@oculum/scanner 1.0.12 → 1.0.13
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/detect/ai-code/agent-tools.d.ts +22 -0
- package/dist/detect/ai-code/agent-tools.d.ts.map +1 -0
- package/dist/detect/ai-code/agent-tools.js +1509 -0
- package/dist/detect/ai-code/agent-tools.js.map +1 -0
- package/dist/detect/ai-code/byok-patterns.d.ts +15 -0
- package/dist/detect/ai-code/byok-patterns.d.ts.map +1 -0
- package/dist/detect/ai-code/byok-patterns.js +313 -0
- package/dist/detect/ai-code/byok-patterns.js.map +1 -0
- package/dist/detect/ai-code/endpoint-protection.d.ts +38 -0
- package/dist/detect/ai-code/endpoint-protection.d.ts.map +1 -0
- package/dist/detect/ai-code/endpoint-protection.js +349 -0
- package/dist/detect/ai-code/endpoint-protection.js.map +1 -0
- package/dist/detect/ai-code/execution-sinks.d.ts +21 -0
- package/dist/detect/ai-code/execution-sinks.d.ts.map +1 -0
- package/dist/detect/ai-code/execution-sinks.js +1158 -0
- package/dist/detect/ai-code/execution-sinks.js.map +1 -0
- package/dist/detect/ai-code/fingerprinting.d.ts +10 -0
- package/dist/detect/ai-code/fingerprinting.d.ts.map +1 -0
- package/dist/detect/ai-code/fingerprinting.js +665 -0
- package/dist/detect/ai-code/fingerprinting.js.map +1 -0
- package/dist/detect/ai-code/index.d.ts +12 -0
- package/dist/detect/ai-code/index.d.ts.map +1 -0
- package/dist/detect/ai-code/index.js +26 -0
- package/dist/detect/ai-code/index.js.map +1 -0
- package/dist/detect/ai-code/mcp-security.d.ts +20 -0
- package/dist/detect/ai-code/mcp-security.d.ts.map +1 -0
- package/dist/detect/ai-code/mcp-security.js +880 -0
- package/dist/detect/ai-code/mcp-security.js.map +1 -0
- package/dist/detect/ai-code/model-supply-chain.d.ts +23 -0
- package/dist/detect/ai-code/model-supply-chain.d.ts.map +1 -0
- package/dist/detect/ai-code/model-supply-chain.js +447 -0
- package/dist/detect/ai-code/model-supply-chain.js.map +1 -0
- package/dist/detect/ai-code/package-hallucination.d.ts +22 -0
- package/dist/detect/ai-code/package-hallucination.d.ts.map +1 -0
- package/dist/detect/ai-code/package-hallucination.js +841 -0
- package/dist/detect/ai-code/package-hallucination.js.map +1 -0
- package/dist/detect/ai-code/prompt-hygiene.d.ts +22 -0
- package/dist/detect/ai-code/prompt-hygiene.d.ts.map +1 -0
- package/dist/detect/ai-code/prompt-hygiene.js +1177 -0
- package/dist/detect/ai-code/prompt-hygiene.js.map +1 -0
- package/dist/detect/ai-code/rag-safety.d.ts +24 -0
- package/dist/detect/ai-code/rag-safety.d.ts.map +1 -0
- package/dist/detect/ai-code/rag-safety.js +913 -0
- package/dist/detect/ai-code/rag-safety.js.map +1 -0
- package/dist/detect/ai-code/schema-validation.d.ts +28 -0
- package/dist/detect/ai-code/schema-validation.d.ts.map +1 -0
- package/dist/detect/ai-code/schema-validation.js +378 -0
- package/dist/detect/ai-code/schema-validation.js.map +1 -0
- package/dist/detect/config/agent-skill-injection.d.ts +27 -0
- package/dist/detect/config/agent-skill-injection.d.ts.map +1 -0
- package/dist/detect/config/agent-skill-injection.js +472 -0
- package/dist/detect/config/agent-skill-injection.js.map +1 -0
- package/dist/detect/config/comments.d.ts +11 -0
- package/dist/detect/config/comments.d.ts.map +1 -0
- package/dist/detect/config/comments.js +206 -0
- package/dist/detect/config/comments.js.map +1 -0
- package/dist/detect/config/file-flags.d.ts +10 -0
- package/dist/detect/config/file-flags.d.ts.map +1 -0
- package/dist/detect/config/file-flags.js +124 -0
- package/dist/detect/config/file-flags.js.map +1 -0
- package/dist/detect/config/index.d.ts +7 -0
- package/dist/detect/config/index.d.ts.map +1 -0
- package/dist/detect/config/index.js +17 -0
- package/dist/detect/config/index.js.map +1 -0
- package/dist/detect/config/osv-check.d.ts +75 -0
- package/dist/detect/config/osv-check.d.ts.map +1 -0
- package/dist/detect/config/osv-check.js +309 -0
- package/dist/detect/config/osv-check.js.map +1 -0
- package/dist/detect/config/package-check.d.ts +63 -0
- package/dist/detect/config/package-check.d.ts.map +1 -0
- package/dist/detect/config/package-check.js +509 -0
- package/dist/detect/config/package-check.js.map +1 -0
- package/dist/detect/config/urls.d.ts +11 -0
- package/dist/detect/config/urls.d.ts.map +1 -0
- package/dist/detect/config/urls.js +450 -0
- package/dist/detect/config/urls.js.map +1 -0
- package/dist/detect/index.d.ts +37 -0
- package/dist/detect/index.d.ts.map +1 -0
- package/dist/detect/index.js +77 -0
- package/dist/detect/index.js.map +1 -0
- package/dist/detect/secrets/config-audit.d.ts +11 -0
- package/dist/detect/secrets/config-audit.d.ts.map +1 -0
- package/dist/detect/secrets/config-audit.js +315 -0
- package/dist/detect/secrets/config-audit.js.map +1 -0
- package/dist/detect/secrets/config-mcp-audit.d.ts +23 -0
- package/dist/detect/secrets/config-mcp-audit.d.ts.map +1 -0
- package/dist/detect/secrets/config-mcp-audit.js +243 -0
- package/dist/detect/secrets/config-mcp-audit.js.map +1 -0
- package/dist/detect/secrets/entropy.d.ts +11 -0
- package/dist/detect/secrets/entropy.d.ts.map +1 -0
- package/dist/detect/secrets/entropy.js +751 -0
- package/dist/detect/secrets/entropy.js.map +1 -0
- package/dist/detect/secrets/index.d.ts +36 -0
- package/dist/detect/secrets/index.d.ts.map +1 -0
- package/dist/detect/secrets/index.js +174 -0
- package/dist/detect/secrets/index.js.map +1 -0
- package/dist/detect/secrets/patterns.d.ts +11 -0
- package/dist/detect/secrets/patterns.d.ts.map +1 -0
- package/dist/detect/secrets/patterns.js +518 -0
- package/dist/detect/secrets/patterns.js.map +1 -0
- package/dist/detect/secrets/weak-crypto.d.ts +10 -0
- package/dist/detect/secrets/weak-crypto.d.ts.map +1 -0
- package/dist/detect/secrets/weak-crypto.js +432 -0
- package/dist/detect/secrets/weak-crypto.js.map +1 -0
- package/dist/detect/structural/auth-patterns.d.ts +22 -0
- package/dist/detect/structural/auth-patterns.d.ts.map +1 -0
- package/dist/detect/structural/auth-patterns.js +533 -0
- package/dist/detect/structural/auth-patterns.js.map +1 -0
- package/dist/detect/structural/dangerous-functions/child-process.d.ts +16 -0
- package/dist/detect/structural/dangerous-functions/child-process.d.ts.map +1 -0
- package/dist/detect/structural/dangerous-functions/child-process.js +74 -0
- package/dist/detect/structural/dangerous-functions/child-process.js.map +1 -0
- package/dist/detect/structural/dangerous-functions/dom-xss.d.ts +34 -0
- package/dist/detect/structural/dangerous-functions/dom-xss.d.ts.map +1 -0
- package/dist/detect/structural/dangerous-functions/dom-xss.js +230 -0
- package/dist/detect/structural/dangerous-functions/dom-xss.js.map +1 -0
- package/dist/detect/structural/dangerous-functions/index.d.ts +16 -0
- package/dist/detect/structural/dangerous-functions/index.d.ts.map +1 -0
- package/dist/detect/structural/dangerous-functions/index.js +1193 -0
- package/dist/detect/structural/dangerous-functions/index.js.map +1 -0
- package/dist/detect/structural/dangerous-functions/json-parse.d.ts +31 -0
- package/dist/detect/structural/dangerous-functions/json-parse.d.ts.map +1 -0
- package/dist/detect/structural/dangerous-functions/json-parse.js +326 -0
- package/dist/detect/structural/dangerous-functions/json-parse.js.map +1 -0
- package/dist/detect/structural/dangerous-functions/math-random.d.ts +111 -0
- package/dist/detect/structural/dangerous-functions/math-random.d.ts.map +1 -0
- package/dist/detect/structural/dangerous-functions/math-random.js +684 -0
- package/dist/detect/structural/dangerous-functions/math-random.js.map +1 -0
- package/dist/detect/structural/dangerous-functions/patterns.d.ts +21 -0
- package/dist/detect/structural/dangerous-functions/patterns.d.ts.map +1 -0
- package/dist/detect/structural/dangerous-functions/patterns.js +163 -0
- package/dist/detect/structural/dangerous-functions/patterns.js.map +1 -0
- package/dist/detect/structural/dangerous-functions/request-validation.d.ts +13 -0
- package/dist/detect/structural/dangerous-functions/request-validation.d.ts.map +1 -0
- package/dist/detect/structural/dangerous-functions/request-validation.js +126 -0
- package/dist/detect/structural/dangerous-functions/request-validation.js.map +1 -0
- package/dist/detect/structural/dangerous-functions/utils/control-flow.d.ts +24 -0
- package/dist/detect/structural/dangerous-functions/utils/control-flow.d.ts.map +1 -0
- package/dist/detect/structural/dangerous-functions/utils/control-flow.js +70 -0
- package/dist/detect/structural/dangerous-functions/utils/control-flow.js.map +1 -0
- package/dist/detect/structural/dangerous-functions/utils/helpers.d.ts +31 -0
- package/dist/detect/structural/dangerous-functions/utils/helpers.d.ts.map +1 -0
- package/dist/detect/structural/dangerous-functions/utils/helpers.js +147 -0
- package/dist/detect/structural/dangerous-functions/utils/helpers.js.map +1 -0
- package/dist/detect/structural/dangerous-functions/utils/index.d.ts +9 -0
- package/dist/detect/structural/dangerous-functions/utils/index.d.ts.map +1 -0
- package/dist/detect/structural/dangerous-functions/utils/index.js +23 -0
- package/dist/detect/structural/dangerous-functions/utils/index.js.map +1 -0
- package/dist/detect/structural/dangerous-functions/utils/schema-validation.d.ts +22 -0
- package/dist/detect/structural/dangerous-functions/utils/schema-validation.d.ts.map +1 -0
- package/dist/detect/structural/dangerous-functions/utils/schema-validation.js +102 -0
- package/dist/detect/structural/dangerous-functions/utils/schema-validation.js.map +1 -0
- package/dist/detect/structural/data-exposure.d.ts +19 -0
- package/dist/detect/structural/data-exposure.d.ts.map +1 -0
- package/dist/detect/structural/data-exposure.js +262 -0
- package/dist/detect/structural/data-exposure.js.map +1 -0
- package/dist/detect/structural/framework-checks.d.ts +10 -0
- package/dist/detect/structural/framework-checks.d.ts.map +1 -0
- package/dist/detect/structural/framework-checks.js +389 -0
- package/dist/detect/structural/framework-checks.js.map +1 -0
- package/dist/detect/structural/index.d.ts +71 -0
- package/dist/detect/structural/index.d.ts.map +1 -0
- package/dist/detect/structural/index.js +510 -0
- package/dist/detect/structural/index.js.map +1 -0
- package/dist/detect/structural/log-injection.d.ts +18 -0
- package/dist/detect/structural/log-injection.d.ts.map +1 -0
- package/dist/detect/structural/log-injection.js +217 -0
- package/dist/detect/structural/log-injection.js.map +1 -0
- package/dist/detect/structural/logic-gates.d.ts +10 -0
- package/dist/detect/structural/logic-gates.d.ts.map +1 -0
- package/dist/detect/structural/logic-gates.js +227 -0
- package/dist/detect/structural/logic-gates.js.map +1 -0
- package/dist/detect/structural/risky-imports.d.ts +10 -0
- package/dist/detect/structural/risky-imports.d.ts.map +1 -0
- package/dist/detect/structural/risky-imports.js +168 -0
- package/dist/detect/structural/risky-imports.js.map +1 -0
- package/dist/detect/structural/security-headers.d.ts +18 -0
- package/dist/detect/structural/security-headers.d.ts.map +1 -0
- package/dist/detect/structural/security-headers.js +196 -0
- package/dist/detect/structural/security-headers.js.map +1 -0
- package/dist/detect/structural/ssrf-detection.d.ts +18 -0
- package/dist/detect/structural/ssrf-detection.d.ts.map +1 -0
- package/dist/detect/structural/ssrf-detection.js +263 -0
- package/dist/detect/structural/ssrf-detection.js.map +1 -0
- package/dist/detect/structural/variables.d.ts +11 -0
- package/dist/detect/structural/variables.d.ts.map +1 -0
- package/dist/detect/structural/variables.js +159 -0
- package/dist/detect/structural/variables.js.map +1 -0
- package/dist/detect/structural/xxe-detection.d.ts +18 -0
- package/dist/detect/structural/xxe-detection.d.ts.map +1 -0
- package/dist/detect/structural/xxe-detection.js +245 -0
- package/dist/detect/structural/xxe-detection.js.map +1 -0
- package/dist/index.d.ts +17 -64
- package/dist/index.d.ts.map +1 -1
- package/dist/index.js +49 -1034
- package/dist/index.js.map +1 -1
- package/dist/layer2/framework-checks.d.ts.map +1 -1
- package/dist/layer2/framework-checks.js +1 -8
- package/dist/layer2/framework-checks.js.map +1 -1
- package/dist/layer2/index.d.ts +4 -0
- package/dist/layer2/index.d.ts.map +1 -1
- package/dist/layer2/index.js +50 -1
- package/dist/layer2/index.js.map +1 -1
- package/dist/layer2/log-injection.d.ts +18 -0
- package/dist/layer2/log-injection.d.ts.map +1 -0
- package/dist/layer2/log-injection.js +214 -0
- package/dist/layer2/log-injection.js.map +1 -0
- package/dist/layer2/security-headers.d.ts +18 -0
- package/dist/layer2/security-headers.d.ts.map +1 -0
- package/dist/layer2/security-headers.js +187 -0
- package/dist/layer2/security-headers.js.map +1 -0
- package/dist/layer2/ssrf-detection.d.ts +18 -0
- package/dist/layer2/ssrf-detection.d.ts.map +1 -0
- package/dist/layer2/ssrf-detection.js +252 -0
- package/dist/layer2/ssrf-detection.js.map +1 -0
- package/dist/layer2/xxe-detection.d.ts +18 -0
- package/dist/layer2/xxe-detection.d.ts.map +1 -0
- package/dist/layer2/xxe-detection.js +242 -0
- package/dist/layer2/xxe-detection.js.map +1 -0
- package/dist/layer3/anthropic/prompts/index.d.ts +1 -1
- package/dist/layer3/anthropic/prompts/index.d.ts.map +1 -1
- package/dist/layer3/anthropic/prompts/index.js +3 -1
- package/dist/layer3/anthropic/prompts/index.js.map +1 -1
- package/dist/layer3/anthropic/prompts/modules/ai-patterns.d.ts +19 -0
- package/dist/layer3/anthropic/prompts/modules/ai-patterns.d.ts.map +1 -0
- package/dist/layer3/anthropic/prompts/modules/ai-patterns.js +156 -0
- package/dist/layer3/anthropic/prompts/modules/ai-patterns.js.map +1 -0
- package/dist/layer3/anthropic/prompts/modules/auth-access.d.ts +9 -0
- package/dist/layer3/anthropic/prompts/modules/auth-access.d.ts.map +1 -0
- package/dist/layer3/anthropic/prompts/modules/auth-access.js +25 -0
- package/dist/layer3/anthropic/prompts/modules/auth-access.js.map +1 -0
- package/dist/layer3/anthropic/prompts/modules/common.d.ts +11 -0
- package/dist/layer3/anthropic/prompts/modules/common.d.ts.map +1 -0
- package/dist/layer3/anthropic/prompts/modules/common.js +152 -0
- package/dist/layer3/anthropic/prompts/modules/common.js.map +1 -0
- package/dist/layer3/anthropic/prompts/modules/index.d.ts +54 -0
- package/dist/layer3/anthropic/prompts/modules/index.d.ts.map +1 -0
- package/dist/layer3/anthropic/prompts/modules/index.js +185 -0
- package/dist/layer3/anthropic/prompts/modules/index.js.map +1 -0
- package/dist/layer3/anthropic/prompts/modules/owasp-classic.d.ts +8 -0
- package/dist/layer3/anthropic/prompts/modules/owasp-classic.d.ts.map +1 -0
- package/dist/layer3/anthropic/prompts/modules/owasp-classic.js +84 -0
- package/dist/layer3/anthropic/prompts/modules/owasp-classic.js.map +1 -0
- package/dist/layer3/anthropic/prompts/modules/secrets-crypto.d.ts +8 -0
- package/dist/layer3/anthropic/prompts/modules/secrets-crypto.d.ts.map +1 -0
- package/dist/layer3/anthropic/prompts/modules/secrets-crypto.js +68 -0
- package/dist/layer3/anthropic/prompts/modules/secrets-crypto.js.map +1 -0
- package/dist/layer3/anthropic/prompts/modules/xss-prompt.d.ts +8 -0
- package/dist/layer3/anthropic/prompts/modules/xss-prompt.d.ts.map +1 -0
- package/dist/layer3/anthropic/prompts/modules/xss-prompt.js +22 -0
- package/dist/layer3/anthropic/prompts/modules/xss-prompt.js.map +1 -0
- package/dist/layer3/anthropic/prompts/validation.d.ts +9 -3
- package/dist/layer3/anthropic/prompts/validation.d.ts.map +1 -1
- package/dist/layer3/anthropic/prompts/validation.js +14 -410
- package/dist/layer3/anthropic/prompts/validation.js.map +1 -1
- package/dist/layer3/anthropic/providers/anthropic.d.ts.map +1 -1
- package/dist/layer3/anthropic/providers/anthropic.js +6 -3
- package/dist/layer3/anthropic/providers/anthropic.js.map +1 -1
- package/dist/layer3/anthropic/providers/openai.d.ts.map +1 -1
- package/dist/layer3/anthropic/providers/openai.js +6 -3
- package/dist/layer3/anthropic/providers/openai.js.map +1 -1
- package/dist/layer3/anthropic/request-builder.d.ts +11 -4
- package/dist/layer3/anthropic/request-builder.d.ts.map +1 -1
- package/dist/layer3/anthropic/request-builder.js +32 -16
- package/dist/layer3/anthropic/request-builder.js.map +1 -1
- package/dist/layer3/anthropic/utils/context-extractor.d.ts +55 -0
- package/dist/layer3/anthropic/utils/context-extractor.d.ts.map +1 -0
- package/dist/layer3/anthropic/utils/context-extractor.js +161 -0
- package/dist/layer3/anthropic/utils/context-extractor.js.map +1 -0
- package/dist/layer3/anthropic/utils/index.d.ts +2 -0
- package/dist/layer3/anthropic/utils/index.d.ts.map +1 -1
- package/dist/layer3/anthropic/utils/index.js +4 -1
- package/dist/layer3/anthropic/utils/index.js.map +1 -1
- package/dist/model/auth-helper-detector.d.ts +56 -0
- package/dist/model/auth-helper-detector.d.ts.map +1 -0
- package/dist/model/auth-helper-detector.js +360 -0
- package/dist/model/auth-helper-detector.js.map +1 -0
- package/dist/model/cross-file-taint.d.ts +40 -0
- package/dist/model/cross-file-taint.d.ts.map +1 -0
- package/dist/model/cross-file-taint.js +290 -0
- package/dist/model/cross-file-taint.js.map +1 -0
- package/dist/model/framework-models/django.d.ts +9 -0
- package/dist/model/framework-models/django.d.ts.map +1 -0
- package/dist/model/framework-models/django.js +82 -0
- package/dist/model/framework-models/django.js.map +1 -0
- package/dist/model/framework-models/express.d.ts +9 -0
- package/dist/model/framework-models/express.d.ts.map +1 -0
- package/dist/model/framework-models/express.js +52 -0
- package/dist/model/framework-models/express.js.map +1 -0
- package/dist/model/framework-models/index.d.ts +20 -0
- package/dist/model/framework-models/index.d.ts.map +1 -0
- package/dist/model/framework-models/index.js +102 -0
- package/dist/model/framework-models/index.js.map +1 -0
- package/dist/model/framework-models/nextjs.d.ts +9 -0
- package/dist/model/framework-models/nextjs.d.ts.map +1 -0
- package/dist/model/framework-models/nextjs.js +71 -0
- package/dist/model/framework-models/nextjs.js.map +1 -0
- package/dist/model/framework-models/prisma.d.ts +10 -0
- package/dist/model/framework-models/prisma.d.ts.map +1 -0
- package/dist/model/framework-models/prisma.js +54 -0
- package/dist/model/framework-models/prisma.js.map +1 -0
- package/dist/model/framework-models/react.d.ts +9 -0
- package/dist/model/framework-models/react.d.ts.map +1 -0
- package/dist/model/framework-models/react.js +67 -0
- package/dist/model/framework-models/react.js.map +1 -0
- package/dist/model/framework-models/sequelize.d.ts +9 -0
- package/dist/model/framework-models/sequelize.d.ts.map +1 -0
- package/dist/model/framework-models/sequelize.js +62 -0
- package/dist/model/framework-models/sequelize.js.map +1 -0
- package/dist/model/framework-models/types.d.ts +43 -0
- package/dist/model/framework-models/types.d.ts.map +1 -0
- package/dist/model/framework-models/types.js +10 -0
- package/dist/model/framework-models/types.js.map +1 -0
- package/dist/model/function-classifier.d.ts +32 -0
- package/dist/model/function-classifier.d.ts.map +1 -0
- package/dist/model/function-classifier.js +143 -0
- package/dist/model/function-classifier.js.map +1 -0
- package/dist/model/import-resolver.d.ts +45 -0
- package/dist/model/import-resolver.d.ts.map +1 -0
- package/dist/model/import-resolver.js +410 -0
- package/dist/model/import-resolver.js.map +1 -0
- package/dist/model/imported-auth-detector.d.ts +38 -0
- package/dist/model/imported-auth-detector.d.ts.map +1 -0
- package/dist/model/imported-auth-detector.js +199 -0
- package/dist/model/imported-auth-detector.js.map +1 -0
- package/dist/model/index.d.ts +63 -0
- package/dist/model/index.d.ts.map +1 -0
- package/dist/model/index.js +272 -0
- package/dist/model/index.js.map +1 -0
- package/dist/model/middleware-detector.d.ts +55 -0
- package/dist/model/middleware-detector.d.ts.map +1 -0
- package/dist/model/middleware-detector.js +382 -0
- package/dist/model/middleware-detector.js.map +1 -0
- package/dist/model/module-graph.d.ts +46 -0
- package/dist/model/module-graph.d.ts.map +1 -0
- package/dist/model/module-graph.js +187 -0
- package/dist/model/module-graph.js.map +1 -0
- package/dist/model/oauth-flow-detector.d.ts +41 -0
- package/dist/model/oauth-flow-detector.d.ts.map +1 -0
- package/dist/model/oauth-flow-detector.js +202 -0
- package/dist/model/oauth-flow-detector.js.map +1 -0
- package/dist/model/project-context.d.ts +119 -0
- package/dist/model/project-context.d.ts.map +1 -0
- package/dist/model/project-context.js +534 -0
- package/dist/model/project-context.js.map +1 -0
- package/dist/model/route-auth-resolver.d.ts +27 -0
- package/dist/model/route-auth-resolver.d.ts.map +1 -0
- package/dist/model/route-auth-resolver.js +182 -0
- package/dist/model/route-auth-resolver.js.map +1 -0
- package/dist/model/route-discovery/express.d.ts +25 -0
- package/dist/model/route-discovery/express.d.ts.map +1 -0
- package/dist/model/route-discovery/express.js +225 -0
- package/dist/model/route-discovery/express.js.map +1 -0
- package/dist/model/route-discovery/index.d.ts +21 -0
- package/dist/model/route-discovery/index.d.ts.map +1 -0
- package/dist/model/route-discovery/index.js +67 -0
- package/dist/model/route-discovery/index.js.map +1 -0
- package/dist/model/route-discovery/nextjs.d.ts +16 -0
- package/dist/model/route-discovery/nextjs.d.ts.map +1 -0
- package/dist/model/route-discovery/nextjs.js +179 -0
- package/dist/model/route-discovery/nextjs.js.map +1 -0
- package/dist/model/route-discovery/python.d.ts +16 -0
- package/dist/model/route-discovery/python.d.ts.map +1 -0
- package/dist/model/route-discovery/python.js +181 -0
- package/dist/model/route-discovery/python.js.map +1 -0
- package/dist/model/route-discovery/types.d.ts +36 -0
- package/dist/model/route-discovery/types.d.ts.map +1 -0
- package/dist/model/route-discovery/types.js +16 -0
- package/dist/model/route-discovery/types.js.map +1 -0
- package/dist/model/route-discovery/utils.d.ts +18 -0
- package/dist/model/route-discovery/utils.d.ts.map +1 -0
- package/dist/model/route-discovery/utils.js +55 -0
- package/dist/model/route-discovery/utils.js.map +1 -0
- package/dist/model/route-hierarchy.d.ts +50 -0
- package/dist/model/route-hierarchy.d.ts.map +1 -0
- package/dist/model/route-hierarchy.js +226 -0
- package/dist/model/route-hierarchy.js.map +1 -0
- package/dist/model/sanitiser-detection.d.ts +27 -0
- package/dist/model/sanitiser-detection.d.ts.map +1 -0
- package/dist/model/sanitiser-detection.js +224 -0
- package/dist/model/sanitiser-detection.js.map +1 -0
- package/dist/model/sink-matcher.d.ts +17 -0
- package/dist/model/sink-matcher.d.ts.map +1 -0
- package/dist/model/sink-matcher.js +141 -0
- package/dist/model/sink-matcher.js.map +1 -0
- package/dist/model/sink-patterns.d.ts +19 -0
- package/dist/model/sink-patterns.d.ts.map +1 -0
- package/dist/model/sink-patterns.js +88 -0
- package/dist/model/sink-patterns.js.map +1 -0
- package/dist/model/source-discovery.d.ts +15 -0
- package/dist/model/source-discovery.d.ts.map +1 -0
- package/dist/model/source-discovery.js +170 -0
- package/dist/model/source-discovery.js.map +1 -0
- package/dist/model/taint-tracker.d.ts +21 -0
- package/dist/model/taint-tracker.d.ts.map +1 -0
- package/dist/model/taint-tracker.js +281 -0
- package/dist/model/taint-tracker.js.map +1 -0
- package/dist/model/taint-types.d.ts +74 -0
- package/dist/model/taint-types.d.ts.map +1 -0
- package/dist/model/taint-types.js +9 -0
- package/dist/model/taint-types.js.map +1 -0
- package/dist/model/trpc-analyzer.d.ts +78 -0
- package/dist/model/trpc-analyzer.d.ts.map +1 -0
- package/dist/model/trpc-analyzer.js +297 -0
- package/dist/model/trpc-analyzer.js.map +1 -0
- package/dist/parse/file-classifier.d.ts +228 -0
- package/dist/parse/file-classifier.d.ts.map +1 -0
- package/dist/parse/file-classifier.js +933 -0
- package/dist/parse/file-classifier.js.map +1 -0
- package/dist/parse/path-exclusions.d.ts +55 -0
- package/dist/parse/path-exclusions.d.ts.map +1 -0
- package/dist/parse/path-exclusions.js +224 -0
- package/dist/parse/path-exclusions.js.map +1 -0
- package/dist/pipeline/config.d.ts +39 -0
- package/dist/pipeline/config.d.ts.map +1 -0
- package/dist/pipeline/config.js +46 -0
- package/dist/pipeline/config.js.map +1 -0
- package/dist/pipeline/index.d.ts +34 -0
- package/dist/pipeline/index.d.ts.map +1 -0
- package/dist/pipeline/index.js +377 -0
- package/dist/pipeline/index.js.map +1 -0
- package/dist/pipeline/modes/incremental.d.ts +66 -0
- package/dist/pipeline/modes/incremental.d.ts.map +1 -0
- package/dist/pipeline/modes/incremental.js +200 -0
- package/dist/pipeline/modes/incremental.js.map +1 -0
- package/dist/postprocess/aggregation.d.ts +14 -0
- package/dist/postprocess/aggregation.d.ts.map +1 -0
- package/dist/postprocess/aggregation.js +63 -0
- package/dist/postprocess/aggregation.js.map +1 -0
- package/dist/postprocess/contradictions.d.ts +18 -0
- package/dist/postprocess/contradictions.d.ts.map +1 -0
- package/dist/postprocess/contradictions.js +99 -0
- package/dist/postprocess/contradictions.js.map +1 -0
- package/dist/postprocess/dedup.d.ts +13 -0
- package/dist/postprocess/dedup.d.ts.map +1 -0
- package/dist/postprocess/dedup.js +58 -0
- package/dist/postprocess/dedup.js.map +1 -0
- package/dist/postprocess/filtering/context-adjustments.d.ts +23 -0
- package/dist/postprocess/filtering/context-adjustments.d.ts.map +1 -0
- package/dist/postprocess/filtering/context-adjustments.js +100 -0
- package/dist/postprocess/filtering/context-adjustments.js.map +1 -0
- package/dist/postprocess/filtering/index.d.ts +3 -0
- package/dist/postprocess/filtering/index.d.ts.map +1 -0
- package/dist/postprocess/filtering/index.js +8 -0
- package/dist/postprocess/filtering/index.js.map +1 -0
- package/dist/postprocess/filtering/pipeline.d.ts +48 -0
- package/dist/postprocess/filtering/pipeline.d.ts.map +1 -0
- package/dist/postprocess/filtering/pipeline.js +76 -0
- package/dist/postprocess/filtering/pipeline.js.map +1 -0
- package/dist/postprocess/index.d.ts +41 -0
- package/dist/postprocess/index.d.ts.map +1 -0
- package/dist/postprocess/index.js +85 -0
- package/dist/postprocess/index.js.map +1 -0
- package/dist/postprocess/suppression/config-loader.d.ts +74 -0
- package/dist/postprocess/suppression/config-loader.d.ts.map +1 -0
- package/dist/postprocess/suppression/config-loader.js +424 -0
- package/dist/postprocess/suppression/config-loader.js.map +1 -0
- package/dist/postprocess/suppression/hash.d.ts +48 -0
- package/dist/postprocess/suppression/hash.d.ts.map +1 -0
- package/dist/postprocess/suppression/hash.js +88 -0
- package/dist/postprocess/suppression/hash.js.map +1 -0
- package/dist/postprocess/suppression/index.d.ts +11 -0
- package/dist/postprocess/suppression/index.d.ts.map +1 -0
- package/dist/postprocess/suppression/index.js +39 -0
- package/dist/postprocess/suppression/index.js.map +1 -0
- package/dist/postprocess/suppression/inline-parser.d.ts +39 -0
- package/dist/postprocess/suppression/inline-parser.d.ts.map +1 -0
- package/dist/postprocess/suppression/inline-parser.js +218 -0
- package/dist/postprocess/suppression/inline-parser.js.map +1 -0
- package/dist/postprocess/suppression/manager.d.ts +94 -0
- package/dist/postprocess/suppression/manager.d.ts.map +1 -0
- package/dist/postprocess/suppression/manager.js +292 -0
- package/dist/postprocess/suppression/manager.js.map +1 -0
- package/dist/postprocess/suppression/types.d.ts +151 -0
- package/dist/postprocess/suppression/types.d.ts.map +1 -0
- package/dist/postprocess/suppression/types.js +28 -0
- package/dist/postprocess/suppression/types.js.map +1 -0
- package/dist/postprocess/validation-cap.d.ts +17 -0
- package/dist/postprocess/validation-cap.d.ts.map +1 -0
- package/dist/postprocess/validation-cap.js +64 -0
- package/dist/postprocess/validation-cap.js.map +1 -0
- package/dist/report/build-result.d.ts +33 -0
- package/dist/report/build-result.d.ts.map +1 -0
- package/dist/report/build-result.js +59 -0
- package/dist/report/build-result.js.map +1 -0
- package/dist/report/enrichment.d.ts +19 -0
- package/dist/report/enrichment.d.ts.map +1 -0
- package/dist/report/enrichment.js +44 -0
- package/dist/report/enrichment.js.map +1 -0
- package/dist/report/formatters/ai-context.d.ts +23 -0
- package/dist/report/formatters/ai-context.d.ts.map +1 -0
- package/dist/report/formatters/ai-context.js +238 -0
- package/dist/report/formatters/ai-context.js.map +1 -0
- package/dist/report/formatters/cli-terminal.d.ts +65 -0
- package/dist/report/formatters/cli-terminal.d.ts.map +1 -0
- package/dist/report/formatters/cli-terminal.js +735 -0
- package/dist/report/formatters/cli-terminal.js.map +1 -0
- package/dist/report/formatters/github-comment.d.ts +41 -0
- package/dist/report/formatters/github-comment.d.ts.map +1 -0
- package/dist/report/formatters/github-comment.js +370 -0
- package/dist/report/formatters/github-comment.js.map +1 -0
- package/dist/report/formatters/grouping.d.ts +52 -0
- package/dist/report/formatters/grouping.d.ts.map +1 -0
- package/dist/report/formatters/grouping.js +152 -0
- package/dist/report/formatters/grouping.js.map +1 -0
- package/dist/report/formatters/ide/claude-code.d.ts +17 -0
- package/dist/report/formatters/ide/claude-code.d.ts.map +1 -0
- package/dist/report/formatters/ide/claude-code.js +94 -0
- package/dist/report/formatters/ide/claude-code.js.map +1 -0
- package/dist/report/formatters/ide/cursor.d.ts +13 -0
- package/dist/report/formatters/ide/cursor.d.ts.map +1 -0
- package/dist/report/formatters/ide/cursor.js +125 -0
- package/dist/report/formatters/ide/cursor.js.map +1 -0
- package/dist/report/formatters/ide/index.d.ts +62 -0
- package/dist/report/formatters/ide/index.d.ts.map +1 -0
- package/dist/report/formatters/ide/index.js +184 -0
- package/dist/report/formatters/ide/index.js.map +1 -0
- package/dist/report/formatters/ide/windsurf.d.ts +13 -0
- package/dist/report/formatters/ide/windsurf.d.ts.map +1 -0
- package/dist/report/formatters/ide/windsurf.js +117 -0
- package/dist/report/formatters/ide/windsurf.js.map +1 -0
- package/dist/report/formatters/index.d.ts +11 -0
- package/dist/report/formatters/index.d.ts.map +1 -0
- package/dist/report/formatters/index.js +54 -0
- package/dist/report/formatters/index.js.map +1 -0
- package/dist/report/formatters/vscode-diagnostic.d.ts +103 -0
- package/dist/report/formatters/vscode-diagnostic.d.ts.map +1 -0
- package/dist/report/formatters/vscode-diagnostic.js +151 -0
- package/dist/report/formatters/vscode-diagnostic.js.map +1 -0
- package/dist/report/summary.d.ts +27 -0
- package/dist/report/summary.d.ts.map +1 -0
- package/dist/report/summary.js +57 -0
- package/dist/report/summary.js.map +1 -0
- package/dist/rules/metadata.d.ts.map +1 -1
- package/dist/rules/metadata.js +66 -0
- package/dist/rules/metadata.js.map +1 -1
- package/dist/score/adjustments.d.ts +22 -0
- package/dist/score/adjustments.d.ts.map +1 -0
