You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When foxguard fires `py/taint-sql-injection`, the developer knows what's wrong but has to figure out how to fix it themselves. For common vulnerability patterns, the fix is well-known and mechanical:
Problem
When foxguard fires `py/taint-sql-injection`, the developer knows what's wrong but has to figure out how to fix it themselves. For common vulnerability patterns, the fix is well-known and mechanical:
Suggesting the fix inline would turn foxguard from "it tells you what's wrong" into "it tells you how to fix it."
Proposal
For each taint rule, add a `fix_suggestion` field that contains:
Surface the suggestion in:
Examples
```
src/routes.py:42 CRITICAL py/taint-sql-injection (CWE-89)
flask.request.args reaches cursor.execute — untrusted input can inject SQL
Fix: use parameterized queries instead of string concatenation
cur.execute("SELECT * FROM users WHERE name = ?", (name,))
```
Scope
Priority
Medium. High user-facing value but not blocking anything else.