This repository was archived by the owner on Apr 19, 2026. It is now read-only.
-
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathcustom_detectors.json
More file actions
53 lines (53 loc) · 1.35 KB
/
custom_detectors.json
File metadata and controls
53 lines (53 loc) · 1.35 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
[
{
"name": "HARDCODED_PASSWORD",
"description": "Detect hardcoded passwords and secrets",
"pattern": "(?i)(password|secret|key|token)\\s*[=:]\\s*[\"'][^\"']{8,}[\"']",
"file_extensions": [],
"case_sensitive": false,
"multiline": false,
"capture_groups": [],
"severity": "High",
"category": "Security",
"examples": [
"password = \"secretpassword123\""
],
"enabled": true
},
{
"name": "SQL_INJECTION",
"description": "Detect potential SQL injection vulnerabilities",
"pattern": "(?i)(query|execute)\\s*\\(\\s*[\"']\\s*SELECT.*\\+.*[\"']\\s*\\)",
"file_extensions": [
"py",
"js",
"php"
],
"case_sensitive": false,
"multiline": false,
"capture_groups": [],
"severity": "Critical",
"category": "Security",
"examples": [
"query(\"SELECT * FROM users WHERE id = \" + user_id)"
],
"enabled": true
},
{
"name": "LARGE_FUNCTION",
"description": "Detect functions that might be too large",
"pattern": "fn\\s+\\w+[^{]*\\{(?:[^{}]*\\{[^{}]*\\})*[^{}]{500,}\\}",
"file_extensions": [
"rs"
],
"case_sensitive": true,
"multiline": true,
"capture_groups": [],
"severity": "Medium",
"category": "CodeQuality",
"examples": [
"Functions with more than 500 characters in body"
],
"enabled": true
}
]