",t};e.buildCustomizationMenuUi=t;function n(e){let t='
${e.filter.label}
The integrated platform for monitoring & security
Observability
End-to-end, simplified visibility into your stack’s health & performance
インフラ
Applications
ログ
セキュリティ
Detect, prioritize, and respond to threats in real-time
Code Security
Cloud Security
Threat Management
Security Labs
Digital Experience
Optimize front-end performance and enhance user experiences
Related Products
Software Delivery
Build, test, secure and ship quality code faster
Service Management
Integrated, streamlined workflows for faster time-to-resolution
Actions
AIOps
AI
Monitor and improve model performance. Pinpoint root causes and detect anomalies
AI Observability
Platform Capabilities
Built-in features & integrations that power the Datadog platform
Built-in Features
Workflows & Collaboration
Extensibility
Industry
テクノロジー
Use-case
Looking for Datadog logos?
You can find the logo assets on our press page.
ID: javascript-express/access-restriction
javascript-express/access-restriction
Language: JavaScript
Severity: Warning
Category: Security
CWE: 548
Exposing a directory listing could present an attacker an opportunity to access source code or other sensitive data through a file structure exploit. Restricting access to non-sensitive directories and files is strongly suggested.
const express = require("express") const serveIndex = require("serve-index") const app = express() app.use(serveIndex())
const express = require("express") const serveIndex = require("serve-index") const app = express() app.use(serveIndex("/public"))
シームレスな統合。 Datadog Code Security をお試しください
1 2
rulesets: - javascript-express # Rules to enforce JavaScript express.
詳細については、Code Security ドキュメント を参照してください
あなたのVS Code エディタ内で直接コードの脆弱性を特定
JetBrains 製品内で直接コードの脆弱性を特定