-
Notifications
You must be signed in to change notification settings - Fork 441
feat(iast): security controls #13655
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(iast): security controls #13655
Conversation
|
Bootstrap import analysisComparison of import times between this PR and base. SummaryThe average import time from this PR is: 299 ± 5 ms. The average import time from base is: 303 ± 5 ms. The import time difference between this PR and base is: -4.8 ± 0.2 ms. Import time breakdownThe following import paths have shrunk:
|
BenchmarksBenchmark execution time: 2025-06-18 15:29:46 Comparing candidate commit 018c26f in PR branch Found 0 performance improvements and 0 performance regressions! Performance is the same for 561 metrics, 3 unstable metrics. |
Cherry pick some refactor that I made in security controls: #13655 ## Checklist - [x] PR author has checked that all the criteria below are met - The PR description includes an overview of the change - The PR description articulates the motivation for the change - The change includes tests OR the PR description describes a testing strategy - The PR description notes risks associated with the change, if any - Newly-added code is easy to change - The change follows the [library release note guidelines](https://ddtrace.readthedocs.io/en/stable/releasenotes.html) - The change includes or references documentation updates if necessary - Backport labels are set (if [applicable](https://ddtrace.readthedocs.io/en/latest/contributing.html#backporting)) ## Reviewer Checklist - [x] Reviewer has checked that all the criteria below are met - Title is accurate - All changes are related to the pull request's stated goal - Avoids breaking [API](https://ddtrace.readthedocs.io/en/stable/versioning.html#interfaces) changes - Testing strategy adequately addresses listed risks - Newly-added code is easy to change - Release note makes sense to a user of the library - If necessary, author has acknowledged and discussed the performance implications of this PR as reported in the benchmarks PR comment - Backport labels are set in a manner that is consistent with the [release branch maintenance policy](https://ddtrace.readthedocs.io/en/latest/contributing.html#backporting)
Handle IAST security controls custom validation and sanitization methods
Overview
The
DD_IAST_SECURITY_CONTROLS_CONFIGURATION
environment variable allows you to specify custom sanitizers and validators that IAST should recognize when analyzing your application for security vulnerabilities.Format
The configuration uses the following format:
Multiple security controls are separated by semicolons (
;
).Fields
INPUT_VALIDATOR
orSANITIZER
*
for all typesshlex
,django.utils.http
)Vulnerability Types
Supported vulnerability types:
COMMAND_INJECTION
/CMDI
CODE_INJECTION
SQL_INJECTION
/SQLI
XSS
HEADER_INJECTION
PATH_TRAVERSAL
SSRF
UNVALIDATED_REDIRECT
INSECURE_COOKIE
NO_HTTPONLY_COOKIE
NO_SAMESITE_COOKIE
WEAK_CIPHER
WEAK_HASH
WEAK_RANDOMNESS
STACKTRACE_LEAK
Use
*
to apply to all vulnerability types.Examples
Basic Examples
Input Validator for Command Injection
Sanitizer for XSS
Multiple Vulnerability Types
All Vulnerability Types
Advanced Examples
Multiple Security Controls
Validator with Specific Parameter Positions
This validates only the 1st and 3rd parameters (0-based indexing).
Complex Configuration
How It Works
Input Validators
Sanitizers
Integration with Existing Controls
Your custom security controls work alongside the built-in IAST security controls:
shlex.quote
(Command injection sanitizer)html.escape
(XSS sanitizer)Checklist
Reviewer Checklist