Leakage of sensitive data to Google Tag Manager
- Rule ID: javascript_third_parties_google_tag_manager
- Languages: javascript
- Source: google_tag_manager.yml
Description
Leaking sensitive data to third-party services and tools like Google Tag Manager is a common cause of data leaks and can lead to data breaches.
Remediations
- Do ensure all sensitive data is removed when sending data to analytics libraries like Google Analytics.
- Do use unique identifiers from the database if you really need to identify users.
datalayer.push({
user: {
uuid: user.uuid
}
})
References
Associated CWE
OWASP Top 10
Configuration
To skip this rule during a scan, use the following flag
bearer scan /path/to/your-project/ --skip-rule=javascript_third_parties_google_tag_manager
To run only this rule during a scan, use the following flag
bearer scan /path/to/your-project/ --only-rule=javascript_third_parties_google_tag_manager