taint_analysis
Track untrusted data flow from sources like HTTP parameters to dangerous sinks such as SQL queries. Framework-aware analysis identifies security vulnerabilities with CWE IDs and fix suggestions.
Instructions
Track flow of untrusted data from sources (HTTP params, env vars, file reads) to dangerous sinks (SQL queries, exec, innerHTML, redirects). Framework-aware: knows Express req.params, Laravel $request->input, Django request.GET, FastAPI Query(), etc. Reports unsanitized flows with CWE IDs and fix suggestions. More accurate than pattern-based scanning — traces actual data flow paths.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| scope | No | Directory to scan (default: whole project) | |
| sources | No | Filter by source kinds (default: all) | |
| sinks | No | Filter by sink kinds (default: all) | |
| include_sanitized | No | Include flows with sanitizers (default: false) | |
| limit | No | Max flows to return (default: 100) |