@oculum/scanner 1.0.12 → 1.0.13

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (961) hide show
  1. package/dist/detect/ai-code/agent-tools.d.ts +22 -0
  2. package/dist/detect/ai-code/agent-tools.d.ts.map +1 -0
  3. package/dist/detect/ai-code/agent-tools.js +1509 -0
  4. package/dist/detect/ai-code/agent-tools.js.map +1 -0
  5. package/dist/detect/ai-code/byok-patterns.d.ts +15 -0
  6. package/dist/detect/ai-code/byok-patterns.d.ts.map +1 -0
  7. package/dist/detect/ai-code/byok-patterns.js +313 -0
  8. package/dist/detect/ai-code/byok-patterns.js.map +1 -0
  9. package/dist/detect/ai-code/endpoint-protection.d.ts +38 -0
  10. package/dist/detect/ai-code/endpoint-protection.d.ts.map +1 -0
  11. package/dist/detect/ai-code/endpoint-protection.js +349 -0
  12. package/dist/detect/ai-code/endpoint-protection.js.map +1 -0
  13. package/dist/detect/ai-code/execution-sinks.d.ts +21 -0
  14. package/dist/detect/ai-code/execution-sinks.d.ts.map +1 -0
  15. package/dist/detect/ai-code/execution-sinks.js +1158 -0
  16. package/dist/detect/ai-code/execution-sinks.js.map +1 -0
  17. package/dist/detect/ai-code/fingerprinting.d.ts +10 -0
  18. package/dist/detect/ai-code/fingerprinting.d.ts.map +1 -0
  19. package/dist/detect/ai-code/fingerprinting.js +665 -0
  20. package/dist/detect/ai-code/fingerprinting.js.map +1 -0
  21. package/dist/detect/ai-code/index.d.ts +12 -0
  22. package/dist/detect/ai-code/index.d.ts.map +1 -0
  23. package/dist/detect/ai-code/index.js +26 -0
  24. package/dist/detect/ai-code/index.js.map +1 -0
  25. package/dist/detect/ai-code/mcp-security.d.ts +20 -0
  26. package/dist/detect/ai-code/mcp-security.d.ts.map +1 -0
  27. package/dist/detect/ai-code/mcp-security.js +880 -0
  28. package/dist/detect/ai-code/mcp-security.js.map +1 -0
  29. package/dist/detect/ai-code/model-supply-chain.d.ts +23 -0
  30. package/dist/detect/ai-code/model-supply-chain.d.ts.map +1 -0
  31. package/dist/detect/ai-code/model-supply-chain.js +447 -0
  32. package/dist/detect/ai-code/model-supply-chain.js.map +1 -0
  33. package/dist/detect/ai-code/package-hallucination.d.ts +22 -0
  34. package/dist/detect/ai-code/package-hallucination.d.ts.map +1 -0
  35. package/dist/detect/ai-code/package-hallucination.js +841 -0
  36. package/dist/detect/ai-code/package-hallucination.js.map +1 -0
  37. package/dist/detect/ai-code/prompt-hygiene.d.ts +22 -0
  38. package/dist/detect/ai-code/prompt-hygiene.d.ts.map +1 -0
  39. package/dist/detect/ai-code/prompt-hygiene.js +1177 -0
  40. package/dist/detect/ai-code/prompt-hygiene.js.map +1 -0
  41. package/dist/detect/ai-code/rag-safety.d.ts +24 -0
  42. package/dist/detect/ai-code/rag-safety.d.ts.map +1 -0
  43. package/dist/detect/ai-code/rag-safety.js +913 -0
  44. package/dist/detect/ai-code/rag-safety.js.map +1 -0
  45. package/dist/detect/ai-code/schema-validation.d.ts +28 -0
  46. package/dist/detect/ai-code/schema-validation.d.ts.map +1 -0
  47. package/dist/detect/ai-code/schema-validation.js +378 -0
  48. package/dist/detect/ai-code/schema-validation.js.map +1 -0
  49. package/dist/detect/config/agent-skill-injection.d.ts +27 -0
  50. package/dist/detect/config/agent-skill-injection.d.ts.map +1 -0
  51. package/dist/detect/config/agent-skill-injection.js +472 -0
  52. package/dist/detect/config/agent-skill-injection.js.map +1 -0
  53. package/dist/detect/config/comments.d.ts +11 -0
  54. package/dist/detect/config/comments.d.ts.map +1 -0
  55. package/dist/detect/config/comments.js +206 -0
  56. package/dist/detect/config/comments.js.map +1 -0
  57. package/dist/detect/config/file-flags.d.ts +10 -0
  58. package/dist/detect/config/file-flags.d.ts.map +1 -0
  59. package/dist/detect/config/file-flags.js +124 -0
  60. package/dist/detect/config/file-flags.js.map +1 -0
  61. package/dist/detect/config/index.d.ts +7 -0
  62. package/dist/detect/config/index.d.ts.map +1 -0
  63. package/dist/detect/config/index.js +17 -0
  64. package/dist/detect/config/index.js.map +1 -0
  65. package/dist/detect/config/osv-check.d.ts +75 -0
  66. package/dist/detect/config/osv-check.d.ts.map +1 -0
  67. package/dist/detect/config/osv-check.js +309 -0
  68. package/dist/detect/config/osv-check.js.map +1 -0
  69. package/dist/detect/config/package-check.d.ts +63 -0
  70. package/dist/detect/config/package-check.d.ts.map +1 -0
  71. package/dist/detect/config/package-check.js +509 -0
  72. package/dist/detect/config/package-check.js.map +1 -0
  73. package/dist/detect/config/urls.d.ts +11 -0
  74. package/dist/detect/config/urls.d.ts.map +1 -0
  75. package/dist/detect/config/urls.js +450 -0
  76. package/dist/detect/config/urls.js.map +1 -0
  77. package/dist/detect/index.d.ts +37 -0
  78. package/dist/detect/index.d.ts.map +1 -0
  79. package/dist/detect/index.js +77 -0
  80. package/dist/detect/index.js.map +1 -0
  81. package/dist/detect/secrets/config-audit.d.ts +11 -0
  82. package/dist/detect/secrets/config-audit.d.ts.map +1 -0
  83. package/dist/detect/secrets/config-audit.js +315 -0
  84. package/dist/detect/secrets/config-audit.js.map +1 -0
  85. package/dist/detect/secrets/config-mcp-audit.d.ts +23 -0
  86. package/dist/detect/secrets/config-mcp-audit.d.ts.map +1 -0
  87. package/dist/detect/secrets/config-mcp-audit.js +243 -0
  88. package/dist/detect/secrets/config-mcp-audit.js.map +1 -0
  89. package/dist/detect/secrets/entropy.d.ts +11 -0
  90. package/dist/detect/secrets/entropy.d.ts.map +1 -0
  91. package/dist/detect/secrets/entropy.js +751 -0
  92. package/dist/detect/secrets/entropy.js.map +1 -0
  93. package/dist/detect/secrets/index.d.ts +36 -0
  94. package/dist/detect/secrets/index.d.ts.map +1 -0
  95. package/dist/detect/secrets/index.js +174 -0
  96. package/dist/detect/secrets/index.js.map +1 -0
  97. package/dist/detect/secrets/patterns.d.ts +11 -0
  98. package/dist/detect/secrets/patterns.d.ts.map +1 -0
  99. package/dist/detect/secrets/patterns.js +518 -0
  100. package/dist/detect/secrets/patterns.js.map +1 -0
  101. package/dist/detect/secrets/weak-crypto.d.ts +10 -0
  102. package/dist/detect/secrets/weak-crypto.d.ts.map +1 -0
  103. package/dist/detect/secrets/weak-crypto.js +432 -0
  104. package/dist/detect/secrets/weak-crypto.js.map +1 -0
  105. package/dist/detect/structural/auth-patterns.d.ts +22 -0
  106. package/dist/detect/structural/auth-patterns.d.ts.map +1 -0
  107. package/dist/detect/structural/auth-patterns.js +533 -0
