Protect deserialization trust boundaries
Deserializers should not consume untrusted payloads directly across a trust boundary.
#Metadata
#Why it matters
Deserializing untrusted payloads can let attacker-controlled data reshape parser state, object graphs, or downstream runtime behavior.
#Remediation
Deserialize only from trusted producers, or validate and constrain the payload shape before crossing the deserialization boundary.
#Repository path
The generated metadata points to critiq-rules/libs/rules/catalog/rules/shared/security.unsafe-deserialization.rule.yaml.