Appearance
Why It Matters
Disabling TLS or certificate verification in config weakens trust boundaries for every connection that uses that transport. In committed config this is usually a durable unsafe default, not a one-off debug flag.
What Triggers
SEC304 applies to parsed JSON configuration and triggers on explicit trust-disable settings such as:
verifyTLS: falseinsecureSkipVerify: true
Examples that trigger:
json
{"client":{"url":"https://internal.test","verifyTLS":false}}
{"transport":{"insecureSkipVerify":true}}Example that stays clean:
json
{"client":{"url":"https://internal.test","verifyTLS":true}}False Positives
The rule is structural and limited to known verification-disable keys. It is a good fit for shipped configs because the signal is explicit even when the environment is internal.
Remediation
Re-enable certificate verification and use trusted HTTPS or local stdio transport. There is no automatic fix because the correct replacement depends on how the client should connect.