- package/dist/score/adjustments.js +373 -0
- package/dist/score/adjustments.js.map +1 -0
- package/dist/score/auto-dismiss.d.ts +28 -0
- package/dist/score/auto-dismiss.d.ts.map +1 -0
- package/dist/score/auto-dismiss.js +200 -0
- package/dist/score/auto-dismiss.js.map +1 -0
- package/dist/score/confidence.d.ts +19 -0
- package/dist/score/confidence.d.ts.map +1 -0
- package/dist/score/confidence.js +52 -0
- package/dist/score/confidence.js.map +1 -0
- package/dist/score/index.d.ts +61 -0
- package/dist/score/index.d.ts.map +1 -0
- package/dist/score/index.js +250 -0
- package/dist/score/index.js.map +1 -0
- package/dist/score/types.d.ts +160 -0
- package/dist/score/types.d.ts.map +1 -0
- package/dist/score/types.js +14 -0
- package/dist/score/types.js.map +1 -0
- package/dist/shared/ai-context/index.d.ts +6 -0
- package/dist/shared/ai-context/index.d.ts.map +1 -0
- package/dist/shared/ai-context/index.js +13 -0
- package/dist/shared/ai-context/index.js.map +1 -0
- package/dist/shared/ai-context/manager.d.ts +67 -0
- package/dist/shared/ai-context/manager.d.ts.map +1 -0
- package/dist/shared/ai-context/manager.js +104 -0
- package/dist/shared/ai-context/manager.js.map +1 -0
- package/dist/shared/baseline/diff.d.ts +32 -0
- package/dist/shared/baseline/diff.d.ts.map +1 -0
- package/dist/shared/baseline/diff.js +119 -0
- package/dist/shared/baseline/diff.js.map +1 -0
- package/dist/shared/baseline/index.d.ts +9 -0
- package/dist/shared/baseline/index.d.ts.map +1 -0
- package/dist/shared/baseline/index.js +19 -0
- package/dist/shared/baseline/index.js.map +1 -0
- package/dist/shared/baseline/manager.d.ts +67 -0
- package/dist/shared/baseline/manager.d.ts.map +1 -0
- package/dist/shared/baseline/manager.js +180 -0
- package/dist/shared/baseline/manager.js.map +1 -0
- package/dist/shared/baseline/types.d.ts +91 -0
- package/dist/shared/baseline/types.d.ts.map +1 -0
- package/dist/shared/baseline/types.js +12 -0
- package/dist/shared/baseline/types.js.map +1 -0
- package/dist/shared/category-filter.d.ts +125 -0
- package/dist/shared/category-filter.d.ts.map +1 -0
- package/dist/shared/category-filter.js +360 -0
- package/dist/shared/category-filter.js.map +1 -0
- package/dist/shared/code-analysis.d.ts +39 -0
- package/dist/shared/code-analysis.d.ts.map +1 -0
- package/dist/shared/code-analysis.js +159 -0
- package/dist/shared/code-analysis.js.map +1 -0
- package/dist/shared/comment-analyzer.d.ts +38 -0
- package/dist/shared/comment-analyzer.d.ts.map +1 -0
- package/dist/shared/comment-analyzer.js +218 -0
- package/dist/shared/comment-analyzer.js.map +1 -0
- package/dist/shared/diff-detector.d.ts +53 -0
- package/dist/shared/diff-detector.d.ts.map +1 -0
- package/dist/shared/diff-detector.js +104 -0
- package/dist/shared/diff-detector.js.map +1 -0
- package/dist/shared/diff-parser.d.ts +80 -0
- package/dist/shared/diff-parser.d.ts.map +1 -0
- package/dist/shared/diff-parser.js +202 -0
- package/dist/shared/diff-parser.js.map +1 -0
- package/dist/shared/environment-context.d.ts +76 -0
- package/dist/shared/environment-context.d.ts.map +1 -0
- package/dist/shared/environment-context.js +271 -0
- package/dist/shared/environment-context.js.map +1 -0
- package/dist/shared/intent-detector.d.ts +66 -0
- package/dist/shared/intent-detector.d.ts.map +1 -0
- package/dist/shared/intent-detector.js +282 -0
- package/dist/shared/intent-detector.js.map +1 -0
- package/dist/shared/parsed-file.d.ts +51 -0
- package/dist/shared/parsed-file.d.ts.map +1 -0
- package/dist/shared/parsed-file.js +95 -0
- package/dist/shared/parsed-file.js.map +1 -0
- package/dist/shared/registry-clients.d.ts +93 -0
- package/dist/shared/registry-clients.d.ts.map +1 -0
- package/dist/shared/registry-clients.js +273 -0
- package/dist/shared/registry-clients.js.map +1 -0
- package/dist/shared/rules/framework-fixes.d.ts +48 -0
- package/dist/shared/rules/framework-fixes.d.ts.map +1 -0
- package/dist/shared/rules/framework-fixes.js +439 -0
- package/dist/shared/rules/framework-fixes.js.map +1 -0
- package/dist/shared/rules/index.d.ts +8 -0
- package/dist/shared/rules/index.d.ts.map +1 -0
- package/dist/shared/rules/index.js +18 -0
- package/dist/shared/rules/index.js.map +1 -0
- package/dist/shared/rules/metadata.d.ts +43 -0
- package/dist/shared/rules/metadata.d.ts.map +1 -0
- package/dist/shared/rules/metadata.js +819 -0
- package/dist/shared/rules/metadata.js.map +1 -0
- package/dist/shared/schema-semantics.d.ts +45 -0
- package/dist/shared/schema-semantics.d.ts.map +1 -0
- package/dist/shared/schema-semantics.js +193 -0
- package/dist/shared/schema-semantics.js.map +1 -0
- package/dist/shared/types.d.ts +337 -0
- package/dist/shared/types.d.ts.map +1 -0
- package/dist/shared/types.js +126 -0
- package/dist/shared/types.js.map +1 -0
- package/dist/tiers.d.ts +2 -2
- package/dist/tiers.d.ts.map +1 -1
- package/dist/tiers.js +10 -0
- package/dist/tiers.js.map +1 -1
- package/dist/types.d.ts +1 -1
- package/dist/types.d.ts.map +1 -1
- package/dist/types.js.map +1 -1
- package/dist/validate/clients.d.ts +44 -0
- package/dist/validate/clients.d.ts.map +1 -0
- package/dist/validate/clients.js +81 -0
- package/dist/validate/clients.js.map +1 -0
- package/dist/validate/index.d.ts +41 -0
- package/dist/validate/index.d.ts.map +1 -0
- package/dist/validate/index.js +141 -0
- package/dist/validate/index.js.map +1 -0
- package/dist/validate/prompts/index.d.ts +8 -0
- package/dist/validate/prompts/index.d.ts.map +1 -0
- package/dist/validate/prompts/index.js +16 -0
- package/dist/validate/prompts/index.js.map +1 -0
- package/dist/validate/prompts/modules/ai-patterns.d.ts +19 -0
- package/dist/validate/prompts/modules/ai-patterns.d.ts.map +1 -0
- package/dist/validate/prompts/modules/ai-patterns.js +156 -0
- package/dist/validate/prompts/modules/ai-patterns.js.map +1 -0
- package/dist/validate/prompts/modules/auth-access.d.ts +9 -0
- package/dist/validate/prompts/modules/auth-access.d.ts.map +1 -0
- package/dist/validate/prompts/modules/auth-access.js +25 -0
- package/dist/validate/prompts/modules/auth-access.js.map +1 -0
- package/dist/validate/prompts/modules/common.d.ts +11 -0
- package/dist/validate/prompts/modules/common.d.ts.map +1 -0
- package/dist/validate/prompts/modules/common.js +186 -0
- package/dist/validate/prompts/modules/common.js.map +1 -0
- package/dist/validate/prompts/modules/index.d.ts +54 -0
- package/dist/validate/prompts/modules/index.d.ts.map +1 -0
- package/dist/validate/prompts/modules/index.js +186 -0
- package/dist/validate/prompts/modules/index.js.map +1 -0
- package/dist/validate/prompts/modules/owasp-classic.d.ts +8 -0
- package/dist/validate/prompts/modules/owasp-classic.d.ts.map +1 -0
- package/dist/validate/prompts/modules/owasp-classic.js +84 -0
- package/dist/validate/prompts/modules/owasp-classic.js.map +1 -0
- package/dist/validate/prompts/modules/secrets-crypto.d.ts +8 -0
- package/dist/validate/prompts/modules/secrets-crypto.d.ts.map +1 -0
- package/dist/validate/prompts/modules/secrets-crypto.js +68 -0
- package/dist/validate/prompts/modules/secrets-crypto.js.map +1 -0
- package/dist/validate/prompts/modules/xss-prompt.d.ts +8 -0
- package/dist/validate/prompts/modules/xss-prompt.d.ts.map +1 -0
- package/dist/validate/prompts/modules/xss-prompt.js +22 -0
- package/dist/validate/prompts/modules/xss-prompt.js.map +1 -0
- package/dist/validate/prompts/semantic-analysis.d.ts +15 -0
- package/dist/validate/prompts/semantic-analysis.d.ts.map +1 -0
- package/dist/validate/prompts/semantic-analysis.js +169 -0
- package/dist/validate/prompts/semantic-analysis.js.map +1 -0
- package/dist/validate/prompts/validation.d.ts +18 -0
- package/dist/validate/prompts/validation.d.ts.map +1 -0
- package/dist/validate/prompts/validation.js +25 -0
- package/dist/validate/prompts/validation.js.map +1 -0
- package/dist/validate/providers/anthropic.d.ts +17 -0
- package/dist/validate/providers/anthropic.d.ts.map +1 -0
- package/dist/validate/providers/anthropic.js +260 -0
- package/dist/validate/providers/anthropic.js.map +1 -0
- package/dist/validate/providers/index.d.ts +8 -0
- package/dist/validate/providers/index.d.ts.map +1 -0
- package/dist/validate/providers/index.js +13 -0
- package/dist/validate/providers/index.js.map +1 -0
- package/dist/validate/providers/openai.d.ts +14 -0
- package/dist/validate/providers/openai.d.ts.map +1 -0
- package/dist/validate/providers/openai.js +336 -0
- package/dist/validate/providers/openai.js.map +1 -0
- package/dist/validate/request-builder.d.ts +61 -0
- package/dist/validate/request-builder.d.ts.map +1 -0
- package/dist/validate/request-builder.js +346 -0
- package/dist/validate/request-builder.js.map +1 -0
- package/dist/validate/types.d.ts +88 -0
- package/dist/validate/types.d.ts.map +1 -0
- package/dist/validate/types.js +38 -0
- package/dist/validate/types.js.map +1 -0
- package/dist/validate/utils/context-extractor.d.ts +55 -0
- package/dist/validate/utils/context-extractor.d.ts.map +1 -0
- package/dist/validate/utils/context-extractor.js +161 -0
- package/dist/validate/utils/context-extractor.js.map +1 -0
- package/dist/validate/utils/index.d.ts +11 -0
- package/dist/validate/utils/index.d.ts.map +1 -0
- package/dist/validate/utils/index.js +27 -0
- package/dist/validate/utils/index.js.map +1 -0
- package/dist/validate/utils/path-helpers.d.ts +21 -0
- package/dist/validate/utils/path-helpers.d.ts.map +1 -0
- package/dist/validate/utils/path-helpers.js +69 -0
- package/dist/validate/utils/path-helpers.js.map +1 -0
- package/dist/validate/utils/response-parser.d.ts +40 -0
- package/dist/validate/utils/response-parser.d.ts.map +1 -0
- package/dist/validate/utils/response-parser.js +286 -0
- package/dist/validate/utils/response-parser.js.map +1 -0
- package/dist/validate/utils/retry.d.ts +15 -0
- package/dist/validate/utils/retry.d.ts.map +1 -0
- package/dist/validate/utils/retry.js +62 -0
- package/dist/validate/utils/retry.js.map +1 -0
- package/package.json +8 -7
- package/src/__tests__/benchmark/fixtures/layer1/agent-skill-injection.ts +204 -0
- package/src/__tests__/benchmark/fixtures/layer1/index.ts +3 -0
- package/src/__tests__/benchmark/fixtures/layer2/index.ts +15 -0
- package/src/__tests__/benchmark/fixtures/layer2/log-injection.ts +147 -0
- package/src/__tests__/benchmark/fixtures/layer2/security-headers.ts +197 -0
- package/src/__tests__/benchmark/fixtures/layer2/ssrf-detection.ts +210 -0
- package/src/__tests__/benchmark/fixtures/layer2/xxe-detection.ts +195 -0
- package/src/__tests__/benchmark/run-depth-validation.ts +3 -3
- package/src/__tests__/benchmark/run-real-world-test.ts +4 -4
- package/src/__tests__/benchmark/types.ts +1 -1
- package/src/__tests__/benchmark/utils/test-runner.ts +3 -3
- package/src/__tests__/category-filter.test.ts +2 -2
- package/src/__tests__/context-engine/cross-file-taint.test.ts +284 -0
- package/src/__tests__/context-engine/framework-models.test.ts +457 -0
- package/src/__tests__/context-engine/function-classifier.test.ts +146 -0
- package/src/__tests__/context-engine/import-resolver.test.ts +328 -0
- package/src/__tests__/context-engine/integration.test.ts +320 -0
- package/src/__tests__/context-engine/module-graph.test.ts +159 -0
- package/src/__tests__/context-engine/route-discovery/auth-resolver.test.ts +353 -0
- package/src/__tests__/context-engine/route-discovery/express.test.ts +150 -0
- package/src/__tests__/context-engine/route-discovery/nextjs.test.ts +138 -0
- package/src/__tests__/context-engine/route-discovery/python.test.ts +95 -0
- package/src/__tests__/context-engine/sanitiser-detection.test.ts +187 -0
- package/src/__tests__/context-engine/sink-matcher.test.ts +251 -0
- package/src/__tests__/context-engine/source-discovery.test.ts +186 -0
- package/src/__tests__/context-engine/taint-tracker.test.ts +182 -0
- package/src/__tests__/regression/agent-skill-benign.test.ts +174 -0
- package/src/__tests__/regression/known-false-positives.test.ts +312 -4
- package/src/__tests__/score/adjustments.test.ts +385 -0
- package/src/__tests__/score/confidence.test.ts +283 -0
- package/src/__tests__/score/framework-scoring.test.ts +275 -0
- package/src/__tests__/score/route-scoring.test.ts +156 -0
- package/src/__tests__/score/scoring-integration.test.ts +165 -0
- package/src/__tests__/score/taint-adjustments.test.ts +244 -0
- package/src/__tests__/snapshots/__snapshots__/anthropic-validation-refactor.test.ts.snap +37 -49
- package/src/__tests__/snapshots/__snapshots__/dangerous-functions-refactor.test.ts.snap +52 -0
- package/src/__tests__/snapshots/__snapshots__/scan-depth.test.ts.snap +3 -3
- package/src/__tests__/snapshots/anthropic-validation-refactor.test.ts +2 -2
- package/src/__tests__/snapshots/dangerous-functions-refactor.test.ts +1 -1
- package/src/__tests__/snapshots/scan-depth.test.ts +3 -3
- package/src/__tests__/validate/route-annotations.test.ts +138 -0
- package/src/__tests__/validation/analyze-results.ts +1 -1
- package/src/__tests__/validation/extract-for-triage.ts +1 -1
- package/src/__tests__/validation/fp-deep-analysis.ts +1 -1
- package/src/{layer2/ai-agent-tools.ts → detect/ai-code/agent-tools.ts} +23 -3
- package/src/{layer2 → detect/ai-code}/byok-patterns.ts +17 -5
- package/src/{layer2/ai-endpoint-protection.ts → detect/ai-code/endpoint-protection.ts} +8 -4
- package/src/{layer2/ai-execution-sinks.ts → detect/ai-code/execution-sinks.ts} +8 -4
- package/src/{layer2/ai-fingerprinting.ts → detect/ai-code/fingerprinting.ts} +20 -4
- package/src/detect/ai-code/index.ts +11 -0
- package/src/{layer2/ai-mcp-security.ts → detect/ai-code/mcp-security.ts} +7 -3
- package/src/{layer2 → detect/ai-code}/model-supply-chain.ts +7 -3
- package/src/{layer2/ai-package-hallucination.ts → detect/ai-code/package-hallucination.ts} +18 -3
- package/src/{layer2/ai-prompt-hygiene.ts → detect/ai-code/prompt-hygiene.ts} +25 -3
- package/src/{layer2/ai-rag-safety.ts → detect/ai-code/rag-safety.ts} +7 -3
- package/src/{layer2/ai-schema-validation.ts → detect/ai-code/schema-validation.ts} +7 -3
- package/src/detect/config/agent-skill-injection.ts +551 -0
- package/src/{layer1 → detect/config}/comments.ts +6 -2
- package/src/{layer1 → detect/config}/file-flags.ts +9 -3
- package/src/detect/config/index.ts +6 -0
- package/src/{layer3 → detect/config}/osv-check.ts +3 -2
- package/src/{layer3 → detect/config}/package-check.ts +3 -2
- package/src/{layer1 → detect/config}/urls.ts +12 -5
- package/src/detect/index.ts +131 -0
- package/src/{layer1 → detect/secrets}/config-audit.ts +7 -2
- package/src/{layer1 → detect/secrets}/config-mcp-audit.ts +8 -3
- package/src/{layer1 → detect/secrets}/entropy.ts +23 -11
- package/src/{layer1 → detect/secrets}/index.ts +31 -30
- package/src/{layer1 → detect/secrets}/patterns.ts +10 -3
- package/src/{layer1 → detect/secrets}/weak-crypto.ts +7 -2
- package/src/{layer2/auth-antipatterns.ts → detect/structural/auth-patterns.ts} +23 -11
- package/src/{layer2 → detect/structural}/dangerous-functions/dom-xss.ts +1 -1
- package/src/{layer2 → detect/structural}/dangerous-functions/index.ts +47 -24
- package/src/{layer2 → detect/structural}/dangerous-functions/json-parse.ts +10 -2
- package/src/{layer2 → detect/structural}/dangerous-functions/math-random.ts +2 -2
- package/src/{layer2 → detect/structural}/dangerous-functions/patterns.ts +1 -1
- package/src/{layer2 → detect/structural}/dangerous-functions/request-validation.ts +10 -2
- package/src/{layer2 → detect/structural}/dangerous-functions/utils/control-flow.ts +2 -2
