Skip to content

Commit

Permalink
Update license links (#3534)
Browse files Browse the repository at this point in the history
* Remove hardcoded license in rules

* Update README and LICENSE

* Update references

* references required only for security rules
  • Loading branch information
p4p3r authored Dec 13, 2024
1 parent 0f5a85c commit 2a662d5
Show file tree
Hide file tree
Showing 86 changed files with 12 additions and 106 deletions.
12 changes: 1 addition & 11 deletions LICENSE
Original file line number Diff line number Diff line change
@@ -1,11 +1 @@
“Commons Clause” License Condition v1.0

The Software is provided to you by the Licensor under the License, as defined below, subject to the following condition.

Without limiting other conditions in the License, the grant of rights under the License will not include, and the License does not grant to you, the right to Sell the Software.

For purposes of the foregoing, “Sell” means practicing any or all of the rights granted to you under the License to provide to third parties, for a fee or other consideration (including without limitation fees for hosting or consulting/ support services related to the Software), a product or service whose value derives, entirely or substantially, from the functionality of the Software. Any license notice or attribution required by the License must also include this Commons Clause License Condition notice.

Software: semgrep-rules (https://github.com/semgrep/semgrep-rules)
License: LGPL 2.1 (GNU Lesser General Public License, Version 2.1)
Licensor: Semgrep, Inc. (https://semgrep.dev)
Semgrep Rules License v1.0. For more details, visit [semgrep.dev/rules-license](semgrep.dev/legal/rules-license)
7 changes: 4 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,11 +28,12 @@ You can also learn how to write rules using the [interactive, example-based Semg

## Contributing

We welcome Semgrep rule contributions directly to this repository! When submitting your contribution to this repository, we’ll ask you to make Semgrep, Inc. a joint owner of your contributions. While you still own copyright rights to your rule, joint ownership allows Semgrep, Inc. to license these contributions to other [Semgrep Registry](https://semgrep.dev/r) users pursuant to the LGPL 2.1 under the [Commons Clause](https://commonsclause.com/). See full [license details](https://github.com/returntocorp/semgrep-rules/blob/develop/LICENSE).
We welcome Semgrep rule contributions directly to this repository! When submitting your contribution, you grant Semgrep, Inc. a license to use, modify, and distribute your contribution under the {Semgrep Rules License v. 1.0](semgrep.dev/legal/rules-license). This ensures your rule can be shared with other Semgrep Registry users.

Note: To contribute, review the **[Contributing to Semgrep rules](https://semgrep.dev/docs/contributing/contributing-to-semgrep-rules-repository/)** documentation.
To contribute, please review our **[Contributing to Semgrep rules](https://semgrep.dev/docs/contributing/contributing-to-semgrep-rules-repository/)** guidelines.

You can also reach out to us at [email protected], and we will help import your rules for others to use!

You can also contact us at [email protected] to make Semgrep rule contributions. We will import your rules for everyone to use!