  108. package/dist/detect/structural/auth-patterns.js.map +1 -0
  109. package/dist/detect/structural/dangerous-functions/child-process.d.ts +16 -0
  110. package/dist/detect/structural/dangerous-functions/child-process.d.ts.map +1 -0
  111. package/dist/detect/structural/dangerous-functions/child-process.js +74 -0
  112. package/dist/detect/structural/dangerous-functions/child-process.js.map +1 -0
  113. package/dist/detect/structural/dangerous-functions/dom-xss.d.ts +34 -0
  114. package/dist/detect/structural/dangerous-functions/dom-xss.d.ts.map +1 -0
  115. package/dist/detect/structural/dangerous-functions/dom-xss.js +230 -0
  116. package/dist/detect/structural/dangerous-functions/dom-xss.js.map +1 -0
  117. package/dist/detect/structural/dangerous-functions/index.d.ts +16 -0
  118. package/dist/detect/structural/dangerous-functions/index.d.ts.map +1 -0
  119. package/dist/detect/structural/dangerous-functions/index.js +1193 -0
  120. package/dist/detect/structural/dangerous-functions/index.js.map +1 -0
  121. package/dist/detect/structural/dangerous-functions/json-parse.d.ts +31 -0
  122. package/dist/detect/structural/dangerous-functions/json-parse.d.ts.map +1 -0
  123. package/dist/detect/structural/dangerous-functions/json-parse.js +326 -0
  124. package/dist/detect/structural/dangerous-functions/json-parse.js.map +1 -0
  125. package/dist/detect/structural/dangerous-functions/math-random.d.ts +111 -0
  126. package/dist/detect/structural/dangerous-functions/math-random.d.ts.map +1 -0
  127. package/dist/detect/structural/dangerous-functions/math-random.js +684 -0
  128. package/dist/detect/structural/dangerous-functions/math-random.js.map +1 -0
  129. package/dist/detect/structural/dangerous-functions/patterns.d.ts +21 -0
  130. package/dist/detect/structural/dangerous-functions/patterns.d.ts.map +1 -0
  131. package/dist/detect/structural/dangerous-functions/patterns.js +163 -0
  132. package/dist/detect/structural/dangerous-functions/patterns.js.map +1 -0
  133. package/dist/detect/structural/dangerous-functions/request-validation.d.ts +13 -0
  134. package/dist/detect/structural/dangerous-functions/request-validation.d.ts.map +1 -0
  135. package/dist/detect/structural/dangerous-functions/request-validation.js +126 -0
  136. package/dist/detect/structural/dangerous-functions/request-validation.js.map +1 -0
  137. package/dist/detect/structural/dangerous-functions/utils/control-flow.d.ts +24 -0
  138. package/dist/detect/structural/dangerous-functions/utils/control-flow.d.ts.map +1 -0
  139. package/dist/detect/structural/dangerous-functions/utils/control-flow.js +70 -0
  140. package/dist/detect/structural/dangerous-functions/utils/control-flow.js.map +1 -0
  141. package/dist/detect/structural/dangerous-functions/utils/helpers.d.ts +31 -0
  142. package/dist/detect/structural/dangerous-functions/utils/helpers.d.ts.map +1 -0
  143. package/dist/detect/structural/dangerous-functions/utils/helpers.js +147 -0
  144. package/dist/detect/structural/dangerous-functions/utils/helpers.js.map +1 -0
  145. package/dist/detect/structural/dangerous-functions/utils/index.d.ts +9 -0
  146. package/dist/detect/structural/dangerous-functions/utils/index.d.ts.map +1 -0
  147. package/dist/detect/structural/dangerous-functions/utils/index.js +23 -0
  148. package/dist/detect/structural/dangerous-functions/utils/index.js.map +1 -0
  149. package/dist/detect/structural/dangerous-functions/utils/schema-validation.d.ts +22 -0
  150. package/dist/detect/structural/dangerous-functions/utils/schema-validation.d.ts.map +1 -0
  151. package/dist/detect/structural/dangerous-functions/utils/schema-validation.js +102 -0
  152. package/dist/detect/structural/dangerous-functions/utils/schema-validation.js.map +1 -0
  153. package/dist/detect/structural/data-exposure.d.ts +19 -0
  154. package/dist/detect/structural/data-exposure.d.ts.map +1 -0
  155. package/dist/detect/structural/data-exposure.js +262 -0
  156. package/dist/detect/structural/data-exposure.js.map +1 -0
  157. package/dist/detect/structural/framework-checks.d.ts +10 -0
  158. package/dist/detect/structural/framework-checks.d.ts.map +1 -0
  159. package/dist/detect/structural/framework-checks.js +389 -0
  160. package/dist/detect/structural/framework-checks.js.map +1 -0
  161. package/dist/detect/structural/index.d.ts +71 -0
  162. package/dist/detect/structural/index.d.ts.map +1 -0
  163. package/dist/detect/structural/index.js +510 -0
  164. package/dist/detect/structural/index.js.map +1 -0
  165. package/dist/detect/structural/log-injection.d.ts +18 -0
  166. package/dist/detect/structural/log-injection.d.ts.map +1 -0
  167. package/dist/detect/structural/log-injection.js +217 -0
  168. package/dist/detect/structural/log-injection.js.map +1 -0
  169. package/dist/detect/structural/logic-gates.d.ts +10 -0
  170. package/dist/detect/structural/logic-gates.d.ts.map +1 -0
  171. package/dist/detect/structural/logic-gates.js +227 -0
  172. package/dist/detect/structural/logic-gates.js.map +1 -0
  173. package/dist/detect/structural/risky-imports.d.ts +10 -0
  174. package/dist/detect/structural/risky-imports.d.ts.map +1 -0
  175. package/dist/detect/structural/risky-imports.js +168 -0
  176. package/dist/detect/structural/risky-imports.js.map +1 -0
  177. package/dist/detect/structural/security-headers.d.ts +18 -0
  178. package/dist/detect/structural/security-headers.d.ts.map +1 -0
  179. package/dist/detect/structural/security-headers.js +196 -0
  180. package/dist/detect/structural/security-headers.js.map +1 -0
  181. package/dist/detect/structural/ssrf-detection.d.ts +18 -0
  182. package/dist/detect/structural/ssrf-detection.d.ts.map +1 -0
  183. package/dist/detect/structural/ssrf-detection.js +263 -0
  184. package/dist/detect/structural/ssrf-detection.js.map +1 -0
  185. package/dist/detect/structural/variables.d.ts +11 -0
  186. package/dist/detect/structural/variables.d.ts.map +1 -0
  187. package/dist/detect/structural/variables.js +159 -0
  188. package/dist/detect/structural/variables.js.map +1 -0
  189. package/dist/detect/structural/xxe-detection.d.ts +18 -0
  190. package/dist/detect/structural/xxe-detection.d.ts.map +1 -0
  191. package/dist/detect/structural/xxe-detection.js +245 -0
  192. package/dist/detect/structural/xxe-detection.js.map +1 -0
  193. package/dist/index.d.ts +17 -64
