@nahisaho/musubix-security 2.0.1 → 2.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/analysis/enhanced-taint-analyzer.d.ts +120 -0
- package/dist/analysis/enhanced-taint-analyzer.d.ts.map +1 -0
- package/dist/analysis/enhanced-taint-analyzer.js +450 -0
- package/dist/analysis/enhanced-taint-analyzer.js.map +1 -0
- package/dist/analysis/index.d.ts +1 -0
- package/dist/analysis/index.d.ts.map +1 -1
- package/dist/analysis/index.js +1 -0
- package/dist/analysis/index.js.map +1 -1
- package/dist/analysis/interprocedural/call-graph-builder.d.ts +192 -0
- package/dist/analysis/interprocedural/call-graph-builder.d.ts.map +1 -0
- package/dist/analysis/interprocedural/call-graph-builder.js +510 -0
- package/dist/analysis/interprocedural/call-graph-builder.js.map +1 -0
- package/dist/analysis/interprocedural/dfg-adapter.d.ts +166 -0
- package/dist/analysis/interprocedural/dfg-adapter.d.ts.map +1 -0
- package/dist/analysis/interprocedural/dfg-adapter.js +455 -0
- package/dist/analysis/interprocedural/dfg-adapter.js.map +1 -0
- package/dist/analysis/interprocedural/index.d.ts +9 -0
- package/dist/analysis/interprocedural/index.d.ts.map +1 -0
- package/dist/analysis/interprocedural/index.js +9 -0
- package/dist/analysis/interprocedural/index.js.map +1 -0
- package/dist/analysis/interprocedural/taint-propagator.d.ts +250 -0
- package/dist/analysis/interprocedural/taint-propagator.d.ts.map +1 -0
- package/dist/analysis/interprocedural/taint-propagator.js +435 -0
- package/dist/analysis/interprocedural/taint-propagator.js.map +1 -0
- package/dist/analysis/sanitizers/command-sanitizers.d.ts +12 -0
- package/dist/analysis/sanitizers/command-sanitizers.d.ts.map +1 -0
- package/dist/analysis/sanitizers/command-sanitizers.js +123 -0
- package/dist/analysis/sanitizers/command-sanitizers.js.map +1 -0
- package/dist/analysis/sanitizers/html-sanitizers.d.ts +12 -0
- package/dist/analysis/sanitizers/html-sanitizers.d.ts.map +1 -0
- package/dist/analysis/sanitizers/html-sanitizers.js +213 -0
- package/dist/analysis/sanitizers/html-sanitizers.js.map +1 -0
- package/dist/analysis/sanitizers/index.d.ts +35 -0
- package/dist/analysis/sanitizers/index.d.ts.map +1 -0
- package/dist/analysis/sanitizers/index.js +59 -0
- package/dist/analysis/sanitizers/index.js.map +1 -0
- package/dist/analysis/sanitizers/path-sanitizers.d.ts +12 -0
- package/dist/analysis/sanitizers/path-sanitizers.d.ts.map +1 -0
- package/dist/analysis/sanitizers/path-sanitizers.js +163 -0
- package/dist/analysis/sanitizers/path-sanitizers.js.map +1 -0
- package/dist/analysis/sanitizers/sql-sanitizers.d.ts +12 -0
- package/dist/analysis/sanitizers/sql-sanitizers.d.ts.map +1 -0
- package/dist/analysis/sanitizers/sql-sanitizers.js +216 -0
- package/dist/analysis/sanitizers/sql-sanitizers.js.map +1 -0
- package/dist/analysis/sanitizers/types.d.ts +78 -0
- package/dist/analysis/sanitizers/types.d.ts.map +1 -0
- package/dist/analysis/sanitizers/types.js +7 -0
- package/dist/analysis/sanitizers/types.js.map +1 -0
- package/dist/analysis/sanitizers/validation-sanitizers.d.ts +12 -0
- package/dist/analysis/sanitizers/validation-sanitizers.d.ts.map +1 -0
- package/dist/analysis/sanitizers/validation-sanitizers.js +268 -0
- package/dist/analysis/sanitizers/validation-sanitizers.js.map +1 -0
- package/dist/analysis/sinks/code-eval.d.ts +12 -0
- package/dist/analysis/sinks/code-eval.d.ts.map +1 -0
- package/dist/analysis/sinks/code-eval.js +231 -0
- package/dist/analysis/sinks/code-eval.js.map +1 -0
- package/dist/analysis/sinks/command-exec.d.ts +12 -0
- package/dist/analysis/sinks/command-exec.d.ts.map +1 -0
- package/dist/analysis/sinks/command-exec.js +187 -0
- package/dist/analysis/sinks/command-exec.js.map +1 -0
- package/dist/analysis/sinks/file-operations.d.ts +12 -0
- package/dist/analysis/sinks/file-operations.d.ts.map +1 -0
- package/dist/analysis/sinks/file-operations.js +239 -0
- package/dist/analysis/sinks/file-operations.js.map +1 -0
- package/dist/analysis/sinks/html-output.d.ts +12 -0
- package/dist/analysis/sinks/html-output.d.ts.map +1 -0
- package/dist/analysis/sinks/html-output.js +256 -0
- package/dist/analysis/sinks/html-output.js.map +1 -0
- package/dist/analysis/sinks/index.d.ts +30 -0
- package/dist/analysis/sinks/index.d.ts.map +1 -0
- package/dist/analysis/sinks/index.js +46 -0
- package/dist/analysis/sinks/index.js.map +1 -0
- package/dist/analysis/sinks/sql-query.d.ts +12 -0
- package/dist/analysis/sinks/sql-query.d.ts.map +1 -0
- package/dist/analysis/sinks/sql-query.js +209 -0
- package/dist/analysis/sinks/sql-query.js.map +1 -0
- package/dist/analysis/sinks/types.d.ts +97 -0
- package/dist/analysis/sinks/types.d.ts.map +1 -0
- package/dist/analysis/sinks/types.js +7 -0
- package/dist/analysis/sinks/types.js.map +1 -0
- package/dist/analysis/sources/database.d.ts +12 -0
- package/dist/analysis/sources/database.d.ts.map +1 -0
- package/dist/analysis/sources/database.js +211 -0
- package/dist/analysis/sources/database.js.map +1 -0
- package/dist/analysis/sources/environment.d.ts +12 -0
- package/dist/analysis/sources/environment.d.ts.map +1 -0
- package/dist/analysis/sources/environment.js +158 -0
- package/dist/analysis/sources/environment.js.map +1 -0
- package/dist/analysis/sources/file-system.d.ts +12 -0
- package/dist/analysis/sources/file-system.d.ts.map +1 -0
- package/dist/analysis/sources/file-system.js +180 -0
- package/dist/analysis/sources/file-system.js.map +1 -0
- package/dist/analysis/sources/http-request.d.ts +12 -0
- package/dist/analysis/sources/http-request.d.ts.map +1 -0
- package/dist/analysis/sources/http-request.js +179 -0
- package/dist/analysis/sources/http-request.js.map +1 -0
- package/dist/analysis/sources/index.d.ts +26 -0
- package/dist/analysis/sources/index.d.ts.map +1 -0
- package/dist/analysis/sources/index.js +40 -0
- package/dist/analysis/sources/index.js.map +1 -0
- package/dist/analysis/sources/types.d.ts +93 -0
- package/dist/analysis/sources/types.d.ts.map +1 -0
- package/dist/analysis/sources/types.js +7 -0
- package/dist/analysis/sources/types.js.map +1 -0
- package/dist/analysis/sources/user-input.d.ts +12 -0
- package/dist/analysis/sources/user-input.d.ts.map +1 -0
- package/dist/analysis/sources/user-input.js +261 -0
- package/dist/analysis/sources/user-input.js.map +1 -0
- package/dist/cve/cpe-matcher.d.ts +183 -0
- package/dist/cve/cpe-matcher.d.ts.map +1 -0
- package/dist/cve/cpe-matcher.js +396 -0
- package/dist/cve/cpe-matcher.js.map +1 -0
- package/dist/cve/cve-cache.d.ts +225 -0
- package/dist/cve/cve-cache.d.ts.map +1 -0
- package/dist/cve/cve-cache.js +452 -0
- package/dist/cve/cve-cache.js.map +1 -0
- package/dist/cve/cve-cache.test.d.ts +6 -0
- package/dist/cve/cve-cache.test.d.ts.map +1 -0
- package/dist/cve/cve-cache.test.js +363 -0
- package/dist/cve/cve-cache.test.js.map +1 -0
- package/dist/cve/dependency-parser.d.ts +204 -0
- package/dist/cve/dependency-parser.d.ts.map +1 -0