- package/src/{layer2 → detect/structural}/data-exposure.ts +11 -3
- package/src/{layer2 → detect/structural}/framework-checks.ts +10 -11
- package/src/{layer2 → detect/structural}/index.ts +80 -77
- package/src/detect/structural/log-injection.ts +254 -0
- package/src/{layer2 → detect/structural}/logic-gates.ts +13 -5
- package/src/{layer2 → detect/structural}/risky-imports.ts +7 -3
- package/src/detect/structural/security-headers.ts +231 -0
- package/src/detect/structural/ssrf-detection.ts +300 -0
- package/src/{layer2 → detect/structural}/variables.ts +7 -3
- package/src/detect/structural/xxe-detection.ts +295 -0
- package/src/index.ts +39 -1291
- package/src/{utils → model}/auth-helper-detector.ts +1 -1
- package/src/model/cross-file-taint.ts +374 -0
- package/src/model/framework-models/django.ts +82 -0
- package/src/model/framework-models/express.ts +54 -0
- package/src/model/framework-models/index.ts +116 -0
- package/src/model/framework-models/nextjs.ts +69 -0
- package/src/model/framework-models/prisma.ts +57 -0
- package/src/model/framework-models/react.ts +63 -0
- package/src/model/framework-models/sequelize.ts +63 -0
- package/src/model/framework-models/types.ts +46 -0
- package/src/model/function-classifier.ts +184 -0
- package/src/model/import-resolver.ts +453 -0
- package/src/{utils → model}/imported-auth-detector.ts +21 -85
- package/src/model/index.ts +353 -0
- package/src/{utils → model}/middleware-detector.ts +156 -17
- package/src/model/module-graph.ts +254 -0
- package/src/{utils → model}/oauth-flow-detector.ts +1 -1
- package/src/{utils/project-context-builder.ts → model/project-context.ts} +1 -1
- package/src/model/route-auth-resolver.ts +216 -0
- package/src/model/route-discovery/express.ts +251 -0
- package/src/model/route-discovery/index.ts +83 -0
- package/src/model/route-discovery/nextjs.ts +216 -0
- package/src/model/route-discovery/python.ts +214 -0
- package/src/model/route-discovery/types.ts +48 -0
- package/src/model/route-discovery/utils.ts +54 -0
- package/src/model/sanitiser-detection.ts +268 -0
- package/src/model/sink-matcher.ts +178 -0
- package/src/model/sink-patterns.ts +109 -0
- package/src/model/source-discovery.ts +209 -0
- package/src/model/taint-tracker.ts +333 -0
- package/src/model/taint-types.ts +149 -0
- package/src/{utils → model}/trpc-analyzer.ts +1 -1
- package/src/{utils/context-helpers.ts → parse/file-classifier.ts} +54 -0
- package/src/{utils → parse}/path-exclusions.ts +1 -1
- package/src/pipeline/config.ts +81 -0
- package/src/pipeline/index.ts +437 -0
- package/src/{modes → pipeline/modes}/incremental.ts +5 -5
- package/src/postprocess/aggregation.ts +74 -0
- package/src/postprocess/contradictions.ts +128 -0
- package/src/postprocess/dedup.ts +62 -0
- package/src/{filtering → postprocess/filtering}/__tests__/pipeline.test.ts +1 -1
- package/src/{filtering → postprocess/filtering}/context-adjustments.ts +2 -2
- package/src/{filtering → postprocess/filtering}/pipeline.ts +2 -2
- package/src/postprocess/index.ts +118 -0
- package/src/{suppression → postprocess/suppression}/config-loader.ts +1 -1
- package/src/{suppression → postprocess/suppression}/hash.ts +1 -1
- package/src/{suppression → postprocess/suppression}/inline-parser.ts +1 -1
- package/src/{suppression → postprocess/suppression}/manager.ts +1 -1
- package/src/{suppression → postprocess/suppression}/types.ts +2 -2
- package/src/postprocess/validation-cap.ts +66 -0
- package/src/report/build-result.ts +94 -0
- package/src/report/enrichment.ts +52 -0
- package/src/{formatters → report/formatters}/ai-context.ts +1 -1
- package/src/{formatters → report/formatters}/cli-terminal.ts +11 -11
- package/src/{formatters → report/formatters}/github-comment.ts +1 -1
- package/src/{formatters → report/formatters}/grouping.ts +8 -8
- package/src/{formatters → report/formatters}/ide/claude-code.ts +1 -1
- package/src/{formatters → report/formatters}/ide/cursor.ts +1 -1
- package/src/{formatters → report/formatters}/ide/windsurf.ts +1 -1
- package/src/{formatters → report/formatters}/vscode-diagnostic.ts +1 -1
- package/src/report/summary.ts +70 -0
- package/src/score/adjustments.ts +387 -0
- package/src/{layer3/anthropic → score}/auto-dismiss.ts +15 -14
- package/src/score/confidence.ts +66 -0
- package/src/score/index.ts +316 -0
- package/src/score/types.ts +187 -0
- package/src/{baseline → shared/baseline}/__tests__/diff.test.ts +2 -2
- package/src/{baseline → shared/baseline}/diff.ts +1 -1
- package/src/{baseline → shared/baseline}/manager.ts +1 -1
- package/src/{category-filter.ts → shared/category-filter.ts} +1 -1
- package/src/{utils → shared}/code-analysis.ts +1 -1
- package/src/{rules → shared/rules}/__tests__/metadata.test.ts +7 -0
- package/src/{rules → shared/rules}/framework-fixes.ts +1 -1
- package/src/{rules → shared/rules}/metadata.ts +94 -0
- package/src/{types.ts → shared/types.ts} +22 -5
- package/src/tiers.ts +18 -1
- package/src/validate/__tests__/context-extractor.test.ts +191 -0
- package/src/validate/__tests__/prompt-assembly.test.ts +233 -0
- package/src/validate/__tests__/request-builder.test.ts +347 -0
- package/src/{layer3/anthropic → validate}/index.ts +8 -7
- package/src/{layer3/anthropic → validate}/prompts/index.ts +2 -0
- package/src/validate/prompts/modules/ai-patterns.ts +153 -0
- package/src/validate/prompts/modules/auth-access.ts +22 -0
- package/src/validate/prompts/modules/common.ts +183 -0
- package/src/validate/prompts/modules/index.ts +204 -0
- package/src/validate/prompts/modules/owasp-classic.ts +81 -0
- package/src/validate/prompts/modules/secrets-crypto.ts +65 -0
- package/src/validate/prompts/modules/xss-prompt.ts +19 -0
- package/src/validate/prompts/validation.ts +20 -0
- package/src/{layer3/anthropic → validate}/providers/anthropic.ts +28 -27
- package/src/validate/providers/index.ts +8 -0
- package/src/{layer3/anthropic → validate}/providers/openai.ts +30 -25
- package/src/validate/request-builder.ts +448 -0
- package/src/{layer3/anthropic → validate}/types.ts +1 -1
- package/src/validate/utils/context-extractor.ts +220 -0
- package/src/{layer3/anthropic → validate}/utils/index.ts +10 -0
- package/src/{layer3/anthropic → validate}/utils/response-parser.ts +2 -1
- package/src/layer3/anthropic/prompts/validation.ts +0 -419
- package/src/layer3/anthropic/providers/index.ts +0 -8
- package/src/layer3/anthropic/request-builder.ts +0 -150
- package/src/layer3/index.ts +0 -168
- /package/src/{layer3 → detect/config}/__tests__/osv-check.test.ts +0 -0
- /package/src/{layer2 → detect/structural}/__tests__/math-random-enhanced.test.ts +0 -0
- /package/src/{layer2 → detect/structural}/dangerous-functions/child-process.ts +0 -0
- /package/src/{layer2 → detect/structural}/dangerous-functions/utils/helpers.ts +0 -0
- /package/src/{layer2 → detect/structural}/dangerous-functions/utils/index.ts +0 -0
- /package/src/{layer2 → detect/structural}/dangerous-functions/utils/schema-validation.ts +0 -0
- /package/src/{utils → model}/route-hierarchy.ts +0 -0
- /package/src/{filtering → postprocess/filtering}/index.ts +0 -0
- /package/src/{suppression → postprocess/suppression}/__tests__/config-loader.test.ts +0 -0
- /package/src/{suppression → postprocess/suppression}/__tests__/hash.test.ts +0 -0
- /package/src/{suppression → postprocess/suppression}/__tests__/inline-parser.test.ts +0 -0
- /package/src/{suppression → postprocess/suppression}/__tests__/manager.test.ts +0 -0
- /package/src/{suppression → postprocess/suppression}/index.ts +0 -0
- /package/src/{formatters → report/formatters}/__tests__/ai-context.test.ts +0 -0
- /package/src/{formatters → report/formatters}/ide/__tests__/ide.test.ts +0 -0
- /package/src/{formatters → report/formatters}/ide/index.ts +0 -0
- /package/src/{formatters → report/formatters}/index.ts +0 -0
- /package/src/{utils → shared}/__tests__/code-analysis.test.ts +0 -0
- /package/src/{utils → shared}/__tests__/parsed-file.test.ts +0 -0
- /package/src/{ai-context → shared/ai-context}/__tests__/manager.test.ts +0 -0
- /package/src/{ai-context → shared/ai-context}/index.ts +0 -0
- /package/src/{ai-context → shared/ai-context}/manager.ts +0 -0
- /package/src/{baseline → shared/baseline}/__tests__/manager.test.ts +0 -0
- /package/src/{baseline → shared/baseline}/index.ts +0 -0
- /package/src/{baseline → shared/baseline}/types.ts +0 -0
- /package/src/{utils → shared}/comment-analyzer.ts +0 -0
- /package/src/{utils → shared}/diff-detector.ts +0 -0
- /package/src/{utils → shared}/diff-parser.ts +0 -0
- /package/src/{utils → shared}/environment-context.ts +0 -0
- /package/src/{utils → shared}/intent-detector.ts +0 -0
- /package/src/{utils → shared}/parsed-file.ts +0 -0
- /package/src/{utils → shared}/registry-clients.ts +0 -0
- /package/src/{rules → shared/rules}/__tests__/framework-fixes.test.ts +0 -0
- /package/src/{rules → shared/rules}/index.ts +0 -0
- /package/src/{utils → shared}/schema-semantics.ts +0 -0
- /package/src/{layer3/anthropic → validate}/clients.ts +0 -0
- /package/src/{layer3/anthropic → validate}/prompts/semantic-analysis.ts +0 -0
- /package/src/{layer3/anthropic → validate}/utils/path-helpers.ts +0 -0
- /package/src/{layer3/anthropic → validate}/utils/retry.ts +0 -0
|
@@ -0,0 +1,1177 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* Layer 2: AI Prompt Hygiene Detection
|
|
4
|
+
* Detects prompt injection vulnerabilities and secrets in LLM prompts
|
|
5
|
+
*
|
|
6
|
+
* Covers:
|
|
7
|
+
* - B1: Prompt & template hygiene (LLM01)
|
|
8
|
+
* - B3: Secrets & sensitive data in prompts (LLM06)
|
|
9
|
+
*/
|
|
10
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
11
|
+
exports.detectAIPromptHygiene = detectAIPromptHygiene;
|
|
12
|
+
exports.isLLMContextFile = isLLMContextFile;
|
|
13
|
+
const file_classifier_1 = require("../../parse/file-classifier");
|
|
14
|
+
const BASE_CONFIDENCE = 0.40;
|
|
15
|
+
/**
|
|
16
|
+
* Check if a file is in an LLM/AI context based on path and content
|
|
17
|
+
*/
|
|
18
|
+
function isLLMContextFile(filePath, content) {
|
|
19
|
+
// File path indicators of AI/LLM code
|
|
20
|
+
const llmPathPatterns = [
|
|
21
|
+
/\/(ai|llm|chat|openai|anthropic|gpt|claude)\//i,
|
|
22
|
+
/\/(assistants?|agents?|prompts?)\//i,
|
|
23
|
+
/(chat|ai|llm|prompt|assistant|agent).*\.(ts|js|tsx|jsx|py)$/i,
|
|
24
|
+
];
|
|
25
|
+
if (llmPathPatterns.some(p => p.test(filePath))) {
|
|
26
|
+
return true;
|
|
27
|
+
}
|
|
28
|
+
// Content patterns suggesting LLM API usage
|
|
29
|
+
const llmContentPatterns = [
|
|
30
|
+
/\.create\s*\(\s*\{[^}]*messages\s*:/i, // OpenAI/Anthropic SDK
|
|
31
|
+
/from\s+['"](@anthropic-ai|openai|langchain|llama[-_]?index)/i, // Imports
|
|
32
|
+
/\bsystem\s*:\s*['"`]/i, // System message definition
|
|
33
|
+
/role:\s*['"`](user|assistant|system)['"`]/i, // Message roles
|
|
34
|
+
/\b(systemPrompt|userPrompt|assistantPrompt)\b/i, // Prompt variables
|
|
35
|
+
/messages\s*:\s*\[/i, // Messages array
|
|
36
|
+
/\.chat\.completions?\.create/i, // OpenAI chat completion
|
|
37
|
+
/\.messages\.create/i, // Anthropic messages
|
|
38
|
+
/ChatCompletion|MessageCreate/i, // SDK types
|
|
39
|
+
];
|
|
40
|
+
return llmContentPatterns.some(p => p.test(content));
|
|
41
|
+
}
|
|
42
|
+
/**
|
|
43
|
+
* Check if user input delimiter/fence patterns are present
|
|
44
|
+
*/
|
|
45
|
+
function hasPromptDelimiters(lineContent, contextLines) {
|
|
46
|
+
const context = [lineContent, ...contextLines].join('\n');
|
|
47
|
+
const delimiterPatterns = [
|
|
48
|
+
/```/, // Triple backticks
|
|
49
|
+
/<user>|<\/user>/i, // XML-style user tags
|
|
50
|
+
/<human>|<\/human>/i, // Human tags
|
|
51
|
+
/---+/, // Horizontal rules
|
|
52
|
+
/\[USER\]|\[\/USER\]/i, // Bracket tags
|
|
53
|
+
/\{\{user\}\}/i, // Template variable
|
|
54
|
+
/###\s*User|###\s*Input/i, // Markdown headers
|
|
55
|
+
/INPUT:|OUTPUT:/i, // Section markers
|
|
56
|
+
];
|
|
57
|
+
return delimiterPatterns.some(p => p.test(context));
|
|
58
|
+
}
|
|
59
|
+
/**
|
|
60
|
+
* Check if content looks like proper parameterization rather than concatenation
|
|
61
|
+
*/
|
|
62
|
+
function isProperlyParameterized(lineContent) {
|
|
63
|
+
const safePatterns = [
|
|
64
|
+
/\{\{.*\}\}/, // Handlebars/mustache templates
|
|
65
|
+
/\{[a-zA-Z_]+\}/, // Python format strings (positional)
|
|
66
|
+
/\$\{.*\}.*sanitize|escape/i, // Template with sanitization
|
|
67
|
+
/placeholder|PLACEHOLDER/, // Explicit placeholders
|
|
68
|
+
];
|
|
69
|
+
return safePatterns.some(p => p.test(lineContent));
|
|
70
|
+
}
|
|
71
|
+
/**
|
|
72
|
+
* B1: Unsafe prompt interpolation patterns
|
|
73
|
+
*/
|
|
74
|
+
const UNSAFE_INTERPOLATION_PATTERNS = [
|
|
75
|
+
// Template literals with user input in system prompts
|
|
76
|
+
{
|
|
77
|
+
name: 'User input in system prompt',
|
|
78
|
+
pattern: /system\s*[=:]\s*`[^`]*\$\{.*(?:user|input|req|request|body|query|params|data).*\}[^`]*`/gi,
|
|
79
|
+
severity: 'high',
|
|
80
|
+
description: 'User input is directly interpolated into a system prompt. This creates a prompt injection vulnerability where attackers can manipulate the AI\'s behavior.',
|
|
81
|
+
suggestedFix: 'Use clear delimiters (```, <user>, ---) between system instructions and user content. Consider using structured input rather than string interpolation.',
|
|
82
|
+
checkDelimiters: true,
|
|
83
|
+
},
|
|
84
|
+
// String concatenation in prompt building
|
|
85
|
+
{
|
|
86
|
+
name: 'Prompt string concatenation with user input',
|
|
87
|
+
pattern: /(?:system|prompt|instruction)\s*[=+]\s*.*\+\s*(?:user|input|req|request|body|query|params)(?:\.|Input|\[)/gi,
|
|
88
|
+
severity: 'high',
|
|
89
|
+
description: 'User input is concatenated into prompt strings. Attackers can inject malicious instructions.',
|
|
90
|
+
suggestedFix: 'Use delimiters to clearly separate system instructions from user content. Example: ```user input here```',
|
|
91
|
+
checkDelimiters: true,
|
|
92
|
+
},
|
|
93
|
+
// Messages array with dynamic user content in system role
|
|
94
|
+
{
|
|
95
|
+
name: 'Dynamic content in system message',
|
|
96
|
+
pattern: /role:\s*['"`]system['"`]\s*,\s*content:\s*`[^`]*\$\{/gi,
|
|
97
|
+
severity: 'medium',
|
|
98
|
+
description: 'System message content includes dynamic values. If user-controlled, this enables prompt injection.',
|
|
99
|
+
suggestedFix: 'Keep system messages static. Place user input in messages with role: "user" instead.',
|
|
100
|
+
checkDelimiters: true,
|
|
101
|
+
},
|
|
102
|
+
// f-strings in Python with user input
|
|
103
|
+
{
|
|
104
|
+
name: 'Python f-string prompt with user input',
|
|
105
|
+
pattern: /f['"][^'"]*\{.*(?:user|input|request|body).*\}[^'"]*['"]/gi,
|
|
106
|
+
severity: 'high',
|
|
107
|
+
description: 'User input in Python f-string prompt creates prompt injection risk.',
|
|
108
|
+
suggestedFix: 'Use explicit delimiters: f"System instructions...\n---\n{user_input}\n---"',
|
|
109
|
+
checkDelimiters: true,
|
|
110
|
+
},
|
|
111
|
+
];
|
|
112
|
+
// ============================================================================
|
|
113
|
+
// Secret Patterns - Comprehensive provider-specific detection
|
|
114
|
+
// ============================================================================
|
|
115
|
+
/**
|
|
116
|
+
* Provider-specific secret patterns with known prefixes
|
|
117
|
+
* These are high-confidence patterns that don't need context matching
|
|
118
|
+
*/
|
|
119
|
+
const KNOWN_SECRET_PREFIXES = [