  194. package/dist/index.d.ts.map +1 -1
  195. package/dist/index.js +49 -1034
  196. package/dist/index.js.map +1 -1
  197. package/dist/layer2/framework-checks.d.ts.map +1 -1
  198. package/dist/layer2/framework-checks.js +1 -8
  199. package/dist/layer2/framework-checks.js.map +1 -1
  200. package/dist/layer2/index.d.ts +4 -0
  201. package/dist/layer2/index.d.ts.map +1 -1
  202. package/dist/layer2/index.js +50 -1
  203. package/dist/layer2/index.js.map +1 -1
  204. package/dist/layer2/log-injection.d.ts +18 -0
  205. package/dist/layer2/log-injection.d.ts.map +1 -0
  206. package/dist/layer2/log-injection.js +214 -0
  207. package/dist/layer2/log-injection.js.map +1 -0
  208. package/dist/layer2/security-headers.d.ts +18 -0
  209. package/dist/layer2/security-headers.d.ts.map +1 -0
  210. package/dist/layer2/security-headers.js +187 -0
  211. package/dist/layer2/security-headers.js.map +1 -0
  212. package/dist/layer2/ssrf-detection.d.ts +18 -0
  213. package/dist/layer2/ssrf-detection.d.ts.map +1 -0
  214. package/dist/layer2/ssrf-detection.js +252 -0
  215. package/dist/layer2/ssrf-detection.js.map +1 -0
  216. package/dist/layer2/xxe-detection.d.ts +18 -0
  217. package/dist/layer2/xxe-detection.d.ts.map +1 -0
  218. package/dist/layer2/xxe-detection.js +242 -0
  219. package/dist/layer2/xxe-detection.js.map +1 -0
  220. package/dist/layer3/anthropic/prompts/index.d.ts +1 -1
  221. package/dist/layer3/anthropic/prompts/index.d.ts.map +1 -1
  222. package/dist/layer3/anthropic/prompts/index.js +3 -1
  223. package/dist/layer3/anthropic/prompts/index.js.map +1 -1
  224. package/dist/layer3/anthropic/prompts/modules/ai-patterns.d.ts +19 -0
  225. package/dist/layer3/anthropic/prompts/modules/ai-patterns.d.ts.map +1 -0
  226. package/dist/layer3/anthropic/prompts/modules/ai-patterns.js +156 -0
  227. package/dist/layer3/anthropic/prompts/modules/ai-patterns.js.map +1 -0
  228. package/dist/layer3/anthropic/prompts/modules/auth-access.d.ts +9 -0
  229. package/dist/layer3/anthropic/prompts/modules/auth-access.d.ts.map +1 -0
  230. package/dist/layer3/anthropic/prompts/modules/auth-access.js +25 -0
  231. package/dist/layer3/anthropic/prompts/modules/auth-access.js.map +1 -0
  232. package/dist/layer3/anthropic/prompts/modules/common.d.ts +11 -0
  233. package/dist/layer3/anthropic/prompts/modules/common.d.ts.map +1 -0
  234. package/dist/layer3/anthropic/prompts/modules/common.js +152 -0
  235. package/dist/layer3/anthropic/prompts/modules/common.js.map +1 -0
  236. package/dist/layer3/anthropic/prompts/modules/index.d.ts +54 -0
  237. package/dist/layer3/anthropic/prompts/modules/index.d.ts.map +1 -0
  238. package/dist/layer3/anthropic/prompts/modules/index.js +185 -0
  239. package/dist/layer3/anthropic/prompts/modules/index.js.map +1 -0
  240. package/dist/layer3/anthropic/prompts/modules/owasp-classic.d.ts +8 -0
  241. package/dist/layer3/anthropic/prompts/modules/owasp-classic.d.ts.map +1 -0
  242. package/dist/layer3/anthropic/prompts/modules/owasp-classic.js +84 -0
  243. package/dist/layer3/anthropic/prompts/modules/owasp-classic.js.map +1 -0
  244. package/dist/layer3/anthropic/prompts/modules/secrets-crypto.d.ts +8 -0
  245. package/dist/layer3/anthropic/prompts/modules/secrets-crypto.d.ts.map +1 -0
  246. package/dist/layer3/anthropic/prompts/modules/secrets-crypto.js +68 -0
  247. package/dist/layer3/anthropic/prompts/modules/secrets-crypto.js.map +1 -0
  248. package/dist/layer3/anthropic/prompts/modules/xss-prompt.d.ts +8 -0
  249. package/dist/layer3/anthropic/prompts/modules/xss-prompt.d.ts.map +1 -0
  250. package/dist/layer3/anthropic/prompts/modules/xss-prompt.js +22 -0
  251. package/dist/layer3/anthropic/prompts/modules/xss-prompt.js.map +1 -0
  252. package/dist/layer3/anthropic/prompts/validation.d.ts +9 -3
  253. package/dist/layer3/anthropic/prompts/validation.d.ts.map +1 -1
  254. package/dist/layer3/anthropic/prompts/validation.js +14 -410
  255. package/dist/layer3/anthropic/prompts/validation.js.map +1 -1
  256. package/dist/layer3/anthropic/providers/anthropic.d.ts.map +1 -1
  257. package/dist/layer3/anthropic/providers/anthropic.js +6 -3
  258. package/dist/layer3/anthropic/providers/anthropic.js.map +1 -1
  259. package/dist/layer3/anthropic/providers/openai.d.ts.map +1 -1
  260. package/dist/layer3/anthropic/providers/openai.js +6 -3
  261. package/dist/layer3/anthropic/providers/openai.js.map +1 -1
  262. package/dist/layer3/anthropic/request-builder.d.ts +11 -4
  263. package/dist/layer3/anthropic/request-builder.d.ts.map +1 -1
  264. package/dist/layer3/anthropic/request-builder.js +32 -16
  265. package/dist/layer3/anthropic/request-builder.js.map +1 -1
  266. package/dist/layer3/anthropic/utils/context-extractor.d.ts +55 -0
  267. package/dist/layer3/anthropic/utils/context-extractor.d.ts.map +1 -0
  268. package/dist/layer3/anthropic/utils/context-extractor.js +161 -0
  269. package/dist/layer3/anthropic/utils/context-extractor.js.map +1 -0
  270. package/dist/layer3/anthropic/utils/index.d.ts +2 -0
  271. package/dist/layer3/anthropic/utils/index.d.ts.map +1 -1
  272. package/dist/layer3/anthropic/utils/index.js +4 -1
  273. package/dist/layer3/anthropic/utils/index.js.map +1 -1
  274. package/dist/model/auth-helper-detector.d.ts +56 -0
  275. package/dist/model/auth-helper-detector.d.ts.map +1 -0
  276. package/dist/model/auth-helper-detector.js +360 -0
  277. package/dist/model/auth-helper-detector.js.map +1 -0
  278. package/dist/model/cross-file-taint.d.ts +40 -0
  279. package/dist/model/cross-file-taint.d.ts.map +1 -0
  280. package/dist/model/cross-file-taint.js +290 -0
  281. package/dist/model/cross-file-taint.js.map +1 -0
  282. package/dist/model/framework-models/django.d.ts +9 -0
  283. package/dist/model/framework-models/django.d.ts.map +1 -0
  284. package/dist/model/framework-models/django.js +82 -0
  285. package/dist/model/framework-models/django.js.map +1 -0
  286. package/dist/model/framework-models/express.d.ts +9 -0
  287. package/dist/model/framework-models/express.d.ts.map +1 -0
  288. package/dist/model/framework-models/express.js +52 -0
  289. package/dist/model/framework-models/express.js.map +1 -0
  290. package/dist/model/framework-models/index.d.ts +20 -0
  291. package/dist/model/framework-models/index.d.ts.map +1 -0
  292. package/dist/model/framework-models/index.js +102 -0
