@nahisaho/musubix-security 2.0.1 → 2.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (363) hide show
  1. package/dist/analysis/enhanced-taint-analyzer.d.ts +120 -0
  2. package/dist/analysis/enhanced-taint-analyzer.d.ts.map +1 -0
  3. package/dist/analysis/enhanced-taint-analyzer.js +450 -0
  4. package/dist/analysis/enhanced-taint-analyzer.js.map +1 -0
  5. package/dist/analysis/index.d.ts +1 -0
  6. package/dist/analysis/index.d.ts.map +1 -1
  7. package/dist/analysis/index.js +1 -0
  8. package/dist/analysis/index.js.map +1 -1
  9. package/dist/analysis/interprocedural/call-graph-builder.d.ts +192 -0
  10. package/dist/analysis/interprocedural/call-graph-builder.d.ts.map +1 -0
  11. package/dist/analysis/interprocedural/call-graph-builder.js +510 -0
  12. package/dist/analysis/interprocedural/call-graph-builder.js.map +1 -0
  13. package/dist/analysis/interprocedural/dfg-adapter.d.ts +166 -0
  14. package/dist/analysis/interprocedural/dfg-adapter.d.ts.map +1 -0
  15. package/dist/analysis/interprocedural/dfg-adapter.js +455 -0
  16. package/dist/analysis/interprocedural/dfg-adapter.js.map +1 -0
  17. package/dist/analysis/interprocedural/index.d.ts +9 -0
  18. package/dist/analysis/interprocedural/index.d.ts.map +1 -0
  19. package/dist/analysis/interprocedural/index.js +9 -0
  20. package/dist/analysis/interprocedural/index.js.map +1 -0
  21. package/dist/analysis/interprocedural/taint-propagator.d.ts +250 -0
  22. package/dist/analysis/interprocedural/taint-propagator.d.ts.map +1 -0
  23. package/dist/analysis/interprocedural/taint-propagator.js +435 -0
  24. package/dist/analysis/interprocedural/taint-propagator.js.map +1 -0
  25. package/dist/analysis/sanitizers/command-sanitizers.d.ts +12 -0
  26. package/dist/analysis/sanitizers/command-sanitizers.d.ts.map +1 -0
  27. package/dist/analysis/sanitizers/command-sanitizers.js +123 -0
  28. package/dist/analysis/sanitizers/command-sanitizers.js.map +1 -0
  29. package/dist/analysis/sanitizers/html-sanitizers.d.ts +12 -0
  30. package/dist/analysis/sanitizers/html-sanitizers.d.ts.map +1 -0
  31. package/dist/analysis/sanitizers/html-sanitizers.js +213 -0
  32. package/dist/analysis/sanitizers/html-sanitizers.js.map +1 -0
  33. package/dist/analysis/sanitizers/index.d.ts +35 -0
  34. package/dist/analysis/sanitizers/index.d.ts.map +1 -0
  35. package/dist/analysis/sanitizers/index.js +59 -0
  36. package/dist/analysis/sanitizers/index.js.map +1 -0
  37. package/dist/analysis/sanitizers/path-sanitizers.d.ts +12 -0
  38. package/dist/analysis/sanitizers/path-sanitizers.d.ts.map +1 -0
  39. package/dist/analysis/sanitizers/path-sanitizers.js +163 -0
  40. package/dist/analysis/sanitizers/path-sanitizers.js.map +1 -0
  41. package/dist/analysis/sanitizers/sql-sanitizers.d.ts +12 -0
  42. package/dist/analysis/sanitizers/sql-sanitizers.d.ts.map +1 -0
  43. package/dist/analysis/sanitizers/sql-sanitizers.js +216 -0
  44. package/dist/analysis/sanitizers/sql-sanitizers.js.map +1 -0
  45. package/dist/analysis/sanitizers/types.d.ts +78 -0
  46. package/dist/analysis/sanitizers/types.d.ts.map +1 -0
  47. package/dist/analysis/sanitizers/types.js +7 -0
  48. package/dist/analysis/sanitizers/types.js.map +1 -0
  49. package/dist/analysis/sanitizers/validation-sanitizers.d.ts +12 -0
  50. package/dist/analysis/sanitizers/validation-sanitizers.d.ts.map +1 -0
  51. package/dist/analysis/sanitizers/validation-sanitizers.js +268 -0
  52. package/dist/analysis/sanitizers/validation-sanitizers.js.map +1 -0
  53. package/dist/analysis/sinks/code-eval.d.ts +12 -0
  54. package/dist/analysis/sinks/code-eval.d.ts.map +1 -0
  55. package/dist/analysis/sinks/code-eval.js +231 -0
  56. package/dist/analysis/sinks/code-eval.js.map +1 -0
  57. package/dist/analysis/sinks/command-exec.d.ts +12 -0
  58. package/dist/analysis/sinks/command-exec.d.ts.map +1 -0
  59. package/dist/analysis/sinks/command-exec.js +187 -0
  60. package/dist/analysis/sinks/command-exec.js.map +1 -0
  61. package/dist/analysis/sinks/file-operations.d.ts +12 -0
  62. package/dist/analysis/sinks/file-operations.d.ts.map +1 -0
  63. package/dist/analysis/sinks/file-operations.js +239 -0
  64. package/dist/analysis/sinks/file-operations.js.map +1 -0
  65. package/dist/analysis/sinks/html-output.d.ts +12 -0
  66. package/dist/analysis/sinks/html-output.d.ts.map +1 -0
  67. package/dist/analysis/sinks/html-output.js +256 -0
  68. package/dist/analysis/sinks/html-output.js.map +1 -0
  69. package/dist/analysis/sinks/index.d.ts +30 -0
  70. package/dist/analysis/sinks/index.d.ts.map +1 -0
  71. package/dist/analysis/sinks/index.js +46 -0
  72. package/dist/analysis/sinks/index.js.map +1 -0
  73. package/dist/analysis/sinks/sql-query.d.ts +12 -0
  74. package/dist/analysis/sinks/sql-query.d.ts.map +1 -0
  75. package/dist/analysis/sinks/sql-query.js +209 -0
  76. package/dist/analysis/sinks/sql-query.js.map +1 -0
  77. package/dist/analysis/sinks/types.d.ts +97 -0
  78. package/dist/analysis/sinks/types.d.ts.map +1 -0
  79. package/dist/analysis/sinks/types.js +7 -0
  80. package/dist/analysis/sinks/types.js.map +1 -0
  81. package/dist/analysis/sources/database.d.ts +12 -0
  82. package/dist/analysis/sources/database.d.ts.map +1 -0
  83. package/dist/analysis/sources/database.js +211 -0
  84. package/dist/analysis/sources/database.js.map +1 -0
  85. package/dist/analysis/sources/environment.d.ts +12 -0
  86. package/dist/analysis/sources/environment.d.ts.map +1 -0
  87. package/dist/analysis/sources/environment.js +158 -0
  88. package/dist/analysis/sources/environment.js.map +1 -0
  89. package/dist/analysis/sources/file-system.d.ts +12 -0
  90. package/dist/analysis/sources/file-system.d.ts.map +1 -0
  91. package/dist/analysis/sources/file-system.js +180 -0
  92. package/dist/analysis/sources/file-system.js.map +1 -0
  93. package/dist/analysis/sources/http-request.d.ts +12 -0
  94. package/dist/analysis/sources/http-request.d.ts.map +1 -0
  95. package/dist/analysis/sources/http-request.js +179 -0
  96. package/dist/analysis/sources/http-request.js.map +1 -0