|
|
120
|
+
// OpenAI
|
|
121
|
+
{ name: 'OpenAI API Key', pattern: /sk-[a-zA-Z0-9]{20,}/g, severity: 'critical' },
|
|
122
|
+
{ name: 'OpenAI Project Key', pattern: /sk-proj-[a-zA-Z0-9]{48,}/g, severity: 'critical' },
|
|
123
|
+
// Anthropic
|
|
124
|
+
{ name: 'Anthropic API Key', pattern: /sk-ant-[a-zA-Z0-9-]{20,}/g, severity: 'critical' },
|
|
125
|
+
{ name: 'Anthropic Full Key', pattern: /sk-ant-api03-[a-zA-Z0-9_-]{90,}/g, severity: 'critical' },
|
|
126
|
+
// GitHub
|
|
127
|
+
{ name: 'GitHub PAT', pattern: /ghp_[a-zA-Z0-9]{36,}/g, severity: 'critical' },
|
|
128
|
+
{ name: 'GitHub OAuth', pattern: /gho_[a-zA-Z0-9]{36,}/g, severity: 'critical' },
|
|
129
|
+
{ name: 'GitHub App Token', pattern: /ghu_[a-zA-Z0-9]{36,}/g, severity: 'critical' },
|
|
130
|
+
{ name: 'GitHub Refresh Token', pattern: /ghr_[a-zA-Z0-9]{36,}/g, severity: 'critical' },
|
|
131
|
+
{ name: 'GitHub Fine-grained PAT', pattern: /github_pat_[a-zA-Z0-9]{22}_[a-zA-Z0-9]{59}/g, severity: 'critical' },
|
|
132
|
+
// Stripe
|
|
133
|
+
{ name: 'Stripe Live Secret', pattern: /sk_live_[a-zA-Z0-9]{24,}/g, severity: 'critical' },
|
|
134
|
+
{ name: 'Stripe Test Secret', pattern: /sk_test_[a-zA-Z0-9]{24,}/g, severity: 'medium' },
|
|
135
|
+
{ name: 'Stripe Restricted Key', pattern: /rk_live_[a-zA-Z0-9]{24,}/g, severity: 'critical' },
|
|
136
|
+
// AWS
|
|
137
|
+
{ name: 'AWS Access Key', pattern: /AKIA[0-9A-Z]{16}/g, severity: 'critical' },
|
|
138
|
+
{ name: 'AWS Session Token', pattern: /ASIA[0-9A-Z]{16}/g, severity: 'critical' },
|
|
139
|
+
// Google
|
|
140
|
+
{ name: 'Google API Key', pattern: /AIza[0-9A-Za-z-_]{35}/g, severity: 'high' },
|
|
141
|
+
// Slack
|
|
142
|
+
{ name: 'Slack Bot Token', pattern: /xoxb-[0-9a-zA-Z-]{50,}/g, severity: 'critical' },
|
|
143
|
+
{ name: 'Slack User Token', pattern: /xoxp-[0-9a-zA-Z-]{50,}/g, severity: 'critical' },
|
|
144
|
+
{ name: 'Slack App Token', pattern: /xoxa-[0-9a-zA-Z-]{50,}/g, severity: 'critical' },
|
|
145
|
+
{ name: 'Slack Legacy Token', pattern: /xox[baprs]-[0-9a-zA-Z]{10,}/g, severity: 'critical' },
|
|
146
|
+
// Twilio
|
|
147
|
+
{ name: 'Twilio API Key', pattern: /SK[a-f0-9]{32}/g, severity: 'critical' },
|
|
148
|
+
{ name: 'Twilio Account SID', pattern: /AC[a-f0-9]{32}/g, severity: 'high' },
|
|
149
|
+
// SendGrid
|
|
150
|
+
{ name: 'SendGrid API Key', pattern: /SG\.[a-zA-Z0-9_-]{22}\.[a-zA-Z0-9_-]{43}/g, severity: 'critical' },
|
|
151
|
+
// Mailgun
|
|
152
|
+
{ name: 'Mailgun API Key', pattern: /key-[a-zA-Z0-9]{32}/g, severity: 'critical' },
|
|
153
|
+
// NPM/PyPI
|
|
154
|
+
{ name: 'NPM Token', pattern: /npm_[a-zA-Z0-9]{36}/g, severity: 'critical' },
|
|
155
|
+
{ name: 'PyPI Token', pattern: /pypi-[a-zA-Z0-9]{32,}/g, severity: 'critical' },
|
|
156
|
+
// Vercel/Netlify
|
|
157
|
+
{ name: 'Vercel Token', pattern: /vercel_[a-zA-Z0-9]{24,}/g, severity: 'critical' },
|
|
158
|
+
{ name: 'Netlify Token', pattern: /nfp_[a-zA-Z0-9]{40,}/g, severity: 'critical' },
|
|
159
|
+
// Square
|
|
160
|
+
{ name: 'Square Access Token', pattern: /sq0csp-[a-zA-Z0-9-_]{43}/g, severity: 'critical' },
|
|
161
|
+
{ name: 'Square OAuth Secret', pattern: /sq0csp-[a-zA-Z0-9-_]{40,}/g, severity: 'critical' },
|
|
162
|
+
// Shopify
|
|
163
|
+
{ name: 'Shopify Access Token', pattern: /shpat_[a-fA-F0-9]{32}/g, severity: 'critical' },
|
|
164
|
+
{ name: 'Shopify Private App', pattern: /shppa_[a-fA-F0-9]{32}/g, severity: 'critical' },
|
|
165
|
+
// Datadog
|
|
166
|
+
{ name: 'Datadog API Key', pattern: /dd[a-z]{1}[a-f0-9]{39}/g, severity: 'critical' },
|
|
167
|
+
// HuggingFace
|
|
168
|
+
{ name: 'HuggingFace Token', pattern: /hf_[a-zA-Z0-9]{34,}/g, severity: 'critical' },
|
|
169
|
+
// Replicate
|
|
170
|
+
{ name: 'Replicate API Token', pattern: /r8_[a-zA-Z0-9]{37}/g, severity: 'critical' },
|
|
171
|
+
// OpenRouter
|
|
172
|
+
{ name: 'OpenRouter Key', pattern: /sk-or-v1-[a-zA-Z0-9]{64}/g, severity: 'critical' },
|
|
173
|
+
// Cohere
|
|
174
|
+
{ name: 'Cohere API Key', pattern: /[a-zA-Z0-9]{40}(?=.*cohere)/gi, severity: 'high' },
|
|
175
|
+
// Private Keys
|
|
176
|
+
{ name: 'Private Key', pattern: /-----BEGIN\s+(?:RSA\s+|EC\s+|DSA\s+|OPENSSH\s+)?PRIVATE\s+KEY-----/g, severity: 'critical' },
|
|
177
|
+
// JWT Tokens (full format)
|
|
178
|
+
{ name: 'JWT Token', pattern: /eyJ[a-zA-Z0-9_-]{10,}\.eyJ[a-zA-Z0-9_-]{10,}\.[a-zA-Z0-9_-]{10,}/g, severity: 'high' },
|
|
179
|
+
// Database URLs with credentials
|
|
180
|
+
{ name: 'Database URL', pattern: /(mongodb|postgres|mysql|redis|amqp)(\+srv)?:\/\/[^:]+:[^@\s]+@[^\s"']+/gi, severity: 'critical' },
|
|
181
|
+
// Webhook URLs (often contain secrets)
|
|
182
|
+
{ name: 'Slack Webhook', pattern: /https:\/\/hooks\.slack\.com\/services\/T[a-zA-Z0-9_]+\/B[a-zA-Z0-9_]+\/[a-zA-Z0-9_]+/g, severity: 'high' },
|
|
183
|
+
{ name: 'Discord Webhook', pattern: /https:\/\/discord(?:app)?\.com\/api\/webhooks\/[0-9]+\/[a-zA-Z0-9_-]+/g, severity: 'high' },
|
|
184
|
+
];
|
|
185
|
+
/**
|
|
186
|
+
* B3: Secrets in prompt context patterns (original context-aware patterns)
|
|
187
|
+
* Note: Using [^\n;]* instead of [^;]* to prevent matching across lines
|
|
188
|
+
*/
|
|
189
|
+
const SECRETS_IN_PROMPTS_PATTERNS = [
|
|
190
|
+
// API keys in message content (same line only)
|
|
191
|
+
{
|
|
192
|
+
name: 'API key in prompt content',
|
|
193
|
+
pattern: /(?:messages|prompt|system|content)\s*[=:][^\n;]*(?:sk-[a-zA-Z0-9]{20,}|api[_-]?key\s*[:=]\s*['"][^'"]{16,}['"])/gi,
|
|
194
|
+
severity: 'critical',
|
|
195
|
+
description: 'API key appears to be hardcoded in prompt content. Keys in prompts may be logged, cached, or sent to model providers.',
|
|
196
|
+
suggestedFix: 'Never include API keys in prompts. Use environment variables and keep them server-side only.',
|
|
197
|
+
},
|
|
198
|
+
// AWS keys in prompts
|
|
199
|
+
{
|
|
200
|
+
name: 'AWS credentials in prompt',
|
|
201
|
+
pattern: /(?:messages|prompt|system|content)\s*[=:][^\n;]*(?:AKIA[A-Z0-9]{16}|aws[_-]?(?:secret|access)[_-]?key)/gi,
|
|
202
|
+
severity: 'critical',
|
|
203
|
+
description: 'AWS credentials detected in prompt content.',
|
|
204
|
+
suggestedFix: 'Remove credentials from prompts. Use IAM roles or environment variables instead.',
|
|
205
|
+
},
|
|
206
|
+
// Database URLs with credentials
|
|
207
|
+
{
|
|
208
|
+
name: 'Database credentials in prompt',
|
|
209
|
+
pattern: /(?:messages|prompt|system|content)[^\n]*(?:mongodb|postgres|mysql|redis):\/\/[^:]+:[^@]+@/gi,
|
|
210
|
+
severity: 'critical',
|
|
211
|
+
description: 'Database connection string with credentials in prompt. This exposes database access.',
|
|
212
|
+
suggestedFix: 'Never include connection strings in prompts. Reference data by ID instead.',
|
|
213
|
+
},
|
|
214
|
+
// Passwords in prompt context
|
|
215
|
+
{
|
|
216
|
+
name: 'Password in prompt content',
|
|
217
|
+
pattern: /(?:messages|prompt|content)\s*[=:][^\n]*(?:password|passwd|pwd)\s*[:=]\s*['"`][^'"`]{8,}/gi,
|
|
218
|
+
severity: 'high',
|
|
219
|
+
description: 'Password appears in prompt content. This may be logged or exposed to model providers.',
|
|
220
|
+
suggestedFix: 'Remove passwords from prompts. Use authentication tokens or session references instead.',
|
|
221
|
+
},
|
|
222
|
+
// Private keys
|
|
223
|
+
{
|
|
224
|
+
name: 'Private key in prompt',
|
|
225
|
+
pattern: /(?:messages|prompt|content)[^\n]*(?:-----BEGIN\s+(?:RSA\s+)?PRIVATE\s+KEY-----)/gi,
|
|
226
|
+
severity: 'critical',
|
|
227
|
+
description: 'Private key material detected in prompt context.',
|
|
228
|
+
suggestedFix: 'Never include private keys in prompts. Sign data server-side instead.',
|
|
229
|
+
},
|
|
230
|
+
// Generic token patterns
|
|
231
|
+
{
|
|
232
|
+
name: 'Access token in prompt',
|
|
233
|
+
pattern: /(?:messages|prompt|content)\s*[=:][^\n]*(?:access[_-]?token|auth[_-]?token|bearer)\s*[:=]\s*['"`][a-zA-Z0-9_.-]{20,}/gi,
|
|
234
|
+
severity: 'high',
|
|
235
|
+
description: 'Access token detected in prompt content. Tokens in prompts risk exposure.',
|
|
236
|
+
suggestedFix: 'Do not include tokens in prompts. Pass token context through secure server-side channels.',
|
|
237
|
+
},
|
|
238
|
+
];
|
|
239
|
+
// ============================================================================
|
|
240
|
+
// Variable Flow Detection - Secrets flowing into prompts
|
|
241
|
+
// ============================================================================
|
|
242
|
+
/**
|
|
243
|
+
* Patterns for detecting secret variable declarations
|
|
244
|
+
*/
|
|
245
|
+
const SECRET_VARIABLE_PATTERNS = [
|
|
246
|
+
// Direct assignment patterns
|
|
247
|
+
/(?:const|let|var)\s+(\w*(?:key|token|secret|password|credential|apiKey|authToken|accessToken)\w*)\s*=\s*['"`]([^'"`]{16,})['"`]/gi,
|
|
248
|
+
// Object property patterns
|
|
249
|
+
/(\w*(?:key|token|secret|password|credential|apiKey|authToken|accessToken)\w*)\s*:\s*['"`]([^'"`]{16,})['"`]/gi,
|
|
250
|
+
];
|
|
251
|
+
/**
|
|
252
|
+
* Patterns for detecting prompt variable usage
|
|
253
|
+
*/
|
|
254
|
+
const PROMPT_USAGE_PATTERNS = [
|
|
255
|
+
// Template literal interpolation
|
|
256
|
+
/`[^`]*\$\{(\w+)\}[^`]*`/g,
|
|
257
|
+
// String concatenation
|
|
258
|
+
/\+\s*(\w+)\s*(?:\+|$)/g,
|
|
259
|
+
// f-string interpolation (Python)
|
|
260
|
+
/f['"][^'"]*\{(\w+)\}[^'"]*['"]/g,
|
|
261
|
+
// Format string
|
|
262
|
+
/\.format\s*\([^)]*(\w+)[^)]*\)/g,
|
|
263
|
+
];
|
|
264
|
+
/**
|
|
265
|
+
* Check if a variable name suggests it contains a secret
|
|
266
|
+
*/
|
|
267
|
+
function isSecretVariableName(varName) {
|
|
268
|
+
const secretIndicators = [
|
|
269
|
+
/api[_-]?key/i,
|
|
270
|
+
/secret[_-]?key/i,
|
|
271
|
+
/access[_-]?token/i,
|
|
272
|
+
/auth[_-]?token/i,
|
|
273
|
+
/password/i,
|
|
274
|
+
/credential/i,
|
|
275
|
+
/private[_-]?key/i,
|
|
276
|
+
/bearer/i,
|
|
277
|
+
/jwt/i,
|
|
278
|
+
/oauth/i,
|
|
279
|
+
/^sk_/i,
|
|
280
|
+
/^pk_/i,
|
|
281
|
+
/token$/i,
|
|
282
|
+
/key$/i,
|
|
283
|
+
/secret$/i,
|
|
284
|
+
];
|
|
285
|
+
return secretIndicators.some(p => p.test(varName));
|
|
286
|
+
}
|
|
287
|
+
/**
|
|
288
|
+
* Detect secrets flowing from variables into prompts (variable indirection)
|
|
289
|
+
*/
|
|
290
|
+
function detectSecretVariableFlow(content, filePath, isTestFile, lines) {
|
|
291
|
+
const vulnerabilities = [];
|
|
292
|
+
const _lines = lines ?? content.split('\n');
|
|
293
|
+
// First pass: collect all secret variable declarations
|
|
294
|
+
const secretVariables = new Map();
|
|
295
|
+
for (let i = 0; i < _lines.length; i++) {
|
|
296
|
+
const line = _lines[i];
|
|
297
|
+
if ((0, file_classifier_1.isComment)(line))
|
|
298
|
+
continue;
|
|
299
|
+
for (const pattern of SECRET_VARIABLE_PATTERNS) {
|
|
300
|
+
const regex = new RegExp(pattern.source, pattern.flags);
|
|
301
|
+
let match;
|
|
302
|
+
while ((match = regex.exec(line)) !== null) {
|
|
303
|
+
const varName = match[1];
|
|
304
|
+
const value = match[2];
|
|
305
|
+
// Check if variable name suggests it's a secret
|
|
306
|
+
if (isSecretVariableName(varName)) {
|
|
307
|
+
secretVariables.set(varName, { line: i + 1, value });
|
|
308
|
+
}
|
|
309
|
+
}
|
|
310
|
+
}
|
|
311
|
+
}
|
|
312
|
+
// Second pass: find where these variables flow into prompts
|
|
313
|
+
const promptContextPatterns = [
|
|
314
|
+
/(?:system|prompt|message|content)\s*[:=]/i,
|
|
315
|
+
/role:\s*['"`](?:system|user|assistant)['"`]/i,
|
|
316
|
+
/\.chat\.completions?\.create/i,
|
|
317
|
+
/\.messages\.create/i,
|
|
318
|
+
/messages\s*:\s*\[/i,
|
|
319
|
+
];
|
|
320
|
+
for (let i = 0; i < _lines.length; i++) {
|
|
321
|
+
const line = _lines[i];
|
|
322
|
+
if ((0, file_classifier_1.isComment)(line))
|
|
323
|
+
continue;
|
|
324
|
+
// Check if this line or nearby lines are in prompt context
|
|
325
|
+
const contextWindow = _lines.slice(Math.max(0, i - 5), Math.min(_lines.length, i + 5)).join('\n');
|
|
326
|
+
const isPromptContext = promptContextPatterns.some(p => p.test(contextWindow));
|
|
327
|
+
if (!isPromptContext)
|
|
328
|
+
continue;
|
|
329
|
+
// Check for template interpolation of secret variables
|
|
330
|
+
const templateMatch = line.match(/\$\{(\w+)\}/);
|
|
331
|
+
if (templateMatch) {
|
|
332
|
+
const varName = templateMatch[1];
|
|
333
|
+
if (secretVariables.has(varName)) {
|
|
334
|
+
const secretInfo = secretVariables.get(varName);
|
|
335
|
+
let severity = 'high';
|
|
336
|
+
let description = `Secret variable '${varName}' (defined at line ${secretInfo.line}) is interpolated into LLM prompt. This exposes the secret to the model provider.`;
|
|
337
|
+
if (isTestFile) {
|
|
338
|
+
severity = 'low';
|
|
339
|
+
description += ' (in test file)';
|
|
340
|
+
}
|
|
341
|
+
vulnerabilities.push({
|
|
342
|
+
id: `secret-flow-${filePath}-${i + 1}-${varName}`,
|
|
343
|
+
filePath,
|
|
344
|
+
lineNumber: i + 1,
|
|
345
|
+
lineContent: line.trim(),
|
|
346
|
+
severity,
|
|
347
|
+
category: 'hardcoded_secret',
|
|
348
|
+
title: `Secret variable '${varName}' in prompt`,
|
|
349
|
+
description,
|
|
350
|
+
suggestedFix: `Remove the secret from the prompt. If the AI needs to use an API, make the call server-side instead of passing credentials to the model.`,
|
|
351
|
+
confidence: 'medium',
|
|
352
|
+
layer: 2,
|
|
353
|
+
source: 'ai_code',
|
|
354
|
+
requiresAIValidation: true,
|
|
355
|
+
baseConfidence: BASE_CONFIDENCE,
|
|
356
|
+
});
|
|
357
|
+
}
|
|
358
|
+
}
|
|
359
|
+
// Check for string concatenation with secret variables
|
|
360
|
+
for (const [varName] of secretVariables) {
|
|
361
|
+
if (line.includes(`+ ${varName}`) || line.includes(`${varName} +`) || line.includes(`+ ${varName} +`)) {
|
|
362
|
+
const secretInfo = secretVariables.get(varName);
|
|
363
|
+
let severity = 'high';
|
|
364
|
+
let description = `Secret variable '${varName}' (defined at line ${secretInfo.line}) is concatenated into prompt. This exposes the secret to the model provider.`;
|
|
365
|
+
if (isTestFile) {
|
|
366
|
+
severity = 'low';
|
|
367
|
+
description += ' (in test file)';
|
|
368
|
+
}
|
|
369
|
+
vulnerabilities.push({
|
|
370
|
+
id: `secret-concat-${filePath}-${i + 1}-${varName}`,
|
|
371
|
+
filePath,
|
|
372
|
+
lineNumber: i + 1,
|
|
373
|
+
lineContent: line.trim(),
|
|
374
|
+
severity,
|
|
375
|
+
category: 'hardcoded_secret',
|
|
376
|
+
title: `Secret variable '${varName}' concatenated in prompt`,
|
|
377
|
+
description,
|
|
378
|
+
suggestedFix: `Remove the secret from the prompt. If the AI needs to use an API, make the call server-side.`,
|
|
379
|
+
confidence: 'medium',
|
|
380
|
+
layer: 2,
|
|
381
|
+
source: 'ai_code',
|
|
382
|
+
requiresAIValidation: true,
|
|
383
|
+
baseConfidence: BASE_CONFIDENCE,
|
|
384
|
+
});
|
|
385
|
+
}
|
|
386
|
+
}
|
|
387
|
+
}
|
|
388
|
+
return vulnerabilities;
|
|
389
|
+
}
|
|
390
|
+
// ============================================================================
|
|
391
|
+
// Phase 2: Indirect Prompt Injection Detection
|
|
392
|
+
// ============================================================================
|
|
393
|
+
/**
|
|
394
|
+
* Check if content filtering/sanitization is present for external content
|
|
395
|
+
*/
|
|
396
|
+
function hasContentFiltering(content, lineNumber, lines) {
|
|
397
|
+
const _lines = lines ?? content.split('\n');
|
|
398
|
+
const contextStart = Math.max(0, lineNumber - 20);
|
|
399
|
+
const contextEnd = Math.min(_lines.length, lineNumber + 10);
|
|
400
|
+
const context = _lines.slice(contextStart, contextEnd).join('\n');