  293. package/dist/model/framework-models/index.js.map +1 -0
  294. package/dist/model/framework-models/nextjs.d.ts +9 -0
  295. package/dist/model/framework-models/nextjs.d.ts.map +1 -0
  296. package/dist/model/framework-models/nextjs.js +71 -0
  297. package/dist/model/framework-models/nextjs.js.map +1 -0
  298. package/dist/model/framework-models/prisma.d.ts +10 -0
  299. package/dist/model/framework-models/prisma.d.ts.map +1 -0
  300. package/dist/model/framework-models/prisma.js +54 -0
  301. package/dist/model/framework-models/prisma.js.map +1 -0
  302. package/dist/model/framework-models/react.d.ts +9 -0
  303. package/dist/model/framework-models/react.d.ts.map +1 -0
  304. package/dist/model/framework-models/react.js +67 -0
  305. package/dist/model/framework-models/react.js.map +1 -0
  306. package/dist/model/framework-models/sequelize.d.ts +9 -0
  307. package/dist/model/framework-models/sequelize.d.ts.map +1 -0
  308. package/dist/model/framework-models/sequelize.js +62 -0
  309. package/dist/model/framework-models/sequelize.js.map +1 -0
  310. package/dist/model/framework-models/types.d.ts +43 -0
  311. package/dist/model/framework-models/types.d.ts.map +1 -0
  312. package/dist/model/framework-models/types.js +10 -0
  313. package/dist/model/framework-models/types.js.map +1 -0
  314. package/dist/model/function-classifier.d.ts +32 -0
  315. package/dist/model/function-classifier.d.ts.map +1 -0
  316. package/dist/model/function-classifier.js +143 -0
  317. package/dist/model/function-classifier.js.map +1 -0
  318. package/dist/model/import-resolver.d.ts +45 -0
  319. package/dist/model/import-resolver.d.ts.map +1 -0
  320. package/dist/model/import-resolver.js +410 -0
  321. package/dist/model/import-resolver.js.map +1 -0
  322. package/dist/model/imported-auth-detector.d.ts +38 -0
  323. package/dist/model/imported-auth-detector.d.ts.map +1 -0
  324. package/dist/model/imported-auth-detector.js +199 -0
  325. package/dist/model/imported-auth-detector.js.map +1 -0
  326. package/dist/model/index.d.ts +63 -0
  327. package/dist/model/index.d.ts.map +1 -0
  328. package/dist/model/index.js +272 -0
  329. package/dist/model/index.js.map +1 -0
  330. package/dist/model/middleware-detector.d.ts +55 -0
  331. package/dist/model/middleware-detector.d.ts.map +1 -0
  332. package/dist/model/middleware-detector.js +382 -0
  333. package/dist/model/middleware-detector.js.map +1 -0
  334. package/dist/model/module-graph.d.ts +46 -0
  335. package/dist/model/module-graph.d.ts.map +1 -0
  336. package/dist/model/module-graph.js +187 -0
  337. package/dist/model/module-graph.js.map +1 -0
  338. package/dist/model/oauth-flow-detector.d.ts +41 -0
  339. package/dist/model/oauth-flow-detector.d.ts.map +1 -0
  340. package/dist/model/oauth-flow-detector.js +202 -0
  341. package/dist/model/oauth-flow-detector.js.map +1 -0
  342. package/dist/model/project-context.d.ts +119 -0
  343. package/dist/model/project-context.d.ts.map +1 -0
  344. package/dist/model/project-context.js +534 -0
  345. package/dist/model/project-context.js.map +1 -0
  346. package/dist/model/route-auth-resolver.d.ts +27 -0
  347. package/dist/model/route-auth-resolver.d.ts.map +1 -0
  348. package/dist/model/route-auth-resolver.js +182 -0
  349. package/dist/model/route-auth-resolver.js.map +1 -0
  350. package/dist/model/route-discovery/express.d.ts +25 -0
  351. package/dist/model/route-discovery/express.d.ts.map +1 -0
  352. package/dist/model/route-discovery/express.js +225 -0
  353. package/dist/model/route-discovery/express.js.map +1 -0
  354. package/dist/model/route-discovery/index.d.ts +21 -0
  355. package/dist/model/route-discovery/index.d.ts.map +1 -0
  356. package/dist/model/route-discovery/index.js +67 -0
  357. package/dist/model/route-discovery/index.js.map +1 -0
  358. package/dist/model/route-discovery/nextjs.d.ts +16 -0
  359. package/dist/model/route-discovery/nextjs.d.ts.map +1 -0
  360. package/dist/model/route-discovery/nextjs.js +179 -0
  361. package/dist/model/route-discovery/nextjs.js.map +1 -0
  362. package/dist/model/route-discovery/python.d.ts +16 -0
  363. package/dist/model/route-discovery/python.d.ts.map +1 -0
  364. package/dist/model/route-discovery/python.js +181 -0
  365. package/dist/model/route-discovery/python.js.map +1 -0
  366. package/dist/model/route-discovery/types.d.ts +36 -0
  367. package/dist/model/route-discovery/types.d.ts.map +1 -0
  368. package/dist/model/route-discovery/types.js +16 -0
  369. package/dist/model/route-discovery/types.js.map +1 -0
  370. package/dist/model/route-discovery/utils.d.ts +18 -0
  371. package/dist/model/route-discovery/utils.d.ts.map +1 -0
  372. package/dist/model/route-discovery/utils.js +55 -0
  373. package/dist/model/route-discovery/utils.js.map +1 -0
  374. package/dist/model/route-hierarchy.d.ts +50 -0
  375. package/dist/model/route-hierarchy.d.ts.map +1 -0
  376. package/dist/model/route-hierarchy.js +226 -0
  377. package/dist/model/route-hierarchy.js.map +1 -0
  378. package/dist/model/sanitiser-detection.d.ts +27 -0
  379. package/dist/model/sanitiser-detection.d.ts.map +1 -0
  380. package/dist/model/sanitiser-detection.js +224 -0
  381. package/dist/model/sanitiser-detection.js.map +1 -0
  382. package/dist/model/sink-matcher.d.ts +17 -0
  383. package/dist/model/sink-matcher.d.ts.map +1 -0
  384. package/dist/model/sink-matcher.js +141 -0
  385. package/dist/model/sink-matcher.js.map +1 -0
  386. package/dist/model/sink-patterns.d.ts +19 -0
  387. package/dist/model/sink-patterns.d.ts.map +1 -0
  388. package/dist/model/sink-patterns.js +88 -0
  389. package/dist/model/sink-patterns.js.map +1 -0
  390. package/dist/model/source-discovery.d.ts +15 -0
  391. package/dist/model/source-discovery.d.ts.map +1 -0
  392. package/dist/model/source-discovery.js +170 -0
  393. package/dist/model/source-discovery.js.map +1 -0
  394. package/dist/model/taint-tracker.d.ts +21 -0
  395. package/dist/model/taint-tracker.d.ts.map +1 -0
  396. package/dist/model/taint-tracker.js +281 -0
  397. package/dist/model/taint-tracker.js.map +1 -0
  398. package/dist/model/taint-types.d.ts +74 -0
  399. package/dist/model/taint-types.d.ts.map +1 -0
  400. package/dist/model/taint-types.js +9 -0
  401. package/dist/model/taint-types.js.map +1 -0
  402. package/dist/model/trpc-analyzer.d.ts +78 -0
  403. package/dist/model/trpc-analyzer.d.ts.map +1 -0
