Leakage of sensitive data to ElasticSearch
Overview
Rule ID:
javascript_third_parties_elasticsearch
Applicable Languages: Javascript
Weakness ID: CWE-201
Description
Exposing sensitive data to third-party data tools is a common cause of data leaks and can result in data breaches.
Remediation Guidelines
Do ensure all sensitive data is removed when logging errors or events to ElasticSearch
References
Configuration
To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our SAST TOOL
PreviousLeakage of sensitive data to DatadogNextLeakage of sensitive data to Google Analytics (React)
Last updated