|
|
401
|
+
const filteringPatterns = [
|
|
402
|
+
/filterContent|sanitizeContent|cleanContent/i,
|
|
403
|
+
/sanitizeContext|filterContext/i,
|
|
404
|
+
/contentModeration|moderateContent/i,
|
|
405
|
+
/stripInstructions|removeInstructions/i,
|
|
406
|
+
/escapePrompt|sanitizePrompt/i,
|
|
407
|
+
/validateInput|inputValidation/i,
|
|
408
|
+
];
|
|
409
|
+
return filteringPatterns.some(p => p.test(context));
|
|
410
|
+
}
|
|
411
|
+
/**
|
|
412
|
+
* Check if proper delimiters are used for external content
|
|
413
|
+
*/
|
|
414
|
+
function hasExternalContentDelimiters(content, lineNumber, lines) {
|
|
415
|
+
const _lines = lines ?? content.split('\n');
|
|
416
|
+
const contextStart = Math.max(0, lineNumber - 15);
|
|
417
|
+
const contextEnd = Math.min(_lines.length, lineNumber + 15);
|
|
418
|
+
const context = _lines.slice(contextStart, contextEnd).join('\n');
|
|
419
|
+
const delimiterPatterns = [
|
|
420
|
+
/<context>|<\/context>/i,
|
|
421
|
+
/<document>|<\/document>/i,
|
|
422
|
+
/<retrieved>|<\/retrieved>/i,
|
|
423
|
+
/<external>|<\/external>/i,
|
|
424
|
+
/```[^`]*context|context[^`]*```/i,
|
|
425
|
+
/---\s*(?:context|document|retrieved)/i,
|
|
426
|
+
/\[CONTEXT\]|\[\/CONTEXT\]/i,
|
|
427
|
+
/\[DOCUMENT\]|\[\/DOCUMENT\]/i,
|
|
428
|
+
];
|
|
429
|
+
return delimiterPatterns.some(p => p.test(context));
|
|
430
|
+
}
|
|
431
|
+
/**
|
|
432
|
+
* Indirect prompt injection patterns - external content flowing to LLM context
|
|
433
|
+
*/
|
|
434
|
+
const INDIRECT_INJECTION_PATTERNS = [
|
|
435
|
+
// ========== External Fetch to Prompt ==========
|
|
436
|
+
{
|
|
437
|
+
name: 'Fetched content in prompt',
|
|
438
|
+
// Pattern looks for: fetch() -> then/await -> result flows into messages/content
|
|
439
|
+
// Use word boundary \b to avoid matching function names like "validatedFetch"
|
|
440
|
+
// The pattern looks for: actual fetch call -> await/then -> use in LLM messages
|
|
441
|
+
pattern: /\bfetch\s*\(\s*[^)]+\)[\s\S]{0,80}(?:\.then|\.json)[\s\S]{0,150}(?:role:\s*['"`](?:system|user)['"`]|messages\s*:\s*\[)/gi,
|
|
442
|
+
severity: 'high',
|
|
443
|
+
description: 'Content fetched from external URL flows into LLM prompt. Malicious websites can embed instructions that hijack the model\'s behavior (indirect prompt injection).',
|
|
444
|
+
suggestedFix: 'Wrap external content with clear delimiters: <external_content>...</external_content>. Implement content filtering to strip instruction-like patterns.',
|
|
445
|
+
checkDelimiters: true,
|
|
446
|
+
},
|
|
447
|
+
{
|
|
448
|
+
name: 'HTTP response in system prompt',
|
|
449
|
+
pattern: /(?:axios|fetch|got|request)[\s\S]{0,150}(?:system|systemPrompt|instructions)\s*[:=+]/gi,
|
|
450
|
+
severity: 'high',
|
|
451
|
+
description: 'HTTP response content used in system prompt. External data in system prompts is especially dangerous as it can override model instructions.',
|
|
452
|
+
suggestedFix: 'Never put external content in system prompts. Use user messages with clear delimiters for context. Implement content sanitization.',
|
|
453
|
+
checkDelimiters: true,
|
|
454
|
+
},
|
|
455
|
+
// ========== RAG Vector Store to Prompt ==========
|
|
456
|
+
{
|
|
457
|
+
name: 'Vector store results in system message',
|
|
458
|
+
pattern: /(?:vectorStore|similaritySearch|query|search|retrieve)[\s\S]{0,200}role:\s*['"`]system['"`]/gi,
|
|
459
|
+
severity: 'high',
|
|
460
|
+
description: 'Vector store search results injected into system message. Poisoned documents in the corpus can hijack model behavior.',
|
|
461
|
+
suggestedFix: 'Place retrieved content in user messages, not system. Use delimiters: <retrieved_context>...</retrieved_context>. Implement document sanitization before indexing.',
|
|
462
|
+
checkDelimiters: true,
|
|
463
|
+
},
|
|
464
|
+
{
|
|
465
|
+
name: 'RAG retrieval directly in context',
|
|
466
|
+
pattern: /(?:retriever\.invoke|retrieve|getRelevantDocuments)\s*\([^)]*\)[\s\S]{0,150}(?:context|prompt|messages)/gi,
|
|
467
|
+
severity: 'high',
|
|
468
|
+
description: 'Retrieved documents flow directly into LLM context. Adversarial documents can contain prompt injection payloads.',
|
|
469
|
+
suggestedFix: 'Sanitize retrieved content before including in prompt. Use XML tags to clearly separate context from instructions.',
|
|
470
|
+
checkDelimiters: true,
|
|
471
|
+
},
|
|
472
|
+
// ========== Document Loading to LLM ==========
|
|
473
|
+
{
|
|
474
|
+
name: 'Loaded documents in LLM chain',
|
|
475
|
+
pattern: /(?:loadDocuments|DirectoryLoader|TextLoader|PDFLoader)[\s\S]{0,200}(?:chain|llm|invoke|call)/gi,
|
|
476
|
+
severity: 'high',
|
|
477
|
+
description: 'Documents loaded from files flow into LLM chain. Malicious files (PDFs, docs) can contain hidden prompt injection text.',
|
|
478
|
+
suggestedFix: 'Scan loaded documents for instruction-like patterns. Use separate document processing pipeline with content filtering.',
|
|
479
|
+
checkDelimiters: true,
|
|
480
|
+
},
|
|
481
|
+
{
|
|
482
|
+
name: 'Document content interpolated',
|
|
483
|
+
pattern: /\$\{.*(?:document|doc|file|page)(?:Content|Text|Data).*\}[\s\S]{0,50}(?:prompt|messages|llm)/gi,
|
|
484
|
+
severity: 'medium',
|
|
485
|
+
description: 'Document content interpolated into LLM prompt. Documents may contain adversarial instructions.',
|
|
486
|
+
suggestedFix: 'Wrap document content with delimiters: ```document\\n${content}\\n```. Implement text sanitization.',
|
|
487
|
+
checkDelimiters: true,
|
|
488
|
+
},
|
|
489
|
+
// ========== Web Scraping to Prompt ==========
|
|
490
|
+
{
|
|
491
|
+
name: 'Scraped content in prompt',
|
|
492
|
+
pattern: /(?:scrape|crawl|spider|puppeteer|playwright|cheerio)[\s\S]{0,200}(?:prompt|messages|context|content\s*:)/gi,
|
|
493
|
+
severity: 'high',
|
|
494
|
+
description: 'Web-scraped content flows into LLM prompt. Malicious websites can embed instructions in their HTML content.',
|
|
495
|
+
suggestedFix: 'Sanitize scraped content to remove instruction-like patterns. Use delimiters: <scraped_content url="...">...</scraped_content>',
|
|
496
|
+
checkDelimiters: true,
|
|
497
|
+
},
|
|
498
|
+
{
|
|
499
|
+
name: 'HTML content in LLM context',
|
|
500
|
+
// Pattern: Reading HTML (.innerHTML) and then using it in prompt/messages
|
|
501
|
+
// NOT: Writing LLM output TO innerHTML (that's output handling, different category)
|
|
502
|
+
// Look for: getting innerHTML value -> flowing to prompt context
|
|
503
|
+
pattern: /(?:\.innerHTML\s*[;,]|\.html\s*\(\s*\))[\s\S]{0,150}(?:role:\s*['"`](?:system|user)['"`]|messages\s*:\s*\[)/gi,
|
|
504
|
+
severity: 'medium',
|
|
505
|
+
description: 'HTML content from web pages used in LLM context. Web pages can contain hidden prompt injection in metadata, comments, or invisible text.',
|
|
506
|
+
suggestedFix: 'Extract only relevant text content. Filter out scripts, comments, and metadata. Use content sanitization.',
|
|
507
|
+
checkDelimiters: true,
|
|
508
|
+
},
|
|
509
|
+
// ========== Email/Message Content to Prompt ==========
|
|
510
|
+
{
|
|
511
|
+
name: 'Email content in prompt',
|
|
512
|
+
pattern: /(?:email|message|inbox)(?:Content|Body|Text)[\s\S]{0,150}(?:prompt|messages|llm|analyze)/gi,
|
|
513
|
+
severity: 'medium',
|
|
514
|
+
description: 'Email or message content flows into LLM prompt. Attackers can craft emails with embedded prompt injection.',
|
|
515
|
+
suggestedFix: 'Sanitize email content before LLM processing. Remove potentially malicious patterns. Use clear delimiters.',
|
|
516
|
+
checkDelimiters: true,
|
|
517
|
+
},
|
|
518
|
+
// ========== Database Content to Prompt ==========
|
|
519
|
+
{
|
|
520
|
+
name: 'Database record in system prompt',
|
|
521
|
+
pattern: /(?:findOne|findById|query|select)[\s\S]{0,150}(?:system|systemPrompt|instructions)\s*[:=]/gi,
|
|
522
|
+
severity: 'medium',
|
|
523
|
+
description: 'Database content used in system prompt. If users can modify database records, they can inject malicious instructions.',
|
|
524
|
+
suggestedFix: 'Keep system prompts static. Place database content in user messages with delimiters. Validate data before use.',
|
|
525
|
+
checkDelimiters: true,
|
|
526
|
+
},
|
|
527
|
+
// ========== Generic External Data Patterns ==========
|
|
528
|
+
{
|
|
529
|
+
name: 'External data concatenation',
|
|
530
|
+
pattern: /(?:externalData|fetchedContent|scrapedData|retrievedText)\s*\+[\s\S]{0,50}(?:prompt|system|instructions)/gi,
|
|
531
|
+
severity: 'medium',
|
|
532
|
+
description: 'External data concatenated with prompt content without clear separation.',
|
|
533
|
+
suggestedFix: 'Use structured prompts with XML/markdown delimiters to separate instructions from external content.',
|
|
534
|
+
checkDelimiters: true,
|
|
535
|
+
},
|
|
536
|
+
];
|
|
537
|
+
/**
|
|
538
|
+
* Missing boundary patterns - prompts without clear user/system separation
|
|
539
|
+
*/
|
|
540
|
+
const MISSING_BOUNDARY_PATTERNS = [
|
|
541
|
+
// Direct concatenation without any markers
|
|
542
|
+
{
|
|
543
|
+
name: 'Missing prompt boundaries',
|
|
544
|
+
pattern: /(?:content|prompt)\s*[:=]\s*(?:systemInstructions?|instructions?)\s*\+\s*(?:userMessage|userInput|input)/gi,
|
|
545
|
+
severity: 'medium',
|
|
546
|
+
description: 'Prompt concatenates system instructions with user input without clear boundaries.',
|
|
547
|
+
suggestedFix: 'Add delimiters between instructions and user content: "Instructions...\n---\n" + userInput + "\n---"',
|
|
548
|
+
},
|
|
549
|
+
// Template literals building prompts without delimiters
|
|
550
|
+
{
|
|
551
|
+
name: 'Unbounded template prompt',
|
|
552
|
+
pattern: /`(?:You are|As an|Your task)[^`]{20,}\$\{(?!.*(?:```|<user|---|\[USER))/gi,
|
|
553
|
+
severity: 'medium',
|
|
554
|
+
description: 'Prompt template interpolates values without clear delimiter boundaries.',
|
|
555
|
+
suggestedFix: 'Wrap interpolated user content with delimiters: ```${userInput}```',
|
|
556
|
+
},
|
|
557
|
+
// M5: RAG-specific prompt injection patterns
|
|
558
|
+
{
|
|
559
|
+
name: 'Retrieved context in system prompt',
|
|
560
|
+
pattern: /role:\s*['"`]system['"`]\s*,\s*content:\s*`[^`]*\$\{.*(?:context|chunks|documents|retrieved|sources)/gi,
|
|
561
|
+
severity: 'high',
|
|
562
|
+
description: 'Retrieved documents injected into system prompt. Poisoned documents could hijack model behavior.',
|
|
563
|
+
suggestedFix: 'Place retrieved context in user messages with clear delimiters. Use structured prompts separating instructions from data.',
|
|
564
|
+
checkDelimiters: true,
|
|
565
|
+
},
|
|
566
|
+
{
|
|
567
|
+
name: 'Mixed user input and retrieved context',
|
|
568
|
+
pattern: /\$\{.*(?:userInput|query|question).*\}[^`]*\$\{.*(?:context|chunks|documents).*\}|\$\{.*(?:context|chunks|documents).*\}[^`]*\$\{.*(?:userInput|query|question).*\}/gi,
|
|
569
|
+
severity: 'medium',
|
|
570
|
+
description: 'User input and retrieved context concatenated without clear separation. Both could contain injection attempts.',
|
|
571
|
+
suggestedFix: 'Clearly separate user input from retrieved context using XML tags or delimiters: <user_query>...</user_query><context>...</context>',
|
|
572
|
+
checkDelimiters: true,
|
|
573
|
+
},
|
|
574
|
+
{
|
|
575
|
+
name: 'RAG context directly interpolated',
|
|
576
|
+
pattern: /(?:system|prompt)\s*[:=].*(?:retrievedContext|ragContext|documentContext|knowledgeBase)\s*(?:\+|,)/gi,
|
|
577
|
+
severity: 'medium',
|
|
578
|
+
description: 'RAG context directly concatenated into prompt. Could enable data poisoning attacks.',
|
|
579
|
+
suggestedFix: 'Use structured prompt format with clear boundaries between instructions, context, and user input.',
|
|
580
|
+
checkDelimiters: true,
|
|
581
|
+
},
|
|
582
|
+
];
|
|
583
|
+
// ============================================================================
|
|
584
|
+
// Sprint 6: Model-Specific Injection Syntax Detection
|
|
585
|
+
// ============================================================================
|
|
586
|
+
/**
|
|
587
|
+
* Model-specific injection markers that could manipulate prompt structure
|
|
588
|
+
* These patterns detect when user input might contain control tokens
|
|
589
|
+
*/
|
|
590
|
+
const MODEL_SPECIFIC_INJECTION_PATTERNS = [
|
|
591
|
+
// Claude/ChatML XML-style markers
|
|
592
|
+
{
|
|
593
|
+
name: 'Claude/ChatML injection markers in user input',
|
|
594
|
+
pattern: /(?:userInput|userMessage|input|message|query)\s*[=:][^\n]*<\|?(?:system|human|assistant|user)\|?>/gi,
|
|
595
|
+
severity: 'high',
|
|
596
|
+
description: 'User input may contain system/role markers that could manipulate prompt structure. Attackers can inject fake system or assistant messages.',
|
|
597
|
+
suggestedFix: 'Strip or escape control tokens from user input: input.replace(/<\\|?(?:system|human|assistant|user)\\|?>/gi, "")',
|
|
598
|
+
},
|
|
599
|
+
// OpenAI ChatML markers
|
|
600
|
+
{
|
|
601
|
+
name: 'OpenAI ChatML control tokens',
|
|
602
|
+
pattern: /(?:userInput|userMessage|input|message|query)\s*[=:][^\n]*<\|im_(?:start|end)\|>/gi,
|
|
603
|
+
severity: 'high',
|
|
604
|
+
description: 'User input contains OpenAI ChatML control tokens (<|im_start|>, <|im_end|>) that could break message boundaries.',
|
|
605
|
+
suggestedFix: 'Filter ChatML tokens from user input before processing: input.replace(/<\\|im_(?:start|end)\\|>/gi, "")',
|
|
606
|
+
},
|
|
607
|
+
// Anthropic Human/Assistant turn markers
|
|
608
|
+
{
|
|
609
|
+
name: 'Anthropic turn markers in user input',
|
|
610
|
+
pattern: /(?:userInput|userMessage|input|message|query)\s*[=:][^\n]*\\n\\n(?:Human|Assistant):\s*/gi,
|
|
611
|
+
severity: 'medium',
|
|
612
|
+
description: 'User input contains Anthropic turn markers (Human:, Assistant:) that could inject fake assistant responses.',
|
|
613
|
+
suggestedFix: 'Sanitize turn markers from user input: input.replace(/\\n\\n(Human|Assistant):\\s*/gi, "")',
|
|
614
|
+
},
|
|
615
|
+
// Generic role injection attempts
|
|
616
|
+
{
|
|
617
|
+
name: 'Role injection in user input',
|
|
618
|
+
pattern: /`[^`]*\$\{[^}]*(?:user|input|query)[^}]*\}[^`]*(?:system|assistant|Human:|Assistant:|<\|)/gi,
|
|
619
|
+
severity: 'high',
|
|
620
|
+
description: 'User input is interpolated near role markers without proper boundaries. Could enable role impersonation.',
|
|
621
|
+
suggestedFix: 'Use strict message formatting and strip role-like patterns from user input.',
|
|
622
|
+
checkDelimiters: true,
|
|
623
|
+
},
|
|
624
|
+
// Instruction override attempts in templates
|
|
625
|
+
{
|
|
626
|
+
name: 'Instruction override pattern',
|
|
627
|
+
pattern: /`[^`]*\$\{[^}]*\}[^`]*(?:ignore\s+(?:all\s+)?previous|disregard\s+(?:your\s+)?(?:rules|instructions)|you\s+are\s+now)/gi,
|
|
628
|
+
severity: 'medium',
|
|
629
|
+
description: 'Template allows interpolation near common jailbreak phrases. User could inject instruction override attempts.',
|
|
630
|
+
suggestedFix: 'Filter jailbreak patterns from user input before interpolation.',
|
|
631
|
+
checkDelimiters: true,
|
|
632
|
+
},
|
|
633
|
+
];
|
|
634
|
+
// ============================================================================
|
|
635
|
+
// Sprint 6: Encoding-Based Escape Detection
|
|
636
|
+
// ============================================================================
|
|
637
|
+
/**
|
|
638
|
+
* Patterns for detecting encoding-based prompt injection bypasses
|
|
639
|
+
*/
|
|
640
|
+
const ENCODING_ESCAPE_PATTERNS = [
