@nahisaho/musubix-security 2.0.1 → 2.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (363) hide show
  1. package/dist/analysis/enhanced-taint-analyzer.d.ts +120 -0
  2. package/dist/analysis/enhanced-taint-analyzer.d.ts.map +1 -0
  3. package/dist/analysis/enhanced-taint-analyzer.js +450 -0
  4. package/dist/analysis/enhanced-taint-analyzer.js.map +1 -0
  5. package/dist/analysis/index.d.ts +1 -0
  6. package/dist/analysis/index.d.ts.map +1 -1
  7. package/dist/analysis/index.js +1 -0
  8. package/dist/analysis/index.js.map +1 -1
  9. package/dist/analysis/interprocedural/call-graph-builder.d.ts +192 -0
  10. package/dist/analysis/interprocedural/call-graph-builder.d.ts.map +1 -0
  11. package/dist/analysis/interprocedural/call-graph-builder.js +510 -0
  12. package/dist/analysis/interprocedural/call-graph-builder.js.map +1 -0
  13. package/dist/analysis/interprocedural/dfg-adapter.d.ts +166 -0
  14. package/dist/analysis/interprocedural/dfg-adapter.d.ts.map +1 -0
  15. package/dist/analysis/interprocedural/dfg-adapter.js +455 -0
  16. package/dist/analysis/interprocedural/dfg-adapter.js.map +1 -0
  17. package/dist/analysis/interprocedural/index.d.ts +9 -0
  18. package/dist/analysis/interprocedural/index.d.ts.map +1 -0
  19. package/dist/analysis/interprocedural/index.js +9 -0
  20. package/dist/analysis/interprocedural/index.js.map +1 -0
  21. package/dist/analysis/interprocedural/taint-propagator.d.ts +250 -0
  22. package/dist/analysis/interprocedural/taint-propagator.d.ts.map +1 -0
  23. package/dist/analysis/interprocedural/taint-propagator.js +435 -0
  24. package/dist/analysis/interprocedural/taint-propagator.js.map +1 -0
  25. package/dist/analysis/sanitizers/command-sanitizers.d.ts +12 -0
  26. package/dist/analysis/sanitizers/command-sanitizers.d.ts.map +1 -0
  27. package/dist/analysis/sanitizers/command-sanitizers.js +123 -0
  28. package/dist/analysis/sanitizers/command-sanitizers.js.map +1 -0
  29. package/dist/analysis/sanitizers/html-sanitizers.d.ts +12 -0
  30. package/dist/analysis/sanitizers/html-sanitizers.d.ts.map +1 -0
  31. package/dist/analysis/sanitizers/html-sanitizers.js +213 -0
  32. package/dist/analysis/sanitizers/html-sanitizers.js.map +1 -0
  33. package/dist/analysis/sanitizers/index.d.ts +35 -0
  34. package/dist/analysis/sanitizers/index.d.ts.map +1 -0
  35. package/dist/analysis/sanitizers/index.js +59 -0
  36. package/dist/analysis/sanitizers/index.js.map +1 -0
  37. package/dist/analysis/sanitizers/path-sanitizers.d.ts +12 -0
  38. package/dist/analysis/sanitizers/path-sanitizers.d.ts.map +1 -0
  39. package/dist/analysis/sanitizers/path-sanitizers.js +163 -0
  40. package/dist/analysis/sanitizers/path-sanitizers.js.map +1 -0
  41. package/dist/analysis/sanitizers/sql-sanitizers.d.ts +12 -0
  42. package/dist/analysis/sanitizers/sql-sanitizers.d.ts.map +1 -0
  43. package/dist/analysis/sanitizers/sql-sanitizers.js +216 -0
  44. package/dist/analysis/sanitizers/sql-sanitizers.js.map +1 -0
  45. package/dist/analysis/sanitizers/types.d.ts +78 -0
  46. package/dist/analysis/sanitizers/types.d.ts.map +1 -0
  47. package/dist/analysis/sanitizers/types.js +7 -0
  48. package/dist/analysis/sanitizers/types.js.map +1 -0
  49. package/dist/analysis/sanitizers/validation-sanitizers.d.ts +12 -0
  50. package/dist/analysis/sanitizers/validation-sanitizers.d.ts.map +1 -0
  51. package/dist/analysis/sanitizers/validation-sanitizers.js +268 -0
  52. package/dist/analysis/sanitizers/validation-sanitizers.js.map +1 -0
  53. package/dist/analysis/sinks/code-eval.d.ts +12 -0
  54. package/dist/analysis/sinks/code-eval.d.ts.map +1 -0
  55. package/dist/analysis/sinks/code-eval.js +231 -0
  56. package/dist/analysis/sinks/code-eval.js.map +1 -0
  57. package/dist/analysis/sinks/command-exec.d.ts +12 -0
  58. package/dist/analysis/sinks/command-exec.d.ts.map +1 -0
  59. package/dist/analysis/sinks/command-exec.js +187 -0
  60. package/dist/analysis/sinks/command-exec.js.map +1 -0
  61. package/dist/analysis/sinks/file-operations.d.ts +12 -0
  62. package/dist/analysis/sinks/file-operations.d.ts.map +1 -0
  63. package/dist/analysis/sinks/file-operations.js +239 -0
  64. package/dist/analysis/sinks/file-operations.js.map +1 -0
  65. package/dist/analysis/sinks/html-output.d.ts +12 -0
  66. package/dist/analysis/sinks/html-output.d.ts.map +1 -0
  67. package/dist/analysis/sinks/html-output.js +256 -0
  68. package/dist/analysis/sinks/html-output.js.map +1 -0
  69. package/dist/analysis/sinks/index.d.ts +30 -0
  70. package/dist/analysis/sinks/index.d.ts.map +1 -0
  71. package/dist/analysis/sinks/index.js +46 -0
  72. package/dist/analysis/sinks/index.js.map +1 -0
  73. package/dist/analysis/sinks/sql-query.d.ts +12 -0
  74. package/dist/analysis/sinks/sql-query.d.ts.map +1 -0
  75. package/dist/analysis/sinks/sql-query.js +209 -0
  76. package/dist/analysis/sinks/sql-query.js.map +1 -0
  77. package/dist/analysis/sinks/types.d.ts +97 -0
  78. package/dist/analysis/sinks/types.d.ts.map +1 -0
  79. package/dist/analysis/sinks/types.js +7 -0
  80. package/dist/analysis/sinks/types.js.map +1 -0
  81. package/dist/analysis/sources/database.d.ts +12 -0
  82. package/dist/analysis/sources/database.d.ts.map +1 -0
  83. package/dist/analysis/sources/database.js +211 -0
  84. package/dist/analysis/sources/database.js.map +1 -0
  85. package/dist/analysis/sources/environment.d.ts +12 -0
  86. package/dist/analysis/sources/environment.d.ts.map +1 -0
  87. package/dist/analysis/sources/environment.js +158 -0
  88. package/dist/analysis/sources/environment.js.map +1 -0
  89. package/dist/analysis/sources/file-system.d.ts +12 -0
  90. package/dist/analysis/sources/file-system.d.ts.map +1 -0
  91. package/dist/analysis/sources/file-system.js +180 -0
  92. package/dist/analysis/sources/file-system.js.map +1 -0
  93. package/dist/analysis/sources/http-request.d.ts +12 -0
  94. package/dist/analysis/sources/http-request.d.ts.map +1 -0
  95. package/dist/analysis/sources/http-request.js +179 -0
  96. package/dist/analysis/sources/http-request.js.map +1 -0
  97. package/dist/analysis/sources/index.d.ts +26 -0
  98. package/dist/analysis/sources/index.d.ts.map +1 -0
  99. package/dist/analysis/sources/index.js +40 -0
  100. package/dist/analysis/sources/index.js.map +1 -0
