Loading...
Every check Sekrd runs, grouped by OWASP Top 10 2021 category. Every rule is mapped to a MITRE CWE, an OWASP ASVS 4.0 requirement, and at least one authoritative reference (OWASP cheat sheet, MDN, RFC, or vendor documentation).
This catalog is what distinguishes a security scanner from a regex tool. Findings from Sekrd cite these entries so auditors and engineers can verify the reasoning independently.
Showing 99 of 99 rules
cookie-no-samesiteCWE-1275ASVS V3.4.3firebase-firestore-publicCWE-284ASVS V4.1.1Firestore collection publicly readable
firebase-rtdb-publicCWE-284ASVS V4.1.1Firebase Realtime Database publicly readable
firebase-rtdb-read-openCWE-284ASVS V4.1.1Realtime Database allows public read access
firebase-rtdb-test-modeCWE-284ASVS V4.1.1Realtime Database rules in test mode (allow all)
firebase-rtdb-write-openCWE-284ASVS V4.1.1Realtime Database allows public write access
firebase-rules-openCWE-284ASVS V4.1.1firebase-storage-publicCWE-284ASVS V4.1.1Firebase Cloud Storage bucket publicly listable
form-no-csrfCWE-352ASVS V13.2.3idor-sequential-idCWE-639ASVS V4.2.1Potential IDOR via sequential IDs
js-clientside-auth-guardCWE-602ASVS V1.4.1Client-side only auth guard detected — bypassable via dev tools
js-clientside-role-checkCWE-602ASVS V1.4.1Role/permission check in client JavaScript — privilege escalation risk
js-internal-urlsCWE-200ASVS V14.3.3js-postmessage-no-originCWE-346ASVS V13.1.5postMessage listener without origin validation
missing-referrer-policyCWE-200ASVS V14.4.6Missing Referrer-Policy header
network-influxdb-exposedCWE-200ASVS V1.14.1InfluxDB admin port exposed
network-zookeeper-exposedCWE-200ASVS V1.14.1ZooKeeper port exposed
open-redirectCWE-601ASVS V5.1.5Open redirect
open-redirect-jsCWE-601ASVS V5.1.5Open redirect (JavaScript)
supabase-rls-bypassCWE-284ASVS V4.1.1unprotected-api-endpointCWE-306ASVS V1.4.1wordpress-rest-api-openCWE-284WordPress REST API fully accessible
cookie-no-secureCWE-614ASVS V3.4.1dmarc-policy-noneCWE-290DMARC policy set to 'none' — not enforcing
dockerfile-secret-in-envCWE-798ASVS V2.10.1Secret baked into image via ENV/ARG
hsts-no-subdomainsCWE-319ASVS V9.1.2HSTS missing includeSubDomains directive
infra-no-dmarcCWE-290ASVS V14.2.1No DMARC record — email spoofing not blocked
infra-no-spfCWE-290ASVS V14.2.1No SPF record — email spoofing possible
js-auth-token-localstorageCWE-922ASVS V3.1.1Auth token stored in localStorage — XSS leads to account takeover
js-pii-in-storageCWE-312ASVS V3.1.1PII stored in browser storage
missing-hstsCWE-319ASVS V9.1.2Missing Strict-Transport-Security (HSTS) header
secret-high-entropyCWE-200ASVS V2.10.1High-entropy token detected
secret-pattern-matchCWE-798ASVS V2.10.1Potential secret detected in client code
site-not-httpsCWE-319ASVS V9.1.1Site not using HTTPS
stripe-live-secret-in-clientCWE-798ASVS V14.3.2Stripe live secret key exposed in client code
tls-1-0-supportedCWE-327ASVS V9.1.3Server supports TLS 1.0 — deprecated and insecure
tls-1-1-supportedCWE-327ASVS V9.1.3Server supports TLS 1.1 — deprecated
tls-cert-expiredCWE-295ASVS V9.1.1TLS certificate has expired
tls-cert-validation-failedCWE-295ASVS V9.1.1TLS certificate validation failed
csp-unsafe-evalCWE-95ASVS V14.4.1CSP allows 'unsafe-eval'