  97. package/dist/analysis/sources/index.d.ts +26 -0
  98. package/dist/analysis/sources/index.d.ts.map +1 -0
  99. package/dist/analysis/sources/index.js +40 -0
  100. package/dist/analysis/sources/index.js.map +1 -0
  101. package/dist/analysis/sources/types.d.ts +93 -0
  102. package/dist/analysis/sources/types.d.ts.map +1 -0
  103. package/dist/analysis/sources/types.js +7 -0
  104. package/dist/analysis/sources/types.js.map +1 -0
  105. package/dist/analysis/sources/user-input.d.ts +12 -0
  106. package/dist/analysis/sources/user-input.d.ts.map +1 -0
  107. package/dist/analysis/sources/user-input.js +261 -0
  108. package/dist/analysis/sources/user-input.js.map +1 -0
  109. package/dist/cve/cpe-matcher.d.ts +183 -0
  110. package/dist/cve/cpe-matcher.d.ts.map +1 -0
  111. package/dist/cve/cpe-matcher.js +396 -0
  112. package/dist/cve/cpe-matcher.js.map +1 -0
  113. package/dist/cve/cve-cache.d.ts +225 -0
  114. package/dist/cve/cve-cache.d.ts.map +1 -0
  115. package/dist/cve/cve-cache.js +452 -0
  116. package/dist/cve/cve-cache.js.map +1 -0
  117. package/dist/cve/cve-cache.test.d.ts +6 -0
  118. package/dist/cve/cve-cache.test.d.ts.map +1 -0
  119. package/dist/cve/cve-cache.test.js +363 -0
  120. package/dist/cve/cve-cache.test.js.map +1 -0
  121. package/dist/cve/dependency-parser.d.ts +204 -0
  122. package/dist/cve/dependency-parser.d.ts.map +1 -0
  123. package/dist/cve/dependency-parser.js +338 -0
  124. package/dist/cve/dependency-parser.js.map +1 -0
  125. package/dist/cve/index.d.ts +20 -0
  126. package/dist/cve/index.d.ts.map +1 -0
  127. package/dist/cve/index.js +13 -0
  128. package/dist/cve/index.js.map +1 -0
  129. package/dist/cve/nvd-client.d.ts +137 -0
  130. package/dist/cve/nvd-client.d.ts.map +1 -0
  131. package/dist/cve/nvd-client.js +333 -0
  132. package/dist/cve/nvd-client.js.map +1 -0
  133. package/dist/cve/rate-limiter.d.ts +194 -0
  134. package/dist/cve/rate-limiter.d.ts.map +1 -0
  135. package/dist/cve/rate-limiter.js +276 -0
  136. package/dist/cve/rate-limiter.js.map +1 -0
  137. package/dist/cve/report-generator.d.ts +145 -0
  138. package/dist/cve/report-generator.d.ts.map +1 -0
  139. package/dist/cve/report-generator.js +377 -0
  140. package/dist/cve/report-generator.js.map +1 -0
  141. package/dist/cve/report-generator.test.d.ts +6 -0
  142. package/dist/cve/report-generator.test.d.ts.map +1 -0
  143. package/dist/cve/report-generator.test.js +275 -0
  144. package/dist/cve/report-generator.test.js.map +1 -0
  145. package/dist/cve/vulnerability-scanner.d.ts +198 -0
  146. package/dist/cve/vulnerability-scanner.d.ts.map +1 -0
  147. package/dist/cve/vulnerability-scanner.js +311 -0
  148. package/dist/cve/vulnerability-scanner.js.map +1 -0
  149. package/dist/cve/vulnerability-scanner.test.d.ts +6 -0
  150. package/dist/cve/vulnerability-scanner.test.d.ts.map +1 -0
  151. package/dist/cve/vulnerability-scanner.test.js +329 -0
  152. package/dist/cve/vulnerability-scanner.test.js.map +1 -0
  153. package/dist/index.d.ts +1 -0
  154. package/dist/index.d.ts.map +1 -1
  155. package/dist/index.js +4 -0
  156. package/dist/index.js.map +1 -1
  157. package/dist/rules/config/config-parser.d.ts +119 -0
  158. package/dist/rules/config/config-parser.d.ts.map +1 -0
  159. package/dist/rules/config/config-parser.js +376 -0
  160. package/dist/rules/config/config-parser.js.map +1 -0
  161. package/dist/rules/config/index.d.ts +8 -0
  162. package/dist/rules/config/index.d.ts.map +1 -0
  163. package/dist/rules/config/index.js +8 -0
  164. package/dist/rules/config/index.js.map +1 -0
  165. package/dist/rules/config/profiles.d.ts +85 -0
  166. package/dist/rules/config/profiles.d.ts.map +1 -0
  167. package/dist/rules/config/profiles.js +226 -0
  168. package/dist/rules/config/profiles.js.map +1 -0
  169. package/dist/rules/cwe/cwe-119-buffer-overflow.d.ts +9 -0
  170. package/dist/rules/cwe/cwe-119-buffer-overflow.d.ts.map +1 -0
  171. package/dist/rules/cwe/cwe-119-buffer-overflow.js +54 -0
  172. package/dist/rules/cwe/cwe-119-buffer-overflow.js.map +1 -0
  173. package/dist/rules/cwe/cwe-125-oob-read.d.ts +20 -0
  174. package/dist/rules/cwe/cwe-125-oob-read.d.ts.map +1 -0
  175. package/dist/rules/cwe/cwe-125-oob-read.js +247 -0
  176. package/dist/rules/cwe/cwe-125-oob-read.js.map +1 -0
  177. package/dist/rules/cwe/cwe-190-integer-overflow.d.ts +9 -0
  178. package/dist/rules/cwe/cwe-190-integer-overflow.d.ts.map +1 -0
  179. package/dist/rules/cwe/cwe-190-integer-overflow.js +55 -0
  180. package/dist/rules/cwe/cwe-190-integer-overflow.js.map +1 -0
  181. package/dist/rules/cwe/cwe-20-input-validation.d.ts +21 -0
  182. package/dist/rules/cwe/cwe-20-input-validation.d.ts.map +1 -0
  183. package/dist/rules/cwe/cwe-20-input-validation.js +342 -0
  184. package/dist/rules/cwe/cwe-20-input-validation.js.map +1 -0
  185. package/dist/rules/cwe/cwe-22-path-traversal.d.ts +20 -0
  186. package/dist/rules/cwe/cwe-22-path-traversal.d.ts.map +1 -0
  187. package/dist/rules/cwe/cwe-22-path-traversal.js +306 -0
  188. package/dist/rules/cwe/cwe-22-path-traversal.js.map +1 -0
  189. package/dist/rules/cwe/cwe-269-improper-privilege.d.ts +9 -0
  190. package/dist/rules/cwe/cwe-269-improper-privilege.d.ts.map +1 -0
  191. package/dist/rules/cwe/cwe-269-improper-privilege.js +58 -0
  192. package/dist/rules/cwe/cwe-269-improper-privilege.js.map +1 -0
  193. package/dist/rules/cwe/cwe-276-default-permissions.d.ts +9 -0
  194. package/dist/rules/cwe/cwe-276-default-permissions.d.ts.map +1 -0
  195. package/dist/rules/cwe/cwe-276-default-permissions.js +54 -0
  196. package/dist/rules/cwe/cwe-276-default-permissions.js.map +1 -0
  197. package/dist/rules/cwe/cwe-287-improper-auth.d.ts +9 -0
  198. package/dist/rules/cwe/cwe-287-improper-auth.d.ts.map +1 -0
  199. package/dist/rules/cwe/cwe-287-improper-auth.js +57 -0
  200. package/dist/rules/cwe/cwe-287-improper-auth.js.map +1 -0
  201. package/dist/rules/cwe/cwe-306-missing-auth-critical.d.ts +9 -0
  202. package/dist/rules/cwe/cwe-306-missing-auth-critical.d.ts.map +1 -0
