION
PYTHON_INSECURE_CIPHER_MODE
PYTHON_INSECURE_JWT_KEY
PYTHON_INSEC_HASH_LIBRARY
PYTHON_IO_PATH_TRAVERSAL
PYTHON_LDAP_CONN_AUTH
PYTHON_LDAP_INJECTION
PYTHON_REGEX_DOS
PYTHON_REGEX_INJECTION
PYTHON_REMOTE_COMMAND_EXECUTION
PYTHON_SECURE_COOKIE
PYTHON_SESSION_FIXATION
PYTHON_UNSAFE_CERTIFICATE_VALIDATION
PYTHON_UNSAFE_CIPHER
PYTHON_UNSAFE_SSL_HOSTNAME
PYTHON_UNSAFE_TEMP_FILE
PYTHON_XML_PARSER

Swift

Scanner method name
Related security requirement verified
SWIFT_CREDENTIALS_EXPOSED_IN_CODE
SWIFT_HC_SECRET_JWT
SWIFT_INSECURE_CIPHER
SWIFT_INSECURE_CRYPTOR

Terraform

Scanner technique name Related security requirement verified
CHECK_REQUIRED_VERSION 266. Disable insecure functionalities
EC2_DEFAULT_SEC_GROUP 266. Disable insecure functionalities
EC2_NOT_TERMINATION_PROTEC
EC2_TERMINATE_SHUTDOWN_BEHAVIOR 266. Disable insecure functionalities
TFM_ADMIN_MANAGED_POLICIES
TFM_ADMIN_POLICY
TFM_ALLOWS_PRIV_ESCALATION_BY_ATTACH_POLICY 035. Manage privilege modifications
TFM_ALLOWS_PRIV_ESCALATION_BY_POLICIES_VERSIONS 035. Manage privilege modifications
TFM_ANYONE_ADMIN_PORTS 255. Allow access only to the necessary ports
TFM_API_ALL_HTTP_METHODS_ENABLED 266. Disable insecure functionalities
TFM_API_GATEWAY_LOGGING_DISABLED
TFM_AWS_ACL_BROAD_NETWORK_ACCESS 255. Allow access only to the necessary ports
TFM_AWS_EBS_VOLUMES_UNENCRYPTED
TFM_AWS_EC2_ALL_TRAFFIC 255. Allow access only to the necessary ports
TFM_AWS_EC2_CFN_UNRESTR_IP_PROT 255. Allow access only to the necessary ports
TFM_AWS_EC2_UNRESTRICTED_CIDRS 255. Allow access only to the necessary ports
TFM_AWS_EFS_UNENCRYPTED
TFM_AWS_ELB_LISTENER_ON_HTTP 181. Transmit data using secure protocols
TFM_AWS_ELB_WITHOUT_SSLPOLICY
TFM_AWS_INSEC_PROTO
TFM_AWS_SEC_GROUP_USING_TCP 181. Transmit data using secure protocols
TFM_AZURE_APP_LOG_DISABLED
TFM_AZURE_CLIENT_CERT_ENABLED
TFM_AZURE_INSEC_PROTO
TFM_AZURE_KEY_VAULT_NOT_RECOVER
TFM_AZURE_KV_DANGER_BYPASS 255. Allow access only to the necessary ports
TFM_AZURE_KV_DEFAULT_ACCESS 255. Allow access only to the necessary ports
TFM_AZURE_KV_ONLY_ACCESS_HTTPS 181. Transmit data using secure protocols
TFM_AZURE_KV_SECRET_NO_EXPIRATION
TFM_AZURE_LNX_VM_INSEC_AUTH
TFM_AZURE_SA_DEFAULT_ACCESS 255. Allow access only to the necessary ports
TFM_AZURE_SA_INSEC_TRANSFER 181. Transmit data using secure protocols
TFM_AZURE_SQL_LOG_RETENT
TFM_AZURE_STORAGE_LOG_DISABLED
TFM_AZURE_UNRESTRICTED_ACCESS 255. Allow access only to the necessary ports
TFM_AZURE_VM_INSEC_AUTH
TFM_BUCKET_ALLOWS_PUBLIC
TFM_BUCKET_POLICY_SEC_TRANSPORT 181. Transmit data using secure protocols
TFM_CF_DISTR_LOG_DISABLED
TFM_COGNITO_HAS_MFA_DISABLED
TFM_CONTENT_HTTP 181. Transmit data using secure protocols
TFM_CTRAIL_LOG_NOT_VALIDATED 080. Prevent log modification
TFM_DB_NO_POINT_TIME_RECOVERY
TFM_DYNAMO_NOT_DEL_PROTEC
TFM_EBS_UNENCRYPTED_DEFAULT 266. Disable insecure functionalities
TFM_EBS_UNENCRYPTED_VOLUMES 266. Disable insecure functionalities
TFM_EC2_ASSOC_PUB_IP 266. Disable insecure functionalities
TFM_EC2_NO_IAM 266. Disable insecure functionalities
TFM_EC2_OPEN_ALL_PORTS_PUBLIC 255. Allow access only to the necessary ports
TFM_EC2_SEC_GROUPS_RFC1918 255. Allow access only to the necessary ports
TFM_EC2_UNENCRYPTED_BLOCK_DEVICES 266. Disable insecure functionalities
TFM_EC2_UNRESTRICTED_DNS 255. Allow access only to the necessary ports
TFM_EC2_UNRESTRICTED_FTP 255. Allow access only to the necessary ports
TFM_EC2_UNRESTRICTED_PORTS 255. Allow access only to the necessary ports
TFM_EKS_HAS_ENDPOINTS_PUBLICLY_ACCESSIBLE
TFM_ELASTICACHE_TRANSIT_ENCRYPTION_DISABLED
TFM_ELASTICACHE_USES_DEFAULT_PORT
TFM_ELB2_INSECURE_SEC_POLICY 266. Disable insecure functionalities
TFM_ELB2_INSEC_PROTO 181. Transmit data using secure protocols
TFM_ELB2_NOT_DELETION_PROTEC
TFM_ELB_LOGGING_DISABLED
TFM_HTTP_METHODS_ENABLED 266. Disable insecure functionalities
TFM_IAM_EXCESSIVE_ROLE_POLICY
TFM_IAM_FULL_ACCESS_SSM
TFM_IAM_MISSING_SECURITY
TFM_IAM_PERMISSIONS_POLICY_NOT_ACTION
TFM_IAM_PERMISSIONS_POLICY_NOT_RESOURCE
TFM_IAM_POLICY_APPLY_TO_USERS
TFM_IAM_TRUST_POLICY_NOT_ACTION
TFM_IAM_TRUST_POLICY_NOT_PRINCIPAL
TFM_IAM_TRUST_POLICY_WILDCARD_ACTION
TFM_IAM_WILDCARD_WRITE
TFM_INST_WITHOUT_PROFILE 255. Allow access only to the necessary ports
TFM_KMS_KEY_ROTATION_DISABLED 266. Disable insecure functionalities
TFM_KMS_MASTER_KEYS_EXPOSED
TFM_NEGATIVE_STATEMENT
TFM_PERMISSIVE_POLICY
TFM_POLICY_SERVER_ENCRYP_DISABLED
TFM_PUBLIC_BUCKETS_ACL
TFM_RDS_INSIDE_SUBNET 255. Allow access only to the necessary ports
TFM_RDS_NOT_AUTO_BACKUPS
TFM_RDS_NOT_USES_IAM_AUTHENTICATION
TFM_RDS_NO_DELETION_PROTEC
TFM_RDS_PUB_ACCESSIBLE
TFM_RDS_UNENCRYPTED_STORAGE
TFM_REDSHIFT_HAS_AUDIT_LOGS_DISABLED
TFM_REDSHIFT_HAS_ENCRYPTION_DISABLED
TFM_REDSHIFT_HAS_PUBLIC_CLUSTERS
TFM_REDSHIFT_HAS_USER_ACTIVITY_LOG_DISABLED
TFM_REDSHIFT_NOT_REQUIRES_SSL
TFM_S3_BUCKETS_ALLOW_UNAUTHORIZED_PUBLIC_ACCESS
TFM_S3_VERSIONING_DISABLED 266. Disable insecure functionalities
TFM_SNS_HAS_SERVER_SIDE_ENCRYPTION_DISABLED
TFM_SQS_HAS_ENCRYPTION_DISABLED
TFM_SQS_IS_PUBLIC
TFM_TRAILS_NOT_MULTIREGION

