html-in-template-string
detect-eval-with-expression
detect-insecure-websocket
detect-no-csrf-before-method-override
detect-disable-mustache-escape
spawn-git-clone
detect-buffer-noassert
detect-pseudoRandomBytes
insecure-object-assign
Object.assign
can cause web response to include data that it should not have or can lead to a mass assignment vulnerability.detect-child-process
$FUNC
. This could lead to a command injection if the input is user controllable. Try to avoid calls to child_process, and if it is needed ensure user input is correctly sanitized or sandboxed.