Secbez Docs

Detection Categories

Vulnerability classes detected by Secbez — injection, XSS, access control, IDOR/BOLA, business logic, transaction integrity, secrets, crypto, SSRF.

Secbez detects vulnerabilities across the categories below. Rule IDs follow the stable SEC.<CATEGORY>.<RULE> namespace and are public identifiers — baseline matching, suppression rules, and analytics key off them.

Injection

TypeDescription
SQL injectionUser input in DB queries without parameterization (raw queries, builders, ORM escape hatches like $queryRaw, knex.raw, query()).
Command injectionUser input passed to exec, execSync, spawn(..., {shell: true}), subprocess.*(shell=True), or equivalent.
Template injection (SSTI)User input rendered by a server-side template engine (Jinja, Handlebars, EJS, Twig) without escaping.
DeserializationUnsafe deserialization of attacker-controlled data (pickle.loads, unserialize, vulnerable JSON-to-class mapping).

Cross-site scripting (XSS)

TypeDescription
Reflected XSSUser input reflected back in HTTP responses without sanitization.
Stored XSSUser input stored and later rendered to other users.
DOM-based XSSClient-side JS that writes user input to the DOM unsafely (innerHTML, outerHTML, insertAdjacentHTML, document.write).
Framework XSSdangerouslySetInnerHTML (React), v-html (Vue), bypassSecurityTrustHtml (Angular) on untrusted input.

Access control

TypeDescription
Broken access controlMissing or insufficient authorization checks on sensitive operations.
IDOR / BOLAUser-controlled IDs reaching DB sinks without an ownership predicate. Object- and function-level.
Privilege escalationUsers can elevate their own role or permissions, vertically or horizontally.
Missing authenticationSensitive endpoints reachable without any authentication step.
Tenant isolationOperations not bound to a server-derived tenant or owner identity.

Authentication and protocol

TypeDescription
JWT misuseAlgorithm none, missing signature verification, weak secret, expired-but-accepted, missing claim checks.
OAuth / SSO callbackState / PKCE missing, open redirector, unverified iss/aud.
Session managementPredictable IDs, missing rotation on auth, missing fixation protection.
Cookie flagsMissing Secure, HttpOnly, SameSite, or scoped paths on session cookies.

Business logic and transactions

TypeDescription
Race conditions / TOCTOUTime-of-check vs. time-of-use windows in state-changing flows.
Double-spendConcurrent execution paths allow the same value to be spent more than once.
Workflow bypassSteps in a multi-step process can be skipped or replayed.
Replay attacksIdempotency keys / nonces missing on sensitive operations.
Invariant violationDomain invariants (balance ≥ 0, quantity > 0) not enforced server-side.

Server-side request forgery (SSRF)

User-controlled URLs reaching outbound HTTP clients without an allowlist or scheme/host check, including indirect SSRF through URL parsers.

Secrets

Rule IDDetects
SEC.SECRETS.GITHUB_TOKENGitHub PATs, OAuth tokens
SEC.SECRETS.AWS_ACCESS_KEY_IDAWS access key IDs
SEC.SECRETS.AWS_SECRET_KEYAWS secret access keys
SEC.SECRETS.GOOGLE_API_KEYGoogle API keys
SEC.SECRETS.PEM_PRIVATE_KEYPEM-encoded private keys
SEC.SECRETS.STRIPE_KEYStripe secret / publishable keys
SEC.SECRETS.SLACK_WEBHOOKSlack webhook URLs
SEC.SECRETS.SENDGRID_KEYSendGrid API keys
SEC.SECRETS.GENERIC_SECRETEntropy-based heuristic catch-all

The secrets detector combines regex matching with Shannon entropy analysis (MIN_SECRET_ENTROPY = 3.5, HIGH_ENTROPY_THRESHOLD = 4.0) and applies placeholder heuristics (changeme, xxx, your-key-here) to suppress obvious non-secrets.

Cryptographic misuse

  • Weak algorithms (MD5, SHA-1 for passwords, single DES, RC4).
  • ECB mode for block ciphers on multi-block plaintext.
  • Hardcoded IVs / keys.
  • Predictable randomness (Math.random, random.random) used for security purposes.
  • Missing constant-time comparison for secret material.

Rule ID naming

SEC.<CATEGORY>.<RULE_NAME>
PrefixMeaning
SEC.SECRETS.*Secret leaks
SEC.SQLI.*SQL injection
SEC.CMDI.*Command injection
SEC.XSS.*Cross-site scripting
SEC.SSTI.*Server-side template injection
SEC.AUTHZ.*Authorization / access control
SEC.AUTHN.*Authentication / protocol
SEC.RCE.*Remote code execution
SEC.IDOR.*Insecure direct object reference
SEC.BL.*Business logic
SEC.TXN.*Transaction integrity
SEC.SSRF.*Server-side request forgery
SEC.CRYPTO.*Cryptographic misuse

Rule IDs are stable. Once published, they are not renamed, because baseline matching and suppression rules depend on them.

On this page