CodeQL library for Ruby
codeql/ruby-all 5.1.15 (changelog, source)
Search

Module Shared

Provides default sources, sinks and sanitizers for detecting “server-side cross-site scripting” vulnerabilities, as well as extension points for adding your own.

Import path

import codeql.ruby.security.XSS

Predicates

isAdditionalXssFlowStep

An additional step that is preserves dataflow in the context of XSS.

Classes

ArgumentInterpretedAsUrlAsSink

An argument that is used to construct the src attribute of a <script> tag.

ErbRawOutputDirective

A value interpolated using a raw erb output directive, which does not perform HTML escaping. erb <%== sink %>

HeaderWriteAsSink

A write to an HTTP response header, considered as a flow sink.

HtmlEscapingAsSanitizer

An HTML escaping, considered as a sanitizer.

HtmlSafeCallAsSink

An html_safe call marking the output as not requiring HTML escaping, considered as a flow sink.

LinkToCallArgumentAsSink

A argument to a call to the link_to method, which does not expect unsanitized user-input, considered as a flow sink.

RawCallArgumentAsSink

An argument to a call to the raw method, considered as a flow sink.

RawHelperCallArgumentAsSink

An argument to an ActionView helper method which is not escaped, considered as a flow sink.

Sanitizer

A sanitizer for “server-side cross-site scripting” vulnerabilities.

Sink

A data flow sink for “server-side cross-site scripting” vulnerabilities.

Source

A data flow source for “server-side cross-site scripting” vulnerabilities.

StringConstArrayInclusionCallAsSanitizer

An inclusion check against an array of constant strings, considered as a sanitizer-guard.

StringConstCompareAsSanitizer

A comparison with a constant string, considered as a sanitizer-guard.