  404. package/dist/model/trpc-analyzer.js +297 -0
  405. package/dist/model/trpc-analyzer.js.map +1 -0
  406. package/dist/parse/file-classifier.d.ts +228 -0
  407. package/dist/parse/file-classifier.d.ts.map +1 -0
  408. package/dist/parse/file-classifier.js +933 -0
  409. package/dist/parse/file-classifier.js.map +1 -0
  410. package/dist/parse/path-exclusions.d.ts +55 -0
  411. package/dist/parse/path-exclusions.d.ts.map +1 -0
  412. package/dist/parse/path-exclusions.js +224 -0
  413. package/dist/parse/path-exclusions.js.map +1 -0
  414. package/dist/pipeline/config.d.ts +39 -0
  415. package/dist/pipeline/config.d.ts.map +1 -0
  416. package/dist/pipeline/config.js +46 -0
  417. package/dist/pipeline/config.js.map +1 -0
  418. package/dist/pipeline/index.d.ts +34 -0
  419. package/dist/pipeline/index.d.ts.map +1 -0
  420. package/dist/pipeline/index.js +377 -0
  421. package/dist/pipeline/index.js.map +1 -0
  422. package/dist/pipeline/modes/incremental.d.ts +66 -0
  423. package/dist/pipeline/modes/incremental.d.ts.map +1 -0
  424. package/dist/pipeline/modes/incremental.js +200 -0
  425. package/dist/pipeline/modes/incremental.js.map +1 -0
  426. package/dist/postprocess/aggregation.d.ts +14 -0
  427. package/dist/postprocess/aggregation.d.ts.map +1 -0
  428. package/dist/postprocess/aggregation.js +63 -0
  429. package/dist/postprocess/aggregation.js.map +1 -0
  430. package/dist/postprocess/contradictions.d.ts +18 -0
  431. package/dist/postprocess/contradictions.d.ts.map +1 -0
  432. package/dist/postprocess/contradictions.js +99 -0
  433. package/dist/postprocess/contradictions.js.map +1 -0
  434. package/dist/postprocess/dedup.d.ts +13 -0
  435. package/dist/postprocess/dedup.d.ts.map +1 -0
  436. package/dist/postprocess/dedup.js +58 -0
  437. package/dist/postprocess/dedup.js.map +1 -0
  438. package/dist/postprocess/filtering/context-adjustments.d.ts +23 -0
  439. package/dist/postprocess/filtering/context-adjustments.d.ts.map +1 -0
  440. package/dist/postprocess/filtering/context-adjustments.js +100 -0
  441. package/dist/postprocess/filtering/context-adjustments.js.map +1 -0
  442. package/dist/postprocess/filtering/index.d.ts +3 -0
  443. package/dist/postprocess/filtering/index.d.ts.map +1 -0
  444. package/dist/postprocess/filtering/index.js +8 -0
  445. package/dist/postprocess/filtering/index.js.map +1 -0
  446. package/dist/postprocess/filtering/pipeline.d.ts +48 -0
  447. package/dist/postprocess/filtering/pipeline.d.ts.map +1 -0
  448. package/dist/postprocess/filtering/pipeline.js +76 -0
  449. package/dist/postprocess/filtering/pipeline.js.map +1 -0
  450. package/dist/postprocess/index.d.ts +41 -0
  451. package/dist/postprocess/index.d.ts.map +1 -0
  452. package/dist/postprocess/index.js +85 -0
  453. package/dist/postprocess/index.js.map +1 -0
  454. package/dist/postprocess/suppression/config-loader.d.ts +74 -0
  455. package/dist/postprocess/suppression/config-loader.d.ts.map +1 -0
  456. package/dist/postprocess/suppression/config-loader.js +424 -0
  457. package/dist/postprocess/suppression/config-loader.js.map +1 -0
  458. package/dist/postprocess/suppression/hash.d.ts +48 -0
  459. package/dist/postprocess/suppression/hash.d.ts.map +1 -0
  460. package/dist/postprocess/suppression/hash.js +88 -0
  461. package/dist/postprocess/suppression/hash.js.map +1 -0
  462. package/dist/postprocess/suppression/index.d.ts +11 -0
  463. package/dist/postprocess/suppression/index.d.ts.map +1 -0
  464. package/dist/postprocess/suppression/index.js +39 -0
  465. package/dist/postprocess/suppression/index.js.map +1 -0
  466. package/dist/postprocess/suppression/inline-parser.d.ts +39 -0
  467. package/dist/postprocess/suppression/inline-parser.d.ts.map +1 -0
  468. package/dist/postprocess/suppression/inline-parser.js +218 -0
  469. package/dist/postprocess/suppression/inline-parser.js.map +1 -0
  470. package/dist/postprocess/suppression/manager.d.ts +94 -0
  471. package/dist/postprocess/suppression/manager.d.ts.map +1 -0
  472. package/dist/postprocess/suppression/manager.js +292 -0
  473. package/dist/postprocess/suppression/manager.js.map +1 -0
  474. package/dist/postprocess/suppression/types.d.ts +151 -0
  475. package/dist/postprocess/suppression/types.d.ts.map +1 -0
  476. package/dist/postprocess/suppression/types.js +28 -0
  477. package/dist/postprocess/suppression/types.js.map +1 -0
  478. package/dist/postprocess/validation-cap.d.ts +17 -0
  479. package/dist/postprocess/validation-cap.d.ts.map +1 -0
  480. package/dist/postprocess/validation-cap.js +64 -0
  481. package/dist/postprocess/validation-cap.js.map +1 -0
  482. package/dist/report/build-result.d.ts +33 -0
  483. package/dist/report/build-result.d.ts.map +1 -0
  484. package/dist/report/build-result.js +59 -0
  485. package/dist/report/build-result.js.map +1 -0
  486. package/dist/report/enrichment.d.ts +19 -0
  487. package/dist/report/enrichment.d.ts.map +1 -0
  488. package/dist/report/enrichment.js +44 -0
  489. package/dist/report/enrichment.js.map +1 -0
  490. package/dist/report/formatters/ai-context.d.ts +23 -0
  491. package/dist/report/formatters/ai-context.d.ts.map +1 -0
  492. package/dist/report/formatters/ai-context.js +238 -0
  493. package/dist/report/formatters/ai-context.js.map +1 -0
  494. package/dist/report/formatters/cli-terminal.d.ts +65 -0
  495. package/dist/report/formatters/cli-terminal.d.ts.map +1 -0
  496. package/dist/report/formatters/cli-terminal.js +735 -0
  497. package/dist/report/formatters/cli-terminal.js.map +1 -0
  498. package/dist/report/formatters/github-comment.d.ts +41 -0
  499. package/dist/report/formatters/github-comment.d.ts.map +1 -0
  500. package/dist/report/formatters/github-comment.js +370 -0
  501. package/dist/report/formatters/github-comment.js.map +1 -0
  502. package/dist/report/formatters/grouping.d.ts +52 -0
  503. package/dist/report/formatters/grouping.d.ts.map +1 -0
  504. package/dist/report/formatters/grouping.js +152 -0
  505. package/dist/report/formatters/grouping.js.map +1 -0
  506. package/dist/report/formatters/ide/claude-code.d.ts +17 -0
  507. package/dist/report/formatters/ide/claude-code.d.ts.map +1 -0
  508. package/dist/report/formatters/ide/claude-code.js +94 -0
  509. package/dist/report/formatters/ide/claude-code.js.map +1 -0
  510. package/dist/report/formatters/ide/cursor.d.ts +13 -0