- package/dist/cve/dependency-parser.js +338 -0
- package/dist/cve/dependency-parser.js.map +1 -0
- package/dist/cve/index.d.ts +20 -0
- package/dist/cve/index.d.ts.map +1 -0
- package/dist/cve/index.js +13 -0
- package/dist/cve/index.js.map +1 -0
- package/dist/cve/nvd-client.d.ts +137 -0
- package/dist/cve/nvd-client.d.ts.map +1 -0
- package/dist/cve/nvd-client.js +333 -0
- package/dist/cve/nvd-client.js.map +1 -0
- package/dist/cve/rate-limiter.d.ts +194 -0
- package/dist/cve/rate-limiter.d.ts.map +1 -0
- package/dist/cve/rate-limiter.js +276 -0
- package/dist/cve/rate-limiter.js.map +1 -0
- package/dist/cve/report-generator.d.ts +145 -0
- package/dist/cve/report-generator.d.ts.map +1 -0
- package/dist/cve/report-generator.js +377 -0
- package/dist/cve/report-generator.js.map +1 -0
- package/dist/cve/report-generator.test.d.ts +6 -0
- package/dist/cve/report-generator.test.d.ts.map +1 -0
- package/dist/cve/report-generator.test.js +275 -0
- package/dist/cve/report-generator.test.js.map +1 -0
- package/dist/cve/vulnerability-scanner.d.ts +198 -0
- package/dist/cve/vulnerability-scanner.d.ts.map +1 -0
- package/dist/cve/vulnerability-scanner.js +311 -0
- package/dist/cve/vulnerability-scanner.js.map +1 -0
- package/dist/cve/vulnerability-scanner.test.d.ts +6 -0
- package/dist/cve/vulnerability-scanner.test.d.ts.map +1 -0
- package/dist/cve/vulnerability-scanner.test.js +329 -0
- package/dist/cve/vulnerability-scanner.test.js.map +1 -0
- package/dist/index.d.ts +1 -0
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +4 -0
- package/dist/index.js.map +1 -1
- package/dist/rules/config/config-parser.d.ts +119 -0
- package/dist/rules/config/config-parser.d.ts.map +1 -0
- package/dist/rules/config/config-parser.js +376 -0
- package/dist/rules/config/config-parser.js.map +1 -0
- package/dist/rules/config/index.d.ts +8 -0
- package/dist/rules/config/index.d.ts.map +1 -0
- package/dist/rules/config/index.js +8 -0
- package/dist/rules/config/index.js.map +1 -0
- package/dist/rules/config/profiles.d.ts +85 -0
- package/dist/rules/config/profiles.d.ts.map +1 -0
- package/dist/rules/config/profiles.js +226 -0
- package/dist/rules/config/profiles.js.map +1 -0
- package/dist/rules/cwe/cwe-119-buffer-overflow.d.ts +9 -0
- package/dist/rules/cwe/cwe-119-buffer-overflow.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-119-buffer-overflow.js +54 -0
- package/dist/rules/cwe/cwe-119-buffer-overflow.js.map +1 -0
- package/dist/rules/cwe/cwe-125-oob-read.d.ts +20 -0
- package/dist/rules/cwe/cwe-125-oob-read.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-125-oob-read.js +247 -0
- package/dist/rules/cwe/cwe-125-oob-read.js.map +1 -0
- package/dist/rules/cwe/cwe-190-integer-overflow.d.ts +9 -0
- package/dist/rules/cwe/cwe-190-integer-overflow.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-190-integer-overflow.js +55 -0
- package/dist/rules/cwe/cwe-190-integer-overflow.js.map +1 -0
- package/dist/rules/cwe/cwe-20-input-validation.d.ts +21 -0
- package/dist/rules/cwe/cwe-20-input-validation.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-20-input-validation.js +342 -0
- package/dist/rules/cwe/cwe-20-input-validation.js.map +1 -0
- package/dist/rules/cwe/cwe-22-path-traversal.d.ts +20 -0
- package/dist/rules/cwe/cwe-22-path-traversal.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-22-path-traversal.js +306 -0
- package/dist/rules/cwe/cwe-22-path-traversal.js.map +1 -0
- package/dist/rules/cwe/cwe-269-improper-privilege.d.ts +9 -0
- package/dist/rules/cwe/cwe-269-improper-privilege.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-269-improper-privilege.js +58 -0
- package/dist/rules/cwe/cwe-269-improper-privilege.js.map +1 -0
- package/dist/rules/cwe/cwe-276-default-permissions.d.ts +9 -0
- package/dist/rules/cwe/cwe-276-default-permissions.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-276-default-permissions.js +54 -0
- package/dist/rules/cwe/cwe-276-default-permissions.js.map +1 -0
- package/dist/rules/cwe/cwe-287-improper-auth.d.ts +9 -0
- package/dist/rules/cwe/cwe-287-improper-auth.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-287-improper-auth.js +57 -0
- package/dist/rules/cwe/cwe-287-improper-auth.js.map +1 -0
- package/dist/rules/cwe/cwe-306-missing-auth-critical.d.ts +9 -0
- package/dist/rules/cwe/cwe-306-missing-auth-critical.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-306-missing-auth-critical.js +53 -0
- package/dist/rules/cwe/cwe-306-missing-auth-critical.js.map +1 -0
- package/dist/rules/cwe/cwe-352-csrf.d.ts +9 -0
- package/dist/rules/cwe/cwe-352-csrf.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-352-csrf.js +51 -0
- package/dist/rules/cwe/cwe-352-csrf.js.map +1 -0
- package/dist/rules/cwe/cwe-362-race-condition.d.ts +9 -0
- package/dist/rules/cwe/cwe-362-race-condition.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-362-race-condition.js +55 -0
- package/dist/rules/cwe/cwe-362-race-condition.js.map +1 -0
- package/dist/rules/cwe/cwe-416-use-after-free.d.ts +23 -0
- package/dist/rules/cwe/cwe-416-use-after-free.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-416-use-after-free.js +402 -0
- package/dist/rules/cwe/cwe-416-use-after-free.js.map +1 -0
- package/dist/rules/cwe/cwe-434-file-upload.d.ts +9 -0
- package/dist/rules/cwe/cwe-434-file-upload.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-434-file-upload.js +55 -0
- package/dist/rules/cwe/cwe-434-file-upload.js.map +1 -0
- package/dist/rules/cwe/cwe-476-null-deref.d.ts +9 -0
- package/dist/rules/cwe/cwe-476-null-deref.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-476-null-deref.js +55 -0
- package/dist/rules/cwe/cwe-476-null-deref.js.map +1 -0
- package/dist/rules/cwe/cwe-502-deserialization.d.ts +9 -0
- package/dist/rules/cwe/cwe-502-deserialization.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-502-deserialization.js +57 -0
- package/dist/rules/cwe/cwe-502-deserialization.js.map +1 -0
- package/dist/rules/cwe/cwe-77-command-injection.d.ts +9 -0
- package/dist/rules/cwe/cwe-77-command-injection.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-77-command-injection.js +55 -0
- package/dist/rules/cwe/cwe-77-command-injection.js.map +1 -0
- package/dist/rules/cwe/cwe-78-command-injection.d.ts +20 -0
- package/dist/rules/cwe/cwe-78-command-injection.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-78-command-injection.js +259 -0
- package/dist/rules/cwe/cwe-78-command-injection.js.map +1 -0
- package/dist/rules/cwe/cwe-787-oob-write.d.ts +21 -0
- package/dist/rules/cwe/cwe-787-oob-write.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-787-oob-write.js +321 -0
- package/dist/rules/cwe/cwe-787-oob-write.js.map +1 -0
- package/dist/rules/cwe/cwe-79-xss.d.ts +22 -0
- package/dist/rules/cwe/cwe-79-xss.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-79-xss.js +386 -0
- package/dist/rules/cwe/cwe-79-xss.js.map +1 -0
- package/dist/rules/cwe/cwe-798-hardcoded-credentials.d.ts +9 -0
