Module Shared
Provides default sources, sinks and sanitizers for detecting “server-side cross-site scripting” vulnerabilities, as well as extension points for adding your own.
Import path
import codeql.ruby.security.XSSPredicates
| isAdditionalXssFlowStep | An additional step that is preserves dataflow in the context of XSS. |
Classes
| ArgumentInterpretedAsUrlAsSink | An argument that is used to construct the |
| ErbRawOutputDirective | A value interpolated using a raw erb output directive, which does not perform HTML escaping. |
| HeaderWriteAsSink | A write to an HTTP response header, considered as a flow sink. |
| HtmlEscapingAsSanitizer | An HTML escaping, considered as a sanitizer. |
| HtmlSafeCallAsSink | An |
| LinkToCallArgumentAsSink | A argument to a call to the |
| RawCallArgumentAsSink | An argument to a call to the |
| RawHelperCallArgumentAsSink | An argument to an ActionView helper method which is not escaped, considered as a flow sink. |
| Sanitizer | A sanitizer for “server-side cross-site scripting” vulnerabilities. |
| Sink | A data flow sink for “server-side cross-site scripting” vulnerabilities. |
| Source | A data flow source for “server-side cross-site scripting” vulnerabilities. |
| StringConstArrayInclusionCallAsSanitizer | An inclusion check against an array of constant strings, considered as a sanitizer-guard. |
| StringConstCompareAsSanitizer | A comparison with a constant string, considered as a sanitizer-guard. |