|
| 1 | +<?xml version="1.0"?> |
| 2 | +<RuleSet Name="Microsoft SDL Roslyn Rules - v9.1" |
| 3 | + Description="Microsoft SDL Roslyn Rules - v9.1" |
| 4 | + ToolsVersion="14.0"> |
| 5 | + |
| 6 | + <Rules AnalyzerId="Microsoft.NetCore.Analyzers" RuleNamespace="Microsoft.NetCore.Analyzers"> |
| 7 | + <Rule Id="CA2301" Action="Error" /> <!-- Do not call BinaryFormatter.Deserialize without first setting BinaryFormatter.Binder --> |
| 8 | + <Rule Id="CA2302" Action="Error" /> <!-- Ensure BinaryFormatter.Binder is set before calling BinaryFormatter.Deserialize --> |
| 9 | + <Rule Id="CA2305" Action="Error" /> <!-- Do not use insecure deserializer LosFormatter --> |
| 10 | + <Rule Id="CA2311" Action="Error" /> <!-- Do not deserialize without first setting NetDataContractSerializer.Binder --> |
| 11 | + <Rule Id="CA2312" Action="Error" /> <!-- Ensure NetDataContractSerializer.Binder is set before deserializing --> |
| 12 | + <Rule Id="CA2315" Action="Error" /> <!-- Do not use insecure deserializer ObjectStateFormatter --> |
| 13 | + <Rule Id="CA2321" Action="Error" /> <!-- Do not deserialize with JavaScriptSerializer using a SimpleTypeResolver --> |
| 14 | + <Rule Id="CA2327" Action="Error" /> <!-- Do not use insecure JsonSerializerSettings --> |
| 15 | + <Rule Id="CA2328" Action="Error" /> <!-- Ensure that JsonSerializerSettings are secure --> |
| 16 | + <Rule Id="CA2329" Action="Error" /> <!-- Do not deserialize with JsonSerializer using an insecure configuration --> |
| 17 | + <Rule Id="CA2330" Action="Error" /> <!-- Ensure that JsonSerializer has a secure configuration when deserializing --> |
| 18 | + <Rule Id="CA3061" Action="Error" /> <!-- Do Not Add Schema By URL --> |
| 19 | + <Rule Id="CA5350" Action="Error" /> <!-- Do Not Use Weak Cryptographic Algorithms --> |
| 20 | + <Rule Id="CA5351" Action="Error" /> <!-- Do Not Use Broken Cryptographic Algorithms --> |
| 21 | + <Rule Id="CA5358" Action="Error" /> <!-- Review cipher mode usage with cryptography experts --> |
| 22 | + <Rule Id="CA5361" Action="Error" /> <!-- Do Not Disable SChannel Use of Strong Crypto --> |
| 23 | + <Rule Id="CA5364" Action="Error" /> <!-- Do Not Use Deprecated Security Protocols --> |
| 24 | + <Rule Id="CA5378" Action="Error" /> <!-- Do not disable ServicePointManagerSecurityProtocols --> |
| 25 | + <Rule Id="CA5397" Action="Error" /> <!-- Do not use deprecated SslProtocols values --> |
| 26 | + <Rule Id="CA2322" Action="Info" /> <!-- Ensure JavaScriptSerializer is not initialized with SimpleTypeResolver before deserializing --> |
| 27 | + <Rule Id="CA3001" Action="Info" /> <!-- Review code for SQL injection vulnerabilities --> |
| 28 | + <Rule Id="CA3002" Action="Info" /> <!-- Review code for XSS vulnerabilities --> |
| 29 | + <Rule Id="CA3003" Action="Info" /> <!-- Review code for file path injection vulnerabilities --> |
| 30 | + <Rule Id="CA3004" Action="Info" /> <!-- Review code for information disclosure vulnerabilities --> |
| 31 | + <Rule Id="CA3005" Action="Info" /> <!-- Review code for LDAP injection vulnerabilities --> |
| 32 | + <Rule Id="CA3006" Action="Info" /> <!-- Review code for process command injection vulnerabilities --> |
| 33 | + <Rule Id="CA3007" Action="Info" /> <!-- Review code for open redirect vulnerabilities --> |
| 34 | + <Rule Id="CA3008" Action="Info" /> <!-- Review code for XPath injection vulnerabilities --> |
| 35 | + <Rule Id="CA3009" Action="Info" /> <!-- Review code for XML injection vulnerabilities --> |
| 36 | + <Rule Id="CA3010" Action="Info" /> <!-- Review code for XAML injection vulnerabilities --> |
| 37 | + <Rule Id="CA3011" Action="Info" /> <!-- Review code for DLL injection vulnerabilities --> |
| 38 | + <Rule Id="CA3012" Action="Info" /> <!-- Review code for regex injection vulnerabilities --> |
| 39 | + <Rule Id="CA5359" Action="Info" /> <!-- Do Not Disable Certificate Validation --> |
| 40 | + <Rule Id="CA5380" Action="Info" /> <!-- Do Not Add Certificates To Root Store --> |
| 41 | + <Rule Id="CA5381" Action="Info" /> <!-- Ensure Certificates Are Not Added To Root Store --> |
| 42 | + <Rule Id="CA5386" Action="Info" /> <!-- Avoid hardcoding SecurityProtocolType value --> |
| 43 | + <Rule Id="CA5391" Action="Info" /> <!-- Use antiforgery tokens in ASP.NET Core MVC controllers --> |
| 44 | + <Rule Id="CA5395" Action="Info" /> <!-- Miss HttpVerb attribute for action methods --> |
| 45 | + <Rule Id="CA5396" Action="Info" /> <!-- Set HttpOnly to true for HttpCookie --> |
| 46 | + <Rule Id="CA5398" Action="Info" /> <!-- Avoid hardcoded SslProtocols values --> |
| 47 | + </Rules> |
| 48 | + |
| 49 | + <Rules AnalyzerId="Microsoft.NetFramework.Analyzers" RuleNamespace="Microsoft.NetFramework.Analyzers"> |
| 50 | + <Rule Id="CA2153" Action="Error" /> <!-- Do Not Catch Corrupted State Exceptions --> |
| 51 | + <Rule Id="CA3075" Action="Error" /> <!-- Insecure DTD processing in XML --> |
| 52 | + <Rule Id="CA3147" Action="Error" /> <!-- Mark Verb Handlers With Validate Antiforgery Token --> |
| 53 | + </Rules> |
| 54 | + |
| 55 | + <Rules AnalyzerId="Microsoft.NetFramework.CSharp.Analyzers" RuleNamespace="Microsoft.NetFramework.CSharp.Analyzers"> |
| 56 | + <Rule Id="CA3076" Action="Error" /> <!-- Insecure XSLT script processing. --> |
| 57 | + <Rule Id="CA3077" Action="Error" /> <!-- Insecure Processing in API Design, XmlDocument and XmlTextReader --> |
| 58 | + </Rules> |
| 59 | + |
| 60 | + <Rules AnalyzerId="Microsoft.NetFramework.VisualBasic.Analyzers" RuleNamespace="Microsoft.NetFramework.VisualBasic.Analyzers"> |
| 61 | + <Rule Id="CA3076" Action="Error" /> <!-- Insecure XSLT script processing. --> |
| 62 | + <Rule Id="CA3077" Action="Error" /> <!-- Insecure Processing in API Design, XmlDocument and XmlTextReader --> |
| 63 | + </Rules> |
| 64 | +</RuleSet> |
0 commit comments