## Additional information

Expand Down
1 change: 0 additions & 1 deletion dockerfile/best-practice/remove-package-cache.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -16,4 +16,3 @@ rules:
category: best-practice
technology:
- dockerfile
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
Original file line number Diff line number Diff line change
Expand Up @@ -44,4 +44,3 @@ rules:
- audit
likelihood: LOW
impact: HIGH
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
1 change: 0 additions & 1 deletion generic/secrets/security/detected-aws-account-id.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -55,4 +55,3 @@ rules:
- audit
likelihood: LOW
impact: HIGH
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
1 change: 0 additions & 1 deletion generic/secrets/security/detected-google-api-key.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,6 @@ rules:
technology:
- secrets
- google
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
confidence: LOW
owasp:
- A07:2021 - Identification and Authentication Failures
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,6 @@ rules:
technology:
- secrets
- telegram
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
confidence: LOW
owasp:
- A07:2021 - Identification and Authentication Failures
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,6 @@ rules:
technology:
- secrets
confidence: MEDIUM
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
cwe2022-top25: true
cwe2021-top25: true
subcategory:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,6 @@ rules:
technology:
- gorilla
confidence: MEDIUM
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
references:
- https://cwe.mitre.org/data/definitions/289.html
subcategory:
Expand Down
1 change: 0 additions & 1 deletion go/lang/security/audit/sqli/pg-orm-sqli.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -84,5 +84,4 @@ rules:
- vuln
likelihood: LOW
impact: HIGH
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
severity: ERROR
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,6 @@ rules:
category: security
cwe:
- "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
owasp:
- A07:2017 - Cross-Site Scripting (XSS)
- A03:2021 - Injection
Expand Down
1 change: 0 additions & 1 deletion go/lang/security/injection/raw-html-format.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,6 @@ rules:
- go
references:
- https://blogtitle.github.io/robn-go-security-pearls-cross-site-scripting-xss/
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
confidence: MEDIUM
cwe2022-top25: true
cwe2021-top25: true
Expand Down
1 change: 0 additions & 1 deletion go/lang/security/injection/tainted-url-host.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,6 @@ rules:
category: security
technology:
- go
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
confidence: HIGH
cwe2022-top25: true
cwe2021-top25: true
Expand Down
2 changes: 0 additions & 2 deletions java/android/best-practice/manifest-security-features.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,6 @@ rules:
Config is present.
metadata:
category: best-practice
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
technology:
- android
references:
Expand All @@ -33,7 +32,6 @@ rules:
if a Network Security Config is present.
metadata:
category: best-practice
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
technology:
- android
references:
Expand Down
5 changes: 0 additions & 5 deletions java/android/best-practice/network-security-config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,6 @@ rules:
`<network-security-config>`)
metadata:
category: best-practice
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
technology:
- android
references:
Expand Down Expand Up @@ -40,7 +39,6 @@ rules:
pin as a backup.
metadata:
category: best-practice
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
technology:
- android
references:
Expand Down Expand Up @@ -78,7 +76,6 @@ rules:
default to trusting system CAs and disregard the pin.
metadata:
category: best-practice
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
technology:
- android
references:
Expand Down Expand Up @@ -108,7 +105,6 @@ rules:
`<network-security-config>`)
metadata:
category: best-practice
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
technology:
- android
references:
Expand Down Expand Up @@ -141,7 +137,6 @@ rules:
`<network-security-config>`)
metadata:
category: best-practice
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
technology:
- android
references:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,6 @@ rules:
- java
- servlets
interfile: true
license: proprietary license - copyright © Semgrep, Inc.
languages:
- java
mode: taint
Expand Down
1 change: 0 additions & 1 deletion java/spring/security/injection/tainted-sql-string.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,6 @@ rules:
category: security
technology:
- spring
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
cwe2022-top25: true
cwe2021-top25: true
subcategory:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,6 @@ rules:
- https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html
technology:
- browser
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
subcategory:
- vuln
likelihood: LOW
Expand Down
1 change: 0 additions & 1 deletion javascript/browser/security/open-redirect.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,6 @@ rules:
- https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html
technology:
- browser
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
subcategory:
- vuln
likelihood: HIGH
Expand Down
1 change: 0 additions & 1 deletion javascript/browser/security/raw-html-concat.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,6 @@ rules:
category: security
technology:
- browser
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
cwe2022-top25: true
cwe2021-top25: true
subcategory:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,6 @@ rules:
likelihood: HIGH
impact: MEDIUM
confidence: HIGH
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
languages:
- javascript
- typescript
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,6 @@ rules:
likelihood: MEDIUM
impact: MEDIUM
confidence: MEDIUM
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
vulnerability_class:
- Cross-Site-Scripting (XSS)
languages:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,6 @@ rules:
category: security
technology:
- express
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
cwe2022-top25: true
cwe2021-top25: true
subcategory:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,6 @@ rules:
category: security
technology:
- typescript
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
cwe2022-top25: true
cwe2021-top25: true
subcategory:
Expand Down
1 change: 0 additions & 1 deletion javascript/lang/security/audit/sqli/node-knex-sqli.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,6 @@ rules:
- express
- nodejs
- knex
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
cwe2022-top25: true
cwe2021-top25: true
subcategory:
Expand Down
1 change: 0 additions & 1 deletion javascript/lang/security/audit/sqli/node-mssql-sqli.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,6 @@ rules:
category: security
technology:
- mssql
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
references:
- https://www.npmjs.com/package/mssql
cwe2022-top25: true
Expand Down
1 change: 0 additions & 1 deletion javascript/lang/security/audit/sqli/node-mysql-sqli.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,6 @@ rules:
- mysql2
- javascript
- nodejs
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
cwe2022-top25: true
cwe2021-top25: true
subcategory:
Expand Down
1 change: 0 additions & 1 deletion javascript/lang/security/detect-child-process.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,6 @@ rules:
category: security
technology:
- javascript
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
cwe2022-top25: true
cwe2021-top25: true
subcategory:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,6 @@ rules:
likelihood: HIGH
impact: HIGH
confidence: HIGH
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
languages:
- javascript
- typescript
Expand Down
1 change: 0 additions & 1 deletion json/aws/security/public-s3-bucket.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,6 @@ rules:
category: security
cwe:
- 'CWE-264: CWE CATEGORY: Permissions, Privileges, and Access Controls'
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
owasp:
- A01:2021 - Broken Access Control
references:
Expand Down
1 change: 0 additions & 1 deletion json/npm/security/package-dependencies-check.yml
Original file line number Diff line number Diff line change
Expand Up @@ -45,7 +45,6 @@ rules:
- https://cwe.mitre.org/data/definitions/427.html
technology:
- npm
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
subcategory:
- audit
likelihood: LOW
Expand Down
1 change: 0 additions & 1 deletion kotlin/lang/security/defaulthttpclient-is-deprecated.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,6 @@ rules:
category: security
technology:
- kotlin
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
references:
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures
subcategory:
Expand Down
1 change: 0 additions & 1 deletion kotlin/lang/security/ecb-cipher.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,6 @@ rules:
category: security
technology:
- kotlin
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
references:
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures
subcategory:
Expand Down
1 change: 0 additions & 1 deletion kotlin/lang/security/gcm-detection.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@ rules:
- https://cwe.mitre.org/data/definitions/323.html
technology:
- kotlin
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
owasp:
- A02:2021 - Cryptographic Failures
subcategory:
Expand Down
1 change: 0 additions & 1 deletion kotlin/lang/security/no-null-cipher.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,6 @@ rules:
category: security
technology:
- kotlin
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
references:
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures
subcategory:
Expand Down
1 change: 0 additions & 1 deletion kotlin/lang/security/unencrypted-socket.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,6 @@ rules:
category: security
technology:
- kotlin
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
references:
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures
subcategory:
Expand Down
1 change: 0 additions & 1 deletion kotlin/lang/security/use-of-md5.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,6 @@ rules:
category: security
technology:
- kotlin
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
references:
- https://owasp.org/Top10/A02_2021-Cryptographic_Failures
subcategory:
Expand Down
2 changes: 1 addition & 1 deletion metadata-schema.yaml.schm
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,6 @@ schema:
allOf:
- type: object
required:
- references
- category
- technology
properties:
Expand Down Expand Up @@ -90,4 +89,5 @@ schema:
- likelihood
- impact
- subcategory
- references

Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,6 @@ rules:
category: security
cwe:
- "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
owasp:
- A01:2017 - Injection
- A03:2021 - Injection
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,6 @@ rules:
category: security
cwe:
- "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
owasp:
- A01:2017 - Injection
- A03:2021 - Injection
Expand Down
1 change: 0 additions & 1 deletion php/lang/security/injection/tainted-url-host.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,6 @@ rules:
category: security
technology:
- php
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
cwe2022-top25: true
cwe2021-top25: true
subcategory:
Expand Down
1 change: 0 additions & 1 deletion php/lang/security/php-ssrf.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,6 @@ rules:
metadata:
references:
- https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
cwe:
- "CWE-918: Server-Side Request Forgery (SSRF)"
category: security
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,6 @@ rules:
category: security
technology:
- python
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
cwe2022-top25: true
cwe2021-top25: true
subcategory:
Expand Down
1 change: 0 additions & 1 deletion python/aws-lambda/security/dangerous-asyncio-exec.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,6 @@ rules:
technology:
- python
- aws-lambda
license: Commons Clause License Condition v1.0[LGPL-2.1-only]
cwe2022-top25: true
cwe2021-top25: true
subcategory:
Expand Down
Loading

0 comments on commit 2a662d5

Please sign in to comment.