Validate redirect URLs
Always validate redirect URLs to prevent open redirect vulnerabilities. When validating external URLs, parse them with the URL constructor and compare origins exactly rather than using string operations.
Bad:
```javascript
// Vulnerable to subdomain attacks (e.g., example.com.attacker.com)
const isRedirectSafe = (redirectUrl) => {
return (
redirectUrl.startsWith("/") ||
Install this rule for wispbit
Add this rule to wispbit and it will run when you open a pull request
Install this rule for Coderabbit
Copy the configuration below and add it to your repository as .coderabbit.yml
in your project root.
reviews:
path_instructions:
- path: "*.vue,*.ts,*.js"
instructions: |
Always validate redirect URLs to prevent open redirect vulnerabilities. When validating external URLs, parse them with the URL constructor and compare origins exactly rather than using string operations.
Bad:
```javascript
// Vulnerable to subdomain attacks (e.g., example.com.attacker.com)
const isRedirectSafe = (redirectUrl) => {
return (
redirectUrl.startsWith("/") ||
redirectUrl.startsWith(window.location.origin)
)
}
```
Good:
```javascript
const isRedirectSafe = (redirectUrl) => {
// Allow local redirects
if (redirectUrl.startsWith("/")) {
return true
}
try {
// Validate external URLs by checking exact origin match
const url = new URL(redirectUrl)
return url.origin === window.location.origin
} catch {
return false
}
}
```
Install this rule for Greptile
Greptile rules can be added through the web interface. Please see this documentation for details on how to add custom rules and context.
Always validate redirect URLs to prevent open redirect vulnerabilities. When validating external URLs, parse them with the URL constructor and compare origins exactly rather than using string operations.
Bad:
```javascript
// Vulnerable to subdomain attacks (e.g., example.com.attacker.com)
const isRedirectSafe = (redirectUrl) => {
return (
redirectUrl.startsWith("/") ||
redirectUrl.startsWith(window.location.origin)
)
}
```
Good:
```javascript
const isRedirectSafe = (redirectUrl) => {
// Allow local redirects
if (redirectUrl.startsWith("/")) {
return true
}
try {
// Validate external URLs by checking exact origin match
const url = new URL(redirectUrl)
return url.origin === window.location.origin
} catch {
return false
}
}
```
File Path Patterns:
Install this rule for GitHub Copilot
Copilot instructions can be added through the interface. See the documentation for details on how to create coding guidelines.
Always validate redirect URLs to prevent open redirect vulnerabilities. When validating external URLs, parse them with the URL constructor and compare origins exactly rather than using string operations.
Bad:
```javascript
// Vulnerable to subdomain attacks (e.g., example.com.attacker.com)
const isRedirectSafe = (redirectUrl) => {
return (
redirectUrl.startsWith("/") ||
redirectUrl.startsWith(window.location.origin)
)
}
```
Good:
```javascript
const isRedirectSafe = (redirectUrl) => {
// Allow local redirects
if (redirectUrl.startsWith("/")) {
return true
}
try {
// Validate external URLs by checking exact origin match
const url = new URL(redirectUrl)
return url.origin === window.location.origin
} catch {
return false
}
}
```
File Path Patterns:
Install this rule for Graphite Diamond
Diamond custom rules can be added through the interface. See the documentation for details on how to create custom rules.
Always validate redirect URLs to prevent open redirect vulnerabilities. When validating external URLs, parse them with the URL constructor and compare origins exactly rather than using string operations.
Bad:
```javascript
// Vulnerable to subdomain attacks (e.g., example.com.attacker.com)
const isRedirectSafe = (redirectUrl) => {
return (
redirectUrl.startsWith("/") ||
redirectUrl.startsWith(window.location.origin)
)
}
```
Good:
```javascript
const isRedirectSafe = (redirectUrl) => {
// Allow local redirects
if (redirectUrl.startsWith("/")) {
return true
}
try {
// Validate external URLs by checking exact origin match
const url = new URL(redirectUrl)
return url.origin === window.location.origin
} catch {
return false
}
}
```
File Path Patterns:
Use with Cline
Copy the rule below and ask Cline to review your code using this rule
Always validate redirect URLs to prevent open redirect vulnerabilities. When validating external URLs, parse them with the URL constructor and compare origins exactly rather than using string operations.
