Skip to content

Commit

Permalink
chore: update snapshots (#192)
Browse files Browse the repository at this point in the history
  • Loading branch information
cfabianski authored Dec 5, 2022
1 parent 0174c2c commit 5032b69
Showing 1 changed file with 87 additions and 9 deletions.
96 changes: 87 additions & 9 deletions integration/flags/.snapshots/TestInitCommand-init
Original file line number Diff line number Diff line change
Expand Up @@ -31,14 +31,14 @@ scan:
type: risk
languages:
- ruby
param_parenting: false
processors: []
patterns:
- pattern: |
Rails.application.configure do
config.force_ssl = false
end
filters: []
param_parenting: false
processors: []
root_singularize: false
root_lowercase: false
metavars: {}
Expand Down Expand Up @@ -278,12 +278,12 @@ scan:
type: risk
languages:
- ruby
param_parenting: false
processors: []
patterns:
- pattern: |
$_.verify_mode = OpenSSL::SSL::VERIFY_NONE
filters: []
param_parenting: false
processors: []
root_singularize: false
root_lowercase: false
metavars: {}
Expand Down Expand Up @@ -340,8 +340,8 @@ scan:
"category_group": category.group_name,
"filename": location.filename,
"line_number": location.line_number,
"parent_line_number": data_type.parent.line_number,
"parent_content": data_type.parent.content
"parent_line_number": location.parent.line_number,
"parent_content": location.parent.content
}
}

Expand All @@ -352,6 +352,41 @@ scan:
critical[item] {
item_in_data_category[[personal_data_group_uuid, item]]
}
insecure_communication_processing_sensitive_data:
query: |
medium = data.bearer.insecure_communication.medium
id: detect_rails_insecure_communication
name: Insecure communication
description: Insecure communication in an application processing sensitive data
level: ""
modules:
- path: policies/insecure_communication.rego
name: bearer.insecure_communication
content: |
package bearer.insecure_communication

import future.keywords

sensitive_data_group_uuid := "f6a0c071-5908-4420-bac2-bba28d41223e"

medium[item] {
some data_type in input.dataflow.data_types
some data_category in input.data_categories
data_category.uuid == data_type.category_uuid
data_category.group_uuid == sensitive_data_group_uuid

some detector in input.dataflow.risks
detector.detector_id == input.policy_id

location = detector.locations[_]
item := {
"category_group": data_category.group_name,
"filename": location.filename,
"line_number": location.line_number,
"parent_line_number": location.parent.line_number,
"parent_content": location.parent.content
}
}
insecure_smtp_processing_sensitive_data:
query: |
medium = data.bearer.insecure_smtp.medium
Expand All @@ -367,17 +402,24 @@ scan:

import future.keywords

sensitive_data_group_uuid := "f6a0c071-5908-4420-bac2-bba28d41223e"

medium[item] {
some data_type in input.dataflow.data_types
some data_category in input.data_categories
data_category.uuid == data_type.category_uuid
data_category.group_uuid == sensitive_data_group_uuid

some detector in input.dataflow.risks
detector.detector_id == input.policy_id

location = detector.locations[_]
item := {
"category_group": "Insecure communication",
"category_group": data_category.group_name,
"filename": location.filename,
"line_number": location.line_number,
"parent_line_number": location.line_number,
"parent_content": location.content
"parent_line_number": location.parent.line_number,
"parent_content": location.parent.content
}
}
jwt_leaks:
Expand Down Expand Up @@ -554,6 +596,42 @@ scan:
"parent_content": location.parent.content
}
}
ssl_certificate_verification_disabled:
query: |
medium = data.bearer.ssl_certificate_verification_disabled.medium
id: ssl_certificate_verification_disabled
name: SSL certificate verification disabled
description: SSL certificate verification disabled in an application processing sensitive data
level: ""
modules:
- path: policies/ssl_certificate_verification_disabled.rego
name: bearer.ssl_certificate_verification_disabled
content: |
package bearer.ssl_certificate_verification_disabled

import future.keywords

sensitive_data_group_uuid := "f6a0c071-5908-4420-bac2-bba28d41223e"

medium[item] {
some data_type in input.dataflow.data_types

some category in input.data_categories
category.uuid == data_type.category_uuid
category.group_uuid == sensitive_data_group_uuid

some detector in input.dataflow.risks
detector.detector_id == input.policy_id
location = detector.locations[_]

item = {
"category_group": category.group_name,
"filename": location.filename,
"line_number": location.line_number,
"parent_line_number": location.parent.line_number,
"parent_content": location.parent.content
}
}
quiet: false
skip-path: []
worker:
Expand Down

0 comments on commit 5032b69

Please sign in to comment.