-
Notifications
You must be signed in to change notification settings - Fork 440
feat(iast): security controls #13655
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
|
Bootstrap import analysisComparison of import times between this PR and base. SummaryThe average import time from this PR is: 276 ± 4 ms. The average import time from base is: 278 ± 2 ms. The import time difference between this PR and base is: -2.1 ± 0.1 ms. Import time breakdownThe following import paths have shrunk:
|
BenchmarksBenchmark execution time: 2025-06-17 13:04:12 Comparing candidate commit 808b772 in PR branch Found 1 performance improvements and 5 performance regressions! Performance is the same for 492 metrics, 6 unstable metrics. scenario:iastaspects-format_map_aspect
scenario:iastaspectsospath-ospathnormcase_aspect
scenario:iastaspectsospath-ospathsplitext_aspect
scenario:iastaspectssplit-splitlines_aspect
scenario:iastdjangostartup-tracer
scenario:telemetryaddmetric-1-distribution-metric-1-times
|
Handle IAST security controls custom validation and sanitization methods
Overview
The
DD_IAST_SECURITY_CONTROLS_CONFIGURATION
environment variable allows you to specify custom sanitizers and validators that IAST should recognize when analyzing your application for security vulnerabilities.Format
The configuration uses the following format:
Multiple security controls are separated by semicolons (
;
).Fields
INPUT_VALIDATOR
orSANITIZER
*
for all typesshlex
,django.utils.http
)Vulnerability Types
Supported vulnerability types:
COMMAND_INJECTION
/CMDI
CODE_INJECTION
SQL_INJECTION
/SQLI
XSS
HEADER_INJECTION
PATH_TRAVERSAL
SSRF
UNVALIDATED_REDIRECT
INSECURE_COOKIE
NO_HTTPONLY_COOKIE
NO_SAMESITE_COOKIE
WEAK_CIPHER
WEAK_HASH
WEAK_RANDOMNESS
STACKTRACE_LEAK
Use
*
to apply to all vulnerability types.Examples
Basic Examples
Input Validator for Command Injection
Sanitizer for XSS
Multiple Vulnerability Types
All Vulnerability Types
Advanced Examples
Multiple Security Controls
Validator with Specific Parameter Positions
This validates only the 1st and 3rd parameters (0-based indexing).
Complex Configuration
How It Works
Input Validators
Sanitizers
Integration with Existing Controls
Your custom security controls work alongside the built-in IAST security controls:
shlex.quote
(Command injection sanitizer)html.escape
(XSS sanitizer)Checklist
Reviewer Checklist