  511. package/dist/report/formatters/ide/cursor.d.ts.map +1 -0
  512. package/dist/report/formatters/ide/cursor.js +125 -0
  513. package/dist/report/formatters/ide/cursor.js.map +1 -0
  514. package/dist/report/formatters/ide/index.d.ts +62 -0
  515. package/dist/report/formatters/ide/index.d.ts.map +1 -0
  516. package/dist/report/formatters/ide/index.js +184 -0
  517. package/dist/report/formatters/ide/index.js.map +1 -0
  518. package/dist/report/formatters/ide/windsurf.d.ts +13 -0
  519. package/dist/report/formatters/ide/windsurf.d.ts.map +1 -0
  520. package/dist/report/formatters/ide/windsurf.js +117 -0
  521. package/dist/report/formatters/ide/windsurf.js.map +1 -0
  522. package/dist/report/formatters/index.d.ts +11 -0
  523. package/dist/report/formatters/index.d.ts.map +1 -0
  524. package/dist/report/formatters/index.js +54 -0
  525. package/dist/report/formatters/index.js.map +1 -0
  526. package/dist/report/formatters/vscode-diagnostic.d.ts +103 -0
  527. package/dist/report/formatters/vscode-diagnostic.d.ts.map +1 -0
  528. package/dist/report/formatters/vscode-diagnostic.js +151 -0
  529. package/dist/report/formatters/vscode-diagnostic.js.map +1 -0
  530. package/dist/report/summary.d.ts +27 -0
  531. package/dist/report/summary.d.ts.map +1 -0
  532. package/dist/report/summary.js +57 -0
  533. package/dist/report/summary.js.map +1 -0
  534. package/dist/rules/metadata.d.ts.map +1 -1
  535. package/dist/rules/metadata.js +66 -0
  536. package/dist/rules/metadata.js.map +1 -1
  537. package/dist/score/adjustments.d.ts +22 -0
  538. package/dist/score/adjustments.d.ts.map +1 -0
  539. package/dist/score/adjustments.js +373 -0
  540. package/dist/score/adjustments.js.map +1 -0
  541. package/dist/score/auto-dismiss.d.ts +28 -0
  542. package/dist/score/auto-dismiss.d.ts.map +1 -0
  543. package/dist/score/auto-dismiss.js +200 -0
  544. package/dist/score/auto-dismiss.js.map +1 -0
  545. package/dist/score/confidence.d.ts +19 -0
  546. package/dist/score/confidence.d.ts.map +1 -0
  547. package/dist/score/confidence.js +52 -0
  548. package/dist/score/confidence.js.map +1 -0
  549. package/dist/score/index.d.ts +61 -0
  550. package/dist/score/index.d.ts.map +1 -0
  551. package/dist/score/index.js +250 -0
  552. package/dist/score/index.js.map +1 -0
  553. package/dist/score/types.d.ts +160 -0
  554. package/dist/score/types.d.ts.map +1 -0
  555. package/dist/score/types.js +14 -0
  556. package/dist/score/types.js.map +1 -0
  557. package/dist/shared/ai-context/index.d.ts +6 -0
  558. package/dist/shared/ai-context/index.d.ts.map +1 -0
  559. package/dist/shared/ai-context/index.js +13 -0
  560. package/dist/shared/ai-context/index.js.map +1 -0
  561. package/dist/shared/ai-context/manager.d.ts +67 -0
  562. package/dist/shared/ai-context/manager.d.ts.map +1 -0
  563. package/dist/shared/ai-context/manager.js +104 -0
  564. package/dist/shared/ai-context/manager.js.map +1 -0
  565. package/dist/shared/baseline/diff.d.ts +32 -0
  566. package/dist/shared/baseline/diff.d.ts.map +1 -0
  567. package/dist/shared/baseline/diff.js +119 -0
  568. package/dist/shared/baseline/diff.js.map +1 -0
  569. package/dist/shared/baseline/index.d.ts +9 -0
  570. package/dist/shared/baseline/index.d.ts.map +1 -0
  571. package/dist/shared/baseline/index.js +19 -0
  572. package/dist/shared/baseline/index.js.map +1 -0
  573. package/dist/shared/baseline/manager.d.ts +67 -0
  574. package/dist/shared/baseline/manager.d.ts.map +1 -0
  575. package/dist/shared/baseline/manager.js +180 -0
  576. package/dist/shared/baseline/manager.js.map +1 -0
  577. package/dist/shared/baseline/types.d.ts +91 -0
  578. package/dist/shared/baseline/types.d.ts.map +1 -0
  579. package/dist/shared/baseline/types.js +12 -0
  580. package/dist/shared/baseline/types.js.map +1 -0
  581. package/dist/shared/category-filter.d.ts +125 -0
  582. package/dist/shared/category-filter.d.ts.map +1 -0
  583. package/dist/shared/category-filter.js +360 -0
  584. package/dist/shared/category-filter.js.map +1 -0
  585. package/dist/shared/code-analysis.d.ts +39 -0
  586. package/dist/shared/code-analysis.d.ts.map +1 -0
  587. package/dist/shared/code-analysis.js +159 -0
  588. package/dist/shared/code-analysis.js.map +1 -0
  589. package/dist/shared/comment-analyzer.d.ts +38 -0
  590. package/dist/shared/comment-analyzer.d.ts.map +1 -0
  591. package/dist/shared/comment-analyzer.js +218 -0
  592. package/dist/shared/comment-analyzer.js.map +1 -0
  593. package/dist/shared/diff-detector.d.ts +53 -0
  594. package/dist/shared/diff-detector.d.ts.map +1 -0
  595. package/dist/shared/diff-detector.js +104 -0
  596. package/dist/shared/diff-detector.js.map +1 -0
  597. package/dist/shared/diff-parser.d.ts +80 -0
  598. package/dist/shared/diff-parser.d.ts.map +1 -0
  599. package/dist/shared/diff-parser.js +202 -0
  600. package/dist/shared/diff-parser.js.map +1 -0
  601. package/dist/shared/environment-context.d.ts +76 -0
  602. package/dist/shared/environment-context.d.ts.map +1 -0
  603. package/dist/shared/environment-context.js +271 -0
  604. package/dist/shared/environment-context.js.map +1 -0
  605. package/dist/shared/intent-detector.d.ts +66 -0
  606. package/dist/shared/intent-detector.d.ts.map +1 -0
  607. package/dist/shared/intent-detector.js +282 -0
  608. package/dist/shared/intent-detector.js.map +1 -0
  609. package/dist/shared/parsed-file.d.ts +51 -0
  610. package/dist/shared/parsed-file.d.ts.map +1 -0
  611. package/dist/shared/parsed-file.js +95 -0
  612. package/dist/shared/parsed-file.js.map +1 -0
  613. package/dist/shared/registry-clients.d.ts +93 -0
  614. package/dist/shared/registry-clients.d.ts.map +1 -0
  615. package/dist/shared/registry-clients.js +273 -0
  616. package/dist/shared/registry-clients.js.map +1 -0
  617. package/dist/shared/rules/framework-fixes.d.ts +48 -0
  618. package/dist/shared/rules/framework-fixes.d.ts.map +1 -0
  619. package/dist/shared/rules/framework-fixes.js +439 -0
  620. package/dist/shared/rules/framework-fixes.js.map +1 -0
  621. package/dist/shared/rules/index.d.ts +8 -0
  622. package/dist/shared/rules/index.d.ts.map +1 -0
  623. package/dist/shared/rules/index.js +18 -0
  624. package/dist/shared/rules/index.js.map +1 -0
  625. package/dist/shared/rules/metadata.d.ts +43 -0
  626. package/dist/shared/rules/metadata.d.ts.map +1 -0
  627. package/dist/shared/rules/metadata.js +819 -0