  101. package/dist/analysis/sources/types.d.ts +93 -0
  102. package/dist/analysis/sources/types.d.ts.map +1 -0
  103. package/dist/analysis/sources/types.js +7 -0
  104. package/dist/analysis/sources/types.js.map +1 -0
  105. package/dist/analysis/sources/user-input.d.ts +12 -0
  106. package/dist/analysis/sources/user-input.d.ts.map +1 -0
  107. package/dist/analysis/sources/user-input.js +261 -0
  108. package/dist/analysis/sources/user-input.js.map +1 -0
  109. package/dist/cve/cpe-matcher.d.ts +183 -0
  110. package/dist/cve/cpe-matcher.d.ts.map +1 -0
  111. package/dist/cve/cpe-matcher.js +396 -0
  112. package/dist/cve/cpe-matcher.js.map +1 -0
  113. package/dist/cve/cve-cache.d.ts +225 -0
  114. package/dist/cve/cve-cache.d.ts.map +1 -0
  115. package/dist/cve/cve-cache.js +452 -0
  116. package/dist/cve/cve-cache.js.map +1 -0
  117. package/dist/cve/cve-cache.test.d.ts +6 -0
  118. package/dist/cve/cve-cache.test.d.ts.map +1 -0
  119. package/dist/cve/cve-cache.test.js +363 -0
  120. package/dist/cve/cve-cache.test.js.map +1 -0
  121. package/dist/cve/dependency-parser.d.ts +204 -0
  122. package/dist/cve/dependency-parser.d.ts.map +1 -0
  123. package/dist/cve/dependency-parser.js +338 -0
  124. package/dist/cve/dependency-parser.js.map +1 -0
  125. package/dist/cve/index.d.ts +20 -0
  126. package/dist/cve/index.d.ts.map +1 -0
  127. package/dist/cve/index.js +13 -0
  128. package/dist/cve/index.js.map +1 -0
  129. package/dist/cve/nvd-client.d.ts +137 -0
  130. package/dist/cve/nvd-client.d.ts.map +1 -0
  131. package/dist/cve/nvd-client.js +333 -0
  132. package/dist/cve/nvd-client.js.map +1 -0
  133. package/dist/cve/rate-limiter.d.ts +194 -0
  134. package/dist/cve/rate-limiter.d.ts.map +1 -0
  135. package/dist/cve/rate-limiter.js +276 -0
  136. package/dist/cve/rate-limiter.js.map +1 -0
  137. package/dist/cve/report-generator.d.ts +145 -0
  138. package/dist/cve/report-generator.d.ts.map +1 -0
  139. package/dist/cve/report-generator.js +377 -0
  140. package/dist/cve/report-generator.js.map +1 -0
  141. package/dist/cve/report-generator.test.d.ts +6 -0
  142. package/dist/cve/report-generator.test.d.ts.map +1 -0
  143. package/dist/cve/report-generator.test.js +275 -0
  144. package/dist/cve/report-generator.test.js.map +1 -0
  145. package/dist/cve/vulnerability-scanner.d.ts +198 -0
  146. package/dist/cve/vulnerability-scanner.d.ts.map +1 -0
  147. package/dist/cve/vulnerability-scanner.js +311 -0
  148. package/dist/cve/vulnerability-scanner.js.map +1 -0
  149. package/dist/cve/vulnerability-scanner.test.d.ts +6 -0
  150. package/dist/cve/vulnerability-scanner.test.d.ts.map +1 -0
  151. package/dist/cve/vulnerability-scanner.test.js +329 -0
  152. package/dist/cve/vulnerability-scanner.test.js.map +1 -0
  153. package/dist/index.d.ts +1 -0
  154. package/dist/index.d.ts.map +1 -1
  155. package/dist/index.js +4 -0
  156. package/dist/index.js.map +1 -1
  157. package/dist/rules/config/config-parser.d.ts +119 -0
  158. package/dist/rules/config/config-parser.d.ts.map +1 -0
  159. package/dist/rules/config/config-parser.js +376 -0
  160. package/dist/rules/config/config-parser.js.map +1 -0
  161. package/dist/rules/config/index.d.ts +8 -0
  162. package/dist/rules/config/index.d.ts.map +1 -0
  163. package/dist/rules/config/index.js +8 -0
  164. package/dist/rules/config/index.js.map +1 -0
  165. package/dist/rules/config/profiles.d.ts +85 -0
  166. package/dist/rules/config/profiles.d.ts.map +1 -0
  167. package/dist/rules/config/profiles.js +226 -0
  168. package/dist/rules/config/profiles.js.map +1 -0
  169. package/dist/rules/cwe/cwe-119-buffer-overflow.d.ts +9 -0
  170. package/dist/rules/cwe/cwe-119-buffer-overflow.d.ts.map +1 -0
  171. package/dist/rules/cwe/cwe-119-buffer-overflow.js +54 -0
  172. package/dist/rules/cwe/cwe-119-buffer-overflow.js.map +1 -0
  173. package/dist/rules/cwe/cwe-125-oob-read.d.ts +20 -0
  174. package/dist/rules/cwe/cwe-125-oob-read.d.ts.map +1 -0
  175. package/dist/rules/cwe/cwe-125-oob-read.js +247 -0
  176. package/dist/rules/cwe/cwe-125-oob-read.js.map +1 -0
  177. package/dist/rules/cwe/cwe-190-integer-overflow.d.ts +9 -0
  178. package/dist/rules/cwe/cwe-190-integer-overflow.d.ts.map +1 -0
  179. package/dist/rules/cwe/cwe-190-integer-overflow.js +55 -0
  180. package/dist/rules/cwe/cwe-190-integer-overflow.js.map +1 -0
  181. package/dist/rules/cwe/cwe-20-input-validation.d.ts +21 -0
  182. package/dist/rules/cwe/cwe-20-input-validation.d.ts.map +1 -0
  183. package/dist/rules/cwe/cwe-20-input-validation.js +342 -0
  184. package/dist/rules/cwe/cwe-20-input-validation.js.map +1 -0
  185. package/dist/rules/cwe/cwe-22-path-traversal.d.ts +20 -0
  186. package/dist/rules/cwe/cwe-22-path-traversal.d.ts.map +1 -0
  187. package/dist/rules/cwe/cwe-22-path-traversal.js +306 -0
  188. package/dist/rules/cwe/cwe-22-path-traversal.js.map +1 -0
  189. package/dist/rules/cwe/cwe-269-improper-privilege.d.ts +9 -0
  190. package/dist/rules/cwe/cwe-269-improper-privilege.d.ts.map +1 -0
  191. package/dist/rules/cwe/cwe-269-improper-privilege.js +58 -0
  192. package/dist/rules/cwe/cwe-269-improper-privilege.js.map +1 -0
  193. package/dist/rules/cwe/cwe-276-default-permissions.d.ts +9 -0
  194. package/dist/rules/cwe/cwe-276-default-permissions.d.ts.map +1 -0
  195. package/dist/rules/cwe/cwe-276-default-permissions.js +54 -0
  196. package/dist/rules/cwe/cwe-276-default-permissions.js.map +1 -0
  197. package/dist/rules/cwe/cwe-287-improper-auth.d.ts +9 -0
  198. package/dist/rules/cwe/cwe-287-improper-auth.d.ts.map +1 -0
  199. package/dist/rules/cwe/cwe-287-improper-auth.js +57 -0
  200. package/dist/rules/cwe/cwe-287-improper-auth.js.map +1 -0
  201. package/dist/rules/cwe/cwe-306-missing-auth-critical.d.ts +9 -0
  202. package/dist/rules/cwe/cwe-306-missing-auth-critical.d.ts.map +1 -0
  203. package/dist/rules/cwe/cwe-306-missing-auth-critical.js +53 -0
  204. package/dist/rules/cwe/cwe-306-missing-auth-critical.js.map +1 -0
  205. package/dist/rules/cwe/cwe-352-csrf.d.ts +9 -0
  206. package/dist/rules/cwe/cwe-352-csrf.d.ts.map +1 -0
  207. package/dist/rules/cwe/cwe-352-csrf.js +51 -0
  208. package/dist/rules/cwe/cwe-352-csrf.js.map +1 -0
  209. package/dist/rules/cwe/cwe-362-race-condition.d.ts +9 -0
  210. package/dist/rules/cwe/cwe-362-race-condition.d.ts.map +1 -0
  211. package/dist/rules/cwe/cwe-362-race-condition.js +55 -0
  212. package/dist/rules/cwe/cwe-362-race-condition.js.map +1 -0
  213. package/dist/rules/cwe/cwe-416-use-after-free.d.ts +23 -0
  214. package/dist/rules/cwe/cwe-416-use-after-free.d.ts.map +1 -0
  215. package/dist/rules/cwe/cwe-416-use-after-free.js +402 -0
  216. package/dist/rules/cwe/cwe-416-use-after-free.js.map +1 -0
  217. package/dist/rules/cwe/cwe-434-file-upload.d.ts +9 -0
  218. package/dist/rules/cwe/cwe-434-file-upload.d.ts.map +1 -0
  219. package/dist/rules/cwe/cwe-434-file-upload.js +55 -0
  220. package/dist/rules/cwe/cwe-434-file-upload.js.map +1 -0
  221. package/dist/rules/cwe/cwe-476-null-deref.d.ts +9 -0
  222. package/dist/rules/cwe/cwe-476-null-deref.d.ts.map +1 -0
  223. package/dist/rules/cwe/cwe-476-null-deref.js +55 -0
  224. package/dist/rules/cwe/cwe-476-null-deref.js.map +1 -0
  225. package/dist/rules/cwe/cwe-502-deserialization.d.ts +9 -0
  226. package/dist/rules/cwe/cwe-502-deserialization.d.ts.map +1 -0
  227. package/dist/rules/cwe/cwe-502-deserialization.js +57 -0
  228. package/dist/rules/cwe/cwe-502-deserialization.js.map +1 -0
  229. package/dist/rules/cwe/cwe-77-command-injection.d.ts +9 -0
  230. package/dist/rules/cwe/cwe-77-command-injection.d.ts.map +1 -0
  231. package/dist/rules/cwe/cwe-77-command-injection.js +55 -0
  232. package/dist/rules/cwe/cwe-77-command-injection.js.map +1 -0
  233. package/dist/rules/cwe/cwe-78-command-injection.d.ts +20 -0
  234. package/dist/rules/cwe/cwe-78-command-injection.d.ts.map +1 -0
  235. package/dist/rules/cwe/cwe-78-command-injection.js +259 -0
  236. package/dist/rules/cwe/cwe-78-command-injection.js.map +1 -0
  237. package/dist/rules/cwe/cwe-787-oob-write.d.ts +21 -0
  238. package/dist/rules/cwe/cwe-787-oob-write.d.ts.map +1 -0
  239. package/dist/rules/cwe/cwe-787-oob-write.js +321 -0
  240. package/dist/rules/cwe/cwe-787-oob-write.js.map +1 -0
  241. package/dist/rules/cwe/cwe-79-xss.d.ts +22 -0
  242. package/dist/rules/cwe/cwe-79-xss.d.ts.map +1 -0
  243. package/dist/rules/cwe/cwe-79-xss.js +386 -0
  244. package/dist/rules/cwe/cwe-79-xss.js.map +1 -0
  245. package/dist/rules/cwe/cwe-798-hardcoded-credentials.d.ts +9 -0
  246. package/dist/rules/cwe/cwe-798-hardcoded-credentials.d.ts.map +1 -0
  247. package/dist/rules/cwe/cwe-798-hardcoded-credentials.js +58 -0
  248. package/dist/rules/cwe/cwe-798-hardcoded-credentials.js.map +1 -0
  249. package/dist/rules/cwe/cwe-862-missing-auth.d.ts +9 -0
  250. package/dist/rules/cwe/cwe-862-missing-auth.d.ts.map +1 -0
  251. package/dist/rules/cwe/cwe-862-missing-auth.js +55 -0
  252. package/dist/rules/cwe/cwe-862-missing-auth.js.map +1 -0
  253. package/dist/rules/cwe/cwe-863-incorrect-auth.d.ts +9 -0
  254. package/dist/rules/cwe/cwe-863-incorrect-auth.d.ts.map +1 -0
  255. package/dist/rules/cwe/cwe-863-incorrect-auth.js +58 -0
  256. package/dist/rules/cwe/cwe-863-incorrect-auth.js.map +1 -0
  257. package/dist/rules/cwe/cwe-89-sql-injection.d.ts +21 -0
  258. package/dist/rules/cwe/cwe-89-sql-injection.d.ts.map +1 -0
  259. package/dist/rules/cwe/cwe-89-sql-injection.js +456 -0
  260. package/dist/rules/cwe/cwe-89-sql-injection.js.map +1 -0
  261. package/dist/rules/cwe/cwe-918-ssrf.d.ts +9 -0
  262. package/dist/rules/cwe/cwe-918-ssrf.d.ts.map +1 -0
  263. package/dist/rules/cwe/cwe-918-ssrf.js +59 -0
  264. package/dist/rules/cwe/cwe-918-ssrf.js.map +1 -0
  265. package/dist/rules/cwe/cwe-94-code-injection.d.ts +9 -0
  266. package/dist/rules/cwe/cwe-94-code-injection.d.ts.map +1 -0
  267. package/dist/rules/cwe/cwe-94-code-injection.js +59 -0
  268. package/dist/rules/cwe/cwe-94-code-injection.js.map +1 -0
  269. package/dist/rules/cwe/index.d.ts +43 -0
  270. package/dist/rules/cwe/index.d.ts.map +1 -0
  271. package/dist/rules/cwe/index.js +99 -0
  272. package/dist/rules/cwe/index.js.map +1 -0
  273. package/dist/rules/engine/index.d.ts +10 -0
  274. package/dist/rules/engine/index.d.ts.map +1 -0
  275. package/dist/rules/engine/index.js +9 -0
  276. package/dist/rules/engine/index.js.map +1 -0
  277. package/dist/rules/engine/rule-context.d.ts +99 -0
  278. package/dist/rules/engine/rule-context.d.ts.map +1 -0
  279. package/dist/rules/engine/rule-context.js +175 -0
  280. package/dist/rules/engine/rule-context.js.map +1 -0
  281. package/dist/rules/engine/rule-engine.d.ts +132 -0
  282. package/dist/rules/engine/rule-engine.d.ts.map +1 -0
  283. package/dist/rules/engine/rule-engine.js +379 -0
  284. package/dist/rules/engine/rule-engine.js.map +1 -0
  285. package/dist/rules/engine/rule-registry.d.ts +133 -0
  286. package/dist/rules/engine/rule-registry.d.ts.map +1 -0
  287. package/dist/rules/engine/rule-registry.js +281 -0
  288. package/dist/rules/engine/rule-registry.js.map +1 -0
  289. package/dist/rules/index.d.ts +14 -0
  290. package/dist/rules/index.d.ts.map +1 -0
  291. package/dist/rules/index.js +16 -0
  292. package/dist/rules/index.js.map +1 -0
  293. package/dist/rules/owasp/a01-broken-access-control.d.ts +19 -0
  294. package/dist/rules/owasp/a01-broken-access-control.d.ts.map +1 -0
  295. package/dist/rules/owasp/a01-broken-access-control.js +295 -0
  296. package/dist/rules/owasp/a01-broken-access-control.js.map +1 -0
  297. package/dist/rules/owasp/a02-cryptographic-failures.d.ts +19 -0
  298. package/dist/rules/owasp/a02-cryptographic-failures.d.ts.map +1 -0
  299. package/dist/rules/owasp/a02-cryptographic-failures.js +327 -0
  300. package/dist/rules/owasp/a02-cryptographic-failures.js.map +1 -0
  301. package/dist/rules/owasp/a03-injection.d.ts +21 -0
  302. package/dist/rules/owasp/a03-injection.d.ts.map +1 -0
  303. package/dist/rules/owasp/a03-injection.js +342 -0
  304. package/dist/rules/owasp/a03-injection.js.map +1 -0
  305. package/dist/rules/owasp/a04-insecure-design.d.ts +19 -0
  306. package/dist/rules/owasp/a04-insecure-design.d.ts.map +1 -0
  307. package/dist/rules/owasp/a04-insecure-design.js +403 -0
  308. package/dist/rules/owasp/a04-insecure-design.js.map +1 -0
  309. package/dist/rules/owasp/a05-security-misconfiguration.d.ts +19 -0
  310. package/dist/rules/owasp/a05-security-misconfiguration.d.ts.map +1 -0
  311. package/dist/rules/owasp/a05-security-misconfiguration.js +371 -0
  312. package/dist/rules/owasp/a05-security-misconfiguration.js.map +1 -0
  313. package/dist/rules/owasp/a06-vulnerable-components.d.ts +18 -0
  314. package/dist/rules/owasp/a06-vulnerable-components.d.ts.map +1 -0
  315. package/dist/rules/owasp/a06-vulnerable-components.js +243 -0
  316. package/dist/rules/owasp/a06-vulnerable-components.js.map +1 -0
  317. package/dist/rules/owasp/a07-auth-failures.d.ts +19 -0
  318. package/dist/rules/owasp/a07-auth-failures.d.ts.map +1 -0
  319. package/dist/rules/owasp/a07-auth-failures.js +300 -0
  320. package/dist/rules/owasp/a07-auth-failures.js.map +1 -0
  321. package/dist/rules/owasp/a08-integrity-failures.d.ts +18 -0
  322. package/dist/rules/owasp/a08-integrity-failures.d.ts.map +1 -0
  323. package/dist/rules/owasp/a08-integrity-failures.js +306 -0
  324. package/dist/rules/owasp/a08-integrity-failures.js.map +1 -0
  325. package/dist/rules/owasp/a09-logging-failures.d.ts +18 -0
  326. package/dist/rules/owasp/a09-logging-failures.d.ts.map +1 -0
  327. package/dist/rules/owasp/a09-logging-failures.js +339 -0
  328. package/dist/rules/owasp/a09-logging-failures.js.map +1 -0
  329. package/dist/rules/owasp/a10-ssrf.d.ts +18 -0
  330. package/dist/rules/owasp/a10-ssrf.d.ts.map +1 -0
  331. package/dist/rules/owasp/a10-ssrf.js +349 -0
  332. package/dist/rules/owasp/a10-ssrf.js.map +1 -0
  333. package/dist/rules/owasp/index.d.ts +20 -0
  334. package/dist/rules/owasp/index.d.ts.map +1 -0
  335. package/dist/rules/owasp/index.js +53 -0
  336. package/dist/rules/owasp/index.js.map +1 -0
  337. package/dist/rules/types.d.ts +277 -0
  338. package/dist/rules/types.d.ts.map +1 -0
  339. package/dist/rules/types.js +34 -0
  340. package/dist/rules/types.js.map +1 -0
  341. package/dist/tests/integration/epic-integration.test.d.ts +7 -0
  342. package/dist/tests/integration/epic-integration.test.d.ts.map +1 -0
  343. package/dist/tests/integration/epic-integration.test.js +390 -0
  344. package/dist/tests/integration/epic-integration.test.js.map +1 -0
  345. package/dist/tests/rules/cwe/cwe-top25-1-13.test.d.ts +2 -0
  346. package/dist/tests/rules/cwe/cwe-top25-1-13.test.d.ts.map +1 -0
  347. package/dist/tests/rules/cwe/cwe-top25-1-13.test.js +154 -0
  348. package/dist/tests/rules/cwe/cwe-top25-1-13.test.js.map +1 -0
  349. package/dist/tests/rules/cwe/cwe-top25-14-25.test.d.ts +2 -0
  350. package/dist/tests/rules/cwe/cwe-top25-14-25.test.d.ts.map +1 -0
  351. package/dist/tests/rules/cwe/cwe-top25-14-25.test.js +121 -0
  352. package/dist/tests/rules/cwe/cwe-top25-14-25.test.js.map +1 -0
  353. package/dist/types/cve.d.ts +278 -0
  354. package/dist/types/cve.d.ts.map +1 -0
  355. package/dist/types/cve.js +7 -0
  356. package/dist/types/cve.js.map +1 -0
  357. package/dist/types/index.d.ts +2 -0
  358. package/dist/types/index.d.ts.map +1 -1
  359. package/dist/types/rule.d.ts +245 -0
  360. package/dist/types/rule.d.ts.map +1 -0
  361. package/dist/types/rule.js +7 -0
  362. package/dist/types/rule.js.map +1 -0
  363. package/package.json +1 -1
@@ -0,0 +1,349 @@
1
+ /**
2
+ * @fileoverview OWASP A10:2021 - Server-Side Request Forgery (SSRF)
3
+ * @module @nahisaho/musubix-security/rules/owasp/a10
4
+ * @trace REQ-SEC-OWASP-010
5
+ */
6
+ /**
7
+ * OWASP A10:2021 - Server-Side Request Forgery (SSRF)
8
+ *
9
+ * Detects:
10
+ * - URL fetching with user input
11
+ * - Missing URL validation
12
+ * - Internal network access risks
13
+ * - Metadata endpoint access
14
+ */
15
+ export const owaspA10SSRF = {
16
+ id: 'owasp-a10-ssrf',
17
+ name: 'OWASP A10:2021 - Server-Side Request Forgery (SSRF)',
18
+ description: 'Detects potential SSRF vulnerabilities where user input controls server-side requests',
19
+ defaultSeverity: 'critical',
20
+ category: 'ssrf',
21
+ owasp: ['A10:2021'],
22
+ cwe: ['918', '441', '611'],
23
+ references: [
24
+ {
25
+ title: 'OWASP A10:2021',
26
+ url: 'https://owasp.org/Top10/A10_2021-Server-Side_Request_Forgery_%28SSRF%29/',
27
+ },
28
+ {
29
+ title: 'CWE-918: Server-Side Request Forgery (SSRF)',
30
+ url: 'https://cwe.mitre.org/data/definitions/918.html',
31
+ },
32
+ ],
33
+ async analyze(context) {
34
+ const findings = [];
35
+ checkUserControlledURLs(context, findings);
36
+ checkMetadataEndpoints(context, findings);
37
+ checkInternalNetworkAccess(context, findings);
38
+ checkRedirectFollowing(context, findings);
39
+ checkXMLExternalEntities(context, findings);
40
+ return findings;
41
+ },
42
+ };
43
+ /**
44
+ * Check for user-controlled URLs in fetch/request operations
45
+ */
46
+ function checkUserControlledURLs(context, findings) {
47
+ const sourceCode = context.sourceCode;
48
+ const lines = sourceCode.split('\n');
49
+ const ssrfPatterns = [
50
+ // fetch with user input
51
+ { pattern: /fetch\s*\(\s*(?:req\.(?:body|query|params)\.\w+|url|targetUrl|endpoint)/i, type: 'fetch' },
52
+ { pattern: /fetch\s*\(\s*`[^`]*\$\{req\./i, type: 'fetch with template' },
53
+ // axios with user input
54
+ { pattern: /axios\.(?:get|post|put|delete|patch)\s*\(\s*(?:req\.(?:body|query|params)|url|targetUrl)/i, type: 'axios' },
55
+ { pattern: /axios\s*\(\s*\{[^}]*url\s*:\s*(?:req\.|url|targetUrl)/i, type: 'axios config' },
56
+ // request library
57
+ { pattern: /request\s*\(\s*(?:req\.(?:body|query|params)|url|targetUrl)/i, type: 'request' },
58
+ // got library
59
+ { pattern: /got\s*\(\s*(?:req\.(?:body|query|params)|url|targetUrl)/i, type: 'got' },
60
+ // http/https module
61
+ { pattern: /https?\.(?:get|request)\s*\(\s*(?:req\.(?:body|query|params)|url|targetUrl)/i, type: 'http(s) module' },
62
+ // URL constructor with user input
63
+ { pattern: /new\s+URL\s*\(\s*req\.(?:body|query|params)/i, type: 'URL constructor' },
64
+ // Image loading from user URL
65
+ { pattern: /(?:img|image)\.src\s*=\s*(?:req\.|url|userUrl)/i, type: 'image source' },
66
+ ];
67
+ for (let lineNum = 0; lineNum < lines.length; lineNum++) {
68
+ const line = lines[lineNum];
69
+ for (const { pattern, type } of ssrfPatterns) {
70
+ if (pattern.test(line)) {
71
+ // Check for URL validation
72
+ const surroundingCode = lines.slice(Math.max(0, lineNum - 5), lineNum + 1).join('\n');
73
+ const hasValidation = /(?:validate.*url|allowlist|whitelist|isValidUrl|URL\.parse|new URL)/i.test(surroundingCode);
74
+ const hasAllowlist = /(?:allowedHosts|allowedDomains|whitelist)/i.test(surroundingCode);
75
+ if (!hasValidation && !hasAllowlist) {
76
+ findings.push({
77
+ id: `owasp-a10-url-${findings.length + 1}`,
78
+ ruleId: 'owasp-a10-ssrf',
79
+ severity: 'critical',
80
+ message: `Potential SSRF vulnerability: ${type} with user-controlled URL`,
81
+ location: {
82
+ file: context.filePath,
83
+ startLine: lineNum + 1,
84
+ endLine: lineNum + 1,
85
+ startColumn: 0,
86
+ endColumn: line.length,
87
+ },
88
+ cwe: ['918'],
89
+ suggestion: {
90
+ description: 'Validate and restrict URLs to allowed domains',
91
+ example: `// Validate URLs with allowlist:
92
+ const ALLOWED_HOSTS = ['api.trusted.com', 'cdn.trusted.com'];
93
+
94
+ function isAllowedUrl(urlString) {
95
+ try {
96
+ const url = new URL(urlString);
97
+ return ALLOWED_HOSTS.includes(url.hostname) &&
98
+ url.protocol === 'https:';
99
+ } catch {
100
+ return false;
101
+ }
102
+ }
103
+
104
+ if (!isAllowedUrl(req.body.url)) {
105
+ return res.status(400).json({ error: 'Invalid URL' });
106
+ }`,
107
+ },
108
+ });
109
+ }
110
+ break;
111
+ }
112
+ }
113
+ }
114
+ }
115
+ /**
116
+ * Check for access to cloud metadata endpoints
117
+ */
118
+ function checkMetadataEndpoints(context, findings) {
119
+ const sourceCode = context.sourceCode;
120
+ const lines = sourceCode.split('\n');
121
+ const metadataPatterns = [
122
+ // AWS metadata
123
+ { pattern: /169\.254\.169\.254/i, cloud: 'AWS', endpoint: 'EC2 metadata' },
124
+ // GCP metadata
125
+ { pattern: /metadata\.google\.internal/i, cloud: 'GCP', endpoint: 'metadata service' },
126
+ { pattern: /169\.254\.169\.254.*computeMetadata/i, cloud: 'GCP', endpoint: 'compute metadata' },
127
+ // Azure metadata
128
+ { pattern: /169\.254\.169\.254.*metadata\/instance/i, cloud: 'Azure', endpoint: 'instance metadata' },
129
+ // Generic internal IPs that might be targeted
130
+ { pattern: /(?:10\.\d+\.\d+\.\d+|172\.(?:1[6-9]|2\d|3[01])\.\d+\.\d+|192\.168\.\d+\.\d+)/i, cloud: 'Private', endpoint: 'internal network' },
131
+ // localhost variants
132
+ { pattern: /(?:localhost|127\.0\.0\.1|0\.0\.0\.0|::1)(?::\d+)?/i, cloud: 'Local', endpoint: 'localhost' },
133
+ ];
134
+ // Check if user input can control these
135
+ const hasUserInput = /(?:req\.(?:body|query|params)|url\s*=|targetUrl|endpoint)/i.test(sourceCode);
136
+ if (!hasUserInput)
137
+ return;
138
+ for (let lineNum = 0; lineNum < lines.length; lineNum++) {
139
+ const line = lines[lineNum];
140
+ for (const { pattern, cloud, endpoint } of metadataPatterns) {
141
+ if (pattern.test(line)) {
142
+ // This is more of an informational finding - the real risk is if user input can reach these
143
+ findings.push({
144
+ id: `owasp-a10-metadata-${findings.length + 1}`,
145
+ ruleId: 'owasp-a10-ssrf',
146
+ severity: cloud === 'Private' ? 'high' : 'critical',
147
+ message: `${cloud} ${endpoint} detected - ensure user input cannot access this`,
148
+ location: {
149
+ file: context.filePath,
150
+ startLine: lineNum + 1,
151
+ endLine: lineNum + 1,
152
+ startColumn: 0,
153
+ endColumn: line.length,
154
+ },
155
+ cwe: ['918'],
156
+ suggestion: {
157
+ description: 'Block access to metadata endpoints and internal networks',
158
+ example: `// Block internal/metadata URLs:
159
+ const BLOCKED_HOSTS = [
160
+ /^169\\.254\\.169\\.254$/,
161
+ /^metadata\\.google\\.internal$/,
162
+ /^10\\./,
163
+ /^172\\.(1[6-9]|2\\d|3[01])\\./,
164
+ /^192\\.168\\./,
165
+ /^localhost$/,
166
+ /^127\\./
167
+ ];
168
+
169
+ function isBlockedUrl(urlString) {
170
+ const url = new URL(urlString);
171
+ return BLOCKED_HOSTS.some(pattern => pattern.test(url.hostname));
172
+ }`,
173
+ },
174
+ });
175
+ break;
176
+ }
177
+ }
178
+ }
179
+ }
180
+ /**
181
+ * Check for internal network access patterns
182
+ */
183
+ function checkInternalNetworkAccess(context, findings) {
184
+ const sourceCode = context.sourceCode;
185
+ const lines = sourceCode.split('\n');
186
+ const internalPatterns = [
187
+ // File protocol
188
+ { pattern: /['"`]file:\/\//i, protocol: 'file://', issue: 'Local file access' },
189
+ // gopher protocol
190
+ { pattern: /['"`]gopher:\/\//i, protocol: 'gopher://', issue: 'Gopher protocol (can be used for SSRF attacks)' },
191
+ // dict protocol
192
+ { pattern: /['"`]dict:\/\//i, protocol: 'dict://', issue: 'Dict protocol' },
193
+ // ftp with credentials
194
+ { pattern: /['"`]ftp:\/\/[^@]*@/i, protocol: 'ftp://', issue: 'FTP with credentials in URL' },
195
+ // Internal hostnames
196
+ { pattern: /['"`]https?:\/\/(?:internal|intranet|corp|private|admin)\./i, protocol: 'http(s)', issue: 'Internal hostname pattern' },
197
+ ];
198
+ for (let lineNum = 0; lineNum < lines.length; lineNum++) {
199
+ const line = lines[lineNum];
200
+ for (const { pattern, protocol, issue } of internalPatterns) {
201
+ if (pattern.test(line)) {
202
+ findings.push({
203
+ id: `owasp-a10-internal-${findings.length + 1}`,
204
+ ruleId: 'owasp-a10-ssrf',
205
+ severity: 'high',
206
+ message: `Potential internal access via ${protocol}: ${issue}`,
207
+ location: {
208
+ file: context.filePath,
209
+ startLine: lineNum + 1,
210
+ endLine: lineNum + 1,
211
+ startColumn: 0,
212
+ endColumn: line.length,
213
+ },
214
+ cwe: ['918'],
215
+ suggestion: {
216
+ description: 'Restrict allowed protocols and validate URLs',
217
+ example: `// Only allow safe protocols:
218
+ const ALLOWED_PROTOCOLS = ['https:'];
219
+
220
+ function validateUrl(urlString) {
221
+ const url = new URL(urlString);
222
+ if (!ALLOWED_PROTOCOLS.includes(url.protocol)) {
223
+ throw new Error('Protocol not allowed');
224
+ }
225
+ return url;
226
+ }`,
227
+ },
228
+ });
229
+ break;
230
+ }
231
+ }
232
+ }
233
+ }
234
+ /**
235
+ * Check for unsafe redirect following
236
+ */
237
+ function checkRedirectFollowing(context, findings) {
238
+ const sourceCode = context.sourceCode;
239
+ const lines = sourceCode.split('\n');
240
+ const redirectPatterns = [
241
+ // Follow redirects without limit
242
+ { pattern: /follow.*redirect.*(?:true|unlimited)/i, issue: 'Unlimited redirect following' },
243
+ { pattern: /maxRedirects\s*:\s*(?:-1|Infinity|100|50)/i, issue: 'High redirect limit' },
244
+ // Location header following
245
+ { pattern: /res\.headers\.location/i, issue: 'Manual redirect following' },
246
+ // Open redirect potential
247
+ { pattern: /res\.redirect\s*\(\s*(?:req\.(?:body|query|params)|url|next|returnUrl)/i, issue: 'Open redirect vulnerability' },
248
+ ];
249
+ for (let lineNum = 0; lineNum < lines.length; lineNum++) {
250
+ const line = lines[lineNum];
251
+ for (const { pattern, issue } of redirectPatterns) {
252
+ if (pattern.test(line)) {
253
+ findings.push({
254
+ id: `owasp-a10-redirect-${findings.length + 1}`,
255
+ ruleId: 'owasp-a10-ssrf',
256
+ severity: issue.includes('Open redirect') ? 'high' : 'medium',
257
+ message: `Unsafe redirect handling: ${issue}`,
258
+ location: {
259
+ file: context.filePath,
260
+ startLine: lineNum + 1,
261
+ endLine: lineNum + 1,
262
+ startColumn: 0,
263
+ endColumn: line.length,
264
+ },
265
+ cwe: ['918', '601'],
266
+ suggestion: {
267
+ description: 'Limit redirects and validate redirect targets',
268
+ example: `// Limit redirects and validate targets:
269
+ const response = await fetch(url, {
270
+ redirect: 'manual', // Handle redirects manually
271
+ follow: 0
272
+ });
273
+
274
+ // For user-controlled redirects:
275
+ const ALLOWED_REDIRECT_HOSTS = ['mysite.com', 'auth.mysite.com'];
276
+
277
+ function safeRedirect(url, allowedHosts) {
278
+ const parsed = new URL(url, 'https://mysite.com');
279
+ if (!allowedHosts.includes(parsed.hostname)) {
280
+ return '/';
281
+ }
282
+ return parsed.pathname + parsed.search;
283
+ }`,
284
+ },
285
+ });
286
+ break;
287
+ }
288
+ }
289
+ }
290
+ }
291
+ /**
292
+ * Check for XML External Entity (XXE) vulnerabilities related to SSRF
293
+ */
294
+ function checkXMLExternalEntities(context, findings) {
295
+ const sourceCode = context.sourceCode;
296
+ const lines = sourceCode.split('\n');
297
+ const xxePatterns = [
298
+ // XML parsing without disabling external entities
299
+ { pattern: /xml2js.*parseString|DOMParser\(\)|XMLParser/i, parser: 'XML parser', issue: 'XML parsing - ensure external entities disabled' },
300
+ // libxmljs
301
+ { pattern: /libxmljs.*parseXml/i, parser: 'libxmljs', issue: 'Ensure noent: false, nonet: true' },
302
+ // External entity reference
303
+ { pattern: /<!ENTITY/i, parser: 'XML', issue: 'XML entity declaration detected' },
304
+ // SVG processing (can contain XXE)
305
+ { pattern: /(?:svg|image\/svg\+xml)/i, parser: 'SVG', issue: 'SVG processing may contain XXE risks' },
306
+ ];
307
+ for (let lineNum = 0; lineNum < lines.length; lineNum++) {
308
+ const line = lines[lineNum];
309
+ for (const { pattern, parser, issue } of xxePatterns) {
310
+ if (pattern.test(line)) {
311
+ // Check for safe configuration
312
+ const surroundingCode = lines.slice(Math.max(0, lineNum - 3), Math.min(lines.length, lineNum + 4)).join('\n');
313
+ const hasDisabledExternal = /(?:noent|external.*false|disableEntity|NOENT)/i.test(surroundingCode);
314
+ if (!hasDisabledExternal) {
315
+ findings.push({
316
+ id: `owasp-a10-xxe-${findings.length + 1}`,
317
+ ruleId: 'owasp-a10-ssrf',
318
+ severity: 'high',
319
+ message: `XXE/SSRF risk via ${parser}: ${issue}`,
320
+ location: {
321
+ file: context.filePath,
322
+ startLine: lineNum + 1,
323
+ endLine: lineNum + 1,
324
+ startColumn: 0,
325
+ endColumn: line.length,
326
+ },
327
+ cwe: ['611', '918'],
328
+ suggestion: {
329
+ description: 'Disable external entity processing in XML parsers',
330
+ example: `// Disable external entities in XML parsing:
331
+ const parser = new xml2js.Parser({
332
+ explicitRoot: false,
333
+ // xml2js is safe by default, but verify configuration
334
+ });
335
+
336
+ // For DOMParser in Node:
337
+ const doc = new DOMParser().parseFromString(xml, 'text/xml');
338
+
339
+ // Validate/sanitize SVG before processing`,
340
+ },
341
+ });
342
+ }
343
+ break;
344
+ }
345
+ }
346
+ }
347
+ }
348
+ export default owaspA10SSRF;
349
+ //# sourceMappingURL=a10-ssrf.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"a10-ssrf.js","sourceRoot":"","sources":["../../../src/rules/owasp/a10-ssrf.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAIH;;;;;;;;GAQG;AACH,MAAM,CAAC,MAAM,YAAY,GAAiB;IACxC,EAAE,EAAE,gBAAgB;IACpB,IAAI,EAAE,qDAAqD;IAC3D,WAAW,EAAE,uFAAuF;IACpG,eAAe,EAAE,UAAU;IAC3B,QAAQ,EAAE,MAAM;IAChB,KAAK,EAAE,CAAC,UAAU,CAAC;IACnB,GAAG,EAAE,CAAC,KAAK,EAAE,KAAK,EAAE,KAAK,CAAC;IAC1B,UAAU,EAAE;QACV;YACE,KAAK,EAAE,gBAAgB;YACvB,GAAG,EAAE,0EAA0E;SAChF;QACD;YACE,KAAK,EAAE,6CAA6C;YACpD,GAAG,EAAE,iDAAiD;SACvD;KACiB;IAEpB,KAAK,CAAC,OAAO,CAAC,OAAoB;QAChC,MAAM,QAAQ,GAAkB,EAAE,CAAC;QAEnC,uBAAuB,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;QAC3C,sBAAsB,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;QAC1C,0BAA0B,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;QAC9C,sBAAsB,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;QAC1C,wBAAwB,CAAC,OAAO,EAAE,QAAQ,CAAC,CAAC;QAE5C,OAAO,QAAQ,CAAC;IAClB,CAAC;CACF,CAAC;AAEF;;GAEG;AACH,SAAS,uBAAuB,CAAC,OAAoB,EAAE,QAAuB;IAC5E,MAAM,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC;IACtC,MAAM,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAErC,MAAM,YAAY,GAAG;QACnB,wBAAwB;QACxB,EAAE,OAAO,EAAE,0EAA0E,EAAE,IAAI,EAAE,OAAO,EAAE;QACtG,EAAE,OAAO,EAAE,+BAA+B,EAAE,IAAI,EAAE,qBAAqB,EAAE;QACzE,wBAAwB;QACxB,EAAE,OAAO,EAAE,2FAA2F,EAAE,IAAI,EAAE,OAAO,EAAE;QACvH,EAAE,OAAO,EAAE,wDAAwD,EAAE,IAAI,EAAE,cAAc,EAAE;QAC3F,kBAAkB;QAClB,EAAE,OAAO,EAAE,8DAA8D,EAAE,IAAI,EAAE,SAAS,EAAE;QAC5F,cAAc;QACd,EAAE,OAAO,EAAE,0DAA0D,EAAE,IAAI,EAAE,KAAK,EAAE;QACpF,oBAAoB;QACpB,EAAE,OAAO,EAAE,8EAA8E,EAAE,IAAI,EAAE,gBAAgB,EAAE;QACnH,kCAAkC;QAClC,EAAE,OAAO,EAAE,8CAA8C,EAAE,IAAI,EAAE,iBAAiB,EAAE;QACpF,8BAA8B;QAC9B,EAAE,OAAO,EAAE,iDAAiD,EAAE,IAAI,EAAE,cAAc,EAAE;KACrF,CAAC;IAEF,KAAK,IAAI,OAAO,GAAG,CAAC,EAAE,OAAO,GAAG,KAAK,CAAC,MAAM,EAAE,OAAO,EAAE,EAAE,CAAC;QACxD,MAAM,IAAI,GAAG,KAAK,CAAC,OAAO,CAAC,CAAC;QAE5B,KAAK,MAAM,EAAE,OAAO,EAAE,IAAI,EAAE,IAAI,YAAY,EAAE,CAAC;YAC7C,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,2BAA2B;gBAC3B,MAAM,eAAe,GAAG,KAAK,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,OAAO,GAAG,CAAC,CAAC,EAAE,OAAO,GAAG,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;gBACtF,MAAM,aAAa,GAAG,sEAAsE,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;gBACnH,MAAM,YAAY,GAAG,4CAA4C,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;gBAExF,IAAI,CAAC,aAAa,IAAI,CAAC,YAAY,EAAE,CAAC;oBACpC,QAAQ,CAAC,IAAI,CAAC;wBACZ,EAAE,EAAE,iBAAiB,QAAQ,CAAC,MAAM,GAAG,CAAC,EAAE;wBAC1C,MAAM,EAAE,gBAAgB;wBACxB,QAAQ,EAAE,UAAU;wBACpB,OAAO,EAAE,iCAAiC,IAAI,2BAA2B;wBACzE,QAAQ,EAAE;4BACR,IAAI,EAAE,OAAO,CAAC,QAAQ;4BACtB,SAAS,EAAE,OAAO,GAAG,CAAC;4BACtB,OAAO,EAAE,OAAO,GAAG,CAAC;4BACpB,WAAW,EAAE,CAAC;4BACd,SAAS,EAAE,IAAI,CAAC,MAAM;yBACvB;wBACD,GAAG,EAAE,CAAC,KAAK,CAAC;wBACZ,UAAU,EAAE;4BACV,WAAW,EAAE,+CAA+C;4BAC5D,OAAO,EAAE;;;;;;;;;;;;;;;EAerB;yBACW;qBACF,CAAC,CAAC;gBACL,CAAC;gBACD,MAAM;YACR,CAAC;QACH,CAAC;IACH,CAAC;AACH,CAAC;AAED;;GAEG;AACH,SAAS,sBAAsB,CAAC,OAAoB,EAAE,QAAuB;IAC3E,MAAM,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC;IACtC,MAAM,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAErC,MAAM,gBAAgB,GAAG;QACvB,eAAe;QACf,EAAE,OAAO,EAAE,qBAAqB,EAAE,KAAK,EAAE,KAAK,EAAE,QAAQ,EAAE,cAAc,EAAE;QAC1E,eAAe;QACf,EAAE,OAAO,EAAE,6BAA6B,EAAE,KAAK,EAAE,KAAK,EAAE,QAAQ,EAAE,kBAAkB,EAAE;QACtF,EAAE,OAAO,EAAE,sCAAsC,EAAE,KAAK,EAAE,KAAK,EAAE,QAAQ,EAAE,kBAAkB,EAAE;QAC/F,iBAAiB;QACjB,EAAE,OAAO,EAAE,yCAAyC,EAAE,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,mBAAmB,EAAE;QACrG,8CAA8C;QAC9C,EAAE,OAAO,EAAE,+EAA+E,EAAE,KAAK,EAAE,SAAS,EAAE,QAAQ,EAAE,kBAAkB,EAAE;QAC5I,qBAAqB;QACrB,EAAE,OAAO,EAAE,qDAAqD,EAAE,KAAK,EAAE,OAAO,EAAE,QAAQ,EAAE,WAAW,EAAE;KAC1G,CAAC;IAEF,wCAAwC;IACxC,MAAM,YAAY,GAAG,4DAA4D,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC;IAEnG,IAAI,CAAC,YAAY;QAAE,OAAO;IAE1B,KAAK,IAAI,OAAO,GAAG,CAAC,EAAE,OAAO,GAAG,KAAK,CAAC,MAAM,EAAE,OAAO,EAAE,EAAE,CAAC;QACxD,MAAM,IAAI,GAAG,KAAK,CAAC,OAAO,CAAC,CAAC;QAE5B,KAAK,MAAM,EAAE,OAAO,EAAE,KAAK,EAAE,QAAQ,EAAE,IAAI,gBAAgB,EAAE,CAAC;YAC5D,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,4FAA4F;gBAC5F,QAAQ,CAAC,IAAI,CAAC;oBACZ,EAAE,EAAE,sBAAsB,QAAQ,CAAC,MAAM,GAAG,CAAC,EAAE;oBAC/C,MAAM,EAAE,gBAAgB;oBACxB,QAAQ,EAAE,KAAK,KAAK,SAAS,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,UAAU;oBACnD,OAAO,EAAE,GAAG,KAAK,IAAI,QAAQ,kDAAkD;oBAC/E,QAAQ,EAAE;wBACR,IAAI,EAAE,OAAO,CAAC,QAAQ;wBACtB,SAAS,EAAE,OAAO,GAAG,CAAC;wBACtB,OAAO,EAAE,OAAO,GAAG,CAAC;wBACpB,WAAW,EAAE,CAAC;wBACd,SAAS,EAAE,IAAI,CAAC,MAAM;qBACvB;oBACD,GAAG,EAAE,CAAC,KAAK,CAAC;oBACZ,UAAU,EAAE;wBACV,WAAW,EAAE,0DAA0D;wBACvE,OAAO,EAAE;;;;;;;;;;;;;;EAcnB;qBACS;iBACF,CAAC,CAAC;gBACH,MAAM;YACR,CAAC;QACH,CAAC;IACH,CAAC;AACH,CAAC;AAED;;GAEG;AACH,SAAS,0BAA0B,CAAC,OAAoB,EAAE,QAAuB;IAC/E,MAAM,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC;IACtC,MAAM,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAErC,MAAM,gBAAgB,GAAG;QACvB,gBAAgB;QAChB,EAAE,OAAO,EAAE,iBAAiB,EAAE,QAAQ,EAAE,SAAS,EAAE,KAAK,EAAE,mBAAmB,EAAE;QAC/E,kBAAkB;QAClB,EAAE,OAAO,EAAE,mBAAmB,EAAE,QAAQ,EAAE,WAAW,EAAE,KAAK,EAAE,gDAAgD,EAAE;QAChH,gBAAgB;QAChB,EAAE,OAAO,EAAE,iBAAiB,EAAE,QAAQ,EAAE,SAAS,EAAE,KAAK,EAAE,eAAe,EAAE;QAC3E,uBAAuB;QACvB,EAAE,OAAO,EAAE,sBAAsB,EAAE,QAAQ,EAAE,QAAQ,EAAE,KAAK,EAAE,6BAA6B,EAAE;QAC7F,qBAAqB;QACrB,EAAE,OAAO,EAAE,6DAA6D,EAAE,QAAQ,EAAE,SAAS,EAAE,KAAK,EAAE,2BAA2B,EAAE;KACpI,CAAC;IAEF,KAAK,IAAI,OAAO,GAAG,CAAC,EAAE,OAAO,GAAG,KAAK,CAAC,MAAM,EAAE,OAAO,EAAE,EAAE,CAAC;QACxD,MAAM,IAAI,GAAG,KAAK,CAAC,OAAO,CAAC,CAAC;QAE5B,KAAK,MAAM,EAAE,OAAO,EAAE,QAAQ,EAAE,KAAK,EAAE,IAAI,gBAAgB,EAAE,CAAC;YAC5D,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,QAAQ,CAAC,IAAI,CAAC;oBACZ,EAAE,EAAE,sBAAsB,QAAQ,CAAC,MAAM,GAAG,CAAC,EAAE;oBAC/C,MAAM,EAAE,gBAAgB;oBACxB,QAAQ,EAAE,MAAM;oBAChB,OAAO,EAAE,iCAAiC,QAAQ,KAAK,KAAK,EAAE;oBAC9D,QAAQ,EAAE;wBACR,IAAI,EAAE,OAAO,CAAC,QAAQ;wBACtB,SAAS,EAAE,OAAO,GAAG,CAAC;wBACtB,OAAO,EAAE,OAAO,GAAG,CAAC;wBACpB,WAAW,EAAE,CAAC;wBACd,SAAS,EAAE,IAAI,CAAC,MAAM;qBACvB;oBACD,GAAG,EAAE,CAAC,KAAK,CAAC;oBACZ,UAAU,EAAE;wBACV,WAAW,EAAE,8CAA8C;wBAC3D,OAAO,EAAE;;;;;;;;;EASnB;qBACS;iBACF,CAAC,CAAC;gBACH,MAAM;YACR,CAAC;QACH,CAAC;IACH,CAAC;AACH,CAAC;AAED;;GAEG;AACH,SAAS,sBAAsB,CAAC,OAAoB,EAAE,QAAuB;IAC3E,MAAM,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC;IACtC,MAAM,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAErC,MAAM,gBAAgB,GAAG;QACvB,iCAAiC;QACjC,EAAE,OAAO,EAAE,uCAAuC,EAAE,KAAK,EAAE,8BAA8B,EAAE;QAC3F,EAAE,OAAO,EAAE,4CAA4C,EAAE,KAAK,EAAE,qBAAqB,EAAE;QACvF,4BAA4B;QAC5B,EAAE,OAAO,EAAE,yBAAyB,EAAE,KAAK,EAAE,2BAA2B,EAAE;QAC1E,0BAA0B;QAC1B,EAAE,OAAO,EAAE,yEAAyE,EAAE,KAAK,EAAE,6BAA6B,EAAE;KAC7H,CAAC;IAEF,KAAK,IAAI,OAAO,GAAG,CAAC,EAAE,OAAO,GAAG,KAAK,CAAC,MAAM,EAAE,OAAO,EAAE,EAAE,CAAC;QACxD,MAAM,IAAI,GAAG,KAAK,CAAC,OAAO,CAAC,CAAC;QAE5B,KAAK,MAAM,EAAE,OAAO,EAAE,KAAK,EAAE,IAAI,gBAAgB,EAAE,CAAC;YAClD,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,QAAQ,CAAC,IAAI,CAAC;oBACZ,EAAE,EAAE,sBAAsB,QAAQ,CAAC,MAAM,GAAG,CAAC,EAAE;oBAC/C,MAAM,EAAE,gBAAgB;oBACxB,QAAQ,EAAE,KAAK,CAAC,QAAQ,CAAC,eAAe,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC,CAAC,CAAC,QAAQ;oBAC7D,OAAO,EAAE,6BAA6B,KAAK,EAAE;oBAC7C,QAAQ,EAAE;wBACR,IAAI,EAAE,OAAO,CAAC,QAAQ;wBACtB,SAAS,EAAE,OAAO,GAAG,CAAC;wBACtB,OAAO,EAAE,OAAO,GAAG,CAAC;wBACpB,WAAW,EAAE,CAAC;wBACd,SAAS,EAAE,IAAI,CAAC,MAAM;qBACvB;oBACD,GAAG,EAAE,CAAC,KAAK,EAAE,KAAK,CAAC;oBACnB,UAAU,EAAE;wBACV,WAAW,EAAE,+CAA+C;wBAC5D,OAAO,EAAE;;;;;;;;;;;;;;;EAenB;qBACS;iBACF,CAAC,CAAC;gBACH,MAAM;YACR,CAAC;QACH,CAAC;IACH,CAAC;AACH,CAAC;AAED;;GAEG;AACH,SAAS,wBAAwB,CAAC,OAAoB,EAAE,QAAuB;IAC7E,MAAM,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC;IACtC,MAAM,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAErC,MAAM,WAAW,GAAG;QAClB,kDAAkD;QAClD,EAAE,OAAO,EAAE,8CAA8C,EAAE,MAAM,EAAE,YAAY,EAAE,KAAK,EAAE,iDAAiD,EAAE;QAC3I,WAAW;QACX,EAAE,OAAO,EAAE,qBAAqB,EAAE,MAAM,EAAE,UAAU,EAAE,KAAK,EAAE,kCAAkC,EAAE;QACjG,4BAA4B;QAC5B,EAAE,OAAO,EAAE,WAAW,EAAE,MAAM,EAAE,KAAK,EAAE,KAAK,EAAE,iCAAiC,EAAE;QACjF,mCAAmC;QACnC,EAAE,OAAO,EAAE,0BAA0B,EAAE,MAAM,EAAE,KAAK,EAAE,KAAK,EAAE,sCAAsC,EAAE;KACtG,CAAC;IAEF,KAAK,IAAI,OAAO,GAAG,CAAC,EAAE,OAAO,GAAG,KAAK,CAAC,MAAM,EAAE,OAAO,EAAE,EAAE,CAAC;QACxD,MAAM,IAAI,GAAG,KAAK,CAAC,OAAO,CAAC,CAAC;QAE5B,KAAK,MAAM,EAAE,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,IAAI,WAAW,EAAE,CAAC;YACrD,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,+BAA+B;gBAC/B,MAAM,eAAe,GAAG,KAAK,CAAC,KAAK,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,EAAE,OAAO,GAAG,CAAC,CAAC,EAAE,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,MAAM,EAAE,OAAO,GAAG,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;gBAC9G,MAAM,mBAAmB,GAAG,gDAAgD,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC;gBAEnG,IAAI,CAAC,mBAAmB,EAAE,CAAC;oBACzB,QAAQ,CAAC,IAAI,CAAC;wBACZ,EAAE,EAAE,iBAAiB,QAAQ,CAAC,MAAM,GAAG,CAAC,EAAE;wBAC1C,MAAM,EAAE,gBAAgB;wBACxB,QAAQ,EAAE,MAAM;wBAChB,OAAO,EAAE,qBAAqB,MAAM,KAAK,KAAK,EAAE;wBAChD,QAAQ,EAAE;4BACR,IAAI,EAAE,OAAO,CAAC,QAAQ;4BACtB,SAAS,EAAE,OAAO,GAAG,CAAC;4BACtB,OAAO,EAAE,OAAO,GAAG,CAAC;4BACpB,WAAW,EAAE,CAAC;4BACd,SAAS,EAAE,IAAI,CAAC,MAAM;yBACvB;wBACD,GAAG,EAAE,CAAC,KAAK,EAAE,KAAK,CAAC;wBACnB,UAAU,EAAE;4BACV,WAAW,EAAE,mDAAmD;4BAChE,OAAO,EAAE;;;;;;;;;2CASoB;yBAC9B;qBACF,CAAC,CAAC;gBACL,CAAC;gBACD,MAAM;YACR,CAAC;QACH,CAAC;IACH,CAAC;AACH,CAAC;AAED,eAAe,YAAY,CAAC"}
