Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
57 changes: 57 additions & 0 deletions Misconfigured-HTTP-Headers/MustContainCORSHeaders.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,57 @@
id: MUST_CONTAIN_CORS_RESPONSE_HEADERS
info:
name: Missing CORS Response Headers
description: "The response does not contain some CORS security headers."
Copy link
Preview

Copilot AI Sep 19, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The description contains a redundant word 'security'. It should read 'some CORS headers' instead of 'some CORS security headers' to be consistent with the pattern.

Suggested change
description: "The response does not contain some CORS security headers."
description: "The response does not contain some CORS headers."

Copilot uses AI. Check for mistakes.

details: >
"These headers control how and when resources can be accessed from other origins. They isolate your pages from other sites unless cross-origin access is explicitly allowed. This creates a secure context required for certain browser features."
impact: "Stops cross-origin data leaks and side-channel attacks."
category:
name: MHH
shortName: Misconfigured HTTP Headers
displayName: Misconfigured HTTP Headers (MHH)
subCategory: MUST_CONTAIN_RESPONSE_HEADERS
severity: LOW
tags:
- Business logic
- OWASP top 10
- HackerOne top 10
references:
- "https://web.dev/security-headers/"
- "https://www.keycdn.com/blog/http-security-headers"
- "https://www.invicti.com/white-papers/whitepaper-http-security-headers"
cwe:
- CWE-693
cve:
- CVE-2022-41915
- CVE-2022-37436

attributes:
nature: INTRUSIVE
plan: STANDARD
duration: FAST


api_selection_filters:
response_code:
gte: 200
lt: 300
method:
neq: "OPTIONS"
execute:
type: single
requests:
- req: []

validate:
response_code:
gte: 200
lt: 300
response_headers:
for_one:
key:
not_contains:
- Cross-Origin-Embedder-Policy
- Cross-Origin-Opener-Policy
- Cross-Origin-Resource-Policy
strategy:
run_once: /
58 changes: 58 additions & 0 deletions Misconfigured-HTTP-Headers/MustContainCachingHeaders.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
id: MUST_CONTAIN_RESPONSE_HEADERS_CACHING
info:
name: Missing Caching & Privacy Control Response Headers
description: "The response does not contain some Caching & Privacy Control headers."
details: >
"The endpoint seems to be missing some HTTP security headers which provide yet another layer of security by helping to mitigate attacks and security vulnerabilities.<br>"
"<b>Background:</b> Whenever a browser requests a page from a web server, the server responds with the content along with Caching & Privacy Control response headers. Some of these headers contain content meta data such as the Content-Encoding, Cache-Control, status codes, etc. Along with these are also HTTP security headers that tell your browser how to behave when handling your website's content. For example, by using the Strict-Transport-Security you can force the browser to communicate solely over HTTPS."
impact: "This information can be used to facilitate more sophisticated attacks on your application."
category:
name: MHH
shortName: Misconfigured HTTP Headers
displayName: Misconfigured HTTP Headers (MHH)
subCategory: MUST_CONTAIN_RESPONSE_HEADERS
severity: LOW
tags:
- Business logic
- OWASP top 10
- HackerOne top 10
references:
- "https://web.dev/security-headers/"
- "https://www.keycdn.com/blog/http-security-headers"
- "https://www.invicti.com/white-papers/whitepaper-http-security-headers"
cwe:
- CWE-693
cve:
- CVE-2022-41915
- CVE-2022-37436

attributes:
nature: INTRUSIVE
plan: STANDARD
duration: FAST


api_selection_filters:
response_code:
gte: 200
lt: 300
method:
neq: "OPTIONS"
execute:
type: single
requests:
- req: []

validate:
response_code:
gte: 200
lt: 300
response_headers:
for_one:
key:
not_contains:
- Cache-Control
- Clear-Site-Data
- Pragma
strategy:
run_once: /
58 changes: 58 additions & 0 deletions Misconfigured-HTTP-Headers/MustContainContentSecurityHeaders.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
id: MUST_CONTAIN_CONTENT_SEC_RESPONSE_HEADERS
info:
name: Missing Content & Framing Security Response Headers
description: "The response does not contain some Content & Framing Security security headers."
Copy link
Preview

Copilot AI Sep 19, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There is a redundant word 'security' in the description. It should read 'some Content & Framing Security headers' instead of 'some Content & Framing Security security headers'.

Suggested change
description: "The response does not contain some Content & Framing Security security headers."
description: "The response does not contain some Content & Framing Security headers."

