Leakage of sensitive data to Algolia

  • Rule ID: javascript_third_parties_algolia
  • Languages: javascript
  • Source: algolia.yml

Description

Leaking sensitive data to third-party data tools like Algolia is a common cause of data leaks and can lead to data breaches.

Remediations

  • Do ensure all sensitive data is removed when sending data to third-party services like Algolia.
  • Do use unique identifiers from the database if you really need to identify users.
      const algoliaSearch = require('algoliasearch')
    const myAlgolia = algoliaSearch("123", "123")
    const index = myAlgolia.initIndex(user.uuid)

References

Associated CWE

OWASP Top 10

Configuration

To skip this rule during a scan, use the following flag

bearer scan /path/to/your-project/ --skip-rule=javascript_third_parties_algolia

To run only this rule during a scan, use the following flag

bearer scan /path/to/your-project/ --only-rule=javascript_third_parties_algolia