hardcoded-credentials
Severity: ErrorCategory: Security Detects potential secrets hardcoded in source code.
Why this matters
Hardcoded credentials in source code get committed to version control, creating a security risk. Secrets should always be stored in environment variables or secure configuration systems.What it detects
The rule looks for string literals assigned to variables with credential-related names:passwordapikeyorapi_keysecrettokenprivatekeyorprivate_key
Examples
Bad: Hardcoded credentials
Bad: Hardcoded credentials
Good: Use environment variables
Good: Use environment variables
Safe values
The rule ignores placeholder values:- Empty strings
"your-api-key"or"YOUR_API_KEY""xxx","****","***"- Strings 3 characters or less
Location
apps/cli/src/rules/hardcoded-credentials.ts:1
no-sql-injection
Severity: ErrorCategory: Security Detects potential SQL injection vulnerabilities from concatenating user input into SQL queries.
Why this matters
User input concatenated directly into SQL queries can be exploited by attackers to execute malicious SQL. Always use parameterized queries or prepared statements.What it detects
The rule identifies:- Template literals containing SQL keywords with variables
- String concatenation with SQL keywords
SQL keywords detected
SELECT, INSERT, UPDATE, DELETE, DROP, CREATE, ALTER, FROM, WHERE
Examples
Bad: String concatenation in SQL
Bad: String concatenation in SQL
Good: Parameterized queries
Good: Parameterized queries
Location
apps/cli/src/rules/no-sql-injection.ts:1
no-unsafe-inner-html
Severity: ErrorCategory: Security Detects potential XSS (Cross-Site Scripting) vulnerabilities from using unsanitized user input in HTML.
Why this matters
Using unsanitized user input in HTML can lead to XSS attacks where attackers inject malicious scripts into your application.What it detects
The rule identifies unsafe HTML manipulation:- React’s
dangerouslySetInnerHTML - DOM properties:
innerHTML,outerHTML - DOM methods:
insertAdjacentHTML
Examples
Bad: Unsafe HTML insertion
Bad: Unsafe HTML insertion
Good: Safe alternatives
Good: Safe alternatives
Location
apps/cli/src/rules/no-unsafe-inner-html.ts:1
Best practices
Security checklist
- Store all secrets in environment variables
- Use parameterized queries for database operations
- Sanitize user input before rendering as HTML
- Never trust user input
- Review security warnings carefully before deploying