Copilot uses AI. Check for mistakes.

details: >
"These headers prevent untrusted scripts, styles, or content from executing in your pages. They stop MIME type sniffing and block your pages from being embedded in iframes. This helps reduce attack vectors like XSS and clickjacking."
impact: "Blocks XSS, clickjacking, and content injection attacks."
category:
name: MHH
shortName: Misconfigured HTTP Headers
displayName: Misconfigured HTTP Headers (MHH)
subCategory: MUST_CONTAIN_RESPONSE_HEADERS
severity: LOW
tags:
- Business logic
- OWASP top 10
- HackerOne top 10
references:
- "https://web.dev/security-headers/"
- "https://www.keycdn.com/blog/http-security-headers"
- "https://www.invicti.com/white-papers/whitepaper-http-security-headers"
cwe:
- CWE-693
cve:
- CVE-2022-41915
- CVE-2022-37436

attributes:
nature: INTRUSIVE
plan: STANDARD
duration: FAST


api_selection_filters:
response_code:
gte: 200
lt: 300
method:
neq: "OPTIONS"
execute:
type: single
requests:
- req: []

validate:
response_code:
gte: 200
lt: 300
response_headers:
for_one:
key:
not_contains:
- Content-Security-Policy
- X-Content-Type-Options
- X-Frame-Options
- X-Permitted-Cross-Domain-Policies
strategy:
run_once: /
55 changes: 55 additions & 0 deletions Misconfigured-HTTP-Headers/MustContainHSTSHeaders.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
id: MUST_CONTAIN_TRANSPORT_SEC_RESPONSE_HEADERS
info:
name: Missing Transport Security Response Headers
description: "The response does not contain Transport Security headers."
Copy link
Preview

Copilot AI Sep 19, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The description should be consistent with other files. It should read 'some Transport Security headers' to match the pattern used in other files where only partial header presence is checked.

Suggested change
description: "The response does not contain Transport Security headers."
description: "The response does not contain some Transport Security headers."

Copilot uses AI. Check for mistakes.

details: >
"This category enforces the use of secure HTTPS connections between the client and server. It ensures that once a user connects securely, all future requests remain encrypted. This protects against downgrade attacks and interception of unencrypted traffic."
impact: "Blocks man-in-the-middle attacks over insecure channels."
category:
name: MHH
shortName: Misconfigured HTTP Headers
displayName: Misconfigured HTTP Headers (MHH)
subCategory: MUST_CONTAIN_RESPONSE_HEADERS
severity: LOW
tags:
- Business logic
- OWASP top 10
- HackerOne top 10
references:
- "https://web.dev/security-headers/"
- "https://www.keycdn.com/blog/http-security-headers"
- "https://www.invicti.com/white-papers/whitepaper-http-security-headers"
cwe:
- CWE-693
cve:
- CVE-2022-41915
- CVE-2022-37436

attributes:
nature: INTRUSIVE
plan: STANDARD
duration: FAST


api_selection_filters:
response_code:
gte: 200
lt: 300
method:
neq: "OPTIONS"
execute:
type: single
requests:
- req: []

validate:
response_code:
gte: 200
lt: 300
response_headers:
for_one:
key:
not_contains:
- Strict-Transport-Security
strategy:
run_once: /
56 changes: 56 additions & 0 deletions Misconfigured-HTTP-Headers/MustContainPrivacyFeatureHeaders.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
id: MUST_CONTAIN_PRIVACY_RESPONSE_HEADERS
info:
name: Missing Privacy & Feature Restriction Response Headers
description: "The response does not contain Privacy & Feature Restriction security headers."
Copy link
Preview

Copilot AI Sep 19, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The description contains a grammatical error. It should read 'some Privacy & Feature Restriction security headers' to match the pattern used in other files where only partial header presence is checked.

Suggested change
description: "The response does not contain Privacy & Feature Restriction security headers."
description: "The response does not contain some Privacy & Feature Restriction security headers."

Copilot uses AI. Check for mistakes.

details: >
"These headers limit what referrer information is shared when navigating to other sites. They also restrict access to powerful browser APIs like camera, microphone, and geolocation. This reduces the exposure of sensitive user data."
impact: "Minimizes data leaks and reduces browser attack surface."
category:
name: MHH
shortName: Misconfigured HTTP Headers
displayName: Misconfigured HTTP Headers (MHH)
subCategory: MUST_CONTAIN_RESPONSE_HEADERS
severity: LOW
tags:
- Business logic
- OWASP top 10
- HackerOne top 10
references:
- "https://web.dev/security-headers/"
- "https://www.keycdn.com/blog/http-security-headers"
- "https://www.invicti.com/white-papers/whitepaper-http-security-headers"
cwe:
- CWE-693
cve:
- CVE-2022-41915
- CVE-2022-37436

attributes:
nature: INTRUSIVE
plan: STANDARD
duration: FAST


api_selection_filters:
response_code:
gte: 200
lt: 300
method:
neq: "OPTIONS"
execute:
type: single
requests:
- req: []

validate:
response_code:
gte: 200
lt: 300
response_headers:
for_one:
key:
not_contains:
- Permissions-Policy
- Referrer-Policy
strategy:
run_once: /
2 changes: 1 addition & 1 deletion Misconfigured-HTTP-Headers/MustContainResponseHeaders.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ attributes:
plan: STANDARD
duration: FAST


inactive: true
api_selection_filters:
response_code:
gte: 200
Expand Down