The only tool that reviews everywhere you work.
Review at the PR stage or directly in your IDE & CLI. Catch security flaws, bugs, and design issues — no matter where you code.
URL parameter injection vulnerability
The code directly uses URL search parameters without sanitization, which could lead to XSS attacks.
Suggested Fix: Sanitize the error message before displaying it.
BEFORE
const errorMessage = searchParams.get("error");AFTER
const errorMessage = DOMPurify.sanitize( searchParams.get('error') ?? '');● High — URL parameter injection vulnerability
Uses URL search parameters without sanitization. Could lead to XSS attacks.
Suggested Fix: Sanitize the error message before displaying.
Before:
After: