Validate untrusted input before parser construction
Untrusted input should be validated before it is used to construct sensitive parsers or runtime objects.
#Metadata
#Why it matters
Passing untrusted text across regex or URL construction boundaries increases the risk of parser abuse, denial of service, and downstream policy bypass.
#Remediation
Validate, sanitize, or normalize the untrusted value before passing it into URL, RegExp, or similarly sensitive constructors.
#Repository path
The generated metadata points to critiq-rules/libs/rules/catalog/rules/typescript/ts.security.unvalidated-external-input.rule.yaml.