Merge feature/242 into feature/242__bsdt-load-improv #655
FastSAST Scan Report
Details
Detailed Report
📊 Summary
The latest Fast SAST scan has detected 10 vulnerabilities. They are notified as annotations in the code.
Every annotation has the rule detecting vulnerability in its title. In its contents, there are four things:
- Description of the vulnerability.
- Suggested Remediation to fix the issue (if available).
- Triage Id which will be useful for triaging.
- Raw Output section that provides the sample
triage.yaml
format.
Their usages are described under the Take Action section.
🛠️ Take Action
To address the vulnerabilities identified, follow one of the two options for each annotation:
⚙️ Option 1: Remediation
If you agree that this finding is a true positive, follow this option to remediate:
Steps:
- 🛠️ Implement the Suggested Remediation to resolve the issue.
Note: If no Suggested Remediation is provided, review the vulnerability details and apply a suitable fix based on your knowledge and resources.
- ✅ Test changes to confirm the vulnerability is addressed.
- 🔄 Commit the code changes with the implemented remediation.
🔍 Option 2: Triaging
If you do not agree that this finding is a true positive, follow this option to triage and mark it as False Positive or Not Exploitable:
Category | Definition | Action |
---|---|---|
🚫 False Positive | A vulnerability identified but not a security issue in the application. | Add to false_positive section in triage.yaml . |
🔒 Not Exploitable | A vulnerability that cannot be exploited due to specific conditions. | Add to not_exploitable section in triage.yaml . |
Steps:
- 📝 Review the vulnerability.
- 🔎 Assess if it is a
False Positive
orNot Exploitable
based on the definition - 🗂️ Add the Triage Id to the appropriate section in the
triage.yaml
file. - 📚 Refer to documentation for guidance.
- 📜 For a sample
triage.yaml
file format, visit theRaw output
section. - 🔄 Commit the code changes with the updated
triage.yaml
file.
💬 Feedback
We value your input! Share your thoughts or report issues using our 📋Feedback Form
🆘 Support
Need assistance? Reach out to our support team 👥 via #fast-sast-service-support
Annotations
Check warning on line 60 in force-app/main/default/classes/TestUtil.cls
ast-scanner-app / FastSAST
Vulnerability found with Rule : base.apex.authorization.soql-missing-security-check .
Description : SOQL SELECT query is missing a user security directive. Apex generally runs in system context. This means that the current users permissions and field-level security are not taken into account during code execution. This may grant the caller unauthorized access to entity data. Use the WITH USER_MODE clause to enable field- and object-level security permissions when running SOQL SELECT queries in Apex code.
Suggested Remediation : Add a WITH USER_MODE directive to all SOQL SELECT queries in Apex.
Triage Id : "force-app/main/default/classes/TestUtil.cls:36f75217ab81437591e48db3ee6649b2eeb79f6797b1e42aa05be7a06a05e689"
Raw output
false_positive:
- id: force-app/main/default/classes/TestUtil.cls:36f75217ab81437591e48db3ee6649b2eeb79f6797b1e42aa05be7a06a05e689
justification: <Enter your justification for false positive here>
not_exploitable: []
Check warning on line 80 in force-app/main/default/classes/ServiceSelector.cls
ast-scanner-app / FastSAST
Vulnerability found with Rule : base.apex.authorization.soql-missing-security-check .
Description : SOQL SELECT query is missing a user security directive. Apex generally runs in system context. This means that the current users permissions and field-level security are not taken into account during code execution. This may grant the caller unauthorized access to entity data. Use the WITH USER_MODE clause to enable field- and object-level security permissions when running SOQL SELECT queries in Apex code.
Suggested Remediation : Add a WITH USER_MODE directive to all SOQL SELECT queries in Apex.
Triage Id : "force-app/main/default/classes/ServiceSelector.cls:516e5f78b9ea5e02dfd65f84d4ea62e456a8955731a8f22ea1b94044729a32d8"
Raw output
false_positive:
- id: force-app/main/default/classes/ServiceSelector.cls:516e5f78b9ea5e02dfd65f84d4ea62e456a8955731a8f22ea1b94044729a32d8
justification: <Enter your justification for false positive here>
not_exploitable: []
Check warning on line 95 in force-app/main/default/classes/ProgramEngagementSelector.cls
ast-scanner-app / FastSAST
Vulnerability found with Rule : base.apex.authorization.soql-missing-security-check .
