We are happy to announce a major improvement on the precision of our SAST engine , detecting more server-side vulnerabilities in applications based on Node.Js and Express.js frameworks.
Here is the list of injection vulnerabilities to be found with this update:
- S2076: OS commands should not be vulnerable to command injection attacks
- S5334: Dynamic code execution should not be vulnerable to injection attacks
- S5146: HTTP request redirections should not be open to forging attacks
- S5144: Server-side requests should not be vulnerable to forging attacks
This adds up to the list of existing vulnerabilities that SonarCloud was already able to find.
In addition, our SAST engine for JS/TS now understands arrays, promises, ES6 classes and async/await syntaxes. This results in a far richer and more precise analysis of your code.
With all these improvements, the analysis might take a little longer to complete.
May you experience an unexpected problem of performance, please reach-out to us so we can investigate.
As an example, the Kibana source code was scanned in 8 minutes before while now it takes 10 minutes.
We hope you will enjoy the level of Code Security this update will bring to your code. Please share feedback as always.
The SonarCloud Team