Skip to content

Reduce false positives on legitimate HTTP clients #2#39

Open
stevehuuuu wants to merge 2 commits intocounterspec:mainfrom
stevehuuuu:fix-false-positives
Open

Reduce false positives on legitimate HTTP clients #2#39
stevehuuuu wants to merge 2 commits intocounterspec:mainfrom
stevehuuuu:fix-false-positives

Conversation

@stevehuuuu
Copy link
Copy Markdown

Optimized detection rules to reduce false positives:

  1. Added allowlist patterns for legitimate HTTP client imports/usage (axios, node-fetch, got, requests, urllib3, etc.)
  2. Fixed over-aggressive EXFIL_FETCH_DYNAMIC pattern to only flag dynamic fetch calls combined with sensitive data (base64, env vars, secrets)
  3. Expanded SAFE_DOMAINS list to include 40+ common legitimate API/service domains (cloud providers, SaaS, package registries, AI APIs)
  4. Reduced EXFIL_FETCH_DYNAMIC severity from high to medium to reduce false positive impact
  • Tested thoroughly:
    • Legitimate HTTP client usage (axios, fetch, etc.) now returns 0 findings (clean)
    • Actual malicious exfiltration (secrets + base64 + fetch) is still detected as high severity
    • All existing detection capabilities for malicious code are preserved

@vercel
Copy link
Copy Markdown

vercel bot commented Apr 1, 2026

Someone is attempting to deploy a commit to the Rapi's projects Team on Vercel.

A member of the Team first needs to authorize it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant