Leakage of sensitive data to Google Tag Manager

Overview

  • Rule ID: javascript_third_parties_google_tag_manager

  • Applicable Languages: Javascript

  • Weakness ID: CWE-201

Description

Exposing sensitive data to third-party services and tools like Google Tag Manager is a common cause of data leaks and can result in data breaches.

Remediation Guidelines

  • Do ensure all sensitive data is removed when logging errors or events to Airbrake

  • Do use unique identifiers from the database if you really need to identify users.

    datalayer.push({
      user: {
       uuid: user.uuid
      }
    })

References

Configuration

To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our SAST TOOL

Last updated