|
|
641
|
+
// Base64 decoded content flowing to prompts
|
|
642
|
+
{
|
|
643
|
+
name: 'Base64 decoded content in prompt',
|
|
644
|
+
pattern: /(?:atob|Buffer\.from|base64\.decode|b64decode)\s*\([^)]+\)[^;]*(?:\+|,)[^;]*(?:prompt|system|message|content)/gi,
|
|
645
|
+
severity: 'medium',
|
|
646
|
+
description: 'Decoded base64 content concatenated with prompts. Attackers can hide malicious instructions in base64 encoding to bypass filters.',
|
|
647
|
+
suggestedFix: 'Validate and sanitize decoded content before including in prompts. Apply same security checks to decoded content.',
|
|
648
|
+
},
|
|
649
|
+
// URL decoded content in prompts
|
|
650
|
+
{
|
|
651
|
+
name: 'URL decoded content in prompt',
|
|
652
|
+
pattern: /(?:unescape|decodeURIComponent|decodeURI|urllib\.parse\.unquote)\s*\([^)]+\)[^;]*(?:\+|,)[^;]*(?:prompt|system|message|content)/gi,
|
|
653
|
+
severity: 'medium',
|
|
654
|
+
description: 'URL decoded content flows into prompt. Encoded payloads can bypass input sanitization.',
|
|
655
|
+
suggestedFix: 'Sanitize content after decoding. Apply prompt injection filters to the decoded output.',
|
|
656
|
+
},
|
|
657
|
+
// HTML entity decoded content
|
|
658
|
+
{
|
|
659
|
+
name: 'HTML decoded content in prompt',
|
|
660
|
+
pattern: /(?:htmlDecode|decodeHTMLEntities|he\.decode|html\.unescape)\s*\([^)]+\)[^;]*(?:\+|,)[^;]*(?:prompt|system|message|content)/gi,
|
|
661
|
+
severity: 'medium',
|
|
662
|
+
description: 'HTML decoded content flows into prompt. HTML entities can hide malicious instructions.',
|
|
663
|
+
suggestedFix: 'Apply prompt injection filters after HTML decoding.',
|
|
664
|
+
},
|
|
665
|
+
// JSON parsed content directly in prompt (could contain encoded payloads)
|
|
666
|
+
{
|
|
667
|
+
name: 'Unvalidated JSON in prompt',
|
|
668
|
+
pattern: /JSON\.parse\s*\([^)]*(?:userInput|body|request|external)[^)]*\)[^;]*(?:\+|,)[^;]*(?:prompt|system|message)/gi,
|
|
669
|
+
severity: 'medium',
|
|
670
|
+
description: 'Parsed JSON content directly used in prompt. JSON values could contain encoded injection payloads.',
|
|
671
|
+
suggestedFix: 'Validate JSON schema and sanitize string values before including in prompts.',
|
|
672
|
+
checkDelimiters: true,
|
|
673
|
+
},
|
|
674
|
+
// Unicode escape sequences that could hide instructions
|
|
675
|
+
{
|
|
676
|
+
name: 'Unicode content in prompt',
|
|
677
|
+
pattern: /(?:String\.fromCharCode|String\.fromCodePoint|chr\(|unichr\()\s*\([^)]+\)[^;]*(?:\+|,)[^;]*(?:prompt|system|message)/gi,
|
|
678
|
+
severity: 'low',
|
|
679
|
+
description: 'Unicode character construction flows into prompt. Could be used to hide malicious characters.',
|
|
680
|
+
suggestedFix: 'Normalize and validate Unicode content before including in prompts.',
|
|
681
|
+
},
|
|
682
|
+
];
|
|
683
|
+
// ============================================================================
|
|
684
|
+
// Sprint 6: Jailbreak Pattern Detection
|
|
685
|
+
// ============================================================================
|
|
686
|
+
/**
|
|
687
|
+
* Common jailbreak preamble patterns that indicate injection attempts
|
|
688
|
+
* These detect when user input flow might contain jailbreak phrases
|
|
689
|
+
*/
|
|
690
|
+
const JAILBREAK_INDICATOR_PATTERNS = [
|
|
691
|
+
// Instruction override phrases flowing to LLM
|
|
692
|
+
{
|
|
693
|
+
name: 'Instruction override phrases in input flow',
|
|
694
|
+
pattern: /(?:userInput|userMessage|input|message|query)\s*[=:][^\n]*(?:ignore\s+(?:all\s+)?previous\s+(?:instructions|prompts)|disregard\s+(?:your\s+)?(?:rules|guidelines|instructions))/gi,
|
|
695
|
+
severity: 'high',
|
|
696
|
+
description: 'User input variable contains instruction override phrases. Classic jailbreak attempt detected.',
|
|
697
|
+
suggestedFix: 'Implement jailbreak detection filter. Block or sanitize inputs containing instruction override patterns.',
|
|
698
|
+
},
|
|
699
|
+
// Role-playing jailbreak attempts
|
|
700
|
+
{
|
|
701
|
+
name: 'Role-playing jailbreak in input',
|
|
702
|
+
pattern: /(?:userInput|userMessage|input|message|query)\s*[=:][^\n]*(?:you\s+are\s+now\s+(?:a|an)\s+\w+|pretend\s+(?:you|to\s+be)\s+(?:are\s+)?(?:a|an|not)|act\s+as\s+(?:if|though)\s+you)/gi,
|
|
703
|
+
severity: 'medium',
|
|
704
|
+
description: 'User input contains role-playing jailbreak patterns. Attempts to make model assume a different persona.',
|
|
705
|
+
suggestedFix: 'Filter role-manipulation phrases from user input. Implement persona consistency checks.',
|
|
706
|
+
},
|
|
707
|
+
// "From now on" style instruction changes
|
|
708
|
+
{
|
|
709
|
+
name: 'Instruction change phrases',
|
|
710
|
+
pattern: /(?:userInput|userMessage|input|message|query)\s*[=:][^\n]*(?:from\s+now\s+on\s+(?:you\s+will|ignore)|for\s+the\s+rest\s+of\s+this\s+(?:conversation|session))/gi,
|
|
711
|
+
severity: 'medium',
|
|
712
|
+
description: 'User input contains temporal instruction override attempts. Tries to change model behavior for the session.',
|
|
713
|
+
suggestedFix: 'Sanitize phrases that attempt to change ongoing behavior.',
|
|
714
|
+
},
|
|
715
|
+
// Developer mode / DAN style jailbreaks
|
|
716
|
+
{
|
|
717
|
+
name: 'Developer mode jailbreak patterns',
|
|
718
|
+
pattern: /(?:userInput|userMessage|input|message|query)\s*[=:][^\n]*(?:developer\s+mode|DAN|Do\s+Anything\s+Now|jailbreak|no\s+restrictions)/gi,
|
|
719
|
+
severity: 'high',
|
|
720
|
+
description: 'User input contains known jailbreak terminology (DAN, developer mode). High-confidence malicious input.',
|
|
721
|
+
suggestedFix: 'Block inputs containing known jailbreak terminology. Log for security review.',
|
|
722
|
+
},
|
|
723
|
+
// Hypothetical scenario framing
|
|
724
|
+
{
|
|
725
|
+
name: 'Hypothetical framing jailbreak',
|
|
726
|
+
pattern: /(?:userInput|userMessage|input|message|query)\s*[=:][^\n]*(?:hypothetically|in\s+a\s+(?:fictional|imaginary)\s+(?:world|scenario)|what\s+if\s+you\s+(?:could|had\s+no))/gi,
|
|
727
|
+
severity: 'low',
|
|
728
|
+
description: 'User input uses hypothetical framing often used in jailbreak attempts. May be legitimate creative use.',
|
|
729
|
+
suggestedFix: 'Apply additional scrutiny to hypothetically-framed requests. Consider context before blocking.',
|
|
730
|
+
},
|
|
731
|
+
];
|
|
732
|
+
/**
|
|
733
|
+
* Check if input sanitization is present for jailbreak patterns
|
|
734
|
+
*/
|
|
735
|
+
function hasJailbreakFiltering(content, lineNumber, lines) {
|
|
736
|
+
const _lines = lines ?? content.split('\n');
|
|
737
|
+
const contextStart = Math.max(0, lineNumber - 20);
|
|
738
|
+
const contextEnd = Math.min(_lines.length, lineNumber + 10);
|
|
739
|
+
const context = _lines.slice(contextStart, contextEnd).join('\n');
|
|
740
|
+
const filteringPatterns = [
|
|
741
|
+
/filterJailbreak|detectJailbreak|jailbreakFilter/i,
|
|
742
|
+
/sanitizePrompt|filterPrompt|cleanPrompt/i,
|
|
743
|
+
/blockInjection|preventInjection/i,
|
|
744
|
+
/moderationApi|contentModeration/i,
|
|
745
|
+
/instructionFilter|roleFilter/i,
|
|
746
|
+
/guardRails|guardrail/i,
|
|
747
|
+
/promptGuard|inputGuard/i,
|
|
748
|
+
];
|
|
749
|
+
return filteringPatterns.some(p => p.test(context));
|
|
750
|
+
}
|
|
751
|
+
/**
|
|
752
|
+
* Check if encoding sanitization is present
|
|
753
|
+
*/
|
|
754
|
+
function hasEncodingSanitization(content, lineNumber, lines) {
|
|
755
|
+
const _lines = lines ?? content.split('\n');
|
|
756
|
+
const contextStart = Math.max(0, lineNumber - 15);
|
|
757
|
+
const contextEnd = Math.min(_lines.length, lineNumber + 5);
|
|
758
|
+
const context = _lines.slice(contextStart, contextEnd).join('\n');
|
|
759
|
+
const sanitizationPatterns = [
|
|
760
|
+
/validateDecoded|sanitizeDecoded/i,
|
|
761
|
+
/afterDecode.*sanitize|decode.*then.*filter/i,
|
|
762
|
+
/normalizeInput|sanitizeInput/i,
|
|
763
|
+
/schema\.parse|validate.*schema/i,
|
|
764
|
+
/stripControlChars|removeControlTokens/i,
|
|
765
|
+
];
|
|
766
|
+
return sanitizationPatterns.some(p => p.test(context));
|
|
767
|
+
}
|
|
768
|
+
// ============================================================================
|
|
769
|
+
// Detection Functions
|
|
770
|
+
// ============================================================================
|
|
771
|
+
/**
|
|
772
|
+
* Get surrounding context lines for analysis
|
|
773
|
+
*/
|
|
774
|
+
function getSurroundingContext(content, lineIndex, windowSize = 10, lines) {
|
|
775
|
+
const _lines = lines ?? content.split('\n');
|
|
776
|
+
const start = Math.max(0, lineIndex - windowSize);
|
|
777
|
+
const end = Math.min(_lines.length, lineIndex + windowSize);
|
|
778
|
+
return _lines.slice(start, end);
|
|
779
|
+
}
|
|
780
|
+
/**
|
|
781
|
+
* Main detection function for AI prompt hygiene issues
|
|
782
|
+
*/
|
|
783
|
+
function detectAIPromptHygiene(content, filePath, options) {
|
|
784
|
+
const vulnerabilities = [];
|
|
785
|
+
// Skip non-applicable files
|
|
786
|
+
if ((0, file_classifier_1.isScannerOrFixtureFile)(filePath))
|
|
787
|
+
return vulnerabilities;
|
|
788
|
+
if ((0, file_classifier_1.isDocumentationFile)(filePath))
|
|
789
|
+
return vulnerabilities;
|
|
790
|
+
// Only scan files that appear to be in LLM context
|
|
791
|
+
if (!isLLMContextFile(filePath, content)) {
|
|
792
|
+
return vulnerabilities;
|
|
793
|
+
}
|
|
794
|
+
const lines = options?.parsed?.lines ?? content.split('\n');
|
|
795
|
+
const isTestFile = (0, file_classifier_1.isTestOrMockFile)(filePath);
|
|
796
|
+
// Scan for unsafe interpolation patterns (B1)
|
|
797
|
+
for (const pattern of UNSAFE_INTERPOLATION_PATTERNS) {
|
|
798
|
+
const regex = new RegExp(pattern.pattern.source, pattern.pattern.flags);
|
|
799
|
+
let match;
|
|
800
|
+
while ((match = regex.exec(content)) !== null) {
|
|
801
|
+
const lineNumber = content.substring(0, match.index).split('\n').length;
|
|
802
|
+
const lineContent = lines[lineNumber - 1]?.trim() || '';
|
|
803
|
+
// Skip comments
|
|
804
|
+
if ((0, file_classifier_1.isComment)(lineContent))
|
|
805
|
+
continue;
|
|
806
|
+
// Skip if properly parameterized
|
|
807
|
+
if (isProperlyParameterized(lineContent))
|
|
808
|
+
continue;
|
|
809
|
+
// Check for delimiters if applicable
|
|
810
|
+
let severity = pattern.severity;
|
|
811
|
+
let description = pattern.description;
|
|
812
|
+
const contextLines = getSurroundingContext(content, lineNumber - 1, 15, lines);
|
|
813
|
+
if (pattern.checkDelimiters && hasPromptDelimiters(lineContent, contextLines)) {
|
|
814
|
+
// Delimiters present - downgrade severity
|
|
815
|
+
severity = 'info';
|
|
816
|
+
description += ' (Note: Delimiters detected in context, which mitigates this risk.)';
|
|
817
|
+
}
|
|
818
|
+
// Downgrade test files
|
|
819
|
+
if (isTestFile) {
|
|
820
|
+
severity = 'info';
|
|
821
|
+
description += ' (in test file)';
|
|
822
|
+
}
|
|
823
|
+
vulnerabilities.push({
|
|
824
|
+
id: `ai-prompt-${filePath}-${lineNumber}-${pattern.name.replace(/\s+/g, '-')}`,
|
|
825
|
+
filePath,
|
|
826
|
+
lineNumber,
|
|
827
|
+
lineContent,
|
|
828
|
+
severity,
|
|
829
|
+
category: 'ai_prompt_injection',
|
|
830
|
+
title: pattern.name,
|
|
831
|
+
description,
|
|
832
|
+
suggestedFix: pattern.suggestedFix,
|
|
833
|
+
confidence: severity === 'info' ? 'low' : 'medium',
|
|
834
|
+
layer: 2,
|
|
835
|
+
source: 'ai_code',
|
|
836
|
+
requiresAIValidation: severity !== 'info',
|
|
837
|
+
baseConfidence: BASE_CONFIDENCE,
|
|
838
|
+
});
|
|
839
|
+
}
|
|
840
|
+
}
|
|
841
|
+
// Scan for secrets in prompts (B3) - Original context-aware patterns
|
|
842
|
+
for (const pattern of SECRETS_IN_PROMPTS_PATTERNS) {
|
|
843
|
+
const regex = new RegExp(pattern.pattern.source, pattern.pattern.flags);
|
|
844
|
+
let match;
|
|
845
|
+
while ((match = regex.exec(content)) !== null) {
|
|
846
|
+
const lineNumber = content.substring(0, match.index).split('\n').length;
|
|
847
|
+
const lineContent = lines[lineNumber - 1]?.trim() || '';
|
|
848
|
+
// Skip comments
|
|
849
|
+
if ((0, file_classifier_1.isComment)(lineContent))
|
|
850
|
+
continue;
|
|
851
|
+
// Check if it's an env var reference (safe pattern)
|
|
852
|
+
const isEnvRef = /process\.env|import\.meta\.env|os\.environ|getenv/i.test(lineContent);
|
|
853
|
+
if (isEnvRef)
|
|
854
|
+
continue;
|
|
855
|
+
// Skip test variable names
|
|
856
|
+
if (/(?:const|let|var)\s+(?:TEST|MOCK|EXAMPLE|DUMMY|FAKE|SAMPLE)[_A-Z0-9]*\s*=/i.test(lineContent))
|
|
857
|
+
continue;
|
|
858
|
+
if (/(?:const|let|var)\s+\w*(?:test|mock|example|dummy|fake|sample)\w*\s*=/i.test(lineContent))
|
|
859
|
+
continue;
|
|
860
|
+
// Skip placeholder/example values in the line
|
|
861
|
+
if (/example|sample|demo|placeholder|your[_-]?api[_-]?key/i.test(lineContent))
|
|
862
|
+
continue;
|
|
863
|
+
let severity = pattern.severity;
|
|
864
|
+
let description = pattern.description;
|
|
865
|
+
// Downgrade test files but still flag
|
|
866
|
+
if (isTestFile) {
|
|
867
|
+
severity = severity === 'critical' ? 'medium' : 'low';
|
|
868
|
+
description += ' (in test file - still review for accidental commits)';
|
|
869
|
+
}
|
|
870
|
+
vulnerabilities.push({
|
|
871
|
+
id: `ai-secret-prompt-${filePath}-${lineNumber}-${pattern.name.replace(/\s+/g, '-')}`,
|
|
872
|
+
filePath,
|
|
873
|
+
lineNumber,
|
|
874
|
+
lineContent,
|
|
875
|
+
severity,
|
|
876
|
+
category: 'hardcoded_secret', // Use existing category for consistency
|
|
877
|
+
title: pattern.name + ' (in LLM context)',
|
|
878
|
+
description: description + ' Secrets in prompts are especially risky as they may be logged, shared, or sent to external AI providers.',
|
|
879
|
+
suggestedFix: pattern.suggestedFix,
|
|
880
|
+
confidence: 'high',
|
|
881
|
+
layer: 2,
|
|
882
|
+
source: 'ai_code',
|
|
883
|
+
requiresAIValidation: false, // Secrets don't need AI validation - they're definitive
|
|
884
|
+
baseConfidence: BASE_CONFIDENCE,
|
|
885
|
+
});
|
|
886
|
+
}
|
|
887
|
+
}
|
|
888
|
+
// ========== NEW: Direct secret detection with known prefixes ==========
|
|
889
|
+
// Scan for any known secret patterns anywhere in prompt-related code
|
|
890
|
+
const seenSecretLines = new Set(); // Avoid duplicates
|
|
891
|
+
for (const secretDef of KNOWN_SECRET_PREFIXES) {
|
|
892
|
+
const regex = new RegExp(secretDef.pattern.source, secretDef.pattern.flags);
|
|
893
|
+
let match;
|
|
894
|
+
while ((match = regex.exec(content)) !== null) {
|
|
895
|
+
const lineNumber = content.substring(0, match.index).split('\n').length;
|
|
896
|
+
const lineContent = lines[lineNumber - 1]?.trim() || '';
|
|
897
|
+
// Skip if already reported on this line
|
|
898
|
+
const lineKey = `${lineNumber}-${secretDef.name}`;
|
|
899
|
+
if (seenSecretLines.has(lineNumber))
|
|
900
|
+
continue;
|
|
901
|
+
seenSecretLines.add(lineNumber);
|
|
902
|
+
// Skip comments
|
|
903
|
+
if ((0, file_classifier_1.isComment)(lineContent))
|
|
904
|
+
continue;
|
|
905
|
+
// Skip env var references
|
|
906
|
+
if (/process\.env|import\.meta\.env|os\.environ|getenv/i.test(lineContent))
|
|
907
|
+
continue;
|
|
908
|
+
// Skip obvious placeholders/examples in the value
|
|
909
|
+
const matchValue = match[0];
|
|
910
|
+
if (/example|sample|demo|dummy|fake|mock|your[_-]|placeholder/i.test(matchValue))
|
|
911
|
+
continue;
|
|
912
|
+
if (/example|sample|demo|placeholder/i.test(lineContent))
|
|
913
|
+
continue;
|
|
914
|
+
// Skip values that contain "test" right after the prefix (e.g., sk-test..., ghp_test...)