  203. package/dist/rules/cwe/cwe-306-missing-auth-critical.js +53 -0
  204. package/dist/rules/cwe/cwe-306-missing-auth-critical.js.map +1 -0
  205. package/dist/rules/cwe/cwe-352-csrf.d.ts +9 -0
  206. package/dist/rules/cwe/cwe-352-csrf.d.ts.map +1 -0
  207. package/dist/rules/cwe/cwe-352-csrf.js +51 -0
  208. package/dist/rules/cwe/cwe-352-csrf.js.map +1 -0
  209. package/dist/rules/cwe/cwe-362-race-condition.d.ts +9 -0
  210. package/dist/rules/cwe/cwe-362-race-condition.d.ts.map +1 -0
  211. package/dist/rules/cwe/cwe-362-race-condition.js +55 -0
  212. package/dist/rules/cwe/cwe-362-race-condition.js.map +1 -0
  213. package/dist/rules/cwe/cwe-416-use-after-free.d.ts +23 -0
  214. package/dist/rules/cwe/cwe-416-use-after-free.d.ts.map +1 -0
  215. package/dist/rules/cwe/cwe-416-use-after-free.js +402 -0
  216. package/dist/rules/cwe/cwe-416-use-after-free.js.map +1 -0
  217. package/dist/rules/cwe/cwe-434-file-upload.d.ts +9 -0
  218. package/dist/rules/cwe/cwe-434-file-upload.d.ts.map +1 -0
  219. package/dist/rules/cwe/cwe-434-file-upload.js +55 -0
  220. package/dist/rules/cwe/cwe-434-file-upload.js.map +1 -0
  221. package/dist/rules/cwe/cwe-476-null-deref.d.ts +9 -0
  222. package/dist/rules/cwe/cwe-476-null-deref.d.ts.map +1 -0
  223. package/dist/rules/cwe/cwe-476-null-deref.js +55 -0
  224. package/dist/rules/cwe/cwe-476-null-deref.js.map +1 -0
  225. package/dist/rules/cwe/cwe-502-deserialization.d.ts +9 -0
  226. package/dist/rules/cwe/cwe-502-deserialization.d.ts.map +1 -0
  227. package/dist/rules/cwe/cwe-502-deserialization.js +57 -0
  228. package/dist/rules/cwe/cwe-502-deserialization.js.map +1 -0
  229. package/dist/rules/cwe/cwe-77-command-injection.d.ts +9 -0
  230. package/dist/rules/cwe/cwe-77-command-injection.d.ts.map +1 -0
  231. package/dist/rules/cwe/cwe-77-command-injection.js +55 -0
  232. package/dist/rules/cwe/cwe-77-command-injection.js.map +1 -0
  233. package/dist/rules/cwe/cwe-78-command-injection.d.ts +20 -0
  234. package/dist/rules/cwe/cwe-78-command-injection.d.ts.map +1 -0
  235. package/dist/rules/cwe/cwe-78-command-injection.js +259 -0
  236. package/dist/rules/cwe/cwe-78-command-injection.js.map +1 -0
  237. package/dist/rules/cwe/cwe-787-oob-write.d.ts +21 -0
  238. package/dist/rules/cwe/cwe-787-oob-write.d.ts.map +1 -0
  239. package/dist/rules/cwe/cwe-787-oob-write.js +321 -0
  240. package/dist/rules/cwe/cwe-787-oob-write.js.map +1 -0
  241. package/dist/rules/cwe/cwe-79-xss.d.ts +22 -0
  242. package/dist/rules/cwe/cwe-79-xss.d.ts.map +1 -0
  243. package/dist/rules/cwe/cwe-79-xss.js +386 -0
  244. package/dist/rules/cwe/cwe-79-xss.js.map +1 -0
  245. package/dist/rules/cwe/cwe-798-hardcoded-credentials.d.ts +9 -0
  246. package/dist/rules/cwe/cwe-798-hardcoded-credentials.d.ts.map +1 -0
  247. package/dist/rules/cwe/cwe-798-hardcoded-credentials.js +58 -0
  248. package/dist/rules/cwe/cwe-798-hardcoded-credentials.js.map +1 -0
  249. package/dist/rules/cwe/cwe-862-missing-auth.d.ts +9 -0
  250. package/dist/rules/cwe/cwe-862-missing-auth.d.ts.map +1 -0
  251. package/dist/rules/cwe/cwe-862-missing-auth.js +55 -0
  252. package/dist/rules/cwe/cwe-862-missing-auth.js.map +1 -0
  253. package/dist/rules/cwe/cwe-863-incorrect-auth.d.ts +9 -0
  254. package/dist/rules/cwe/cwe-863-incorrect-auth.d.ts.map +1 -0
  255. package/dist/rules/cwe/cwe-863-incorrect-auth.js +58 -0
  256. package/dist/rules/cwe/cwe-863-incorrect-auth.js.map +1 -0
  257. package/dist/rules/cwe/cwe-89-sql-injection.d.ts +21 -0
  258. package/dist/rules/cwe/cwe-89-sql-injection.d.ts.map +1 -0
  259. package/dist/rules/cwe/cwe-89-sql-injection.js +456 -0
  260. package/dist/rules/cwe/cwe-89-sql-injection.js.map +1 -0
  261. package/dist/rules/cwe/cwe-918-ssrf.d.ts +9 -0
  262. package/dist/rules/cwe/cwe-918-ssrf.d.ts.map +1 -0
  263. package/dist/rules/cwe/cwe-918-ssrf.js +59 -0
  264. package/dist/rules/cwe/cwe-918-ssrf.js.map +1 -0
  265. package/dist/rules/cwe/cwe-94-code-injection.d.ts +9 -0
  266. package/dist/rules/cwe/cwe-94-code-injection.d.ts.map +1 -0
  267. package/dist/rules/cwe/cwe-94-code-injection.js +59 -0
  268. package/dist/rules/cwe/cwe-94-code-injection.js.map +1 -0
  269. package/dist/rules/cwe/index.d.ts +43 -0
  270. package/dist/rules/cwe/index.d.ts.map +1 -0
  271. package/dist/rules/cwe/index.js +99 -0
  272. package/dist/rules/cwe/index.js.map +1 -0
  273. package/dist/rules/engine/index.d.ts +10 -0
  274. package/dist/rules/engine/index.d.ts.map +1 -0
  275. package/dist/rules/engine/index.js +9 -0
  276. package/dist/rules/engine/index.js.map +1 -0
  277. package/dist/rules/engine/rule-context.d.ts +99 -0
  278. package/dist/rules/engine/rule-context.d.ts.map +1 -0
  279. package/dist/rules/engine/rule-context.js +175 -0
  280. package/dist/rules/engine/rule-context.js.map +1 -0
  281. package/dist/rules/engine/rule-engine.d.ts +132 -0
  282. package/dist/rules/engine/rule-engine.d.ts.map +1 -0
  283. package/dist/rules/engine/rule-engine.js +379 -0
  284. package/dist/rules/engine/rule-engine.js.map +1 -0
  285. package/dist/rules/engine/rule-registry.d.ts +133 -0
  286. package/dist/rules/engine/rule-registry.d.ts.map +1 -0
  287. package/dist/rules/engine/rule-registry.js +281 -0
  288. package/dist/rules/engine/rule-registry.js.map +1 -0
  289. package/dist/rules/index.d.ts +14 -0
  290. package/dist/rules/index.d.ts.map +1 -0
  291. package/dist/rules/index.js +16 -0
  292. package/dist/rules/index.js.map +1 -0
  293. package/dist/rules/owasp/a01-broken-access-control.d.ts +19 -0
  294. package/dist/rules/owasp/a01-broken-access-control.d.ts.map +1 -0
  295. package/dist/rules/owasp/a01-broken-access-control.js +295 -0
  296. package/dist/rules/owasp/a01-broken-access-control.js.map +1 -0
  297. package/dist/rules/owasp/a02-cryptographic-failures.d.ts +19 -0
  298. package/dist/rules/owasp/a02-cryptographic-failures.d.ts.map +1 -0
  299. package/dist/rules/owasp/a02-cryptographic-failures.js +327 -0
  300. package/dist/rules/owasp/a02-cryptographic-failures.js.map +1 -0
  301. package/dist/rules/owasp/a03-injection.d.ts +21 -0
  302. package/dist/rules/owasp/a03-injection.d.ts.map +1 -0
  303. package/dist/rules/owasp/a03-injection.js +342 -0
  304. package/dist/rules/owasp/a03-injection.js.map +1 -0
  305. package/dist/rules/owasp/a04-insecure-design.d.ts +19 -0
  306. package/dist/rules/owasp/a04-insecure-design.d.ts.map +1 -0
  307. package/dist/rules/owasp/a04-insecure-design.js +403 -0
  308. package/dist/rules/owasp/a04-insecure-design.js.map +1 -0
  309. package/dist/rules/owasp/a05-security-misconfiguration.d.ts +19 -0
  310. package/dist/rules/owasp/a05-security-misconfiguration.d.ts.map +1 -0
  311. package/dist/rules/owasp/a05-security-misconfiguration.js +371 -0
  312. package/dist/rules/owasp/a05-security-misconfiguration.js.map +1 -0
  313. package/dist/rules/owasp/a06-vulnerable-components.d.ts +18 -0
  314. package/dist/rules/owasp/a06-vulnerable-components.d.ts.map +1 -0
  315. package/dist/rules/owasp/a06-vulnerable-components.js +243 -0
  316. package/dist/rules/owasp/a06-vulnerable-components.js.map +1 -0
  317. package/dist/rules/owasp/a07-auth-failures.d.ts +19 -0
  318. package/dist/rules/owasp/a07-auth-failures.d.ts.map +1 -0
  319. package/dist/rules/owasp/a07-auth-failures.js +300 -0
  320. package/dist/rules/owasp/a07-auth-failures.js.map +1 -0
  321. package/dist/rules/owasp/a08-integrity-failures.d.ts +18 -0
  322. package/dist/rules/owasp/a08-integrity-failures.d.ts.map +1 -0
  323. package/dist/rules/owasp/a08-integrity-failures.js +306 -0
  324. package/dist/rules/owasp/a08-integrity-failures.js.map +1 -0
  325. package/dist/rules/owasp/a09-logging-failures.d.ts +18 -0
  326. package/dist/rules/owasp/a09-logging-failures.d.ts.map +1 -0
  327. package/dist/rules/owasp/a09-logging-failures.js +339 -0
  328. package/dist/rules/owasp/a09-logging-failures.js.map +1 -0
  329. package/dist/rules/owasp/a10-ssrf.d.ts +18 -0
  330. package/dist/rules/owasp/a10-ssrf.d.ts.map +1 -0
  331. package/dist/rules/owasp/a10-ssrf.js +349 -0
  332. package/dist/rules/owasp/a10-ssrf.js.map +1 -0
  333. package/dist/rules/owasp/index.d.ts +20 -0
  334. package/dist/rules/owasp/index.d.ts.map +1 -0
  335. package/dist/rules/owasp/index.js +53 -0
  336. package/dist/rules/owasp/index.js.map +1 -0
  337. package/dist/rules/types.d.ts +277 -0
  338. package/dist/rules/types.d.ts.map +1 -0
  339. package/dist/rules/types.js +34 -0
  340. package/dist/rules/types.js.map +1 -0
  341. package/dist/tests/integration/epic-integration.test.d.ts +7 -0
  342. package/dist/tests/integration/epic-integration.test.d.ts.map +1 -0
  343. package/dist/tests/integration/epic-integration.test.js +390 -0
  344. package/dist/tests/integration/epic-integration.test.js.map +1 -0
  345. package/dist/tests/rules/cwe/cwe-top25-1-13.test.d.ts +2 -0
  346. package/dist/tests/rules/cwe/cwe-top25-1-13.test.d.ts.map +1 -0
  347. package/dist/tests/rules/cwe/cwe-top25-1-13.test.js +154 -0
  348. package/dist/tests/rules/cwe/cwe-top25-1-13.test.js.map +1 -0
  349. package/dist/tests/rules/cwe/cwe-top25-14-25.test.d.ts +2 -0
  350. package/dist/tests/rules/cwe/cwe-top25-14-25.test.d.ts.map +1 -0
  351. package/dist/tests/rules/cwe/cwe-top25-14-25.test.js +121 -0
  352. package/dist/tests/rules/cwe/cwe-top25-14-25.test.js.map +1 -0
  353. package/dist/types/cve.d.ts +278 -0
  354. package/dist/types/cve.d.ts.map +1 -0
  355. package/dist/types/cve.js +7 -0
  356. package/dist/types/cve.js.map +1 -0
  357. package/dist/types/index.d.ts +2 -0
  358. package/dist/types/index.d.ts.map +1 -1
  359. package/dist/types/rule.d.ts +245 -0
  360. package/dist/types/rule.d.ts.map +1 -0
  361. package/dist/types/rule.js +7 -0
  362. package/dist/types/rule.js.map +1 -0
  363. package/package.json +1 -1
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cwe-190-integer-overflow.js","sourceRoot":"","sources":["../../../src/rules/cwe/cwe-190-integer-overflow.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAIH,MAAM,CAAC,MAAM,qBAAqB,GAAiB;IACjD,EAAE,EAAE,0BAA0B;IAC9B,IAAI,EAAE,yCAAyC;IAC/C,WAAW,EAAE,oDAAoD;IACjE,eAAe,EAAE,MAAM;IACvB,QAAQ,EAAE,SAAS;IACnB,IAAI,EAAE,CAAC,KAAK,EAAE,SAAS,EAAE,UAAU,EAAE,UAAU,CAAC;IAChD,GAAG,EAAE,CAAC,KAAK,CAAC;IACZ,UAAU,EAAE;QACV,EAAE,KAAK,EAAE,SAAS,EAAE,GAAG,EAAE,iDAAiD,EAAE;KAC7E;IAED,KAAK,CAAC,OAAO,CAAC,OAAoB;QAChC,MAAM,QAAQ,GAAkB,EAAE,CAAC;QACnC,MAAM,KAAK,GAAG,OAAO,CAAC,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QAE7C,MAAM,QAAQ,GAAG;YACf,EAAE,OAAO,EAAE,iDAAiD,EAAE,IAAI,EAAE,6BAA6B,EAAE,QAAQ,EAAE,MAAe,EAAE;YAC9H,EAAE,OAAO,EAAE,mCAAmC,EAAE,IAAI,EAAE,2BAA2B,EAAE,QAAQ,EAAE,QAAiB,EAAE;YAChH,EAAE,OAAO,EAAE,oDAAoD,EAAE,IAAI,EAAE,0BAA0B,EAAE,QAAQ,EAAE,KAAc,EAAE;YAC7H,EAAE,OAAO,EAAE,yBAAyB,EAAE,IAAI,EAAE,gCAAgC,EAAE,QAAQ,EAAE,QAAiB,EAAE;YAC3G,EAAE,OAAO,EAAE,eAAe,EAAE,IAAI,EAAE,iBAAiB,EAAE,QAAQ,EAAE,MAAe,EAAE;YAChF,EAAE,OAAO,EAAE,uDAAuD,EAAE,IAAI,EAAE,qBAAqB,EAAE,QAAQ,EAAE,KAAc,EAAE;SAC5H,CAAC;QAEF,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,KAAK,CAAC,MAAM,EAAE,CAAC,EAAE,EAAE,CAAC;YACtC,KAAK,MAAM,EAAE,OAAO,EAAE,IAAI,EAAE,QAAQ,EAAE,IAAI,QAAQ,EAAE,CAAC;gBACnD,OAAO,CAAC,SAAS,GAAG,CAAC,CAAC;gBACtB,IAAI,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,EAAE,CAAC;oBAC3B,QAAQ,CAAC,IAAI,CAAC;wBACZ,EAAE,EAAE,WAAW,QAAQ,CAAC,MAAM,GAAG,CAAC,EAAE;wBACpC,MAAM,EAAE,0BAA0B;wBAClC,QAAQ;wBACR,OAAO,EAAE,sBAAsB,IAAI,2BAA2B;wBAC9D,QAAQ,EAAE,EAAE,IAAI,EAAE,OAAO,CAAC,QAAQ,EAAE,SAAS,EAAE,CAAC,GAAG,CAAC,EAAE,OAAO,EAAE,CAAC,GAAG,CAAC,EAAE;wBACtE,GAAG,EAAE,CAAC,KAAK,CAAC;wBACZ,UAAU,EAAE;4BACV,WAAW,EAAE,+BAA+B;4BAC5C,OAAO,EAAE;;;;kEAI2C;yBACrD;qBACF,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;QACH,CAAC;QACD,OAAO,QAAQ,CAAC;IAClB,CAAC;CACF,CAAC;AAEF,eAAe,qBAAqB,CAAC"}
@@ -0,0 +1,21 @@
1
+ /**
2
+ * @fileoverview CWE-20: Improper Input Validation
3
+ * @module @nahisaho/musubix-security/rules/cwe/cwe-20-input-validation
4
+ * @trace TSK-RULE-005
5
+ *
6
+ * Detects:
7
+ * - Missing input validation
8
+ * - Insufficient type checking
9
+ * - Missing length/size limits
10
+ * - Unsafe type coercion
11
+ * - Missing sanitization
12
+ *
13
+ * CWE-20 is #6 in CWE Top 25 2023.
