New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support graphql resolver arguments as vulnerability source #3835
Conversation
Overall package sizeSelf size: 6.04 MB Dependency sizes
🤖 This report was automatically generated by heaviest-objects-in-the-universe |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #3835 +/- ##
=======================================
Coverage 85.33% 85.34%
=======================================
Files 243 243
Lines 10570 10576 +6
Branches 33 33
=======================================
+ Hits 9020 9026 +6
Misses 1550 1550 ☔ View full report in Codecov by Sentry. |
BenchmarksBenchmark execution time: 2024-02-15 08:39:48 Comparing candidate commit 3c3510d in PR branch Found 0 performance improvements and 0 performance regressions! Performance is the same for 258 metrics, 8 unstable metrics. |
53e6b19
to
8e10b69
Compare
276c18b
to
e239e0f
Compare
...dd-trace/test/appsec/iast/taint-tracking/sources/plugin.apollo-server-express.plugin.spec.js
Show resolved
Hide resolved
…in.apollo-server-express.plugin.spec.js Co-authored-by: Carles Capell <107924659+CarlesDD@users.noreply.github.com>
What does this PR do?
Adds support for Graphql resolver arguments to detect injection vulnerabilities.
Motivation
Improve our injection vulnerabilities detection.
Checklist
Additional Notes
Security
Datadog employees:
@DataDog/security-design-and-guidance.Unsure? Have a question? Request a review!
APPSEC-12046