githubEdit

Objective-C rules

circle-info

Code analysis support for Objective-C is in Early Access and is available only with Enterprise plans. To enable the feature, see Snyk Previewarrow-up-right.

Each rule includes the following information.

  • Rule Name: The Snyk name of the rule.

  • CWE(s): The CWE numbersarrow-up-right that are covered by this rule.

  • Security Categories: The OWASP Top 10arrow-up-right (2021 edition) category to which the rule belongs to, if any, and if it is included in SANS 25arrow-up-right.

  • Autofixable: Security rules that are autofixable by Snyk Agent Fix. This information is included only for the supported programming languages.

Rule Name
CWE(s)
Security Categories
Autofixable

Clear Text Logging

CWE-200, CWE-312

OWASP:A01, OWASP:A04

No

Client-Side Request Forgery (CSRF)

CWE-918

Sans Top 25, OWASP:A10

No

Code Injection

CWE-94

OWASP:A03

No

Command Injection

CWE-78

Sans Top 25, OWASP:A03

No

Device Authentication Bypass

CWE-287

OWASP:A07

No

Improper Certificate Validation

CWE-295

OWASP:A07

No

Inadequate Encryption Strength

CWE-326

OWASP:A02

No

Information Exposure

CWE-200

OWASP:A01, OWASP:A04

No

Insecure Data Storage

CWE-922

No

Memory Corruption

CWE-822

OWASP:A03

No

Path Traversal

CWE-23

OWASP:A01

No

SQL Injection

CWE-89

Sans Top 25, OWASP:A03

No

Sensitive Cookie in HTTPS Session Without 'Secure' Attribute

CWE-614

OWASP:A05

No

Use of Hardcoded Cryptographic Key

CWE-321

OWASP:A02

No

Use of Insufficiently Random Values

CWE-330

OWASP:A02

No

Use of Password Hash With Insufficient Computational Effort

CWE-916

OWASP:A02

No

Use of a Broken or Risky Cryptographic Algorithm

CWE-327

OWASP:A02

No

XML External Entity (XXE) Injection

CWE-611

OWASP:A05

No

Last updated

Was this helpful?