diff --git a/javascript/express/security/audit/xss/mustache/var-in-href.mustache b/javascript/express/security/audit/xss/mustache/var-in-href.mustache
deleted file mode 100644
index b47e8200f0..0000000000
--- a/javascript/express/security/audit/xss/mustache/var-in-href.mustache
+++ /dev/null
@@ -1,62 +0,0 @@
-
-
-
-
-
- Demo Mustache.JS
-
-
-
-
-
-
-
-
-
-
-
-
- Singed in as: {{ val }}
-
-
-
-
-
-
-
diff --git a/javascript/express/security/audit/xss/mustache/var-in-href.yaml b/javascript/express/security/audit/xss/mustache/var-in-href.yaml
deleted file mode 100644
index 6f6148dca9..0000000000
--- a/javascript/express/security/audit/xss/mustache/var-in-href.yaml
+++ /dev/null
@@ -1,38 +0,0 @@
-rules:
-- id: var-in-href
- message: >-
- Detected a template variable used in an anchor tag with
- the 'href' attribute. This allows a malicious actor to
- input the 'javascript:' URI and is subject to cross-
- site scripting (XSS) attacks. If using a relative URL,
- start with a literal forward slash and concatenate the URL,
- like this: href='/{{link}}'. You may also consider setting
- the Content Security Policy (CSP) header.
- metadata:
- cwe:
- - "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
- owasp:
- - A07:2017 - Cross-Site Scripting (XSS)
- - A03:2021 - Injection
- references:
- - https://flask.palletsprojects.com/en/1.1.x/security/#cross-site-scripting-xss#:~:text=javascript:%20URI
- - https://github.com/pugjs/pug/issues/2952
- category: security
- technology:
- - express
- cwe2022-top25: true
- cwe2021-top25: true
- subcategory:
- - audit
- likelihood: LOW
- impact: MEDIUM
- confidence: LOW
- languages:
- - regex
- severity: WARNING
- paths:
- include:
- - '*.mustache'
- - '*.hbs'
- - '*.html'
- pattern-regex: From: {{ from_email }}
-To:
- {% for recipient in recipients %}
- {{ recipient }}
- {% endfor %}
-
-Subject: {{subject}}
-
- {{ message }}
-
-
-
diff --git a/python/django/security/audit/xss/template-href-var.yaml b/python/django/security/audit/xss/template-href-var.yaml
deleted file mode 100644
index 5069f3952d..0000000000
--- a/python/django/security/audit/xss/template-href-var.yaml
+++ /dev/null
@@ -1,41 +0,0 @@
-rules:
-- id: template-href-var
- message: >-
- Detected a template variable used in an anchor tag with
- the 'href' attribute. This allows a malicious actor to
- input the 'javascript:' URI and is subject to cross-
- site scripting (XSS) attacks. Use the 'url' template tag
- to safely generate a URL. You may also consider setting
- the Content Security Policy (CSP) header.
- metadata:
- cwe:
- - "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
- owasp:
- - A07:2017 - Cross-Site Scripting (XSS)
- - A03:2021 - Injection
- references:
- - https://flask.palletsprojects.com/en/1.1.x/security/#cross-site-scripting-xss
- - https://docs.djangoproject.com/en/3.1/ref/templates/builtins/#url
- - https://content-security-policy.com/
- category: security
- technology:
- - django
- cwe2022-top25: true
- cwe2021-top25: true
- subcategory:
- - audit
- likelihood: LOW
- impact: MEDIUM
- confidence: LOW
- languages:
- - generic
- paths:
- include:
- - '*.html'
- severity: WARNING
- patterns:
- - pattern-inside:
- - pattern-either:
- - pattern: href = '{{...}}'
- - pattern: href = "{{...}}"
- - pattern: href = {{...}}
diff --git a/python/django/security/audit/xss/var-in-script-tag.html b/python/django/security/audit/xss/var-in-script-tag.html
deleted file mode 100644
index 8bfb72f8d5..0000000000
--- a/python/django/security/audit/xss/var-in-script-tag.html
+++ /dev/null
@@ -1,21 +0,0 @@
-
-
-
-
-
-
-
-
-
-
-
diff --git a/python/django/security/audit/xss/var-in-script-tag.yaml b/python/django/security/audit/xss/var-in-script-tag.yaml
deleted file mode 100644
index a56724ba50..0000000000
--- a/python/django/security/audit/xss/var-in-script-tag.yaml
+++ /dev/null
@@ -1,43 +0,0 @@
-rules:
-- id: var-in-script-tag
- languages: [generic]
- severity: ERROR
- message: >-
- Detected a template variable used in a script tag.
- Although template variables are HTML escaped, HTML
- escaping does not always prevent cross-site scripting (XSS)
- attacks when used directly in JavaScript. If you need this
- data on the rendered page, consider placing it in the HTML
- portion (outside of a script tag). Alternatively, use a
- JavaScript-specific encoder, such as the one available
- in OWASP ESAPI. For Django, you may also consider using
- the 'json_script' template tag and retrieving the data in
- your script by using the element ID (e.g., `document.getElementById`).
- patterns:
- - pattern-inside:
- - pattern: '{{ ... }}'
- - pattern-not-inside: nonce = '...'
- - pattern-not-inside: nonce = "..."
- paths:
- include:
- - '*.html'
- metadata:
- cwe:
- - "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
- owasp:
- - A07:2017 - Cross-Site Scripting (XSS)
- - A03:2021 - Injection
- references:
- - https://adamj.eu/tech/2020/02/18/safely-including-data-for-javascript-in-a-django-template/?utm_campaign=Django%2BNewsletter&utm_medium=rss&utm_source=Django_Newsletter_12A
- - https://www.veracode.com/blog/secure-development/nodejs-template-engines-why-default-encoders-are-not-enough
- - https://github.com/ESAPI/owasp-esapi-js
- category: security
- technology:
- - django
- cwe2022-top25: true
- cwe2021-top25: true
- subcategory:
- - audit
- likelihood: LOW
- impact: MEDIUM
- confidence: LOW
diff --git a/python/flask/security/xss/audit/template-href-var.html b/python/flask/security/xss/audit/template-href-var.html
deleted file mode 100644
index 34adbcf891..0000000000
--- a/python/flask/security/xss/audit/template-href-var.html
+++ /dev/null
@@ -1,32 +0,0 @@
-From: {{ from_email }}
-To:
- {% for recipient in recipients %}
- {{ recipient }}
- {% endfor %}
-
-Subject: {{subject}}
-
- {{ message }}
-
-
-
diff --git a/python/flask/security/xss/audit/template-href-var.yaml b/python/flask/security/xss/audit/template-href-var.yaml
deleted file mode 100644
index d8d625198f..0000000000
--- a/python/flask/security/xss/audit/template-href-var.yaml
+++ /dev/null
@@ -1,43 +0,0 @@
-rules:
-- id: template-href-var
- message: >-
- Detected a template variable used in an anchor tag with
- the 'href' attribute. This allows a malicious actor to
- input the 'javascript:' URI and is subject to cross-
- site scripting (XSS) attacks. Use 'url_for()' to safely
- generate a URL. You may also consider setting the Content
- Security Policy (CSP) header.
- metadata:
- cwe:
- - "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"
- owasp:
- - A07:2017 - Cross-Site Scripting (XSS)
- - A03:2021 - Injection
- references:
- - https://flask.palletsprojects.com/en/1.1.x/security/#cross-site-scripting-xss
- - https://content-security-policy.com/
- category: security
- technology:
- - flask
- cwe2022-top25: true
- cwe2021-top25: true
- subcategory:
- - audit
- likelihood: LOW
- impact: MEDIUM
- confidence: LOW
- languages:
- - generic
- paths:
- include:
- - '*.html'
- severity: WARNING
- patterns:
- - pattern-inside:
- - pattern-either:
- - pattern: href = {{ ... }}
- - pattern: href = "{{ ... }}"
- - pattern: href = '{{ ... }}'
- - pattern-not-inside: href = {{ url_for(...) ... }}
- - pattern-not-inside: href = "{{ url_for(...) ... }}"
- - pattern-not-inside: href = '{{ url_for(...) ... }}'