Skip to content

Map Project CodeGuard rules to the new MITRE CWE Top 25 Most Dangerous Software Weaknesses (2025) #77

@santosomar

Description

@santosomar

The MITRE CWE Top 25 Most Dangerous Software Weaknesses for 2025 identifies the most frequent and impactful classes of software weaknesses based on real-world CVE and exploitation data; making it a valuable framework for prioritization and coverage assessment.

Objective

Create a comprehensive mapping between existing Project CodeGuard rules under and the MITRE CWE Top 25 Most Dangerous Software Weaknesses (2025).

This mapping should help:

  • Evaluate CodeGuard rule coverage against the most dangerous software weaknesses.
  • Identify gaps where new rules may be needed.

Proposed Deliverables

  1. CWE Top 25 List Extraction

    • Extract the 2025 MITRE Top 25 list including CWE IDs and names. ([CWE][2])
  2. Rule–CWE Mapping Table (Core Rules)

    • For each rule in sources/core, map to one (or more) applicable CWE ID(s) from the Top 25.
    • Include rationale for each mapping (e.g., rule logic, threat mitigated).

    Example table format:

    CodeGuard Rule Description Mapped CWE ID(s) CWE Name (2025 Top 25) Notes
    codeguard-x-xyz.md Prevent X CWE-79 Improper Neutralization of Input … Rule logic aligns with XSS patterns
  3. Coverage Summary

    • A summary of which Top 25 CWEs are covered by existing rules vs. missing.
    • High-priority gaps requiring new rules.

Metadata

Metadata

Assignees

Labels

documentationImprovements or additions to documentationnew-ruleAdding a new rule to Project CodeGuard

Type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions