I am running a scan of front-end code, all JavaScript, using SonarScanner.
The version of SonarQube server being used is 7.7.0.23042
It is concerning that on the SonarQube portal, seeing only 7 vulnerability rules for the JavaScript.
[“alert(…)” open=javascript%3AS1442&rule_key=javascript%3AS1442) JavaScriptVulnerabilitycwe, owasp-a3, user-experience
[Console logging should not be used]open=javascript%3AS2228&rule_key=javascript%3AS2228) JavaScriptVulnerabilityowasp-a3, user-experience
Cross-document messaging domains should be carefully restricted JavaScriptVulnerabilityhtml5, owasp-a7
Debugger statements should not be used JavaScriptVulnerabilitycwe, owasp-a3, user-experience
Local storage should not be used JavaScriptVulnerabilityowasp-a3
Untrusted content should not be included JavaScriptVulnerabilitycwe, owasp-a1, sans-top25-risky
Web SQL databases should not be used JavaScriptVulnerabilityhtml5, owasp-a3, owasp-a9
Is this correct, that there are only 7 SonarQube rules for identifying JS vulnerabilities?