- package/dist/rules/cwe/cwe-798-hardcoded-credentials.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-798-hardcoded-credentials.js +58 -0
- package/dist/rules/cwe/cwe-798-hardcoded-credentials.js.map +1 -0
- package/dist/rules/cwe/cwe-862-missing-auth.d.ts +9 -0
- package/dist/rules/cwe/cwe-862-missing-auth.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-862-missing-auth.js +55 -0
- package/dist/rules/cwe/cwe-862-missing-auth.js.map +1 -0
- package/dist/rules/cwe/cwe-863-incorrect-auth.d.ts +9 -0
- package/dist/rules/cwe/cwe-863-incorrect-auth.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-863-incorrect-auth.js +58 -0
- package/dist/rules/cwe/cwe-863-incorrect-auth.js.map +1 -0
- package/dist/rules/cwe/cwe-89-sql-injection.d.ts +21 -0
- package/dist/rules/cwe/cwe-89-sql-injection.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-89-sql-injection.js +456 -0
- package/dist/rules/cwe/cwe-89-sql-injection.js.map +1 -0
- package/dist/rules/cwe/cwe-918-ssrf.d.ts +9 -0
- package/dist/rules/cwe/cwe-918-ssrf.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-918-ssrf.js +59 -0
- package/dist/rules/cwe/cwe-918-ssrf.js.map +1 -0
- package/dist/rules/cwe/cwe-94-code-injection.d.ts +9 -0
- package/dist/rules/cwe/cwe-94-code-injection.d.ts.map +1 -0
- package/dist/rules/cwe/cwe-94-code-injection.js +59 -0
- package/dist/rules/cwe/cwe-94-code-injection.js.map +1 -0
- package/dist/rules/cwe/index.d.ts +43 -0
- package/dist/rules/cwe/index.d.ts.map +1 -0
- package/dist/rules/cwe/index.js +99 -0
- package/dist/rules/cwe/index.js.map +1 -0
- package/dist/rules/engine/index.d.ts +10 -0
- package/dist/rules/engine/index.d.ts.map +1 -0
- package/dist/rules/engine/index.js +9 -0
- package/dist/rules/engine/index.js.map +1 -0
- package/dist/rules/engine/rule-context.d.ts +99 -0
- package/dist/rules/engine/rule-context.d.ts.map +1 -0
- package/dist/rules/engine/rule-context.js +175 -0
- package/dist/rules/engine/rule-context.js.map +1 -0
- package/dist/rules/engine/rule-engine.d.ts +132 -0
- package/dist/rules/engine/rule-engine.d.ts.map +1 -0
- package/dist/rules/engine/rule-engine.js +379 -0
- package/dist/rules/engine/rule-engine.js.map +1 -0
- package/dist/rules/engine/rule-registry.d.ts +133 -0
- package/dist/rules/engine/rule-registry.d.ts.map +1 -0
- package/dist/rules/engine/rule-registry.js +281 -0
- package/dist/rules/engine/rule-registry.js.map +1 -0
- package/dist/rules/index.d.ts +14 -0
- package/dist/rules/index.d.ts.map +1 -0
- package/dist/rules/index.js +16 -0
- package/dist/rules/index.js.map +1 -0
- package/dist/rules/owasp/a01-broken-access-control.d.ts +19 -0
- package/dist/rules/owasp/a01-broken-access-control.d.ts.map +1 -0
- package/dist/rules/owasp/a01-broken-access-control.js +295 -0
- package/dist/rules/owasp/a01-broken-access-control.js.map +1 -0
- package/dist/rules/owasp/a02-cryptographic-failures.d.ts +19 -0
- package/dist/rules/owasp/a02-cryptographic-failures.d.ts.map +1 -0
- package/dist/rules/owasp/a02-cryptographic-failures.js +327 -0
- package/dist/rules/owasp/a02-cryptographic-failures.js.map +1 -0
- package/dist/rules/owasp/a03-injection.d.ts +21 -0
- package/dist/rules/owasp/a03-injection.d.ts.map +1 -0
- package/dist/rules/owasp/a03-injection.js +342 -0
- package/dist/rules/owasp/a03-injection.js.map +1 -0
- package/dist/rules/owasp/a04-insecure-design.d.ts +19 -0
- package/dist/rules/owasp/a04-insecure-design.d.ts.map +1 -0
- package/dist/rules/owasp/a04-insecure-design.js +403 -0
- package/dist/rules/owasp/a04-insecure-design.js.map +1 -0
- package/dist/rules/owasp/a05-security-misconfiguration.d.ts +19 -0
- package/dist/rules/owasp/a05-security-misconfiguration.d.ts.map +1 -0
- package/dist/rules/owasp/a05-security-misconfiguration.js +371 -0
- package/dist/rules/owasp/a05-security-misconfiguration.js.map +1 -0
- package/dist/rules/owasp/a06-vulnerable-components.d.ts +18 -0
- package/dist/rules/owasp/a06-vulnerable-components.d.ts.map +1 -0
- package/dist/rules/owasp/a06-vulnerable-components.js +243 -0
- package/dist/rules/owasp/a06-vulnerable-components.js.map +1 -0
- package/dist/rules/owasp/a07-auth-failures.d.ts +19 -0
- package/dist/rules/owasp/a07-auth-failures.d.ts.map +1 -0
- package/dist/rules/owasp/a07-auth-failures.js +300 -0
- package/dist/rules/owasp/a07-auth-failures.js.map +1 -0
- package/dist/rules/owasp/a08-integrity-failures.d.ts +18 -0
- package/dist/rules/owasp/a08-integrity-failures.d.ts.map +1 -0
- package/dist/rules/owasp/a08-integrity-failures.js +306 -0
- package/dist/rules/owasp/a08-integrity-failures.js.map +1 -0
- package/dist/rules/owasp/a09-logging-failures.d.ts +18 -0
- package/dist/rules/owasp/a09-logging-failures.d.ts.map +1 -0
- package/dist/rules/owasp/a09-logging-failures.js +339 -0
- package/dist/rules/owasp/a09-logging-failures.js.map +1 -0
- package/dist/rules/owasp/a10-ssrf.d.ts +18 -0
- package/dist/rules/owasp/a10-ssrf.d.ts.map +1 -0
- package/dist/rules/owasp/a10-ssrf.js +349 -0
- package/dist/rules/owasp/a10-ssrf.js.map +1 -0
- package/dist/rules/owasp/index.d.ts +20 -0
- package/dist/rules/owasp/index.d.ts.map +1 -0
- package/dist/rules/owasp/index.js +53 -0
- package/dist/rules/owasp/index.js.map +1 -0
- package/dist/rules/types.d.ts +277 -0
- package/dist/rules/types.d.ts.map +1 -0
- package/dist/rules/types.js +34 -0
- package/dist/rules/types.js.map +1 -0
- package/dist/tests/integration/epic-integration.test.d.ts +7 -0
- package/dist/tests/integration/epic-integration.test.d.ts.map +1 -0
- package/dist/tests/integration/epic-integration.test.js +390 -0
- package/dist/tests/integration/epic-integration.test.js.map +1 -0
- package/dist/tests/rules/cwe/cwe-top25-1-13.test.d.ts +2 -0
- package/dist/tests/rules/cwe/cwe-top25-1-13.test.d.ts.map +1 -0
- package/dist/tests/rules/cwe/cwe-top25-1-13.test.js +154 -0
- package/dist/tests/rules/cwe/cwe-top25-1-13.test.js.map +1 -0
- package/dist/tests/rules/cwe/cwe-top25-14-25.test.d.ts +2 -0
- package/dist/tests/rules/cwe/cwe-top25-14-25.test.d.ts.map +1 -0
- package/dist/tests/rules/cwe/cwe-top25-14-25.test.js +121 -0
- package/dist/tests/rules/cwe/cwe-top25-14-25.test.js.map +1 -0
- package/dist/types/cve.d.ts +278 -0
- package/dist/types/cve.d.ts.map +1 -0
- package/dist/types/cve.js +7 -0
- package/dist/types/cve.js.map +1 -0
- package/dist/types/index.d.ts +2 -0
- package/dist/types/index.d.ts.map +1 -1
- package/dist/types/rule.d.ts +245 -0
- package/dist/types/rule.d.ts.map +1 -0
- package/dist/types/rule.js +7 -0
- package/dist/types/rule.js.map +1 -0
- package/package.json +1 -1
|
@@ -0,0 +1,268 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* @fileoverview Input validation sanitizer definitions
|
|
3
|
+
* @module @nahisaho/musubix-security/analysis/sanitizers/validation-sanitizers
|
|
4
|
+
* @trace REQ-SEC-001
|
|
5
|
+
*/
|
|
6
|
+
/**
|
|
7
|
+
* Input validation sanitizers
|
|
8
|
+
* @trace REQ-SEC-001
|
|
9
|
+
*/
|
|
10
|
+
export const VALIDATION_SANITIZERS = [
|
|
11
|
+
// validator.js - escape
|
|
12
|
+
{
|
|
13
|
+
id: 'SAN-VAL-001',
|
|
14
|
+
name: 'escape',
|
|
15
|
+
package: 'validator',
|
|
16
|
+
protects: ['html-output'],
|
|
17
|
+
completeness: 'complete',
|
|
18
|
+
returnsClean: true,
|
|
19
|
+
description: 'validator.escape - escapes HTML entities',
|
|
20
|
+
enabled: true,
|
|
21
|
+
tags: ['validator', 'escape', 'html-output'],
|
|
22
|
+
},
|
|
23
|
+
// validator.js - isEmail
|
|
24
|
+
{
|
|
25
|
+
id: 'SAN-VAL-010',
|
|
26
|
+
name: 'isEmail',
|
|
27
|
+
package: 'validator',
|
|
28
|
+
protects: ['sql-query', 'html-output', 'command-exec'],
|
|
29
|
+
completeness: 'complete',
|
|
30
|
+
returnsClean: false,
|
|
31
|
+
description: 'validator.isEmail - validates email format',
|
|
32
|
+
enabled: true,
|
|
33
|
+
tags: ['validator', 'email', 'format'],
|
|
34
|
+
},
|
|
35
|
+
// validator.js - isURL
|
|
36
|
+
{
|
|
37
|
+
id: 'SAN-VAL-020',
|
|
38
|
+
name: 'isURL',
|
|
39
|
+
package: 'validator',
|
|
40
|
+
protects: ['http-request', 'redirect'],
|
|
41
|
+
completeness: 'partial',
|
|
42
|
+
returnsClean: false,
|
|
43
|
+
description: 'validator.isURL - validates URL format',
|
|
44
|
+
caveats: 'Does not prevent SSRF to internal hosts',
|
|
45
|
+
enabled: true,
|
|
46
|
+
tags: ['validator', 'url', 'format'],
|
|
47
|
+
},
|
|
48
|
+
// validator.js - isInt/isNumeric
|
|
49
|
+
{
|
|
50
|
+
id: 'SAN-VAL-030',
|
|
51
|
+
name: 'isInt',
|
|
52
|
+
aliases: ['isNumeric', 'isFloat', 'isDecimal'],
|
|
53
|
+
package: 'validator',
|
|
54
|
+
protects: ['sql-query', 'command-exec'],
|
|
55
|
+
completeness: 'complete',
|
|
56
|
+
returnsClean: false,
|
|
57
|
+
description: 'validator numeric validation',
|
|
58
|
+
enabled: true,
|
|
59
|
+
tags: ['validator', 'numeric', 'format'],
|
|
60
|
+
},
|
|
61
|
+
// validator.js - isUUID
|
|
62
|
+
{
|
|
63
|
+
id: 'SAN-VAL-040',
|
|
64
|
+
name: 'isUUID',
|
|
65
|
+
package: 'validator',
|
|
66
|
+
protects: ['sql-query', 'command-exec'],
|
|
67
|
+
completeness: 'complete',
|
|
68
|
+
returnsClean: false,
|
|
69
|
+
description: 'validator.isUUID - validates UUID format',
|
|
70
|
+
enabled: true,
|
|
71
|
+
tags: ['validator', 'uuid', 'format'],
|
|
72
|
+
},
|
|
73
|
+
// validator.js - isAlphanumeric
|
|
74
|
+
{
|
|
75
|
+
id: 'SAN-VAL-050',
|
|
76
|
+
name: 'isAlphanumeric',
|
|
77
|
+
aliases: ['isAlpha', 'isAscii'],
|
|
78
|
+
package: 'validator',
|
|
79
|
+
protects: ['sql-query', 'html-output', 'command-exec'],
|
|
80
|
+
completeness: 'complete',
|
|
81
|
+
returnsClean: false,
|
|
82
|
+
description: 'validator alphanumeric validation',
|
|
83
|
+
enabled: true,
|
|
84
|
+
tags: ['validator', 'alphanumeric', 'format'],
|
|
85
|
+
},
|
|
86
|
+
// validator.js - whitelist
|
|
87
|
+
{
|
|
88
|
+
id: 'SAN-VAL-060',
|
|
89
|
+
name: 'whitelist',
|
|
90
|
+
package: 'validator',
|
|
91
|
+
protects: ['sql-query', 'html-output', 'command-exec'],
|
|
92
|
+
completeness: 'complete',
|
|
93
|
+
returnsClean: true,
|
|
94
|
+
description: 'validator.whitelist - removes non-whitelisted chars',
|
|
95
|
+
enabled: true,
|
|
96
|
+
tags: ['validator', 'whitelist', 'filter'],
|
|
97
|
+
},
|
|
98
|
+
// validator.js - blacklist
|
|
99
|
+
{
|
|
100
|
+
id: 'SAN-VAL-070',
|
|
101
|
+
name: 'blacklist',
|
|
102
|
+
package: 'validator',
|
|
103
|
+
protects: ['sql-query', 'html-output', 'command-exec'],
|
|
104
|
+
completeness: 'partial',
|
|
105
|
+
returnsClean: true,
|
|
106
|
+
description: 'validator.blacklist - removes blacklisted chars',
|
|
107
|
+
caveats: 'Blacklist approach may miss new attack vectors',
|
|
108
|
+
enabled: true,
|
|
109
|
+
tags: ['validator', 'blacklist', 'filter'],
|
|
110
|
+
},
|
|
111
|
+
// validator.js - trim/stripLow
|
|
112
|
+
{
|
|
113
|
+
id: 'SAN-VAL-080',
|
|
114
|
+
name: 'trim',
|
|
115
|
+
aliases: ['ltrim', 'rtrim', 'stripLow'],
|
|
116
|
+
package: 'validator',
|
|
117
|
+
protects: ['sql-query', 'command-exec'],
|
|
118
|
+
completeness: 'partial',
|
|
119
|
+
returnsClean: true,
|
|
120
|
+
description: 'validator trim functions',
|
|
121
|
+
caveats: 'Only removes whitespace/control chars',
|
|
122
|
+
enabled: true,
|
|
123
|
+
tags: ['validator', 'trim', 'filter'],
|
|
124
|
+
},
|
|
125
|
+
// Zod schema validation
|
|
126
|
+
{
|
|
127
|
+
id: 'SAN-VAL-090',
|
|
128
|
+
name: 'parse',
|
|
129
|
+
aliases: ['safeParse', 'parseAsync', 'safeParseAsync'],
|
|
130
|
+
package: 'zod',
|
|
131
|
+
protects: ['sql-query', 'html-output', 'command-exec'],
|
|
132
|
+
completeness: 'complete',
|
|
133
|
+
returnsClean: true,
|
|
134
|
+
description: 'Zod schema validation',
|
|
135
|
+
enabled: true,
|
|
136
|
+
tags: ['zod', 'schema', 'validate'],
|
|
137
|
+
},
|
|
138
|
+
// Yup schema validation
|
|
139
|
+
{
|
|
140
|
+
id: 'SAN-VAL-100',
|
|
141
|
+
name: 'validate',
|
|
142
|
+
aliases: ['validateSync', 'isValid', 'isValidSync'],
|
|
143
|
+
package: 'yup',
|
|
144
|
+
protects: ['sql-query', 'html-output', 'command-exec'],
|
|
145
|
+
completeness: 'complete',
|
|
146
|
+
returnsClean: true,
|
|
147
|
+
description: 'Yup schema validation',
|
|
148
|
+
enabled: true,
|
|
149
|
+
tags: ['yup', 'schema', 'validate'],
|
|
150
|
+
},
|
|
151
|
+
// Joi schema validation
|
|
152
|
+
{
|
|
153
|
+
id: 'SAN-VAL-110',
|
|
154
|
+
name: 'validate',
|
|
155
|
+
aliases: ['validateAsync', 'attempt'],
|
|
156
|
+
package: 'joi',
|
|
157
|
+
protects: ['sql-query', 'html-output', 'command-exec'],
|
|
158
|
+
completeness: 'complete',
|
|
159
|
+
returnsClean: true,
|
|
160
|
+
description: 'Joi schema validation',
|
|
161
|
+
enabled: true,
|
|
162
|
+
tags: ['joi', 'schema', 'validate'],
|
|
163
|
+
},
|
|
164
|
+
// io-ts codec validation
|
|
165
|
+
{
|
|
166
|
+
id: 'SAN-VAL-120',
|
|
167
|
+
name: 'decode',
|
|
168
|
+
aliases: ['is'],
|
|
169
|
+
package: 'io-ts',
|
|
170
|
+
protects: ['sql-query', 'html-output', 'command-exec'],
|
|
171
|
+
completeness: 'complete',
|
|
172
|
+
returnsClean: true,
|
|
173
|
+
description: 'io-ts codec validation',
|
|
174
|
+
enabled: true,
|
|
175
|
+
tags: ['io-ts', 'codec', 'validate'],
|
|
176
|
+
},
|
|
177
|
+
// superstruct validation
|
|
178
|
+
{
|
|
179
|
+
id: 'SAN-VAL-130',
|
|
180
|
+
name: 'create',
|
|
181
|
+
aliases: ['validate', 'assert', 'is'],
|
|
182
|
+
package: 'superstruct',
|
|
183
|
+
protects: ['sql-query', 'html-output', 'command-exec'],
|
|
184
|
+
completeness: 'complete',
|
|
185
|
+
returnsClean: true,
|
|
186
|
+
description: 'superstruct validation',
|
|
187
|
+
enabled: true,
|
|
188
|
+
tags: ['superstruct', 'schema', 'validate'],
|
|
189
|
+
},
|
|
190
|
+
// class-validator
|
|
191
|
+
{
|
|
192
|
+
id: 'SAN-VAL-140',
|
|
193
|
+
name: 'validate',
|
|
194
|
+
aliases: ['validateSync', 'validateOrReject'],
|
|
195
|
+
package: 'class-validator',
|
|
196
|
+
protects: ['sql-query', 'html-output', 'command-exec'],
|
|
197
|
+
completeness: 'complete',
|
