Deprecate S6299: Disabling Vue.js built-in escaping is security-sensitive #4541
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This rule is not consistent with the rule quality the AppSec squad enforces:
The rule risks a non-negligible number of FPs for the chance of having TPs.
It is non-productive as TPs would get drowned in between FPs. we lose credibility and engagement even if we do find TPs
The rule is hardly actionable as is, as it only shows a “sink”, not the rest of where the variable is coming from, to check if it is an actual problem
Security Hotspots are meant to raise issues that require data that cannot be put in the same code base, such as organizational needs. The why of the rule seems related to the fact that the analyzer does not support VueJS and the specificator still wanted to make a move.
This is not a standard practice at AppSec and does not follow the company delivery model
Review
A dedicated reviewer checked the rule description successfully for: