Leakage of sensitive data in local storage
Last updated
Last updated
Rule ID: javascript_lang_session
Applicable Languages: Javascript
Weakness ID: CWE-312
Storing sensitive data in localStorage presents a security risk. This vulnerability arises when sensitive information is kept in the browser's local storage, leaving it exposed to unauthorized access.
Avoid storing sensitive data in localStorage
. This practice exposes sensitive information to potential security vulnerabilities.
Use server-based session storage solutions to keep session data secure. This method reduces the risk of sensitive data exposure.
Store only non-sensitive data in localStorage
, such as a unique identifier, to mitigate security risks.
To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our