Bad:
```javascript
// Vulnerable to subdomain attacks (e.g., example.com.attacker.com)
const isRedirectSafe = (redirectUrl) => {
return (
redirectUrl.startsWith("/") ||
redirectUrl.startsWith(window.location.origin)
)
}
```
Good:
```javascript
const isRedirectSafe = (redirectUrl) => {
// Allow local redirects
if (redirectUrl.startsWith("/")) {
return true
}
try {
// Validate external URLs by checking exact origin match
const url = new URL(redirectUrl)
return url.origin === window.location.origin
} catch {
return false
}
}
```
Use with OpenAI Codex
Copy the rule below and ask OpenAI Codex to review your code using this rule
Always validate redirect URLs to prevent open redirect vulnerabilities. When validating external URLs, parse them with the URL constructor and compare origins exactly rather than using string operations.
Bad:
```javascript
// Vulnerable to subdomain attacks (e.g., example.com.attacker.com)
const isRedirectSafe = (redirectUrl) => {
return (
redirectUrl.startsWith("/") ||
redirectUrl.startsWith(window.location.origin)
)
}
```
Good:
```javascript
const isRedirectSafe = (redirectUrl) => {
// Allow local redirects
if (redirectUrl.startsWith("/")) {
return true
}
try {
// Validate external URLs by checking exact origin match
const url = new URL(redirectUrl)
return url.origin === window.location.origin
} catch {
return false
}
}
```
Use with Cursor
Copy the rule below and ask Cursor to review your code using this rule
Always validate redirect URLs to prevent open redirect vulnerabilities. When validating external URLs, parse them with the URL constructor and compare origins exactly rather than using string operations.
Bad:
```javascript
// Vulnerable to subdomain attacks (e.g., example.com.attacker.com)
const isRedirectSafe = (redirectUrl) => {
return (
redirectUrl.startsWith("/") ||
redirectUrl.startsWith(window.location.origin)
)
}
```
Good:
```javascript
const isRedirectSafe = (redirectUrl) => {
// Allow local redirects
if (redirectUrl.startsWith("/")) {
return true
}
try {
// Validate external URLs by checking exact origin match
const url = new URL(redirectUrl)
return url.origin === window.location.origin
} catch {
return false
}
}
```
Use with Claude Code
Copy the rule below and ask Claude Code to review your code using this rule
Always validate redirect URLs to prevent open redirect vulnerabilities. When validating external URLs, parse them with the URL constructor and compare origins exactly rather than using string operations.
Bad:
```javascript
// Vulnerable to subdomain attacks (e.g., example.com.attacker.com)
const isRedirectSafe = (redirectUrl) => {
return (
redirectUrl.startsWith("/") ||
redirectUrl.startsWith(window.location.origin)
)
}
```
Good:
```javascript
const isRedirectSafe = (redirectUrl) => {
// Allow local redirects
if (redirectUrl.startsWith("/")) {
return true
}
try {
// Validate external URLs by checking exact origin match
const url = new URL(redirectUrl)
return url.origin === window.location.origin
} catch {
return false
}
}
```
Install this rule for Windsurf
To set up rules for Windsurf Reviews, please see this documentation
Always validate redirect URLs to prevent open redirect vulnerabilities. When validating external URLs, parse them with the URL constructor and compare origins exactly rather than using string operations.
Bad:
```javascript
// Vulnerable to subdomain attacks (e.g., example.com.attacker.com)
const isRedirectSafe = (redirectUrl) => {
return (
redirectUrl.startsWith("/") ||
redirectUrl.startsWith(window.location.origin)
)
}
```
Good:
```javascript
const isRedirectSafe = (redirectUrl) => {
// Allow local redirects
if (redirectUrl.startsWith("/")) {
return true
}
try {
// Validate external URLs by checking exact origin match
const url = new URL(redirectUrl)
return url.origin === window.location.origin
} catch {
return false
}
}
```