* it sends data which might be intercepted or dangerous.
* it receives a response which might have been crafted by an attacker.
* as each request opens a socket and triggers some processing for the sender and the recipient, it is possible to exhaust resources on both sides by sending too many requests.
This rule flags code that initiates an HTTP request. The goal is to guide security code reviews.