security.deserialization

Protect deserialization trust boundaries

Deserializers should not consume untrusted payloads directly across a trust boundary.

#Metadata

#Why it matters

Deserializing untrusted payloads can let attacker-controlled data reshape parser state, object graphs, or downstream runtime behavior.

#Remediation

Deserialize only from trusted producers, or validate and constrain the payload shape before crossing the deserialization boundary.

#Repository path

The generated metadata points to critiq-rules/libs/rules/catalog/rules/shared/security.unsafe-deserialization.rule.yaml.