|
198
|
+
returnsClean: true,
|
|
199
|
+
description: 'class-validator validation',
|
|
200
|
+
enabled: true,
|
|
201
|
+
tags: ['class-validator', 'decorator', 'validate'],
|
|
202
|
+
},
|
|
203
|
+
// parseInt/parseFloat
|
|
204
|
+
{
|
|
205
|
+
id: 'SAN-VAL-150',
|
|
206
|
+
name: 'parseInt',
|
|
207
|
+
aliases: ['parseFloat', 'Number'],
|
|
208
|
+
protects: ['sql-query', 'command-exec'],
|
|
209
|
+
completeness: 'complete',
|
|
210
|
+
returnsClean: true,
|
|
211
|
+
description: 'JavaScript numeric parsing',
|
|
212
|
+
caveats: 'Check for NaN after parsing',
|
|
213
|
+
enabled: true,
|
|
214
|
+
tags: ['javascript', 'parse', 'number'],
|
|
215
|
+
},
|
|
216
|
+
// JSON.parse (structural validation)
|
|
217
|
+
{
|
|
218
|
+
id: 'SAN-VAL-160',
|
|
219
|
+
name: 'parse',
|
|
220
|
+
package: 'JSON',
|
|
221
|
+
protects: ['sql-query', 'command-exec'],
|
|
222
|
+
completeness: 'partial',
|
|
223
|
+
returnsClean: false,
|
|
224
|
+
description: 'JSON.parse structural validation',
|
|
225
|
+
caveats: 'Only validates JSON structure, not content',
|
|
226
|
+
enabled: true,
|
|
227
|
+
tags: ['json', 'parse', 'validate'],
|
|
228
|
+
},
|
|
229
|
+
// UUID generation (safe replacement)
|
|
230
|
+
{
|
|
231
|
+
id: 'SAN-VAL-170',
|
|
232
|
+
name: 'v4',
|
|
233
|
+
aliases: ['v1', 'v5', 'randomUUID'],
|
|
234
|
+
package: 'uuid',
|
|
235
|
+
protects: ['sql-query', 'command-exec'],
|
|
236
|
+
completeness: 'complete',
|
|
237
|
+
returnsClean: true,
|
|
238
|
+
description: 'UUID generation as safe ID replacement',
|
|
239
|
+
enabled: true,
|
|
240
|
+
tags: ['uuid', 'generate', 'safe'],
|
|
241
|
+
},
|
|
242
|
+
// Regex test with safe pattern
|
|
243
|
+
{
|
|
244
|
+
id: 'SAN-VAL-180',
|
|
245
|
+
name: 'test',
|
|
246
|
+
protects: ['sql-query', 'html-output', 'command-exec'],
|
|
247
|
+
completeness: 'conditional',
|
|
248
|
+
returnsClean: false,
|
|
249
|
+
description: 'RegExp.test for input validation',
|
|
250
|
+
caveats: 'Depends on regex pattern quality',
|
|
251
|
+
enabled: true,
|
|
252
|
+
tags: ['regex', 'test', 'validate'],
|
|
253
|
+
},
|
|
254
|
+
// ajv JSON Schema validation
|
|
255
|
+
{
|
|
256
|
+
id: 'SAN-VAL-190',
|
|
257
|
+
name: 'validate',
|
|
258
|
+
aliases: ['compile'],
|
|
259
|
+
package: 'ajv',
|
|
260
|
+
protects: ['sql-query', 'html-output', 'command-exec'],
|
|
261
|
+
completeness: 'complete',
|
|
262
|
+
returnsClean: true,
|
|
263
|
+
description: 'AJV JSON Schema validation',
|
|
264
|
+
enabled: true,
|
|
265
|
+
tags: ['ajv', 'jsonschema', 'validate'],
|
|
266
|
+
},
|
|
267
|
+
];
|
|
268
|
+
//# sourceMappingURL=validation-sanitizers.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"validation-sanitizers.js","sourceRoot":"","sources":["../../../src/analysis/sanitizers/validation-sanitizers.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAIH;;;GAGG;AACH,MAAM,CAAC,MAAM,qBAAqB,GAAmC;IACnE,wBAAwB;IACxB;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,QAAQ;QACd,OAAO,EAAE,WAAW;QACpB,QAAQ,EAAE,CAAC,aAAa,CAAC;QACzB,YAAY,EAAE,UAAU;QACxB,YAAY,EAAE,IAAI;QAClB,WAAW,EAAE,0CAA0C;QACvD,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,WAAW,EAAE,QAAQ,EAAE,aAAa,CAAC;KAC7C;IAED,yBAAyB;IACzB;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,SAAS;QACf,OAAO,EAAE,WAAW;QACpB,QAAQ,EAAE,CAAC,WAAW,EAAE,aAAa,EAAE,cAAc,CAAC;QACtD,YAAY,EAAE,UAAU;QACxB,YAAY,EAAE,KAAK;QACnB,WAAW,EAAE,4CAA4C;QACzD,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,WAAW,EAAE,OAAO,EAAE,QAAQ,CAAC;KACvC;IAED,uBAAuB;IACvB;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,OAAO;QACb,OAAO,EAAE,WAAW;QACpB,QAAQ,EAAE,CAAC,cAAc,EAAE,UAAU,CAAC;QACtC,YAAY,EAAE,SAAS;QACvB,YAAY,EAAE,KAAK;QACnB,WAAW,EAAE,wCAAwC;QACrD,OAAO,EAAE,yCAAyC;QAClD,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,WAAW,EAAE,KAAK,EAAE,QAAQ,CAAC;KACrC;IAED,iCAAiC;IACjC;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,OAAO;QACb,OAAO,EAAE,CAAC,WAAW,EAAE,SAAS,EAAE,WAAW,CAAC;QAC9C,OAAO,EAAE,WAAW;QACpB,QAAQ,EAAE,CAAC,WAAW,EAAE,cAAc,CAAC;QACvC,YAAY,EAAE,UAAU;QACxB,YAAY,EAAE,KAAK;QACnB,WAAW,EAAE,8BAA8B;QAC3C,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,WAAW,EAAE,SAAS,EAAE,QAAQ,CAAC;KACzC;IAED,wBAAwB;IACxB;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,QAAQ;QACd,OAAO,EAAE,WAAW;QACpB,QAAQ,EAAE,CAAC,WAAW,EAAE,cAAc,CAAC;QACvC,YAAY,EAAE,UAAU;QACxB,YAAY,EAAE,KAAK;QACnB,WAAW,EAAE,0CAA0C;QACvD,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,WAAW,EAAE,MAAM,EAAE,QAAQ,CAAC;KACtC;IAED,gCAAgC;IAChC;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,gBAAgB;QACtB,OAAO,EAAE,CAAC,SAAS,EAAE,SAAS,CAAC;QAC/B,OAAO,EAAE,WAAW;QACpB,QAAQ,EAAE,CAAC,WAAW,EAAE,aAAa,EAAE,cAAc,CAAC;QACtD,YAAY,EAAE,UAAU;QACxB,YAAY,EAAE,KAAK;QACnB,WAAW,EAAE,mCAAmC;QAChD,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,WAAW,EAAE,cAAc,EAAE,QAAQ,CAAC;KAC9C;IAED,2BAA2B;IAC3B;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,WAAW;QACjB,OAAO,EAAE,WAAW;QACpB,QAAQ,EAAE,CAAC,WAAW,EAAE,aAAa,EAAE,cAAc,CAAC;QACtD,YAAY,EAAE,UAAU;QACxB,YAAY,EAAE,IAAI;QAClB,WAAW,EAAE,qDAAqD;QAClE,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,WAAW,EAAE,WAAW,EAAE,QAAQ,CAAC;KAC3C;IAED,2BAA2B;IAC3B;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,WAAW;QACjB,OAAO,EAAE,WAAW;QACpB,QAAQ,EAAE,CAAC,WAAW,EAAE,aAAa,EAAE,cAAc,CAAC;QACtD,YAAY,EAAE,SAAS;QACvB,YAAY,EAAE,IAAI;QAClB,WAAW,EAAE,iDAAiD;QAC9D,OAAO,EAAE,gDAAgD;QACzD,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,WAAW,EAAE,WAAW,EAAE,QAAQ,CAAC;KAC3C;IAED,+BAA+B;IAC/B;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,MAAM;QACZ,OAAO,EAAE,CAAC,OAAO,EAAE,OAAO,EAAE,UAAU,CAAC;QACvC,OAAO,EAAE,WAAW;QACpB,QAAQ,EAAE,CAAC,WAAW,EAAE,cAAc,CAAC;QACvC,YAAY,EAAE,SAAS;QACvB,YAAY,EAAE,IAAI;QAClB,WAAW,EAAE,0BAA0B;QACvC,OAAO,EAAE,uCAAuC;QAChD,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,WAAW,EAAE,MAAM,EAAE,QAAQ,CAAC;KACtC;IAED,wBAAwB;IACxB;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,OAAO;QACb,OAAO,EAAE,CAAC,WAAW,EAAE,YAAY,EAAE,gBAAgB,CAAC;QACtD,OAAO,EAAE,KAAK;QACd,QAAQ,EAAE,CAAC,WAAW,EAAE,aAAa,EAAE,cAAc,CAAC;QACtD,YAAY,EAAE,UAAU;QACxB,YAAY,EAAE,IAAI;QAClB,WAAW,EAAE,uBAAuB;QACpC,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,KAAK,EAAE,QAAQ,EAAE,UAAU,CAAC;KACpC;IAED,wBAAwB;IACxB;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,UAAU;QAChB,OAAO,EAAE,CAAC,cAAc,EAAE,SAAS,EAAE,aAAa,CAAC;QACnD,OAAO,EAAE,KAAK;QACd,QAAQ,EAAE,CAAC,WAAW,EAAE,aAAa,EAAE,cAAc,CAAC;QACtD,YAAY,EAAE,UAAU;QACxB,YAAY,EAAE,IAAI;QAClB,WAAW,EAAE,uBAAuB;QACpC,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,KAAK,EAAE,QAAQ,EAAE,UAAU,CAAC;KACpC;IAED,wBAAwB;IACxB;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,UAAU;QAChB,OAAO,EAAE,CAAC,eAAe,EAAE,SAAS,CAAC;QACrC,OAAO,EAAE,KAAK;QACd,QAAQ,EAAE,CAAC,WAAW,EAAE,aAAa,EAAE,cAAc,CAAC;QACtD,YAAY,EAAE,UAAU;QACxB,YAAY,EAAE,IAAI;QAClB,WAAW,EAAE,uBAAuB;QACpC,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,KAAK,EAAE,QAAQ,EAAE,UAAU,CAAC;KACpC;IAED,yBAAyB;IACzB;