CodeAnt AI home pagelight logodark logo
  • Dashboard
  • Dashboard
  • Documentation
  • Demo Call with CEO
  • Blog
  • Slack
  • Get Started
    • CodeAnt AI
    • Setup
    • Control Center
    • Pull Request Review
    • IDE
    • Compliance
    • Anti-Patterns
    • Code Governance
    • Infrastructure Security Database
    • Application Security Database
      • Apex
      • Bash
      • C
      • Clojure
      • Cpp
      • Csharp
      • Dockerfile
      • Elixir
      • Fingerprints
      • Generic
      • Go
      • Html
      • Java
      • Javascript
        • Ajv
        • Angular
        • Apollo
        • Argon2
        • Audit
        • Aws-lambda
        • Axios
        • Bluebird
        • Browser
        • Chrome-remote-interface
        • Crypto
        • Deno
        • Express
        • Fbjs
        • Firebase
        • Grpc
        • Intercom
        • Jose
        • Jquery
        • Jsonwebtoken
        • Jssha
        • Jwt-simple
        • Knex
        • Lang
          • Best practice
          • Correctness
          • Hardcoded
          • Security
          • Security
            • Audit
            • Audit
              • Path traversal
              • Prototype pollution
              • Sqli
        • Monaco-editor
        • Mongodb
        • Mongoose
        • Mssql
        • Mysql
        • Node-expat
        • Passport-jwt
        • Pg
        • Phantom
        • Playwright
        • Puppeteer
        • React
        • Sandbox
        • Sax
        • Sequelize
        • Serialize-javascript
        • Shelljs
        • Superagent
        • Thenify
        • Vm2
        • Vue
        • Wkhtmltoimage
        • Wkhtmltopdf
        • Xml2json
      • Json
      • Kotlin
      • Ocaml
      • Php
      • Problem-based-packs
      • Python
      • Ruby
      • Rust
      • Scala
      • Solidity
      • Swift
      • Terraform
      • Typescript
      • Yaml
    Audit

    Path traversal

    Detected possible user input going into a path.join or path.resolve function. This could possibly lead to a path traversal vulnerability, where the attacker can access arbitrary files stored in the file system. Instead, be sure to sanitize or validate user input first.
    Likelihood: HIGH
    Confidence: LOW
    CWE:
    - CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
    OWASP:
    - A05:2017 - Broken Access Control
    - A01:2021 - Broken Access Control

    AuditPrototype pollution
    twitterlinkedin
    Powered by Mintlify