Description : SOQL SELECT query is missing a user security directive. Apex generally runs in system context. This means that the current users permissions and field-level security are not taken into account during code execution. This may grant the caller unauthorized access to entity data. Use the WITH USER_MODE clause to enable field- and object-level security permissions when running SOQL SELECT queries in Apex code.
Suggested Remediation : Add a WITH USER_MODE directive to all SOQL SELECT queries in Apex.
Triage Id : "force-app/main/default/classes/ProgramEngagementSelector.cls:9576dbefdd41e65fa1e8baff2bd73590fee96a813bdba83042fe436953aa5c75"
Raw output
false_positive:
- id: force-app/main/default/classes/ProgramEngagementSelector.cls:9576dbefdd41e65fa1e8baff2bd73590fee96a813bdba83042fe436953aa5c75
justification: <Enter your justification for false positive here>
not_exploitable: []
Check warning on line 42 in force-app/main/default/classes/ServiceSelector.cls
ast-scanner-app / FastSAST
Vulnerability found with Rule : base.apex.authorization.soql-missing-security-check .
Description : SOQL SELECT query is missing a user security directive. Apex generally runs in system context. This means that the current users permissions and field-level security are not taken into account during code execution. This may grant the caller unauthorized access to entity data. Use the WITH USER_MODE clause to enable field- and object-level security permissions when running SOQL SELECT queries in Apex code.
Suggested Remediation : Add a WITH USER_MODE directive to all SOQL SELECT queries in Apex.
Triage Id : "force-app/main/default/classes/ServiceSelector.cls:8d3573190f119b7aaa6c368b4f441df4606b2f6224e2d6c7db5c05cc23b0c0c0"
Raw output
false_positive:
- id: force-app/main/default/classes/ServiceSelector.cls:8d3573190f119b7aaa6c368b4f441df4606b2f6224e2d6c7db5c05cc23b0c0c0
justification: <Enter your justification for false positive here>
not_exploitable: []
Check warning on line 28 in force-app/main/default/classes/ProgramEngagementSelector.cls
ast-scanner-app / FastSAST
Vulnerability found with Rule : base.apex.authorization.soql-missing-security-check .
Description : SOQL SELECT query is missing a user security directive. Apex generally runs in system context. This means that the current users permissions and field-level security are not taken into account during code execution. This may grant the caller unauthorized access to entity data. Use the WITH USER_MODE clause to enable field- and object-level security permissions when running SOQL SELECT queries in Apex code.
Suggested Remediation : Add a WITH USER_MODE directive to all SOQL SELECT queries in Apex.
Triage Id : "force-app/main/default/classes/ProgramEngagementSelector.cls:3013aa22966ec4f2f5389d25c252f66cda5481d51c9f7bd9176641618b7ae38c"
Raw output
false_positive:
- id: force-app/main/default/classes/ProgramEngagementSelector.cls:3013aa22966ec4f2f5389d25c252f66cda5481d51c9f7bd9176641618b7ae38c
justification: <Enter your justification for false positive here>
not_exploitable: []
Check warning on line 48 in force-app/main/default/classes/ServiceSelector.cls
ast-scanner-app / FastSAST
Vulnerability found with Rule : base.apex.authorization.soql-missing-security-check .
Description : SOQL SELECT query is missing a user security directive. Apex generally runs in system context. This means that the current users permissions and field-level security are not taken into account during code execution. This may grant the caller unauthorized access to entity data. Use the WITH USER_MODE clause to enable field- and object-level security permissions when running SOQL SELECT queries in Apex code.
Suggested Remediation : Add a WITH USER_MODE directive to all SOQL SELECT queries in Apex.
Triage Id : "force-app/main/default/classes/ServiceSelector.cls:3fe7423ccb09fd2e6cb7c1cca93df500ff3d98cf0205dbf16a82b576098ebff7"
Raw output
false_positive:
- id: force-app/main/default/classes/ServiceSelector.cls:3fe7423ccb09fd2e6cb7c1cca93df500ff3d98cf0205dbf16a82b576098ebff7
justification: <Enter your justification for false positive here>
not_exploitable: []
Check warning on line 69 in force-app/main/default/classes/ServiceSelector.cls
ast-scanner-app / FastSAST
Vulnerability found with Rule : base.apex.authorization.soql-missing-security-check .