csp-unsafe-inlineCWE-79ASVS V14.4.1CSP allows 'unsafe-inline' in script-src
js-document-writeCWE-79ASVS V5.3.3document.write() used — DOM manipulation risk
js-eval-dynamicCWE-95ASVS V5.3.7js-innerhtml-dynamicCWE-79ASVS V5.3.3sqli-error-basedCWE-89ASVS V5.3.4SQL injection (error-based)
xss-reflectedCWE-79ASVS V5.3.3Reflected XSS
cors-reflected-credsCWE-942ASVS V14.5.3CORS reflects arbitrary origin with credentials
cors-reflected-originCWE-942ASVS V14.5.3CORS reflects arbitrary origin
cors-wildcard-credsCWE-942ASVS V14.5.3CORS wildcard with credentials
csp-broad-script-srcCWE-693ASVS V14.4.1CSP script-src allows overly broad sources
csp-no-object-srcCWE-693ASVS V14.4.1CSP missing object-src restriction
csp-report-onlyCWE-693ASVS V14.4.1CSP is report-only, not enforced
dockerfile-apt-no-recommendsCWE-1037ASVS V14.2.5apt-get install without --no-install-recommends
dockerfile-no-userCWE-250ASVS V14.2.1Dockerfile has no USER directive
dockerfile-root-userCWE-250ASVS V14.2.1Container runs as root
dockerfile-sudoCWE-269ASVS V14.2.1Dockerfile invokes sudo
env-file-exposedCWE-538ASVS V14.3.2.env file publicly accessible
error-page-leakCWE-209ASVS V7.4.1Error page leaks implementation details
js-sourcemap-exposedCWE-540ASVS V14.3.2JavaScript source map exposed
js-sourcemap-referenceCWE-540ASVS V14.3.2Source map reference found in JavaScript
missing-coopCWE-1021ASVS V14.4.7Missing Cross-Origin-Opener-Policy header
missing-corpCWE-1021ASVS V14.4.7Missing Cross-Origin-Resource-Policy header
missing-cspCWE-693ASVS V14.4.1No Content-Security-Policy header
missing-permissions-policyCWE-693ASVS V14.4.5Missing Permissions-Policy header
missing-x-content-type-optionsCWE-116ASVS V14.4.4Missing X-Content-Type-Options: nosniff
missing-xfoCWE-1021ASVS V14.4.7Missing X-Frame-Options header
network-elasticsearch-exposedCWE-284ASVS V1.14.1Elasticsearch HTTP API exposed to the public internet
network-kafka-exposedCWE-284ASVS V1.14.1Kafka broker port exposed
network-memcached-exposedCWE-306ASVS V1.14.1Memcached port exposed to the public internet
network-mysql-exposedCWE-284ASVS V1.14.1MySQL port exposed to the public internet
network-postgresql-exposedCWE-284ASVS V1.14.1PostgreSQL port exposed to the public internet
network-rabbitmq-amqp-exposedCWE-284ASVS V1.14.1RabbitMQ AMQP broker exposed
network-rabbitmq-mgmt-exposedCWE-284ASVS V1.14.1RabbitMQ management UI exposed
server-version-disclosedCWE-200ASVS V14.3.1Server software version disclosed
via-header-disclosedCWE-200ASVS V14.3.1Proxy software disclosed in Via header
cookie-no-httponlyCWE-1004ASVS V3.4.2network-couchdb-exposedCWE-284ASVS V1.14.1CouchDB admin port exposed
network-mongodb-exposedCWE-306ASVS V1.14.1MongoDB port exposed to the public internet
network-neo4j-exposedCWE-521ASVS V1.14.1Neo4j Browser port exposed
network-redis-exposedCWE-306ASVS V1.14.1Redis port exposed to the public internet
supabase-email-confirm-offCWE-287ASVS V2.2.7Email confirmation disabled
supabase-phone-confirm-offCWE-287ASVS V2.2.7Phone confirmation disabled
wordpress-bruteforce-chainCWE-307WordPress brute-force attack chain: admin username + exposed login
wordpress-login-exposedCWE-284WordPress login page publicly accessible
wordpress-user-enumCWE-203WordPress user enumeration via REST API