TypeScript

Scanner method name
Related security requirement verified
TSX_LACK_OF_VALIDATION_EVENT_LISTENER
TS_CLIENT_STORAGE
TS_CRYPTO_CREDENTIALS
TS_DEBUGGER_ENABLED
TS_DECODE_INSECURE_JWT_TOKEN
TS_DYNAMIC_X_PATH
TS_HAS_REVERSE_TABNABBING
TS_INSECURE_COMPRESSION_ALGORITHM
TS_INSECURE_COOKIE
TS_INSECURE_CREATE_CIPHER
TS_INSECURE_ECDH_KEY
TS_INSECURE_EC_KEYPAIR
TS_INSECURE_ENCRYPT
TS_INSECURE_HASH
TS_INSECURE_JWT_TOKEN
TS_INSECURE_LOGGING
TS_INSECURE_RSA_KEYPAIR
TS_INSEC_COOKIES
TS_INSEC_MSG_AUTH_MECHANISM
TS_JSON_PARSE_UNVALIDATED_DATA
TS_JWT_INSEC_SIGN_ALGORITHM
TS_JWT_INSEC_SIGN_ALGO_ASYNC
TS_LOCAL_STORAGE_SENS_DATA_ASSIGNMENT
TS_NON_SECURE_CONSTRUCTION_OF_COOKIES
TS_PATH_TRAVERSAL
TS_REGEX_INJECTION
TS_REMOTE_COMMAND_EXECUTION
TS_SALT_IS_HARDCODED
TS_SQL_API_INJECTION
TS_SQL_INJECTION
TS_UNNECESSARY_IMPORTS
TS_UNSAFE_HTTP_XSS_PROTECTION
TS_UNSAFE_HTTP_X_FRAME_OPTIONS
TS_UNSAFE_ORIGIN
TS_UNSAFE_XSS_CONTENT
TS_USES_BYPASS_SECURITY_TRUST_URL
TS_USES_DANGEROUSLY_SET_HTML
TS_USES_EVAL
TS_USES_INNERHTML
TS_WEAK_RANDOM
TS_XML_PARSER
TS_ZIP_SLIP
TYPESCRIPT_ACCEPTS_ANY_MIME_DEFAULT
TYPESCRIPT_ACCEPTS_ANY_MIME_METHOD

.NET

Scanner method name
Related security requirement verified
DOTNETCONFIG_ANON_AUTH_ENABLED
DOTNETCONFIG_ASP_VERSION_ENABLED

DOTNETCONFIG_EXCESSIVE_AUTH_PRIVILEGES

DOTNETCONFIG_HAS_DEBUG_ENABLED
DOTNETCONFIG_HAS_SSL_DISABLED
DOTNETCONFIG_NOT_CUSTOM_ERRORS
DOTNETCONFIG_NOT_SUPPRESS_VULN_HEADER

General

Scanner method name
Related security requirement verified
NON_UPGRADEABLE_DEPS
UNVERIFIABLE_FILES

Free trial message
Free trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.