14
+ */
15
+ import type { SecurityRule } from '../types.js';
16
+ /**
17
+ * CWE-20 - Improper Input Validation
18
+ */
19
+ export declare const cwe20InputValidation: SecurityRule;
20
+ export default cwe20InputValidation;
21
+ //# sourceMappingURL=cwe-20-input-validation.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cwe-20-input-validation.d.ts","sourceRoot":"","sources":["../../../src/rules/cwe/cwe-20-input-validation.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;GAaG;AAEH,OAAO,KAAK,EAAE,YAAY,EAA4B,MAAM,aAAa,CAAC;AAE1E;;GAEG;AACH,eAAO,MAAM,oBAAoB,EAAE,YA+BlC,CAAC;AAyUF,eAAe,oBAAoB,CAAC"}
@@ -0,0 +1,342 @@
1
+ /**
2
+ * @fileoverview CWE-20: Improper Input Validation
3
+ * @module @nahisaho/musubix-security/rules/cwe/cwe-20-input-validation
4
+ * @trace TSK-RULE-005
5
+ *
6
+ * Detects:
7
+ * - Missing input validation
8
+ * - Insufficient type checking
9
+ * - Missing length/size limits
10
+ * - Unsafe type coercion
11
+ * - Missing sanitization
12
+ *
13
+ * CWE-20 is #6 in CWE Top 25 2023.
14
+ */
15
+ /**
16
+ * CWE-20 - Improper Input Validation
17
+ */
18
+ export const cwe20InputValidation = {
19
+ id: 'cwe-20-input-validation',
20
+ name: 'CWE-20: Improper Input Validation',
21
+ description: 'Detects missing or insufficient input validation patterns',
22
+ defaultSeverity: 'medium',
23
+ category: 'input-validation',
24
+ tags: ['cwe', 'input', 'validation', 'security'],
25
+ cwe: ['20'],
26
+ references: [
27
+ {
28
+ title: 'CWE-20: Improper Input Validation',
29
+ url: 'https://cwe.mitre.org/data/definitions/20.html',
30
+ },
31
+ {
32
+ title: 'OWASP Input Validation Cheat Sheet',
33
+ url: 'https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html',
34
+ },
35
+ ],
36
+ async analyze(context) {
37
+ const findings = [];
38
+ const sourceCode = context.sourceCode;
39
+ checkDirectUserInput(context, sourceCode, findings);
40
+ checkTypeCoercion(context, sourceCode, findings);
41
+ checkMissingLengthChecks(context, sourceCode, findings);
42
+ checkRegexValidation(context, sourceCode, findings);
43
+ return findings;
44
+ },
45
+ };
46
+ /**
47
+ * Check for direct use of user input without validation
48
+ */
49
+ function checkDirectUserInput(context, sourceCode, findings) {
50
+ const lines = sourceCode.split('\n');
51
+ const inputPatterns = [
52
+ {
53
+ pattern: /const\s+\w+\s*=\s*req\.body\.\w+\s*;/gi,
54
+ type: 'Direct body access',
55
+ message: 'Request body field used without validation',
56
+ severity: 'medium',
57
+ },
58
+ {
59
+ pattern: /const\s+\w+\s*=\s*req\.query\.\w+\s*;/gi,
60
+ type: 'Direct query access',
61
+ message: 'Query parameter used without validation',
62
+ severity: 'medium',
63
+ },
64
+ {
65
+ pattern: /const\s+\w+\s*=\s*req\.params\.\w+\s*;/gi,
66
+ type: 'Direct params access',
67
+ message: 'URL parameter used without validation',
68
+ severity: 'medium',
69
+ },
70
+ {
71
+ pattern: /const\s*\{[^}]+\}\s*=\s*req\.body\s*;/gi,
72
+ type: 'Destructured body',
73
+ message: 'Destructuring body without validation schema',
74
+ severity: 'low',
75
+ },
76
+ {
77
+ pattern: /JSON\.parse\s*\(\s*(?:req\.|body|data|input)/gi,
78
+ type: 'JSON.parse with user input',
79
+ message: 'JSON.parse with user input should have error handling',
80
+ severity: 'medium',
81
+ },
82
+ {
83
+ pattern: /parseInt\s*\(\s*(?:req\.|params\.|query\.)/gi,
84
+ type: 'parseInt with user input',
85
+ message: 'parseInt with user input may produce unexpected results',
86
+ severity: 'low',
87
+ },
88
+ ];
89
+ for (let lineNum = 0; lineNum < lines.length; lineNum++) {
90
+ const line = lines[lineNum];
91
+ for (const { pattern, type, message, severity } of inputPatterns) {
92
+ pattern.lastIndex = 0;
93
+ if (pattern.test(line)) {
94
+ findings.push({
95
+ id: `cwe-20-input-${findings.length + 1}`,
96
+ ruleId: 'cwe-20-input-validation',
97
+ severity,
98
+ message: `Input Validation - ${type}: ${message}`,
99
+ location: {
100
+ file: context.filePath,
101
+ startLine: lineNum + 1,
102
+ endLine: lineNum + 1,
103
+ startColumn: 0,
104
+ endColumn: line.length,
105
+ },
106
+ cwe: ['20'],
107
+ suggestion: {
108
+ description: 'Use validation library like Zod, Joi, or Yup',
109
+ example: `// Use Zod for validation
110
+ import { z } from 'zod';
111
+
112
+ const schema = z.object({
113
+ email: z.string().email(),
114
+ age: z.number().min(0).max(120),
115
+ });
116
+
117
+ const result = schema.safeParse(req.body);
118
+ if (!result.success) {
119
+ return res.status(400).json({ errors: result.error.issues });
120
+ }
121
+ const { email, age } = result.data;`,
122
+ },
123
+ });
124
+ }
125
+ }
126
+ }
127
+ }
128
+ /**
129
+ * Check for unsafe type coercion
130
+ */
131
+ function checkTypeCoercion(context, sourceCode, findings) {
132
+ const lines = sourceCode.split('\n');
133
+ const coercionPatterns = [
134
+ {
135
