Skip to content

Commit 033f8a4

Browse files
mary-georgiou-sonarsourcesonartech
authored andcommitted
NET-1040 Update RSPEC before 10.7 release
1 parent d9a8fd0 commit 033f8a4

35 files changed

+16
-119
lines changed

analyzers/rspec/cs/S1133.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"type": "CODE_SMELL",
44
"code": {
55
"impacts": {
6-
"MAINTAINABILITY": "LOW"
6+
"MAINTAINABILITY": "INFO"
77
},
88
"attribute": "CLEAR"
99
},

analyzers/rspec/cs/S1135.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"type": "CODE_SMELL",
44
"code": {
55
"impacts": {
6-
"MAINTAINABILITY": "LOW"
6+
"MAINTAINABILITY": "INFO"
77
},
88
"attribute": "COMPLETE"
99
},

analyzers/rspec/cs/S1227.html

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
<p>This rule is deprecated, and will eventually be removed.</p>
12
<h2>Why is this an issue?</h2>
23
<p><code>break;</code> is an unstructured control flow statement which makes code harder to read.</p>
34
<p>Ideally, every loop should have a single termination condition.</p>

analyzers/rspec/cs/S1227.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
},
88
"attribute": "CLEAR"
99
},
10-
"status": "ready",
10+
"status": "deprecated",
1111
"remediation": {
1212
"func": "Constant\/Issue",
1313
"constantCost": "10min"

analyzers/rspec/cs/S2115.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"type": "VULNERABILITY",
44
"code": {
55
"impacts": {
6-
"SECURITY": "HIGH"
6+
"SECURITY": "BLOCKER"
77
},
88
"attribute": "TRUSTWORTHY"
99
},

analyzers/rspec/cs/S2245.html

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -57,15 +57,10 @@ <h2>See</h2>
5757
<li> OWASP - <a href="https://owasp.org/Top10/A02_2021-Cryptographic_Failures/">Top 10 2021 Category A2 - Cryptographic Failures</a> </li>
5858
<li> OWASP - <a href="https://owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure">Top 10 2017 Category A3 - Sensitive Data
5959
Exposure</a> </li>
60-
<li> OWASP - <a href="https://mas.owasp.org/checklists/MASVS-CRYPTO/">Mobile AppSec Verification Standard - Cryptography Requirements</a> </li>
61-
<li> OWASP - <a href="https://owasp.org/www-project-mobile-top-10/2016-risks/m5-insufficient-cryptography">Mobile Top 10 2016 Category M5 -
62-
Insufficient Cryptography</a> </li>
6360
<li> CWE - <a href="https://cwe.mitre.org/data/definitions/338">CWE-338 - Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)</a>
6461
</li>
6562
<li> CWE - <a href="https://cwe.mitre.org/data/definitions/330">CWE-330 - Use of Insufficiently Random Values</a> </li>
6663
<li> CWE - <a href="https://cwe.mitre.org/data/definitions/326">CWE-326 - Inadequate Encryption Strength</a> </li>
6764
<li> CWE - <a href="https://cwe.mitre.org/data/definitions/1241">CWE-1241 - Use of Predictable Algorithm in Random Number Generator</a> </li>
68-
<li> Derived from FindSecBugs rule <a href="https://h3xstream.github.io/find-sec-bugs/bugs.htm#PREDICTABLE_RANDOM">Predictable Pseudo Random Number
69-
Generator</a> </li>
7065
</ul>
7166

analyzers/rspec/cs/S2245.json

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -29,12 +29,6 @@
2929
"OWASP": [
3030
"A3"
3131
],
32-
"OWASP Mobile": [
33-
"M5"
34-
],
35-
"MASVS": [
36-
"MSTG-CRYPTO-6"
37-
],
3832
"OWASP Top 10 2021": [
3933
"A2"
4034
],

analyzers/rspec/cs/S2755.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"type": "VULNERABILITY",
44
"code": {
55
"impacts": {
6-
"SECURITY": "HIGH"
6+
"SECURITY": "BLOCKER"
77
},
88
"attribute": "COMPLETE"
99
},

analyzers/rspec/cs/S4423.json

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -30,12 +30,6 @@
3030
"A3",
3131
"A6"
3232
],
33-
"OWASP Mobile": [
34-
"M3"
35-
],
36-
"MASVS": [
37-
"MSTG-NETWORK-2"
38-
],
3933
"OWASP Top 10 2021": [
4034
"A2",
4135
"A7"

analyzers/rspec/cs/S4426.html

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ <h3>How does this work?</h3>
116116
<h4>RSA (Rivest-Shamir-Adleman) and DSA (Digital Signature Algorithm)</h4>
117117
<p>The security of these algorithms depends on the difficulty of attacks attempting to solve their underlying mathematical problem.</p>
118118
<p>In general, a minimum key size of <strong>2048</strong> bits is recommended for both. It provides 112 bits of security. A key length of
119-
<strong>3072</strong> or <strong>4092</strong> should be preferred when possible.</p>
119+
<strong>3072</strong> or <strong>4096</strong> should be preferred when possible.</p>
120120
<h4>AES (Advanced Encryption Standard)</h4>
121121
<p>AES supports three key sizes: 128 bits, 192 bits and 256 bits. The security of the AES algorithm is based on the computational complexity of trying
122122
all possible keys.<br> A larger key size increases the number of possible keys and makes exhaustive search attacks computationally infeasible.
@@ -182,9 +182,6 @@ <h3>Standards</h3>
182182
Exposure</a> </li>
183183
<li> OWASP - <a href="https://owasp.org/www-project-top-ten/2017/A6_2017-Security_Misconfiguration">Top 10 2017 Category A6 - Security
184184
Misconfiguration</a> </li>
185-
<li> OWASP - <a href="https://mas.owasp.org/checklists/MASVS-CRYPTO/">Mobile AppSec Verification Standard - Cryptography Requirements</a> </li>
186-
<li> OWASP - <a href="https://owasp.org/www-project-mobile-top-10/2016-risks/m5-insufficient-cryptography">Mobile Top 10 2016 Category M5 -
187-
Insufficient Cryptography</a> </li>
188185
<li> <a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-131Ar1.pdf">NIST 800-131A</a> - Recommendation for Transitioning the
189186
Use of Cryptographic Algorithms and Key Lengths </li>
190187
<li> CWE - <a href="https://cwe.mitre.org/data/definitions/326">CWE-326 - Inadequate Encryption Strength</a> </li>

0 commit comments

Comments
 (0)