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,QAAQ;QACd,OAAO,EAAE,CAAC,IAAI,CAAC;QACf,OAAO,EAAE,OAAO;QAChB,QAAQ,EAAE,CAAC,WAAW,EAAE,aAAa,EAAE,cAAc,CAAC;QACtD,YAAY,EAAE,UAAU;QACxB,YAAY,EAAE,IAAI;QAClB,WAAW,EAAE,wBAAwB;QACrC,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,OAAO,EAAE,OAAO,EAAE,UAAU,CAAC;KACrC;IAED,yBAAyB;IACzB;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,QAAQ;QACd,OAAO,EAAE,CAAC,UAAU,EAAE,QAAQ,EAAE,IAAI,CAAC;QACrC,OAAO,EAAE,aAAa;QACtB,QAAQ,EAAE,CAAC,WAAW,EAAE,aAAa,EAAE,cAAc,CAAC;QACtD,YAAY,EAAE,UAAU;QACxB,YAAY,EAAE,IAAI;QAClB,WAAW,EAAE,wBAAwB;QACrC,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,aAAa,EAAE,QAAQ,EAAE,UAAU,CAAC;KAC5C;IAED,kBAAkB;IAClB;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,UAAU;QAChB,OAAO,EAAE,CAAC,cAAc,EAAE,kBAAkB,CAAC;QAC7C,OAAO,EAAE,iBAAiB;QAC1B,QAAQ,EAAE,CAAC,WAAW,EAAE,aAAa,EAAE,cAAc,CAAC;QACtD,YAAY,EAAE,UAAU;QACxB,YAAY,EAAE,IAAI;QAClB,WAAW,EAAE,4BAA4B;QACzC,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,iBAAiB,EAAE,WAAW,EAAE,UAAU,CAAC;KACnD;IAED,sBAAsB;IACtB;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,UAAU;QAChB,OAAO,EAAE,CAAC,YAAY,EAAE,QAAQ,CAAC;QACjC,QAAQ,EAAE,CAAC,WAAW,EAAE,cAAc,CAAC;QACvC,YAAY,EAAE,UAAU;QACxB,YAAY,EAAE,IAAI;QAClB,WAAW,EAAE,4BAA4B;QACzC,OAAO,EAAE,6BAA6B;QACtC,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,YAAY,EAAE,OAAO,EAAE,QAAQ,CAAC;KACxC;IAED,qCAAqC;IACrC;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,OAAO;QACb,OAAO,EAAE,MAAM;QACf,QAAQ,EAAE,CAAC,WAAW,EAAE,cAAc,CAAC;QACvC,YAAY,EAAE,SAAS;QACvB,YAAY,EAAE,KAAK;QACnB,WAAW,EAAE,kCAAkC;QAC/C,OAAO,EAAE,4CAA4C;QACrD,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,MAAM,EAAE,OAAO,EAAE,UAAU,CAAC;KACpC;IAED,qCAAqC;IACrC;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,IAAI;QACV,OAAO,EAAE,CAAC,IAAI,EAAE,IAAI,EAAE,YAAY,CAAC;QACnC,OAAO,EAAE,MAAM;QACf,QAAQ,EAAE,CAAC,WAAW,EAAE,cAAc,CAAC;QACvC,YAAY,EAAE,UAAU;QACxB,YAAY,EAAE,IAAI;QAClB,WAAW,EAAE,wCAAwC;QACrD,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,MAAM,EAAE,UAAU,EAAE,MAAM,CAAC;KACnC;IAED,+BAA+B;IAC/B;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,MAAM;QACZ,QAAQ,EAAE,CAAC,WAAW,EAAE,aAAa,EAAE,cAAc,CAAC;QACtD,YAAY,EAAE,aAAa;QAC3B,YAAY,EAAE,KAAK;QACnB,WAAW,EAAE,kCAAkC;QAC/C,OAAO,EAAE,kCAAkC;QAC3C,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,OAAO,EAAE,MAAM,EAAE,UAAU,CAAC;KACpC;IAED,6BAA6B;IAC7B;QACE,EAAE,EAAE,aAAa;QACjB,IAAI,EAAE,UAAU;QAChB,OAAO,EAAE,CAAC,SAAS,CAAC;QACpB,OAAO,EAAE,KAAK;QACd,QAAQ,EAAE,CAAC,WAAW,EAAE,aAAa,EAAE,cAAc,CAAC;QACtD,YAAY,EAAE,UAAU;QACxB,YAAY,EAAE,IAAI;QAClB,WAAW,EAAE,4BAA4B;QACzC,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,KAAK,EAAE,YAAY,EAAE,UAAU,CAAC;KACxC;CACO,CAAC"}
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* @fileoverview Code evaluation sink definitions
|
|
3
|
+
* @module @nahisaho/musubix-security/analysis/sinks/code-eval
|
|
4
|
+
* @trace REQ-SEC-001
|
|
5
|
+
*/
|
|
6
|
+
import type { SinkDefinition } from './types.js';
|
|
7
|
+
/**
|
|
8
|
+
* Code evaluation sinks (RCE vulnerabilities)
|
|
9
|
+
* @trace REQ-SEC-001
|
|
10
|
+
*/
|
|
11
|
+
export declare const CODE_EVAL_SINKS: readonly SinkDefinition[];
|
|
12
|
+
//# sourceMappingURL=code-eval.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"code-eval.d.ts","sourceRoot":"","sources":["../../../src/analysis/sinks/code-eval.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,YAAY,CAAC;AAEjD;;;GAGG;AACH,eAAO,MAAM,eAAe,EAAE,SAAS,cAAc,EAuO3C,CAAC"}
|
|
@@ -0,0 +1,231 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* @fileoverview Code evaluation sink definitions
|
|
3
|
+
* @module @nahisaho/musubix-security/analysis/sinks/code-eval
|
|
4
|
+
* @trace REQ-SEC-001
|
|
5
|
+
*/
|
|
6
|
+
/**
|
|
7
|
+
* Code evaluation sinks (RCE vulnerabilities)
|
|
8
|
+
* @trace REQ-SEC-001
|
|
9
|
+
*/
|
|
10
|
+
export const CODE_EVAL_SINKS = [
|
|
11
|
+
// JavaScript eval
|
|
12
|
+
{
|
|
13
|
+
id: 'SNK-EVAL-001',
|
|
14
|
+
name: 'JavaScript eval',
|
|
15
|
+
category: 'eval',
|
|
16
|
+
severity: 'critical',
|
|
17
|
+
patterns: [
|
|
18
|
+
{ method: 'eval', vulnerableArg: 0 },
|
|
19
|
+
],
|
|
20
|
+
expectedSanitizers: [],
|
|
21
|
+
description: 'JavaScript eval() - direct code execution',
|
|
22
|
+
enabled: true,
|
|
23
|
+
tags: ['eval', 'rce', 'code-injection'],
|
|
24
|
+
relatedCWE: ['CWE-94', 'CWE-95'],
|
|
25
|
+
owaspCategory: 'A03:2021-Injection',
|
|
26
|
+
},
|
|
27
|
+
// Function constructor
|
|
28
|
+
{
|
|
29
|
+
id: 'SNK-EVAL-010',
|
|
30
|
+
name: 'Function Constructor',
|
|
31
|
+
category: 'eval',
|
|
32
|
+
severity: 'critical',
|
|
33
|
+
patterns: [
|
|
34
|
+
{ method: 'Function', vulnerableArg: 0 },
|
|
35
|
+
{ receiver: 'Function', method: 'constructor', vulnerableArg: 0 },
|
|
36
|
+
],
|
|
37
|
+
expectedSanitizers: [],
|
|
38
|
+
description: 'Function constructor - dynamic code creation',
|
|
39
|
+
enabled: true,
|
|
40
|
+
tags: ['eval', 'rce', 'code-injection'],
|
|
41
|
+
relatedCWE: ['CWE-94'],
|
|
42
|
+
owaspCategory: 'A03:2021-Injection',
|
|
43
|
+
},
|
|
44
|
+
// setTimeout/setInterval with string
|
|
45
|
+
{
|
|
46
|
+
id: 'SNK-EVAL-020',
|
|
47
|
+
name: 'Timer String Evaluation',
|
|
48
|
+
category: 'eval',
|
|
49
|
+
severity: 'high',
|
|
50
|
+
framework: 'browser',
|
|
51
|
+
patterns: [
|
|
52
|
+
{ method: 'setTimeout', vulnerableArg: 0 },
|
|
53
|
+
{ method: 'setInterval', vulnerableArg: 0 },
|
|
54
|
+
{ receiver: 'window', method: 'setTimeout', vulnerableArg: 0 },
|
|
55
|
+
{ receiver: 'window', method: 'setInterval', vulnerableArg: 0 },
|
|
56
|
+
],
|
|
57
|
+
expectedSanitizers: [],
|
|
58
|
+
description: 'Timer functions with string argument - code execution',
|
|
59
|
+
enabled: true,
|
|
60
|
+
tags: ['eval', 'timer', 'code-injection'],
|
|
61
|
+
relatedCWE: ['CWE-94'],
|
|
62
|
+
owaspCategory: 'A03:2021-Injection',
|
|
63
|
+
},
|
|
64
|
+
// vm.runInContext (Node.js)
|
|
65
|
+
{
|
|
66
|
+
id: 'SNK-EVAL-030',
|
|
67
|
+
name: 'Node.js VM Execution',
|
|
68
|
+
category: 'eval',
|
|
69
|
+
severity: 'critical',
|
|
70
|
+
framework: 'node',
|
|
71
|
+
patterns: [
|
|
72
|
+
{ receiver: 'vm', method: 'runInContext', vulnerableArg: 0 },
|
|
73
|
+
{ receiver: 'vm', method: 'runInNewContext', vulnerableArg: 0 },
|
|
74
|
+
{ receiver: 'vm', method: 'runInThisContext', vulnerableArg: 0 },
|
|
75
|
+
{ receiver: 'vm', method: 'compileFunction', vulnerableArg: 0 },
|
|
76
|
+
{ method: 'Script', vulnerableArg: 0 },
|
|
77
|
+
],
|
|
78
|
+
expectedSanitizers: [],
|
|
79
|
+
description: 'Node.js vm module - sandbox escape possible',
|
|
80
|
+
enabled: true,
|
|
81
|
+
tags: ['eval', 'vm', 'node', 'sandbox'],
|
|
82
|
+
relatedCWE: ['CWE-94'],
|
|
83
|
+
owaspCategory: 'A03:2021-Injection',
|
|
84
|
+
},
|
|
85
|
+
// Deserialization
|
|
86
|
+
{
|
|
87
|
+
id: 'SNK-EVAL-040',
|
|
88
|
+
name: 'Unsafe Deserialization',
|
|
89
|
+
category: 'deserialization',
|
|
90
|
+
severity: 'critical',
|
|
91