Description : SOQL SELECT query is missing a user security directive. Apex generally runs in system context. This means that the current users permissions and field-level security are not taken into account during code execution. This may grant the caller unauthorized access to entity data. Use the WITH USER_MODE clause to enable field- and object-level security permissions when running SOQL SELECT queries in Apex code.
Suggested Remediation : Add a WITH USER_MODE directive to all SOQL SELECT queries in Apex.
Triage Id : "force-app/main/default/classes/ServiceSelector.cls:318ee346644d62b0a5f239d2ad4ec62346940ac845bd096f97e5dd1d13094e6e"
Raw output
false_positive:
- id: force-app/main/default/classes/ServiceSelector.cls:318ee346644d62b0a5f239d2ad4ec62346940ac845bd096f97e5dd1d13094e6e
justification: <Enter your justification for false positive here>
not_exploitable: []
Check warning on line 58 in force-app/main/default/classes/ProgramEngagementSelector.cls
ast-scanner-app / FastSAST
Vulnerability found with Rule : base.apex.authorization.soql-missing-security-check .
Description : SOQL SELECT query is missing a user security directive. Apex generally runs in system context. This means that the current users permissions and field-level security are not taken into account during code execution. This may grant the caller unauthorized access to entity data. Use the WITH USER_MODE clause to enable field- and object-level security permissions when running SOQL SELECT queries in Apex code.
Suggested Remediation : Add a WITH USER_MODE directive to all SOQL SELECT queries in Apex.
Triage Id : "force-app/main/default/classes/ProgramEngagementSelector.cls:1ba0ddfc96ade77de852b91514599cd8be17eea388d37cf9dcb6b085543d825d"
Raw output
false_positive:
- id: force-app/main/default/classes/ProgramEngagementSelector.cls:1ba0ddfc96ade77de852b91514599cd8be17eea388d37cf9dcb6b085543d825d
justification: <Enter your justification for false positive here>
not_exploitable: []
Check warning on line 107 in force-app/main/default/classes/ServiceSelector.cls
ast-scanner-app / FastSAST
Vulnerability found with Rule : base.apex.authorization.soql-missing-security-check .
Description : SOQL SELECT query is missing a user security directive. Apex generally runs in system context. This means that the current users permissions and field-level security are not taken into account during code execution. This may grant the caller unauthorized access to entity data. Use the WITH USER_MODE clause to enable field- and object-level security permissions when running SOQL SELECT queries in Apex code.
Suggested Remediation : Add a WITH USER_MODE directive to all SOQL SELECT queries in Apex.
Triage Id : "force-app/main/default/classes/ServiceSelector.cls:8c86ba3f04d025b214e83186ff4c30e41bb09898c78a3e84a773f64160bd0260"
Raw output
false_positive:
- id: force-app/main/default/classes/ServiceSelector.cls:8c86ba3f04d025b214e83186ff4c30e41bb09898c78a3e84a773f64160bd0260
justification: <Enter your justification for false positive here>
not_exploitable: []
Check warning on line 22 in force-app/main/default/classes/ServiceSelector.cls
ast-scanner-app / FastSAST
Vulnerability found with Rule : base.apex.authorization.soql-missing-security-check .
Description : SOQL SELECT query is missing a user security directive. Apex generally runs in system context. This means that the current users permissions and field-level security are not taken into account during code execution. This may grant the caller unauthorized access to entity data. Use the WITH USER_MODE clause to enable field- and object-level security permissions when running SOQL SELECT queries in Apex code.
Suggested Remediation : Add a WITH USER_MODE directive to all SOQL SELECT queries in Apex.
Triage Id : "force-app/main/default/classes/ServiceSelector.cls:840e61c4090c269d173d2a9baf28c94756603ac0bca989dd4b18204fc6c555e7"
Raw output
false_positive:
- id: force-app/main/default/classes/ServiceSelector.cls:840e61c4090c269d173d2a9baf28c94756603ac0bca989dd4b18204fc6c555e7
justification: <Enter your justification for false positive here>
not_exploitable: []