@@ -0,0 +1,20 @@
1
+ /**
2
+ * @fileoverview OWASP Top 10 Rules Module
3
+ * @module @nahisaho/musubix-security/rules/owasp
4
+ * @trace TSK-RULE-003, TSK-RULE-004
5
+ */
6
+ export { owaspA01BrokenAccessControl } from './a01-broken-access-control.js';
7
+ export { owaspA02CryptographicFailures } from './a02-cryptographic-failures.js';
8
+ export { owaspA03Injection } from './a03-injection.js';
9
+ export { owaspA04InsecureDesign } from './a04-insecure-design.js';
10
+ export { owaspA05SecurityMisconfiguration } from './a05-security-misconfiguration.js';
11
+ export { owaspA06VulnerableComponents } from './a06-vulnerable-components.js';
12
+ export { owaspA07AuthFailures } from './a07-auth-failures.js';
13
+ export { owaspA08IntegrityFailures } from './a08-integrity-failures.js';
14
+ export { owaspA09LoggingFailures } from './a09-logging-failures.js';
15
+ export { owaspA10SSRF } from './a10-ssrf.js';
16
+ export declare const owaspRulesA01A05: import("../types.js").SecurityRule[];
17
+ export declare const owaspRulesA06A10: import("../types.js").SecurityRule[];
18
+ export declare const owaspTop10Rules: import("../types.js").SecurityRule[];
19
+ export { owaspA01BrokenAccessControl as default } from './a01-broken-access-control.js';
20
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/rules/owasp/index.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAiBH,OAAO,EAAE,2BAA2B,EAAE,MAAM,gCAAgC,CAAC;AAC7E,OAAO,EAAE,6BAA6B,EAAE,MAAM,iCAAiC,CAAC;AAChF,OAAO,EAAE,iBAAiB,EAAE,MAAM,oBAAoB,CAAC;AACvD,OAAO,EAAE,sBAAsB,EAAE,MAAM,0BAA0B,CAAC;AAClE,OAAO,EAAE,gCAAgC,EAAE,MAAM,oCAAoC,CAAC;AAGtF,OAAO,EAAE,4BAA4B,EAAE,MAAM,gCAAgC,CAAC;AAC9E,OAAO,EAAE,oBAAoB,EAAE,MAAM,wBAAwB,CAAC;AAC9D,OAAO,EAAE,yBAAyB,EAAE,MAAM,6BAA6B,CAAC;AACxE,OAAO,EAAE,uBAAuB,EAAE,MAAM,2BAA2B,CAAC;AACpE,OAAO,EAAE,YAAY,EAAE,MAAM,eAAe,CAAC;AAG7C,eAAO,MAAM,gBAAgB,sCAM5B,CAAC;AAGF,eAAO,MAAM,gBAAgB,sCAM5B,CAAC;AAGF,eAAO,MAAM,eAAe,sCAG3B,CAAC;AAGF,OAAO,EAAE,2BAA2B,IAAI,OAAO,EAAE,MAAM,gCAAgC,CAAC"}
@@ -0,0 +1,53 @@
1
+ /**
2
+ * @fileoverview OWASP Top 10 Rules Module
3
+ * @module @nahisaho/musubix-security/rules/owasp
4
+ * @trace TSK-RULE-003, TSK-RULE-004
5
+ */
6
+ // Import A01-A05 rules
7
+ import { owaspA01BrokenAccessControl } from './a01-broken-access-control.js';
8
+ import { owaspA02CryptographicFailures } from './a02-cryptographic-failures.js';
9
+ import { owaspA03Injection } from './a03-injection.js';
10
+ import { owaspA04InsecureDesign } from './a04-insecure-design.js';
11
+ import { owaspA05SecurityMisconfiguration } from './a05-security-misconfiguration.js';
12
+ // Import A06-A10 rules
13
+ import { owaspA06VulnerableComponents } from './a06-vulnerable-components.js';
14
+ import { owaspA07AuthFailures } from './a07-auth-failures.js';
15
+ import { owaspA08IntegrityFailures } from './a08-integrity-failures.js';
16
+ import { owaspA09LoggingFailures } from './a09-logging-failures.js';
17
+ import { owaspA10SSRF } from './a10-ssrf.js';
18
+ // Re-export individual rules (A01-A05)
19
+ export { owaspA01BrokenAccessControl } from './a01-broken-access-control.js';
20
+ export { owaspA02CryptographicFailures } from './a02-cryptographic-failures.js';
21
+ export { owaspA03Injection } from './a03-injection.js';
22
+ export { owaspA04InsecureDesign } from './a04-insecure-design.js';
23
+ export { owaspA05SecurityMisconfiguration } from './a05-security-misconfiguration.js';
24
+ // Re-export individual rules (A06-A10)
25
+ export { owaspA06VulnerableComponents } from './a06-vulnerable-components.js';
26
+ export { owaspA07AuthFailures } from './a07-auth-failures.js';
27
+ export { owaspA08IntegrityFailures } from './a08-integrity-failures.js';
28
+ export { owaspA09LoggingFailures } from './a09-logging-failures.js';
29
+ export { owaspA10SSRF } from './a10-ssrf.js';
30
+ // All OWASP A01-A05 rules
31
+ export const owaspRulesA01A05 = [
32
+ owaspA01BrokenAccessControl,
33
+ owaspA02CryptographicFailures,
34
+ owaspA03Injection,
35
+ owaspA04InsecureDesign,
36
+ owaspA05SecurityMisconfiguration,
37
+ ];
38
+ // All OWASP A06-A10 rules
39
+ export const owaspRulesA06A10 = [
40
+ owaspA06VulnerableComponents,
41
+ owaspA07AuthFailures,
42
+ owaspA08IntegrityFailures,
43
+ owaspA09LoggingFailures,
44
+ owaspA10SSRF,
45
+ ];
46
+ // All OWASP Top 10 rules
47
+ export const owaspTop10Rules = [
48
+ ...owaspRulesA01A05,
49
+ ...owaspRulesA06A10,
50
+ ];
51
+ // Re-export default for convenience
52
+ export { owaspA01BrokenAccessControl as default } from './a01-broken-access-control.js';
53
+ //# sourceMappingURL=index.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../../src/rules/owasp/index.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH,uBAAuB;AACvB,OAAO,EAAE,2BAA2B,EAAE,MAAM,gCAAgC,CAAC;AAC7E,OAAO,EAAE,6BAA6B,EAAE,MAAM,iCAAiC,CAAC;AAChF,OAAO,EAAE,iBAAiB,EAAE,MAAM,oBAAoB,CAAC;AACvD,OAAO,EAAE,sBAAsB,EAAE,MAAM,0BAA0B,CAAC;AAClE,OAAO,EAAE,gCAAgC,EAAE,MAAM,oCAAoC,CAAC;AAEtF,uBAAuB;AACvB,OAAO,EAAE,4BAA4B,EAAE,MAAM,gCAAgC,CAAC;AAC9E,OAAO,EAAE,oBAAoB,EAAE,MAAM,wBAAwB,CAAC;AAC9D,OAAO,EAAE,yBAAyB,EAAE,MAAM,6BAA6B,CAAC;AACxE,OAAO,EAAE,uBAAuB,EAAE,MAAM,2BAA2B,CAAC;AACpE,OAAO,EAAE,YAAY,EAAE,MAAM,eAAe,CAAC;AAE7C,uCAAuC;AACvC,OAAO,EAAE,2BAA2B,EAAE,MAAM,gCAAgC,CAAC;AAC7E,OAAO,EAAE,6BAA6B,EAAE,MAAM,iCAAiC,CAAC;AAChF,OAAO,EAAE,iBAAiB,EAAE,MAAM,oBAAoB,CAAC;AACvD,OAAO,EAAE,sBAAsB,EAAE,MAAM,0BAA0B,CAAC;AAClE,OAAO,EAAE,gCAAgC,EAAE,MAAM,oCAAoC,CAAC;AAEtF,uCAAuC;AACvC,OAAO,EAAE,4BAA4B,EAAE,MAAM,gCAAgC,CAAC;AAC9E,OAAO,EAAE,oBAAoB,EAAE,MAAM,wBAAwB,CAAC;AAC9D,OAAO,EAAE,yBAAyB,EAAE,MAAM,6BAA6B,CAAC;AACxE,OAAO,EAAE,uBAAuB,EAAE,MAAM,2BAA2B,CAAC;AACpE,OAAO,EAAE,YAAY,EAAE,MAAM,eAAe,CAAC;AAE7C,0BAA0B;AAC1B,MAAM,CAAC,MAAM,gBAAgB,GAAG;IAC9B,2BAA2B;IAC3B,6BAA6B;IAC7B,iBAAiB;IACjB,sBAAsB;IACtB,gCAAgC;CACjC,CAAC;AAEF,0BAA0B;AAC1B,MAAM,CAAC,MAAM,gBAAgB,GAAG;IAC9B,4BAA4B;IAC5B,oBAAoB;IACpB,yBAAyB;IACzB,uBAAuB;IACvB,YAAY;CACb,CAAC;AAEF,yBAAyB;AACzB,MAAM,CAAC,MAAM,eAAe,GAAG;IAC7B,GAAG,gBAAgB;IACnB,GAAG,gBAAgB;CACpB,CAAC;AAEF,oCAAoC;AACpC,OAAO,EAAE,2BAA2B,IAAI,OAAO,EAAE,MAAM,gCAAgC,CAAC"}