docs/running_psalm/issues/TaintedCookie.md
Potential cookie injection. This rule is emitted when user-controlled input can be passed into a cookie.
The risk of setting arbitrary cookies depends on further application configuration.
Examples of potential issues:
<?php
setcookie('authtoken', $_GET['value'], time() + (86400 * 30), '/');
If this is required functionality, limit the cookie setting to values and not the name. (e.g. authtoken in the example)
Make sure to change session tokens after authentication attempts.