|
+
patterns: [
|
|
92
|
+
{ method: 'deserialize', vulnerableArg: 0 },
|
|
93
|
+
{ method: 'unserialize', vulnerableArg: 0 },
|
|
94
|
+
{ receiver: 'serialize', method: 'unserialize', vulnerableArg: 0 },
|
|
95
|
+
{ receiver: 'node-serialize', method: 'unserialize', vulnerableArg: 0 },
|
|
96
|
+
],
|
|
97
|
+
expectedSanitizers: [],
|
|
98
|
+
description: 'Unsafe deserialization - RCE via prototype pollution',
|
|
99
|
+
enabled: true,
|
|
100
|
+
tags: ['deserialization', 'rce', 'prototype-pollution'],
|
|
101
|
+
relatedCWE: ['CWE-502'],
|
|
102
|
+
owaspCategory: 'A08:2021-Software and Data Integrity Failures',
|
|
103
|
+
},
|
|
104
|
+
// YAML parsing (unsafe)
|
|
105
|
+
{
|
|
106
|
+
id: 'SNK-EVAL-050',
|
|
107
|
+
name: 'Unsafe YAML Parsing',
|
|
108
|
+
category: 'deserialization',
|
|
109
|
+
severity: 'critical',
|
|
110
|
+
framework: 'js-yaml',
|
|
111
|
+
patterns: [
|
|
112
|
+
{ receiver: 'yaml', method: 'load', vulnerableArg: 0 },
|
|
113
|
+
{ receiver: 'YAML', method: 'parse', vulnerableArg: 0 },
|
|
114
|
+
],
|
|
115
|
+
expectedSanitizers: ['safeLoad', 'JSON_SCHEMA'],
|
|
116
|
+
description: 'Unsafe YAML parsing - code execution via custom tags',
|
|
117
|
+
enabled: true,
|
|
118
|
+
tags: ['yaml', 'deserialization', 'rce'],
|
|
119
|
+
relatedCWE: ['CWE-502'],
|
|
120
|
+
owaspCategory: 'A08:2021-Software and Data Integrity Failures',
|
|
121
|
+
},
|
|
122
|
+
// Regular expression DoS (ReDoS)
|
|
123
|
+
{
|
|
124
|
+
id: 'SNK-EVAL-060',
|
|
125
|
+
name: 'Dynamic Regular Expression',
|
|
126
|
+
category: 'eval',
|
|
127
|
+
severity: 'medium',
|
|
128
|
+
patterns: [
|
|
129
|
+
{ method: 'RegExp', vulnerableArg: 0 },
|
|
130
|
+
{ receiver: 'RegExp', method: 'constructor', vulnerableArg: 0 },
|
|
131
|
+
],
|
|
132
|
+
expectedSanitizers: ['escapeRegExp', 'validateRegex'],
|
|
133
|
+
description: 'Dynamic RegExp construction - ReDoS vulnerability',
|
|
134
|
+
enabled: true,
|
|
135
|
+
tags: ['regex', 'redos', 'dos'],
|
|
136
|
+
relatedCWE: ['CWE-1333', 'CWE-400'],
|
|
137
|
+
owaspCategory: 'A03:2021-Injection',
|
|
138
|
+
},
|
|
139
|
+
// LDAP injection
|
|
140
|
+
{
|
|
141
|
+
id: 'SNK-EVAL-070',
|
|
142
|
+
name: 'LDAP Query',
|
|
143
|
+
category: 'ldap-query',
|
|
144
|
+
severity: 'high',
|
|
145
|
+
patterns: [
|
|
146
|
+
{ method: 'search', vulnerableArg: 0 },
|
|
147
|
+
{ receiver: 'ldap', method: 'search', vulnerableArg: 0 },
|
|
148
|
+
{ receiver: 'client', method: 'search', vulnerableArg: 0 },
|
|
149
|
+
],
|
|
150
|
+
expectedSanitizers: ['escapeLDAP', 'sanitize'],
|
|
151
|
+
description: 'LDAP query with user input - LDAP injection',
|
|
152
|
+
enabled: true,
|
|
153
|
+
tags: ['ldap', 'injection'],
|
|
154
|
+
relatedCWE: ['CWE-90'],
|
|
155
|
+
owaspCategory: 'A03:2021-Injection',
|
|
156
|
+
},
|
|
157
|
+
// XPath injection
|
|
158
|
+
{
|
|
159
|
+
id: 'SNK-EVAL-080',
|
|
160
|
+
name: 'XPath Query',
|
|
161
|
+
category: 'xpath-query',
|
|
162
|
+
severity: 'high',
|
|
163
|
+
patterns: [
|
|
164
|
+
{ method: 'select', vulnerableArg: 0 },
|
|
165
|
+
{ method: 'evaluate', vulnerableArg: 0 },
|
|
166
|
+
{ receiver: 'xpath', method: 'select', vulnerableArg: 0 },
|
|
167
|
+
],
|
|
168
|
+
expectedSanitizers: ['escapeXPath', 'parameterize'],
|
|
169
|
+
description: 'XPath query with user input - XPath injection',
|
|
170
|
+
enabled: true,
|
|
171
|
+
tags: ['xpath', 'injection', 'xml'],
|
|
172
|
+
relatedCWE: ['CWE-643'],
|
|
173
|
+
owaspCategory: 'A03:2021-Injection',
|
|
174
|
+
},
|
|
175
|
+
// Server-Side Request Forgery (SSRF)
|
|
176
|
+
{
|
|
177
|
+
id: 'SNK-EVAL-090',
|
|
178
|
+
name: 'SSRF via HTTP Request',
|
|
179
|
+
category: 'http-request',
|
|
180
|
+
severity: 'high',
|
|
181
|
+
patterns: [
|
|
182
|
+
{ method: 'fetch', vulnerableArg: 0 },
|
|
183
|
+
{ receiver: 'axios', method: 'get', vulnerableArg: 0 },
|
|
184
|
+
{ receiver: 'axios', method: 'post', vulnerableArg: 0 },
|
|
185
|
+
{ receiver: 'http', method: 'get', vulnerableArg: 0 },
|
|
186
|
+
{ receiver: 'https', method: 'get', vulnerableArg: 0 },
|
|
187
|
+
{ receiver: 'got', method: 'get', vulnerableArg: 0 },
|
|
188
|
+
{ receiver: 'request', method: 'get', vulnerableArg: 0 },
|
|
189
|
+
],
|
|
190
|
+
expectedSanitizers: ['validateUrl', 'isAllowedDomain', 'whitelist'],
|
|
191
|
+
description: 'HTTP request with user-controlled URL - SSRF',
|
|
192
|
+
enabled: true,
|
|
193
|
+
tags: ['ssrf', 'http', 'network'],
|
|
194
|
+
relatedCWE: ['CWE-918'],
|
|
195
|
+
owaspCategory: 'A10:2021-Server-Side Request Forgery',
|
|
196
|
+
},
|
|
197
|
+
// Object property access (prototype pollution)
|
|
198
|
+
{
|
|
199
|
+
id: 'SNK-EVAL-100',
|
|
200
|
+
name: 'Dynamic Property Access',
|
|
201
|
+
category: 'eval',
|
|
202
|
+
severity: 'medium',
|
|
203
|
+
patterns: [
|
|
204
|
+
{ method: 'assign', vulnerableArg: 1 },
|
|
205
|
+
{ receiver: 'Object', method: 'assign', vulnerableArg: 1 },
|
|
206
|
+
],
|
|
207
|
+
expectedSanitizers: ['sanitizeKeys', 'Object.freeze'],
|
|
208
|
+
description: 'Dynamic property assignment - prototype pollution',
|
|
209
|
+
enabled: true,
|
|
210
|
+
tags: ['prototype-pollution', 'object'],
|
|
211
|
+
relatedCWE: ['CWE-1321'],
|
|
212
|
+
owaspCategory: 'A03:2021-Injection',
|
|
213
|
+
},
|
|
214
|
+
// crypto weak random
|
|
215
|
+
{
|
|
216
|
+
id: 'SNK-EVAL-110',
|
|
217
|
+
name: 'Weak Random Number',
|
|
218
|
+
category: 'eval',
|
|
219
|
+
severity: 'medium',
|
|
220
|
+
patterns: [
|
|
221
|
+
{ receiver: 'Math', method: 'random', vulnerableArg: -1 },
|
|
222
|
+
],
|
|
223
|
+
expectedSanitizers: ['crypto.randomBytes', 'crypto.randomUUID'],
|
|
224
|
+
description: 'Math.random() used for security - weak randomness',
|
|
225
|
+
enabled: true,
|
|
226
|
+
tags: ['crypto', 'random', 'weak'],
|
|
227
|
+
relatedCWE: ['CWE-330', 'CWE-338'],
|
|
228
|
+
owaspCategory: 'A02:2021-Cryptographic Failures',
|
|
229
|
+
},
|
|
230
|
+
];
|
|
231
|
+