+ pattern: /==\s*(?:null|undefined|true|false|['"`]\w*['"`]|\d+)/gi,
136
+ type: 'Loose equality comparison',
137
+ message: 'Loose equality (==) can cause type coercion issues',
138
+ severity: 'low',
139
+ },
140
+ {
141
+ pattern: /!=\s*(?:null|undefined)/gi,
142
+ type: 'Loose inequality',
143
+ message: 'Loose inequality (!=) can cause type coercion issues',
144
+ severity: 'low',
145
+ },
146
+ {
147
+ pattern: /Number\s*\(\s*(?:req\.|params\.|query\.)/gi,
148
+ type: 'Number coercion of user input',
149
+ message: 'Number() coercion may return NaN for invalid input',
150
+ severity: 'low',
151
+ },
152
+ {
153
+ pattern: /\+\s*(?:req\.|params\.|query\.)\w+/gi,
154
+ type: 'Unary plus coercion',
155
+ message: 'Unary plus for number conversion is implicit and error-prone',
156
+ severity: 'low',
157
+ },
158
+ {
159
+ pattern: /Boolean\s*\(\s*(?:req\.|params\.|query\.)/gi,
160
+ type: 'Boolean coercion',
161
+ message: 'Boolean coercion treats empty string as false',
162
+ severity: 'info',
163
+ },
164
+ ];
165
+ for (let lineNum = 0; lineNum < lines.length; lineNum++) {
166
+ const line = lines[lineNum];
167
+ for (const { pattern, type, message, severity } of coercionPatterns) {
168
+ pattern.lastIndex = 0;
169
+ if (pattern.test(line)) {
170
+ findings.push({
171
+ id: `cwe-20-coerce-${findings.length + 1}`,
172
+ ruleId: 'cwe-20-input-validation',
173
+ severity,
174
+ message: `Type Coercion - ${type}: ${message}`,
175
+ location: {
176
+ file: context.filePath,
177
+ startLine: lineNum + 1,
178
+ endLine: lineNum + 1,
179
+ startColumn: 0,
180
+ endColumn: line.length,
181
+ },
182
+ cwe: ['20'],
183
+ suggestion: {
184
+ description: 'Use strict equality and explicit type checking',
185
+ example: `// Use strict equality
186
+ if (value === null || value === undefined) { }
187
+
188
+ // Explicit number parsing with validation
189
+ const num = Number.parseInt(input, 10);
190
+ if (Number.isNaN(num)) {
191
+ throw new Error('Invalid number');
192
+ }
193
+
194
+ // Boolean from string
195
+ const boolValue = input === 'true';`,
196
+ },
197
+ });
198
+ }
199
+ }
200
+ }
201
+ }
202
+ /**
203
+ * Check for missing length/size checks
204
+ */
205
+ function checkMissingLengthChecks(context, sourceCode, findings) {
206
+ const lines = sourceCode.split('\n');
207
+ const lengthPatterns = [
208
+ {
209
+ pattern: /req\.body\.\w+\.(?:split|slice|substring|substr)\s*\(/gi,
210
+ type: 'String operation without length check',
211
+ message: 'String operation on user input without length validation',
212
+ severity: 'low',
213
+ },
214
+ {
215
+ pattern: /\.forEach\s*\(\s*(?:async\s*)?\([^)]*\)\s*=>\s*\{[^}]*await/gi,
216
+ type: 'Async forEach on user array',
217
+ message: 'Unbounded iteration over user input may cause DoS',
218
+ severity: 'medium',
219
+ },
220
+ {
221
+ pattern: /req\.files?\.\w+\s*(?:;|$)/gi,
222
+ type: 'File access without size check',
223
+ message: 'File upload accessed without size validation',
224
+ severity: 'medium',
225
+ },
226
+ {
227
+ pattern: /\.repeat\s*\(\s*(?:req\.|params\.|query\.|Number\()/gi,
228
+ type: 'String repeat with user input',
229
+ message: 'String.repeat with user input can cause memory exhaustion',
230
+ severity: 'high',
231
+ },
232
+ ];
233
+ for (let lineNum = 0; lineNum < lines.length; lineNum++) {
234
+ const line = lines[lineNum];
235
+ for (const { pattern, type, message, severity } of lengthPatterns) {
236
+ pattern.lastIndex = 0;
237
+ if (pattern.test(line)) {
238
+ findings.push({
239
+ id: `cwe-20-length-${findings.length + 1}`,
240
+ ruleId: 'cwe-20-input-validation',
241
+ severity,
242
+ message: `Missing Length Check - ${type}: ${message}`,
243
+ location: {
244
+ file: context.filePath,
245
+ startLine: lineNum + 1,
246
+ endLine: lineNum + 1,
247
+ startColumn: 0,
248
+ endColumn: line.length,
249
+ },
250
+ cwe: ['20'],
251
+ suggestion: {
252
+ description: 'Add length/size limits to user input',
253
+ example: `// Limit string length
254
+ const MAX_LENGTH = 1000;
255
+ if (input.length > MAX_LENGTH) {
256
+ throw new Error('Input too long');
257
+ }
258
+
259
+ // Limit array operations
260
+ const MAX_ITEMS = 100;
261
+ const items = userArray.slice(0, MAX_ITEMS);
262
+
263
+ // Limit file size
264
+ const MAX_FILE_SIZE = 5 * 1024 * 1024; // 5MB
265
+ if (req.file.size > MAX_FILE_SIZE) {
266
+ throw new Error('File too large');
267
+ }`,
268
+ },
269
+ });
270
+ }
271
+ }
272
+ }
273
+ }
274
+ /**
275
+ * Check for regex validation issues
276
+ */
277
+ function checkRegexValidation(context, sourceCode, findings) {
278
+ const lines = sourceCode.split('\n');
279
+ const regexPatterns = [
280
+ {
281
+ pattern: /new\s+RegExp\s*\(\s*(?:req\.|params\.|query\.|body\.)/gi,
282
+ type: 'RegExp from user input',
283
+ message: 'Creating RegExp from user input can cause ReDoS',
284
+ severity: 'high',
285
+ },
286
+ {
287
