Rule ID: javascript_third_parties_sentry
javascript_third_parties_sentry
Applicable Languages: Javascript
Weakness ID: CWE-201
Leaking sensitive data to third-party loggers like Sentry is a common cause of data leaks and can lead to data breaches.
Do ensure all sensitive data is removed when logging errors or events to Sentry
Sentry Docsarrow-up-right
CWE-201: Insertion of Sensitive Information Into Sent Dataarrow-up-right
OWASP Top 10: A01:2021 - Broken Access Controlarrow-up-right
To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our SAST TOOLarrow-up-right
Last updated 1 year ago