|
|
915
|
+
// These are clearly test/development keys, not production secrets
|
|
916
|
+
if (/^(sk-|ghp_|gho_|sk_live_|sk_test_|xoxb-|SG\.)test/i.test(matchValue))
|
|
917
|
+
continue;
|
|
918
|
+
if (/[-_]test[-_0-9]/i.test(matchValue))
|
|
919
|
+
continue;
|
|
920
|
+
// Skip test variable names (e.g., TEST_API_KEY, MOCK_SECRET)
|
|
921
|
+
if (/(?:const|let|var)\s+(?:TEST|MOCK|EXAMPLE|DUMMY|FAKE|SAMPLE)[_A-Z0-9]*\s*=/i.test(lineContent))
|
|
922
|
+
continue;
|
|
923
|
+
// Skip if variable name contains test/mock/example (broader check)
|
|
924
|
+
if (/(?:const|let|var)\s+\w*(?:test|mock|example|dummy|fake|sample)\w*\s*=/i.test(lineContent))
|
|
925
|
+
continue;
|
|
926
|
+
let severity = secretDef.severity;
|
|
927
|
+
let description = `${secretDef.name} detected in LLM-related code. This secret may be exposed to the model provider, logged, or cached.`;
|
|
928
|
+
// Downgrade test files
|
|
929
|
+
if (isTestFile) {
|
|
930
|
+
severity = severity === 'critical' ? 'medium' : 'low';
|
|
931
|
+
description += ' (in test file)';
|
|
932
|
+
}
|
|
933
|
+
vulnerabilities.push({
|
|
934
|
+
id: `ai-direct-secret-${filePath}-${lineNumber}-${secretDef.name.replace(/\s+/g, '-')}`,
|
|
935
|
+
filePath,
|
|
936
|
+
lineNumber,
|
|
937
|
+
lineContent,
|
|
938
|
+
severity,
|
|
939
|
+
category: 'hardcoded_secret',
|
|
940
|
+
title: `${secretDef.name} in LLM context`,
|
|
941
|
+
description,
|
|
942
|
+
suggestedFix: 'Remove the hardcoded secret. Use environment variables server-side. Never expose secrets to LLM prompts.',
|
|
943
|
+
confidence: 'high',
|
|
944
|
+
layer: 2,
|
|
945
|
+
source: 'ai_code',
|
|
946
|
+
requiresAIValidation: false,
|
|
947
|
+
baseConfidence: BASE_CONFIDENCE,
|
|
948
|
+
});
|
|
949
|
+
}
|
|
950
|
+
}
|
|
951
|
+
// ========== NEW: Variable flow detection ==========
|
|
952
|
+
// Detect secrets flowing from variables into prompts
|
|
953
|
+
const flowVulns = detectSecretVariableFlow(content, filePath, isTestFile, lines);
|
|
954
|
+
vulnerabilities.push(...flowVulns);
|
|
955
|
+
// Scan for missing boundary patterns (B1 continued)
|
|
956
|
+
for (const pattern of MISSING_BOUNDARY_PATTERNS) {
|
|
957
|
+
const regex = new RegExp(pattern.pattern.source, pattern.pattern.flags);
|
|
958
|
+
let match;
|
|
959
|
+
while ((match = regex.exec(content)) !== null) {
|
|
960
|
+
const lineNumber = content.substring(0, match.index).split('\n').length;
|
|
961
|
+
const lineContent = lines[lineNumber - 1]?.trim() || '';
|
|
962
|
+
// Skip comments
|
|
963
|
+
if ((0, file_classifier_1.isComment)(lineContent))
|
|
964
|
+
continue;
|
|
965
|
+
const contextLines = getSurroundingContext(content, lineNumber - 1, 10, lines);
|
|
966
|
+
// Skip if delimiters are present
|
|
967
|
+
if (hasPromptDelimiters(lineContent, contextLines))
|
|
968
|
+
continue;
|
|
969
|
+
let severity = pattern.severity;
|
|
970
|
+
let description = pattern.description;
|
|
971
|
+
if (isTestFile) {
|
|
972
|
+
severity = 'info';
|
|
973
|
+
description += ' (in test file)';
|
|
974
|
+
}
|
|
975
|
+
vulnerabilities.push({
|
|
976
|
+
id: `ai-boundary-${filePath}-${lineNumber}-${pattern.name.replace(/\s+/g, '-')}`,
|
|
977
|
+
filePath,
|
|
978
|
+
lineNumber,
|
|
979
|
+
lineContent,
|
|
980
|
+
severity,
|
|
981
|
+
category: 'ai_prompt_injection',
|
|
982
|
+
title: pattern.name,
|
|
983
|
+
description,
|
|
984
|
+
suggestedFix: pattern.suggestedFix,
|
|
985
|
+
confidence: 'medium',
|
|
986
|
+
layer: 2,
|
|
987
|
+
source: 'ai_code',
|
|
988
|
+
requiresAIValidation: true,
|
|
989
|
+
baseConfidence: BASE_CONFIDENCE,
|
|
990
|
+
});
|
|
991
|
+
}
|
|
992
|
+
}
|
|
993
|
+
// Scan for indirect prompt injection patterns (Phase 2)
|
|
994
|
+
for (const pattern of INDIRECT_INJECTION_PATTERNS) {
|
|
995
|
+
const regex = new RegExp(pattern.pattern.source, pattern.pattern.flags);
|
|
996
|
+
let match;
|
|
997
|
+
while ((match = regex.exec(content)) !== null) {
|
|
998
|
+
const lineNumber = content.substring(0, match.index).split('\n').length;
|
|
999
|
+
const lineContent = lines[lineNumber - 1]?.trim() || '';
|
|
1000
|
+
// Skip comments
|
|
1001
|
+
if ((0, file_classifier_1.isComment)(lineContent))
|
|
1002
|
+
continue;
|
|
1003
|
+
let severity = pattern.severity;
|
|
1004
|
+
let description = pattern.description;
|
|
1005
|
+
// Check for content filtering/sanitization
|
|
1006
|
+
const hasFiltering = hasContentFiltering(content, lineNumber, lines);
|
|
1007
|
+
const hasDelimiters = hasExternalContentDelimiters(content, lineNumber, lines);
|
|
1008
|
+
if (hasFiltering && hasDelimiters) {
|
|
1009
|
+
// Both mitigations present - fully mitigated
|
|
1010
|
+
severity = 'info';
|
|
1011
|
+
description += ' (Content filtering and delimiters detected - mitigated.)';
|
|
1012
|
+
}
|
|
1013
|
+
else if (hasFiltering) {
|
|
1014
|
+
// Partial mitigation - filtering present
|
|
1015
|
+
severity = severity === 'high' ? 'medium' : 'low';
|
|
1016
|
+
description += ' (Content filtering detected.)';
|
|
1017
|
+
}
|
|
1018
|
+
else if (hasDelimiters) {
|
|
1019
|
+
// Partial mitigation - delimiters present
|
|
1020
|
+
severity = severity === 'high' ? 'medium' : 'low';
|
|
1021
|
+
description += ' (External content delimiters detected.)';
|
|
1022
|
+
}
|
|
1023
|
+
// Downgrade test files
|
|
1024
|
+
if (isTestFile) {
|
|
1025
|
+
severity = 'info';
|
|
1026
|
+
description += ' (in test file)';
|
|
1027
|
+
}
|
|
1028
|
+
vulnerabilities.push({
|
|
1029
|
+
id: `ai-indirect-injection-${filePath}-${lineNumber}-${pattern.name.replace(/\s+/g, '-')}`,
|
|
1030
|
+
filePath,
|
|
1031
|
+
lineNumber,
|
|
1032
|
+
lineContent,
|
|
1033
|
+
severity,
|
|
1034
|
+
category: 'ai_prompt_injection',
|
|
1035
|
+
title: pattern.name + ' (Indirect Injection)',
|
|
1036
|
+
description,
|
|
1037
|
+
suggestedFix: pattern.suggestedFix,
|
|
1038
|
+
confidence: severity === 'info' ? 'low' : 'medium',
|
|
1039
|
+
layer: 2,
|
|
1040
|
+
source: 'ai_code',
|
|
1041
|
+
requiresAIValidation: severity !== 'info',
|
|
1042
|
+
baseConfidence: BASE_CONFIDENCE,
|
|
1043
|
+
});
|
|
1044
|
+
}
|
|
1045
|
+
}
|
|
1046
|
+
// ========== Sprint 6: Model-specific injection markers ==========
|
|
1047
|
+
for (const pattern of MODEL_SPECIFIC_INJECTION_PATTERNS) {
|
|
1048
|
+
const regex = new RegExp(pattern.pattern.source, pattern.pattern.flags);
|
|
1049
|
+
let match;
|
|
1050
|
+
while ((match = regex.exec(content)) !== null) {
|
|
1051
|
+
const lineNumber = content.substring(0, match.index).split('\n').length;
|
|
1052
|
+
const lineContent = lines[lineNumber - 1]?.trim() || '';
|
|
1053
|
+
// Skip comments
|
|
1054
|
+
if ((0, file_classifier_1.isComment)(lineContent))
|
|
1055
|
+
continue;
|
|
1056
|
+
let severity = pattern.severity;
|
|
1057
|
+
let description = pattern.description;
|
|
1058
|
+
const contextLines = getSurroundingContext(content, lineNumber - 1, 15, lines);
|
|
1059
|
+
// Check for delimiters/sanitization
|
|
1060
|
+
if (pattern.checkDelimiters && hasPromptDelimiters(lineContent, contextLines)) {
|
|
1061
|
+
severity = 'info';
|
|
1062
|
+
description += ' (Delimiters detected, risk mitigated.)';
|
|
1063
|
+
}
|
|
1064
|
+
// Check for jailbreak filtering
|
|
1065
|
+
if (hasJailbreakFiltering(content, lineNumber, lines)) {
|
|
1066
|
+
severity = severity === 'high' ? 'medium' : 'low';
|
|
1067
|
+
description += ' (Jailbreak filtering detected.)';
|
|
1068
|
+
}
|
|
1069
|
+
if (isTestFile) {
|
|
1070
|
+
severity = 'info';
|
|
1071
|
+
description += ' (in test file)';
|
|
1072
|
+
}
|
|
1073
|
+
vulnerabilities.push({
|
|
1074
|
+
id: `ai-model-injection-${filePath}-${lineNumber}-${pattern.name.replace(/\s+/g, '-')}`,
|
|
1075
|
+
filePath,
|
|
1076
|
+
lineNumber,
|
|
1077
|
+
lineContent,
|
|
1078
|
+
severity,
|
|
1079
|
+
category: 'ai_prompt_injection',
|
|
1080
|
+
title: pattern.name,
|
|
1081
|
+
description,
|
|
1082
|
+
suggestedFix: pattern.suggestedFix,
|
|
1083
|
+
confidence: severity === 'info' ? 'low' : 'medium',
|
|
1084
|
+
layer: 2,
|
|
1085
|
+
source: 'ai_code',
|
|
1086
|
+
requiresAIValidation: severity !== 'info' && severity !== 'low',
|
|
1087
|
+
baseConfidence: BASE_CONFIDENCE,
|
|
1088
|
+
});
|
|
1089
|
+
}
|
|
1090
|
+
}
|
|
1091
|
+
// ========== Sprint 6: Encoding-based escape detection ==========
|
|
1092
|
+
for (const pattern of ENCODING_ESCAPE_PATTERNS) {
|
|
1093
|
+
const regex = new RegExp(pattern.pattern.source, pattern.pattern.flags);
|
|
1094
|
+
let match;
|
|
1095
|
+
while ((match = regex.exec(content)) !== null) {
|
|
1096
|
+
const lineNumber = content.substring(0, match.index).split('\n').length;
|
|
1097
|
+
const lineContent = lines[lineNumber - 1]?.trim() || '';
|
|
1098
|
+
// Skip comments
|
|
1099
|
+
if ((0, file_classifier_1.isComment)(lineContent))
|
|
1100
|
+
continue;
|
|
1101
|
+
let severity = pattern.severity;
|
|
1102
|
+
let description = pattern.description;
|
|
1103
|
+
const contextLines = getSurroundingContext(content, lineNumber - 1, 15, lines);
|
|
1104
|
+
// Check for encoding sanitization
|
|
1105
|
+
if (hasEncodingSanitization(content, lineNumber, lines)) {
|
|
1106
|
+
severity = 'info';
|
|
1107
|
+
description += ' (Encoding sanitization detected.)';
|
|
1108
|
+
}
|
|
1109
|
+
// Check for delimiters
|
|
1110
|
+
if (pattern.checkDelimiters && hasPromptDelimiters(lineContent, contextLines)) {
|
|
1111
|
+
severity = 'info';
|
|
1112
|
+
description += ' (Delimiters detected.)';
|
|
1113
|
+
}
|
|
1114
|
+
if (isTestFile) {
|
|
1115
|
+
severity = 'info';
|
|
1116
|
+
description += ' (in test file)';
|
|
1117
|
+
}
|
|
1118
|
+
vulnerabilities.push({
|
|
1119
|
+
id: `ai-encoding-escape-${filePath}-${lineNumber}-${pattern.name.replace(/\s+/g, '-')}`,
|
|
1120
|
+
filePath,
|
|
1121
|
+
lineNumber,
|
|
1122
|
+
lineContent,
|
|
1123
|
+
severity,
|
|
1124
|
+
category: 'ai_prompt_injection',
|
|
1125
|
+
title: pattern.name + ' (Encoding Bypass)',
|
|
1126
|
+
description,
|
|
1127
|
+
suggestedFix: pattern.suggestedFix,
|
|
1128
|
+
confidence: 'medium',
|
|
1129
|
+
layer: 2,
|
|
1130
|
+
source: 'ai_code',
|
|
1131
|
+
requiresAIValidation: severity !== 'info',
|
|
1132
|
+
baseConfidence: BASE_CONFIDENCE,
|
|
1133
|
+
});
|
|
1134
|
+
}
|
|
1135
|
+
}
|
|
1136
|
+
// ========== Sprint 6: Jailbreak pattern detection ==========
|
|
1137
|
+
for (const pattern of JAILBREAK_INDICATOR_PATTERNS) {
|
|
1138
|
+
const regex = new RegExp(pattern.pattern.source, pattern.pattern.flags);
|
|
1139
|
+
let match;
|
|
1140
|
+
while ((match = regex.exec(content)) !== null) {
|
|
1141
|
+
const lineNumber = content.substring(0, match.index).split('\n').length;
|
|
1142
|
+
const lineContent = lines[lineNumber - 1]?.trim() || '';
|
|
1143
|
+
// Skip comments
|
|
1144
|
+
if ((0, file_classifier_1.isComment)(lineContent))
|
|
1145
|
+
continue;
|
|
1146
|
+
let severity = pattern.severity;
|
|
1147
|
+
let description = pattern.description;
|
|
1148
|
+
// Check for jailbreak filtering
|
|
1149
|
+
if (hasJailbreakFiltering(content, lineNumber, lines)) {
|
|
1150
|
+
severity = 'info';
|
|
1151
|
+
description += ' (Jailbreak filtering detected - mitigated.)';
|
|
1152
|
+
}
|
|
1153
|
+
if (isTestFile) {
|
|
1154
|
+
severity = 'info';
|
|
1155
|
+
description += ' (in test file)';
|
|
1156
|
+
}
|
|
1157
|
+
vulnerabilities.push({
|
|
1158
|
+
id: `ai-jailbreak-${filePath}-${lineNumber}-${pattern.name.replace(/\s+/g, '-')}`,
|
|
1159
|
+
filePath,
|
|
1160
|
+
lineNumber,
|
|
1161
|
+
lineContent,
|
|
1162
|
+
severity,
|
|
1163
|
+
category: 'ai_prompt_injection',
|
|
1164
|
+
title: pattern.name + ' (Jailbreak Risk)',
|
|
1165
|
+
description,
|
|
1166
|
+
suggestedFix: pattern.suggestedFix,
|
|
1167
|
+
confidence: severity === 'info' ? 'low' : 'medium',
|
|
1168
|
+
layer: 2,
|
|
1169
|
+
source: 'ai_code',
|
|
1170
|
+
requiresAIValidation: severity !== 'info' && severity !== 'low',
|
|
1171
|
+
baseConfidence: BASE_CONFIDENCE,
|
|
1172
|
+
});
|
|
1173
|
+
}
|
|
1174
|
+
}
|
|
1175
|
+
return vulnerabilities;
|
|
1176
|
+
}
|
|
1177
|
+
//# sourceMappingURL=prompt-hygiene.js.map
|