Rust rules
Code analysis support for Rust is in Early Access and is available only with Enterprise plans. To enable the feature, see Snyk Preview.
Each rule includes the following information.
Rule Name: The Snyk name of the rule.
CWE(s): The CWE numbers that are covered by this rule.
Security Categories: The OWASP Top 10 (2021 edition) category to which the rule belongs to, if any, and if it is included in SANS 25.
Autofixable: Security rules that are autofixable by Snyk Agent Fix. This information is included only for the supported programming languages.
Command Injection
CWE-78
Sans Top 25, OWASP:A03
No
Cross-site Scripting (XSS)
CWE-79
Sans Top 25, OWASP:A03
No
Hardcoded Secret
CWE-547
OWASP:A05
No
Inadequate Padding for Public Key Encryption
CWE-326
OWASP:A02
No
Insecure File Permissions
CWE-732
OWASP:A05
No
Observable Timing Discrepancy
CWE-208
OWASP:A02
No
Open Redirect
CWE-601
OWASP:A01
No
Origin Validation Error
CWE-346, CWE-942
OWASP:A05
No
Path Traversal
CWE-23
OWASP:A01
No
SQL Injection
CWE-89
Sans Top 25, OWASP:A03
No
Server-Side Request Forgery (SSRF)
CWE-918
Sans Top 25, OWASP:A10
No
Use of Hardcoded Passwords
CWE-259, CWE-798
Sans Top 25, OWASP:A07
No
Use of Insufficiently Random Values
CWE-330
OWASP:A02
No
Use of Password Hash With Insufficient Computational Effort
CWE-916
OWASP:A02
No
Use of a Broken or Risky Cryptographic Algorithm
CWE-327
OWASP:A02
No
Last updated
Was this helpful?