+ pattern: /\.match\s*\(\s*new\s+RegExp\s*\(/gi,
288
+ type: 'Dynamic regex in match',
289
+ message: 'Dynamic regex pattern may be vulnerable to ReDoS',
290
+ severity: 'medium',
291
+ },
292
+ {
293
+ pattern: /\.replace\s*\(\s*new\s+RegExp\s*\(/gi,
294
+ type: 'Dynamic regex in replace',
295
+ message: 'Dynamic regex pattern in replace may be vulnerable',
296
+ severity: 'medium',
297
+ },
298
+ {
299
+ pattern: /\.test\s*\(\s*\w+\s*\)\s*(?:;|\))/gi,
300
+ type: 'Regex test without anchors',
301
+ message: 'Regex validation without ^ and $ anchors may be bypassed',
302
+ severity: 'low',
303
+ },
304
+ ];
305
+ for (let lineNum = 0; lineNum < lines.length; lineNum++) {
306
+ const line = lines[lineNum];
307
+ for (const { pattern, type, message, severity } of regexPatterns) {
308
+ pattern.lastIndex = 0;
309
+ if (pattern.test(line)) {
310
+ findings.push({
311
+ id: `cwe-20-regex-${findings.length + 1}`,
312
+ ruleId: 'cwe-20-input-validation',
313
+ severity,
314
+ message: `Regex Validation - ${type}: ${message}`,
315
+ location: {
316
+ file: context.filePath,
317
+ startLine: lineNum + 1,
318
+ endLine: lineNum + 1,
319
+ startColumn: 0,
320
+ endColumn: line.length,
321
+ },
322
+ cwe: ['20', '1333'],
323
+ suggestion: {
324
+ description: 'Use safe regex patterns and avoid user-controlled regex',
325
+ example: `// Never create RegExp from user input
326
+ // Instead, use fixed patterns:
327
+ const emailRegex = /^[^s@]+@[^s@]+.[^s@]+$/;
328
+ if (!emailRegex.test(email)) {
329
+ throw new Error('Invalid email');
330
+ }
331
+
332
+ // For search, escape special chars:
333
+ function escapeRegex(s) { return s.replace(/[.*+?^\${}()|[\\]]/g, '-'); }
334
+ const safePattern = new RegExp(escapeRegex(userInput), 'i');`,
335
+ },
336
+ });
337
+ }
338
+ }
339
+ }
340
+ }
341
+ export default cwe20InputValidation;
342
+ //# sourceMappingURL=cwe-20-input-validation.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cwe-20-input-validation.js","sourceRoot":"","sources":["../../../src/rules/cwe/cwe-20-input-validation.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;;GAaG;AAIH;;GAEG;AACH,MAAM,CAAC,MAAM,oBAAoB,GAAiB;IAChD,EAAE,EAAE,yBAAyB;IAC7B,IAAI,EAAE,mCAAmC;IACzC,WAAW,EACT,2DAA2D;IAC7D,eAAe,EAAE,QAAQ;IACzB,QAAQ,EAAE,kBAAkB;IAC5B,IAAI,EAAE,CAAC,KAAK,EAAE,OAAO,EAAE,YAAY,EAAE,UAAU,CAAC;IAChD,GAAG,EAAE,CAAC,IAAI,CAAC;IACX,UAAU,EAAE;QACV;YACE,KAAK,EAAE,mCAAmC;YAC1C,GAAG,EAAE,gDAAgD;SACtD;QACD;YACE,KAAK,EAAE,oCAAoC;YAC3C,GAAG,EAAE,kFAAkF;SACxF;KACF;IAED,KAAK,CAAC,OAAO,CAAC,OAAoB;QAChC,MAAM,QAAQ,GAAkB,EAAE,CAAC;QACnC,MAAM,UAAU,GAAG,OAAO,CAAC,UAAU,CAAC;QAEtC,oBAAoB,CAAC,OAAO,EAAE,UAAU,EAAE,QAAQ,CAAC,CAAC;QACpD,iBAAiB,CAAC,OAAO,EAAE,UAAU,EAAE,QAAQ,CAAC,CAAC;QACjD,wBAAwB,CAAC,OAAO,EAAE,UAAU,EAAE,QAAQ,CAAC,CAAC;QACxD,oBAAoB,CAAC,OAAO,EAAE,UAAU,EAAE,QAAQ,CAAC,CAAC;QAEpD,OAAO,QAAQ,CAAC;IAClB,CAAC;CACF,CAAC;AAEF;;GAEG;AACH,SAAS,oBAAoB,CAC3B,OAAoB,EACpB,UAAkB,EAClB,QAAuB;IAEvB,MAAM,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAErC,MAAM,aAAa,GAAG;QACpB;YACE,OAAO,EAAE,wCAAwC;YACjD,IAAI,EAAE,oBAAoB;YAC1B,OAAO,EAAE,4CAA4C;YACrD,QAAQ,EAAE,QAAiB;SAC5B;QACD;YACE,OAAO,EAAE,yCAAyC;YAClD,IAAI,EAAE,qBAAqB;YAC3B,OAAO,EAAE,yCAAyC;YAClD,QAAQ,EAAE,QAAiB;SAC5B;QACD;YACE,OAAO,EAAE,0CAA0C;YACnD,IAAI,EAAE,sBAAsB;YAC5B,OAAO,EAAE,uCAAuC;YAChD,QAAQ,EAAE,QAAiB;SAC5B;QACD;YACE,OAAO,EAAE,yCAAyC;YAClD,IAAI,EAAE,mBAAmB;YACzB,OAAO,EAAE,8CAA8C;YACvD,QAAQ,EAAE,KAAc;SACzB;QACD;YACE,OAAO,EAAE,gDAAgD;YACzD,IAAI,EAAE,4BAA4B;YAClC,OAAO,EAAE,uDAAuD;YAChE,QAAQ,EAAE,QAAiB;SAC5B;QACD;YACE,OAAO,EAAE,8CAA8C;YACvD,IAAI,EAAE,0BAA0B;YAChC,OAAO,EAAE,yDAAyD;YAClE,QAAQ,EAAE,KAAc;SACzB;KACF,CAAC;IAEF,KAAK,IAAI,OAAO,GAAG,CAAC,EAAE,OAAO,GAAG,KAAK,CAAC,MAAM,EAAE,OAAO,EAAE,EAAE,CAAC;QACxD,MAAM,IAAI,GAAG,KAAK,CAAC,OAAO,CAAC,CAAC;QAE5B,KAAK,MAAM,EAAE,OAAO,EAAE,IAAI,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,aAAa,EAAE,CAAC;YACjE,OAAO,CAAC,SAAS,GAAG,CAAC,CAAC;YACtB,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,QAAQ,CAAC,IAAI,CAAC;oBACZ,EAAE,EAAE,gBAAgB,QAAQ,CAAC,MAAM,GAAG,CAAC,EAAE;oBACzC,MAAM,EAAE,yBAAyB;oBACjC,QAAQ;oBACR,OAAO,EAAE,sBAAsB,IAAI,KAAK,OAAO,EAAE;oBACjD,QAAQ,EAAE;wBACR,IAAI,EAAE,OAAO,CAAC,QAAQ;wBACtB,SAAS,EAAE,OAAO,GAAG,CAAC;wBACtB,OAAO,EAAE,OAAO,GAAG,CAAC;wBACpB,WAAW,EAAE,CAAC;wBACd,SAAS,EAAE,IAAI,CAAC,MAAM;qBACvB;oBACD,GAAG,EAAE,CAAC,IAAI,CAAC;oBACX,UAAU,EAAE;wBACV,WAAW,EAAE,8CAA8C;wBAC3D,OAAO,EAAE;;;;;;;;;;;;oCAYe;qBACzB;iBACF,CAAC,CAAC;YACL,CAAC;QACH,CAAC;IACH,CAAC;AACH,CAAC;AAED;;GAEG;AACH,SAAS,iBAAiB,CACxB,OAAoB,EACpB,UAAkB,EAClB,QAAuB;IAEvB,MAAM,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAErC,MAAM,gBAAgB,GAAG;QACvB;YACE,OAAO,EAAE,wDAAwD;YACjE,IAAI,EAAE,2BAA2B;YACjC,OAAO,EAAE,oDAAoD;YAC7D,QAAQ,EAAE,KAAc;SACzB;QACD;YACE,OAAO,EAAE,2BAA2B;YACpC,IAAI,EAAE,kBAAkB;YACxB,OAAO,EAAE,sDAAsD;YAC/D,QAAQ,EAAE,KAAc;SACzB;QACD;YACE,OAAO,EAAE,4CAA4C;YACrD,IAAI,EAAE,+BAA+B;YACrC,OAAO,EAAE,oDAAoD;YAC7D,QAAQ,EAAE,KAAc;SACzB;QACD;YACE,OAAO,EAAE,sCAAsC;YAC/C,IAAI,EAAE,qBAAqB;YAC3B,OAAO,EAAE,8DAA8D;YACvE,QAAQ,EAAE,KAAc;SACzB;QACD;YACE,OAAO,EAAE,6CAA6C;YACtD,IAAI,EAAE,kBAAkB;YACxB,OAAO,EAAE,+CAA+C;YACxD,QAAQ,EAAE,MAAe;SAC1B;KACF,CAAC;IAEF,KAAK,IAAI,OAAO,GAAG,CAAC,EAAE,OAAO,GAAG,KAAK,CAAC,MAAM,EAAE,OAAO,EAAE,EAAE,CAAC;QACxD,MAAM,IAAI,GAAG,KAAK,CAAC,OAAO,CAAC,CAAC;QAE5B,KAAK,MAAM,EAAE,OAAO,EAAE,IAAI,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,gBAAgB,EAAE,CAAC;YACpE,OAAO,CAAC,SAAS,GAAG,CAAC,CAAC;YACtB,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,QAAQ,CAAC,IAAI,CAAC;oBACZ,EAAE,EAAE,iBAAiB,QAAQ,CAAC,MAAM,GAAG,CAAC,EAAE;oBAC1C,MAAM,EAAE,yBAAyB;oBACjC,QAAQ;oBACR,OAAO,EAAE,mBAAmB,IAAI,KAAK,OAAO,EAAE;oBAC9C,QAAQ,EAAE;wBACR,IAAI,EAAE,OAAO,CAAC,QAAQ;wBACtB,SAAS,EAAE,OAAO,GAAG,CAAC;wBACtB,OAAO,EAAE,OAAO,GAAG,CAAC;wBACpB,WAAW,EAAE,CAAC;wBACd,SAAS,EAAE,IAAI,CAAC,MAAM;qBACvB;oBACD,GAAG,EAAE,CAAC,IAAI,CAAC;oBACX,UAAU,EAAE;wBACV,WAAW,EAAE,gDAAgD;wBAC7D,OAAO,EAAE;;;;;;;;;;oCAUe;qBACzB;iBACF,CAAC,CAAC;YACL,CAAC;QACH,CAAC;IACH,CAAC;AACH,CAAC;AAED;;GAEG;AACH,SAAS,wBAAwB,CAC/B,OAAoB,EACpB,UAAkB,EAClB,QAAuB;IAEvB,MAAM,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAErC,MAAM,cAAc,GAAG;QACrB;YACE,OAAO,EAAE,yDAAyD;YAClE,IAAI,EAAE,uCAAuC;YAC7C,OAAO,EAAE,0DAA0D;YACnE,QAAQ,EAAE,KAAc;SACzB;QACD;YACE,OAAO,EAAE,+DAA+D;YACxE,IAAI,EAAE,6BAA6B;YACnC,OAAO,EAAE,mDAAmD;YAC5D,QAAQ,EAAE,QAAiB;SAC5B;QACD;YACE,OAAO,EAAE,8BAA8B;YACvC,IAAI,EAAE,gCAAgC;YACtC,OAAO,EAAE,8CAA8C;YACvD,QAAQ,EAAE,QAAiB;SAC5B;QACD;YACE,OAAO,EAAE,uDAAuD;YAChE,IAAI,EAAE,+BAA+B;YACrC,OAAO,EAAE,2DAA2D;YACpE,QAAQ,EAAE,MAAe;SAC1B;KACF,CAAC;IAEF,KAAK,IAAI,OAAO,GAAG,CAAC,EAAE,OAAO,GAAG,KAAK,CAAC,MAAM,EAAE,OAAO,EAAE,EAAE,CAAC;QACxD,MAAM,IAAI,GAAG,KAAK,CAAC,OAAO,CAAC,CAAC;QAE5B,KAAK,MAAM,EAAE,OAAO,EAAE,IAAI,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,cAAc,EAAE,CAAC;YAClE,OAAO,CAAC,SAAS,GAAG,CAAC,CAAC;YACtB,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,QAAQ,CAAC,IAAI,CAAC;oBACZ,EAAE,EAAE,iBAAiB,QAAQ,CAAC,MAAM,GAAG,CAAC,EAAE;oBAC1C,MAAM,EAAE,yBAAyB;oBACjC,QAAQ;oBACR,OAAO,EAAE,0BAA0B,IAAI,KAAK,OAAO,EAAE;oBACrD,QAAQ,EAAE;wBACR,IAAI,EAAE,OAAO,CAAC,QAAQ;wBACtB,SAAS,EAAE,OAAO,GAAG,CAAC;wBACtB,OAAO,EAAE,OAAO,GAAG,CAAC;wBACpB,WAAW,EAAE,CAAC;wBACd,SAAS,EAAE,IAAI,CAAC,MAAM;qBACvB;oBACD,GAAG,EAAE,CAAC,IAAI,CAAC;oBACX,UAAU,EAAE;wBACV,WAAW,EAAE,sCAAsC;wBACnD,OAAO,EAAE;;;;;;;;;;;;;;EAcnB;qBACS;iBACF,CAAC,CAAC;YACL,CAAC;QACH,CAAC;IACH,CAAC;AACH,CAAC;AAED;;GAEG;AACH,SAAS,oBAAoB,CAC3B,OAAoB,EACpB,UAAkB,EAClB,QAAuB;IAEvB,MAAM,KAAK,GAAG,UAAU,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;IAErC,MAAM,aAAa,GAAG;QACpB;YACE,OAAO,EAAE,yDAAyD;YAClE,IAAI,EAAE,wBAAwB;YAC9B,OAAO,EAAE,iDAAiD;YAC1D,QAAQ,EAAE,MAAe;SAC1B;QACD;YACE,OAAO,EAAE,oCAAoC;YAC7C,IAAI,EAAE,wBAAwB;YAC9B,OAAO,EAAE,kDAAkD;YAC3D,QAAQ,EAAE,QAAiB;SAC5B;QACD;YACE,OAAO,EAAE,sCAAsC;YAC/C,IAAI,EAAE,0BAA0B;YAChC,OAAO,EAAE,oDAAoD;YAC7D,QAAQ,EAAE,QAAiB;SAC5B;QACD;YACE,OAAO,EAAE,qCAAqC;YAC9C,IAAI,EAAE,4BAA4B;YAClC,OAAO,EAAE,0DAA0D;YACnE,QAAQ,EAAE,KAAc;SACzB;KACF,CAAC;IAEF,KAAK,IAAI,OAAO,GAAG,CAAC,EAAE,OAAO,GAAG,KAAK,CAAC,MAAM,EAAE,OAAO,EAAE,EAAE,CAAC;QACxD,MAAM,IAAI,GAAG,KAAK,CAAC,OAAO,CAAC,CAAC;QAE5B,KAAK,MAAM,EAAE,OAAO,EAAE,IAAI,EAAE,OAAO,EAAE,QAAQ,EAAE,IAAI,aAAa,EAAE,CAAC;YACjE,OAAO,CAAC,SAAS,GAAG,CAAC,CAAC;YACtB,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;gBACvB,QAAQ,CAAC,IAAI,CAAC;oBACZ,EAAE,EAAE,gBAAgB,QAAQ,CAAC,MAAM,GAAG,CAAC,EAAE;oBACzC,MAAM,EAAE,yBAAyB;oBACjC,QAAQ;oBACR,OAAO,EAAE,sBAAsB,IAAI,KAAK,OAAO,EAAE;oBACjD,QAAQ,EAAE;wBACR,IAAI,EAAE,OAAO,CAAC,QAAQ;wBACtB,SAAS,EAAE,OAAO,GAAG,CAAC;wBACtB,OAAO,EAAE,OAAO,GAAG,CAAC;wBACpB,WAAW,EAAE,CAAC;wBACd,SAAS,EAAE,IAAI,CAAC,MAAM;qBACvB;oBACD,GAAG,EAAE,CAAC,IAAI,EAAE,MAAM,CAAC;oBACnB,UAAU,EAAE;wBACV,WAAW,EAAE,yDAAyD;wBACtE,OAAO,EAAE;;;;;;;;;6DASwC;qBAClD;iBACF,CAAC,CAAC;YACL,CAAC;QACH,CAAC;IACH,CAAC;AACH,CAAC;AAED,eAAe,oBAAoB,CAAC"}
@@ -0,0 +1,20 @@
1
+ /**
2
+ * @fileoverview CWE-22: Improper Limitation of a Pathname to a Restricted Directory (Path Traversal)
3
+ * @module @nahisaho/musubix-security/rules/cwe/cwe-22-path-traversal
4
+ * @trace TSK-RULE-005
5
+ *
6
+ * Detects:
7
+ * - Path concatenation with user input
8
+ * - Missing path normalization
9
+ * - Directory escape attempts
10
+ * - Symlink attacks
11
+ *
12
+ * CWE-22 is #8 in CWE Top 25 2023.
13
+ */
14
+ import type { SecurityRule } from '../types.js';
15
+ /**
16
+ * CWE-22 - Path Traversal
17
+ */
18
+ export declare const cwe22PathTraversal: SecurityRule;
19
+ export default cwe22PathTraversal;
20
+ //# sourceMappingURL=cwe-22-path-traversal.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"cwe-22-path-traversal.d.ts","sourceRoot":"","sources":["../../../src/rules/cwe/cwe-22-path-traversal.ts"],"names":[],"mappings":"AAAA;;;;;;;;;;;;GAYG;AAEH,OAAO,KAAK,EAAE,YAAY,EAA4B,MAAM,aAAa,CAAC;AAE1E;;GAEG;AACH,eAAO,MAAM,kBAAkB,EAAE,YA8BhC,CAAC;AA+RF,eAAe,kBAAkB,CAAC"}