java-route-mapper

Warn

Audited by Socket on Mar 10, 2026

1 alert found:

Anomaly
AnomalyLOW
references/STRUTS.md

The provided document is a non-malicious guide on Struts 2 routing and configuration. It does not itself contain malware or backdoors. However, it highlights several configuration patterns that, if present in an application's struts.xml/web.xml (notably devMode=true, empty action extensions, wildcard/multi-level action mappings, ModelDriven binding without whitelists, dynamic method invocation, and using unsanitized variables in Content-Disposition), substantially increase the risk of parameter injection, mass-assignment, arbitrary method invocation, information leakage, and potentially remote code execution. Review and hardening of these configuration points is recommended when this guidance is applied in real applications.

Confidence: 90%Severity: 60%
Audit Metadata
Analyzed At
Mar 10, 2026, 04:37 AM
Package URL
pkg:socket/skills-sh/RuoJi6%2Fjava-audit-skills%2Fjava-route-mapper%2F@572b51ff0763d586624120e17cb4f16da0f9b4c9