  628. package/dist/shared/rules/metadata.js.map +1 -0
  629. package/dist/shared/schema-semantics.d.ts +45 -0
  630. package/dist/shared/schema-semantics.d.ts.map +1 -0
  631. package/dist/shared/schema-semantics.js +193 -0
  632. package/dist/shared/schema-semantics.js.map +1 -0
  633. package/dist/shared/types.d.ts +337 -0
  634. package/dist/shared/types.d.ts.map +1 -0
  635. package/dist/shared/types.js +126 -0
  636. package/dist/shared/types.js.map +1 -0
  637. package/dist/tiers.d.ts +2 -2
  638. package/dist/tiers.d.ts.map +1 -1
  639. package/dist/tiers.js +10 -0
  640. package/dist/tiers.js.map +1 -1
  641. package/dist/types.d.ts +1 -1
  642. package/dist/types.d.ts.map +1 -1
  643. package/dist/types.js.map +1 -1
  644. package/dist/validate/clients.d.ts +44 -0
  645. package/dist/validate/clients.d.ts.map +1 -0
  646. package/dist/validate/clients.js +81 -0
  647. package/dist/validate/clients.js.map +1 -0
  648. package/dist/validate/index.d.ts +41 -0
  649. package/dist/validate/index.d.ts.map +1 -0
  650. package/dist/validate/index.js +141 -0
  651. package/dist/validate/index.js.map +1 -0
  652. package/dist/validate/prompts/index.d.ts +8 -0
  653. package/dist/validate/prompts/index.d.ts.map +1 -0
  654. package/dist/validate/prompts/index.js +16 -0
  655. package/dist/validate/prompts/index.js.map +1 -0
  656. package/dist/validate/prompts/modules/ai-patterns.d.ts +19 -0
  657. package/dist/validate/prompts/modules/ai-patterns.d.ts.map +1 -0
  658. package/dist/validate/prompts/modules/ai-patterns.js +156 -0
  659. package/dist/validate/prompts/modules/ai-patterns.js.map +1 -0
  660. package/dist/validate/prompts/modules/auth-access.d.ts +9 -0
  661. package/dist/validate/prompts/modules/auth-access.d.ts.map +1 -0
  662. package/dist/validate/prompts/modules/auth-access.js +25 -0
  663. package/dist/validate/prompts/modules/auth-access.js.map +1 -0
  664. package/dist/validate/prompts/modules/common.d.ts +11 -0
  665. package/dist/validate/prompts/modules/common.d.ts.map +1 -0
  666. package/dist/validate/prompts/modules/common.js +186 -0
  667. package/dist/validate/prompts/modules/common.js.map +1 -0
  668. package/dist/validate/prompts/modules/index.d.ts +54 -0
  669. package/dist/validate/prompts/modules/index.d.ts.map +1 -0
  670. package/dist/validate/prompts/modules/index.js +186 -0
  671. package/dist/validate/prompts/modules/index.js.map +1 -0
  672. package/dist/validate/prompts/modules/owasp-classic.d.ts +8 -0
  673. package/dist/validate/prompts/modules/owasp-classic.d.ts.map +1 -0
  674. package/dist/validate/prompts/modules/owasp-classic.js +84 -0
  675. package/dist/validate/prompts/modules/owasp-classic.js.map +1 -0
  676. package/dist/validate/prompts/modules/secrets-crypto.d.ts +8 -0
  677. package/dist/validate/prompts/modules/secrets-crypto.d.ts.map +1 -0
  678. package/dist/validate/prompts/modules/secrets-crypto.js +68 -0
  679. package/dist/validate/prompts/modules/secrets-crypto.js.map +1 -0
  680. package/dist/validate/prompts/modules/xss-prompt.d.ts +8 -0
  681. package/dist/validate/prompts/modules/xss-prompt.d.ts.map +1 -0
  682. package/dist/validate/prompts/modules/xss-prompt.js +22 -0
  683. package/dist/validate/prompts/modules/xss-prompt.js.map +1 -0
  684. package/dist/validate/prompts/semantic-analysis.d.ts +15 -0
  685. package/dist/validate/prompts/semantic-analysis.d.ts.map +1 -0
  686. package/dist/validate/prompts/semantic-analysis.js +169 -0
  687. package/dist/validate/prompts/semantic-analysis.js.map +1 -0
  688. package/dist/validate/prompts/validation.d.ts +18 -0
  689. package/dist/validate/prompts/validation.d.ts.map +1 -0
  690. package/dist/validate/prompts/validation.js +25 -0
  691. package/dist/validate/prompts/validation.js.map +1 -0
  692. package/dist/validate/providers/anthropic.d.ts +17 -0
  693. package/dist/validate/providers/anthropic.d.ts.map +1 -0
  694. package/dist/validate/providers/anthropic.js +260 -0
  695. package/dist/validate/providers/anthropic.js.map +1 -0
  696. package/dist/validate/providers/index.d.ts +8 -0
  697. package/dist/validate/providers/index.d.ts.map +1 -0
  698. package/dist/validate/providers/index.js +13 -0
  699. package/dist/validate/providers/index.js.map +1 -0
  700. package/dist/validate/providers/openai.d.ts +14 -0
  701. package/dist/validate/providers/openai.d.ts.map +1 -0
  702. package/dist/validate/providers/openai.js +336 -0
  703. package/dist/validate/providers/openai.js.map +1 -0
  704. package/dist/validate/request-builder.d.ts +61 -0
  705. package/dist/validate/request-builder.d.ts.map +1 -0
  706. package/dist/validate/request-builder.js +346 -0
  707. package/dist/validate/request-builder.js.map +1 -0
  708. package/dist/validate/types.d.ts +88 -0
  709. package/dist/validate/types.d.ts.map +1 -0
  710. package/dist/validate/types.js +38 -0
  711. package/dist/validate/types.js.map +1 -0
  712. package/dist/validate/utils/context-extractor.d.ts +55 -0
  713. package/dist/validate/utils/context-extractor.d.ts.map +1 -0
  714. package/dist/validate/utils/context-extractor.js +161 -0
  715. package/dist/validate/utils/context-extractor.js.map +1 -0
  716. package/dist/validate/utils/index.d.ts +11 -0
  717. package/dist/validate/utils/index.d.ts.map +1 -0
  718. package/dist/validate/utils/index.js +27 -0
  719. package/dist/validate/utils/index.js.map +1 -0
  720. package/dist/validate/utils/path-helpers.d.ts +21 -0
  721. package/dist/validate/utils/path-helpers.d.ts.map +1 -0
  722. package/dist/validate/utils/path-helpers.js +69 -0
  723. package/dist/validate/utils/path-helpers.js.map +1 -0
  724. package/dist/validate/utils/response-parser.d.ts +40 -0
  725. package/dist/validate/utils/response-parser.d.ts.map +1 -0
  726. package/dist/validate/utils/response-parser.js +286 -0
  727. package/dist/validate/utils/response-parser.js.map +1 -0
  728. package/dist/validate/utils/retry.d.ts +15 -0
  729. package/dist/validate/utils/retry.d.ts.map +1 -0
  730. package/dist/validate/utils/retry.js +62 -0
  731. package/dist/validate/utils/retry.js.map +1 -0
  732. package/package.json +8 -7
  733. package/src/__tests__/benchmark/fixtures/layer1/agent-skill-injection.ts +204 -0
  734. package/src/__tests__/benchmark/fixtures/layer1/index.ts +3 -0
  735. package/src/__tests__/benchmark/fixtures/layer2/index.ts +15 -0