//# sourceMappingURL=code-eval.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"code-eval.js","sourceRoot":"","sources":["../../../src/analysis/sinks/code-eval.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAIH;;;GAGG;AACH,MAAM,CAAC,MAAM,eAAe,GAA8B;IACxD,kBAAkB;IAClB;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,iBAAiB;QACvB,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,UAAU;QACpB,QAAQ,EAAE;YACR,EAAE,MAAM,EAAE,MAAM,EAAE,aAAa,EAAE,CAAC,EAAE;SACrC;QACD,kBAAkB,EAAE,EAAE;QACtB,WAAW,EAAE,2CAA2C;QACxD,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,MAAM,EAAE,KAAK,EAAE,gBAAgB,CAAC;QACvC,UAAU,EAAE,CAAC,QAAQ,EAAE,QAAQ,CAAC;QAChC,aAAa,EAAE,oBAAoB;KACpC;IAED,uBAAuB;IACvB;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,sBAAsB;QAC5B,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,UAAU;QACpB,QAAQ,EAAE;YACR,EAAE,MAAM,EAAE,UAAU,EAAE,aAAa,EAAE,CAAC,EAAE;YACxC,EAAE,QAAQ,EAAE,UAAU,EAAE,MAAM,EAAE,aAAa,EAAE,aAAa,EAAE,CAAC,EAAE;SAClE;QACD,kBAAkB,EAAE,EAAE;QACtB,WAAW,EAAE,8CAA8C;QAC3D,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,MAAM,EAAE,KAAK,EAAE,gBAAgB,CAAC;QACvC,UAAU,EAAE,CAAC,QAAQ,CAAC;QACtB,aAAa,EAAE,oBAAoB;KACpC;IAED,qCAAqC;IACrC;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,yBAAyB;QAC/B,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,MAAM;QAChB,SAAS,EAAE,SAAS;QACpB,QAAQ,EAAE;YACR,EAAE,MAAM,EAAE,YAAY,EAAE,aAAa,EAAE,CAAC,EAAE;YAC1C,EAAE,MAAM,EAAE,aAAa,EAAE,aAAa,EAAE,CAAC,EAAE;YAC3C,EAAE,QAAQ,EAAE,QAAQ,EAAE,MAAM,EAAE,YAAY,EAAE,aAAa,EAAE,CAAC,EAAE;YAC9D,EAAE,QAAQ,EAAE,QAAQ,EAAE,MAAM,EAAE,aAAa,EAAE,aAAa,EAAE,CAAC,EAAE;SAChE;QACD,kBAAkB,EAAE,EAAE;QACtB,WAAW,EAAE,uDAAuD;QACpE,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,MAAM,EAAE,OAAO,EAAE,gBAAgB,CAAC;QACzC,UAAU,EAAE,CAAC,QAAQ,CAAC;QACtB,aAAa,EAAE,oBAAoB;KACpC;IAED,4BAA4B;IAC5B;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,sBAAsB;QAC5B,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,UAAU;QACpB,SAAS,EAAE,MAAM;QACjB,QAAQ,EAAE;YACR,EAAE,QAAQ,EAAE,IAAI,EAAE,MAAM,EAAE,cAAc,EAAE,aAAa,EAAE,CAAC,EAAE;YAC5D,EAAE,QAAQ,EAAE,IAAI,EAAE,MAAM,EAAE,iBAAiB,EAAE,aAAa,EAAE,CAAC,EAAE;YAC/D,EAAE,QAAQ,EAAE,IAAI,EAAE,MAAM,EAAE,kBAAkB,EAAE,aAAa,EAAE,CAAC,EAAE;YAChE,EAAE,QAAQ,EAAE,IAAI,EAAE,MAAM,EAAE,iBAAiB,EAAE,aAAa,EAAE,CAAC,EAAE;YAC/D,EAAE,MAAM,EAAE,QAAQ,EAAE,aAAa,EAAE,CAAC,EAAE;SACvC;QACD,kBAAkB,EAAE,EAAE;QACtB,WAAW,EAAE,6CAA6C;QAC1D,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,MAAM,EAAE,IAAI,EAAE,MAAM,EAAE,SAAS,CAAC;QACvC,UAAU,EAAE,CAAC,QAAQ,CAAC;QACtB,aAAa,EAAE,oBAAoB;KACpC;IAED,kBAAkB;IAClB;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,wBAAwB;QAC9B,QAAQ,EAAE,iBAAiB;QAC3B,QAAQ,EAAE,UAAU;QACpB,QAAQ,EAAE;YACR,EAAE,MAAM,EAAE,aAAa,EAAE,aAAa,EAAE,CAAC,EAAE;YAC3C,EAAE,MAAM,EAAE,aAAa,EAAE,aAAa,EAAE,CAAC,EAAE;YAC3C,EAAE,QAAQ,EAAE,WAAW,EAAE,MAAM,EAAE,aAAa,EAAE,aAAa,EAAE,CAAC,EAAE;YAClE,EAAE,QAAQ,EAAE,gBAAgB,EAAE,MAAM,EAAE,aAAa,EAAE,aAAa,EAAE,CAAC,EAAE;SACxE;QACD,kBAAkB,EAAE,EAAE;QACtB,WAAW,EAAE,sDAAsD;QACnE,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,iBAAiB,EAAE,KAAK,EAAE,qBAAqB,CAAC;QACvD,UAAU,EAAE,CAAC,SAAS,CAAC;QACvB,aAAa,EAAE,+CAA+C;KAC/D;IAED,wBAAwB;IACxB;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,qBAAqB;QAC3B,QAAQ,EAAE,iBAAiB;QAC3B,QAAQ,EAAE,UAAU;QACpB,SAAS,EAAE,SAAS;QACpB,QAAQ,EAAE;YACR,EAAE,QAAQ,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,aAAa,EAAE,CAAC,EAAE;YACtD,EAAE,QAAQ,EAAE,MAAM,EAAE,MAAM,EAAE,OAAO,EAAE,aAAa,EAAE,CAAC,EAAE;SACxD;QACD,kBAAkB,EAAE,CAAC,UAAU,EAAE,aAAa,CAAC;QAC/C,WAAW,EAAE,sDAAsD;QACnE,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,MAAM,EAAE,iBAAiB,EAAE,KAAK,CAAC;QACxC,UAAU,EAAE,CAAC,SAAS,CAAC;QACvB,aAAa,EAAE,+CAA+C;KAC/D;IAED,iCAAiC;IACjC;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,4BAA4B;QAClC,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,QAAQ;QAClB,QAAQ,EAAE;YACR,EAAE,MAAM,EAAE,QAAQ,EAAE,aAAa,EAAE,CAAC,EAAE;YACtC,EAAE,QAAQ,EAAE,QAAQ,EAAE,MAAM,EAAE,aAAa,EAAE,aAAa,EAAE,CAAC,EAAE;SAChE;QACD,kBAAkB,EAAE,CAAC,cAAc,EAAE,eAAe,CAAC;QACrD,WAAW,EAAE,mDAAmD;QAChE,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,OAAO,EAAE,OAAO,EAAE,KAAK,CAAC;QAC/B,UAAU,EAAE,CAAC,UAAU,EAAE,SAAS,CAAC;QACnC,aAAa,EAAE,oBAAoB;KACpC;IAED,iBAAiB;IACjB;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,YAAY;QAClB,QAAQ,EAAE,YAAY;QACtB,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE;YACR,EAAE,MAAM,EAAE,QAAQ,EAAE,aAAa,EAAE,CAAC,EAAE;YACtC,EAAE,QAAQ,EAAE,MAAM,EAAE,MAAM,EAAE,QAAQ,EAAE,aAAa,EAAE,CAAC,EAAE;YACxD,EAAE,QAAQ,EAAE,QAAQ,EAAE,MAAM,EAAE,QAAQ,EAAE,aAAa,EAAE,CAAC,EAAE;SAC3D;QACD,kBAAkB,EAAE,CAAC,YAAY,EAAE,UAAU,CAAC;QAC9C,WAAW,EAAE,6CAA6C;QAC1D,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,MAAM,EAAE,WAAW,CAAC;QAC3B,UAAU,EAAE,CAAC,QAAQ,CAAC;QACtB,aAAa,EAAE,oBAAoB;KACpC;IAED,kBAAkB;IAClB;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,aAAa;QACnB,QAAQ,EAAE,aAAa;QACvB,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE;YACR,EAAE,MAAM,EAAE,QAAQ,EAAE,aAAa,EAAE,CAAC,EAAE;YACtC,EAAE,MAAM,EAAE,UAAU,EAAE,aAAa,EAAE,CAAC,EAAE;YACxC,EAAE,QAAQ,EAAE,OAAO,EAAE,MAAM,EAAE,QAAQ,EAAE,aAAa,EAAE,CAAC,EAAE;SAC1D;QACD,kBAAkB,EAAE,CAAC,aAAa,EAAE,cAAc,CAAC;QACnD,WAAW,EAAE,+CAA+C;QAC5D,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,OAAO,EAAE,WAAW,EAAE,KAAK,CAAC;QACnC,UAAU,EAAE,CAAC,SAAS,CAAC;QACvB,aAAa,EAAE,oBAAoB;KACpC;IAED,qCAAqC;IACrC;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,uBAAuB;QAC7B,QAAQ,EAAE,cAAc;QACxB,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE;YACR,EAAE,MAAM,EAAE,OAAO,EAAE,aAAa,EAAE,CAAC,EAAE;YACrC,EAAE,QAAQ,EAAE,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,aAAa,EAAE,CAAC,EAAE;YACtD,EAAE,QAAQ,EAAE,OAAO,EAAE,MAAM,EAAE,MAAM,EAAE,aAAa,EAAE,CAAC,EAAE;YACvD,EAAE,QAAQ,EAAE,MAAM,EAAE,MAAM,EAAE,KAAK,EAAE,aAAa,EAAE,CAAC,EAAE;YACrD,EAAE,QAAQ,EAAE,OAAO,EAAE,MAAM,EAAE,KAAK,EAAE,aAAa,EAAE,CAAC,EAAE;YACtD,EAAE,QAAQ,EAAE,KAAK,EAAE,MAAM,EAAE,KAAK,EAAE,aAAa,EAAE,CAAC,EAAE;YACpD,EAAE,QAAQ,EAAE,SAAS,EAAE,MAAM,EAAE,KAAK,EAAE,aAAa,EAAE,CAAC,EAAE;SACzD;QACD,kBAAkB,EAAE,CAAC,aAAa,EAAE,iBAAiB,EAAE,WAAW,CAAC;QACnE,WAAW,EAAE,8CAA8C;QAC3D,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,MAAM,EAAE,MAAM,EAAE,SAAS,CAAC;QACjC,UAAU,EAAE,CAAC,SAAS,CAAC;QACvB,aAAa,EAAE,sCAAsC;KACtD;IAED,+CAA+C;IAC/C;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,yBAAyB;QAC/B,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,QAAQ;QAClB,QAAQ,EAAE;YACR,EAAE,MAAM,EAAE,QAAQ,EAAE,aAAa,EAAE,CAAC,EAAE;YACtC,EAAE,QAAQ,EAAE,QAAQ,EAAE,MAAM,EAAE,QAAQ,EAAE,aAAa,EAAE,CAAC,EAAE;SAC3D;QACD,kBAAkB,EAAE,CAAC,cAAc,EAAE,eAAe,CAAC;QACrD,WAAW,EAAE,mDAAmD;QAChE,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,qBAAqB,EAAE,QAAQ,CAAC;QACvC,UAAU,EAAE,CAAC,UAAU,CAAC;QACxB,aAAa,EAAE,oBAAoB;KACpC;IAED,qBAAqB;IACrB;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,oBAAoB;QAC1B,QAAQ,EAAE,MAAM;QAChB,QAAQ,EAAE,QAAQ;QAClB,QAAQ,EAAE;YACR,EAAE,QAAQ,EAAE,MAAM,EAAE,MAAM,EAAE,QAAQ,EAAE,aAAa,EAAE,CAAC,CAAC,EAAE;SAC1D;QACD,kBAAkB,EAAE,CAAC,oBAAoB,EAAE,mBAAmB,CAAC;QAC/D,WAAW,EAAE,mDAAmD;QAChE,OAAO,EAAE,IAAI;QACb,IAAI,EAAE,CAAC,QAAQ,EAAE,QAAQ,EAAE,MAAM,CAAC;QAClC,UAAU,EAAE,CAAC,SAAS,EAAE,SAAS,CAAC;QAClC,aAAa,EAAE,iCAAiC;KACjD;CACO,CAAC"}
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* @fileoverview Command execution sink definitions
|
|
3
|
+
* @module @nahisaho/musubix-security/analysis/sinks/command-exec
|
|
4
|
+
* @trace REQ-SEC-001
|
|
5
|
+
*/
|
|
6
|
+
import type { SinkDefinition } from './types.js';
|
|
7
|
+
/**
|
|
8
|
+
* Command injection sinks
|
|
9
|
+
* @trace REQ-SEC-001
|
|
10
|
+
*/
|
|
11
|
+
export declare const COMMAND_EXEC_SINKS: readonly SinkDefinition[];
|
|
12
|
+
//# sourceMappingURL=command-exec.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"command-exec.d.ts","sourceRoot":"","sources":["../../../src/analysis/sinks/command-exec.ts"],"names":[],"mappings":"AAAA;;;;GAIG;AAEH,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,YAAY,CAAC;AAEjD;;;GAGG;AACH,eAAO,MAAM,kBAAkB,EAAE,SAAS,cAAc,EAwL9C,CAAC"}
|