no-cookies
Disallow client-side cookie usage patterns that increase session and data risk.
Targeted pattern scope
This rule targets browser cookie read and write patterns, including direct
access to document.cookie.
What this rule reports
This rule reports cookie usage in client code where safer or less exposed storage patterns are preferred.
Why this rule exists
Cookies are frequently sent over network requests and can expand leakage and tampering risk when misconfigured.
❌ Incorrect
document.cookie = `sessionToken=${token}; path=/`;
✅ Correct
localStorage.setItem("sessionToken", token);
ESLint flat config example
import sdl from "eslint-plugin-sdl-2";
export default [
{
plugins: { sdl },
rules: {
"sdl/no-cookies": "error",
},
},
];
When not to use it
Disable this rule when application requirements mandate cookie-backed sessions with hardened attributes and server controls.
Package documentation
Further reading
Rule catalog ID: R006