ESLint InterlaceESLint Interlace

Security Metadata

Understanding CWE, OWASP, and CVSS standards

Industry Security Standards

Interlace maps every security rule to three industry standards, ensuring your vulnerabilities are classified using the same language as professional security auditors, compliance frameworks, and AI assistants.


CWE (Common Weakness Enumeration)

What is CWE?

A community-developed dictionary of software weaknesses maintained by MITRE. Each weakness has a unique ID (e.g., CWE-89 for SQL Injection).

CWE provides a common language for describing security vulnerabilities. When Interlace reports CWE-89, any security tool, auditor, or AI assistant knows exactly what type of issue it is.

Common CWEs in Interlace

CWE IDNameRisk CategoryExample Rule
CWE-79Cross-site Scripting (XSS)Webbrowser-security/no-innerhtml
CWE-89SQL InjectionInjectionsecure-coding/no-sql-concatenation
CWE-327Use of Broken CryptoCryptographynode-security/no-weak-algorithms
CWE-798Hardcoded CredentialsSecretssecrets/no-hardcoded-credentials
CWE-614Sensitive Cookie in HTTPSWebbrowser-security/secure-cookie

Browse the full CWE database →


OWASP Top 10

What is OWASP?

The Open Web Application Security Project publishes the most critical web application risks every few years. The Top 10 is the industry standard for web security priorities.

Interlace covers 100% of the OWASP Top 10 2021:

RankCategoryInterlace Coverage
A01Broken Access Control✓ Role/permission rules
A02Cryptographic Failureseslint-plugin-crypto
A03Injection✓ SQL, NoSQL, Command injection
A04Insecure Design✓ Architecture patterns
A05Security Misconfiguration✓ Config validation rules
A06Vulnerable Components✓ Dependency checks
A07Auth Failures✓ JWT, session rules
A08Data Integrity Failures✓ Deserialization rules
A09Logging Failures✓ Logging best practices
A10SSRF✓ URL validation rules

Read the OWASP Top 10 2021 →


CVSS (Common Vulnerability Scoring System)

What is CVSS?

A severity rating from 0.0 to 10.0 that helps prioritize vulnerability fixes. Higher scores = more critical.

CVSS helps you prioritize which issues to fix first:

Score RangeSeverityActionExample
9.0 - 10.0🔴 CriticalFix immediatelySQL Injection (9.8)
7.0 - 8.9🟠 HighFix in current sprintHardcoded secrets (7.5)
4.0 - 6.9🟡 MediumSchedule fixMissing HTTPS (5.3)
0.1 - 3.9🟢 LowMonitor & planInfo disclosure (2.1)

CVSS in Interlace

Every security rule displays its CVSS score, helping you:

  • Triage issues by severity
  • Report to stakeholders with industry-standard metrics
  • Comply with security frameworks that require risk scoring

CVSS Disclaimer

Interlace CVSS scores are based on industry averages for each CWE category. Actual severity may vary based on your specific application context.


Why This Mapping Matters

For Developers

  • Understand the real-world impact of each issue
  • Prioritize fixes based on severity
  • Learn security patterns from industry standards

For Security Teams

  • Audit codebases using industry-standard classifications
  • Report findings with CWE/OWASP/CVSS mappings
  • Integrate with SIEMs and security dashboards

For AI Agents

  • Ground responses in verified security context
  • Reference specific remediation patterns
  • Avoid hallucinations with structured metadata

Next Steps

On this page