CodeAnt AI home page
Search...
⌘K
Support
Dashboard
Dashboard
Search...
Navigation
Documentation
API Reference
Start Here
What is CodeAnt?
Join Community
Setup
Github
GitHub Enterprise
Bitbucket
Gitlab
Azure Devops
Pull Request Review
Features
Customize Review
Quality Gates
Integrations
Scan center
Code Security
Code Quality
Cloud Security
Engineering Productivity
Integrations
Jira
Test Coverage
CI/CD
IDE
Setup
Review
Enhancements
Rule Reference
Compliance
Anti-Patterns
Code Governance
Infrastructure Security Database
Application Security Database
Apex
Bash
C
Clojure
Cpp
Csharp
Dockerfile
Elixir
Fingerprints
Generic
Go
Html
Java
Javascript
Json
Kotlin
Ocaml
Php
Doctrine
Lang
Laravel
Security
Security
Laravel-code-injection
Laravel-column-sql-injection
Laravel-command-injection
Laravel-cookie-not-encrypted
Laravel-csrf-not-verified
Laravel-direct-response-write
Laravel-http-client-ssrf
Laravel-mail-command-injection
Laravel-native-sql-injection
Laravel-path-traversal-storage
Laravel-path-traversal
Laravel-raw-sql-injection
Laravel-unsafe-entity-loader
Laravel-xml-unsafe-parser-flags
Search-laravel-form-csrf
Search laravel form csrf
Secrets
Symfony
Wordpress-plugins
Problem-based-packs
Python
Ruby
Rust
Scala
Solidity
Swift
Terraform
Typescript
Yaml
Resources
Open Source
Blogs
Search-laravel-form-csrf
Search laravel form csrf
search-laravel-form-csrf
This rule has been deprecated.
Likelihood
: LOW
Confidence
: LOW
CWE
:
- CWE-352: Cross-Site Request Forgery (CSRF)
OWASP
:
- A01:2021 - Broken Access Control
Laravel xml unsafe parser flags
Database password
Assistant
Responses are generated using AI and may contain mistakes.