  736. package/src/__tests__/benchmark/fixtures/layer2/log-injection.ts +147 -0
  737. package/src/__tests__/benchmark/fixtures/layer2/security-headers.ts +197 -0
  738. package/src/__tests__/benchmark/fixtures/layer2/ssrf-detection.ts +210 -0
  739. package/src/__tests__/benchmark/fixtures/layer2/xxe-detection.ts +195 -0
  740. package/src/__tests__/benchmark/run-depth-validation.ts +3 -3
  741. package/src/__tests__/benchmark/run-real-world-test.ts +4 -4
  742. package/src/__tests__/benchmark/types.ts +1 -1
  743. package/src/__tests__/benchmark/utils/test-runner.ts +3 -3
  744. package/src/__tests__/category-filter.test.ts +2 -2
  745. package/src/__tests__/context-engine/cross-file-taint.test.ts +284 -0
  746. package/src/__tests__/context-engine/framework-models.test.ts +457 -0
  747. package/src/__tests__/context-engine/function-classifier.test.ts +146 -0
  748. package/src/__tests__/context-engine/import-resolver.test.ts +328 -0
  749. package/src/__tests__/context-engine/integration.test.ts +320 -0
  750. package/src/__tests__/context-engine/module-graph.test.ts +159 -0
  751. package/src/__tests__/context-engine/route-discovery/auth-resolver.test.ts +353 -0
  752. package/src/__tests__/context-engine/route-discovery/express.test.ts +150 -0
  753. package/src/__tests__/context-engine/route-discovery/nextjs.test.ts +138 -0
  754. package/src/__tests__/context-engine/route-discovery/python.test.ts +95 -0
  755. package/src/__tests__/context-engine/sanitiser-detection.test.ts +187 -0
  756. package/src/__tests__/context-engine/sink-matcher.test.ts +251 -0
  757. package/src/__tests__/context-engine/source-discovery.test.ts +186 -0
  758. package/src/__tests__/context-engine/taint-tracker.test.ts +182 -0
  759. package/src/__tests__/regression/agent-skill-benign.test.ts +174 -0
  760. package/src/__tests__/regression/known-false-positives.test.ts +312 -4
  761. package/src/__tests__/score/adjustments.test.ts +385 -0
  762. package/src/__tests__/score/confidence.test.ts +283 -0
  763. package/src/__tests__/score/framework-scoring.test.ts +275 -0
  764. package/src/__tests__/score/route-scoring.test.ts +156 -0
  765. package/src/__tests__/score/scoring-integration.test.ts +165 -0
  766. package/src/__tests__/score/taint-adjustments.test.ts +244 -0
  767. package/src/__tests__/snapshots/__snapshots__/anthropic-validation-refactor.test.ts.snap +37 -49
  768. package/src/__tests__/snapshots/__snapshots__/dangerous-functions-refactor.test.ts.snap +52 -0
  769. package/src/__tests__/snapshots/__snapshots__/scan-depth.test.ts.snap +3 -3
  770. package/src/__tests__/snapshots/anthropic-validation-refactor.test.ts +2 -2
  771. package/src/__tests__/snapshots/dangerous-functions-refactor.test.ts +1 -1
  772. package/src/__tests__/snapshots/scan-depth.test.ts +3 -3
  773. package/src/__tests__/validate/route-annotations.test.ts +138 -0
  774. package/src/__tests__/validation/analyze-results.ts +1 -1
  775. package/src/__tests__/validation/extract-for-triage.ts +1 -1
  776. package/src/__tests__/validation/fp-deep-analysis.ts +1 -1
  777. package/src/{layer2/ai-agent-tools.ts → detect/ai-code/agent-tools.ts} +23 -3
  778. package/src/{layer2 → detect/ai-code}/byok-patterns.ts +17 -5
  779. package/src/{layer2/ai-endpoint-protection.ts → detect/ai-code/endpoint-protection.ts} +8 -4
  780. package/src/{layer2/ai-execution-sinks.ts → detect/ai-code/execution-sinks.ts} +8 -4
  781. package/src/{layer2/ai-fingerprinting.ts → detect/ai-code/fingerprinting.ts} +20 -4
  782. package/src/detect/ai-code/index.ts +11 -0
  783. package/src/{layer2/ai-mcp-security.ts → detect/ai-code/mcp-security.ts} +7 -3
  784. package/src/{layer2 → detect/ai-code}/model-supply-chain.ts +7 -3
  785. package/src/{layer2/ai-package-hallucination.ts → detect/ai-code/package-hallucination.ts} +18 -3
  786. package/src/{layer2/ai-prompt-hygiene.ts → detect/ai-code/prompt-hygiene.ts} +25 -3
  787. package/src/{layer2/ai-rag-safety.ts → detect/ai-code/rag-safety.ts} +7 -3
  788. package/src/{layer2/ai-schema-validation.ts → detect/ai-code/schema-validation.ts} +7 -3
  789. package/src/detect/config/agent-skill-injection.ts +551 -0
  790. package/src/{layer1 → detect/config}/comments.ts +6 -2
  791. package/src/{layer1 → detect/config}/file-flags.ts +9 -3
  792. package/src/detect/config/index.ts +6 -0
  793. package/src/{layer3 → detect/config}/osv-check.ts +3 -2
  794. package/src/{layer3 → detect/config}/package-check.ts +3 -2
  795. package/src/{layer1 → detect/config}/urls.ts +12 -5
  796. package/src/detect/index.ts +131 -0
  797. package/src/{layer1 → detect/secrets}/config-audit.ts +7 -2
  798. package/src/{layer1 → detect/secrets}/config-mcp-audit.ts +8 -3
  799. package/src/{layer1 → detect/secrets}/entropy.ts +23 -11
  800. package/src/{layer1 → detect/secrets}/index.ts +31 -30
  801. package/src/{layer1 → detect/secrets}/patterns.ts +10 -3
  802. package/src/{layer1 → detect/secrets}/weak-crypto.ts +7 -2
  803. package/src/{layer2/auth-antipatterns.ts → detect/structural/auth-patterns.ts} +23 -11
  804. package/src/{layer2 → detect/structural}/dangerous-functions/dom-xss.ts +1 -1
  805. package/src/{layer2 → detect/structural}/dangerous-functions/index.ts +47 -24
  806. package/src/{layer2 → detect/structural}/dangerous-functions/json-parse.ts +10 -2
  807. package/src/{layer2 → detect/structural}/dangerous-functions/math-random.ts +2 -2
  808. package/src/{layer2 → detect/structural}/dangerous-functions/patterns.ts +1 -1
  809. package/src/{layer2 → detect/structural}/dangerous-functions/request-validation.ts +10 -2
  810. package/src/{layer2 → detect/structural}/dangerous-functions/utils/control-flow.ts +2 -2
  811. package/src/{layer2 → detect/structural}/data-exposure.ts +11 -3
  812. package/src/{layer2 → detect/structural}/framework-checks.ts +10 -11
  813. package/src/{layer2 → detect/structural}/index.ts +80 -77
  814. package/src/detect/structural/log-injection.ts +254 -0
  815. package/src/{layer2 → detect/structural}/logic-gates.ts +13 -5
  816. package/src/{layer2 → detect/structural}/risky-imports.ts +7 -3
  817. package/src/detect/structural/security-headers.ts +231 -0
  818. package/src/detect/structural/ssrf-detection.ts +300 -0
  819. package/src/{layer2 → detect/structural}/variables.ts +7 -3
  820. package/src/detect/structural/xxe-detection.ts +295 -0
  821. package/src/index.ts +39 -1291
  822. package/src/{utils → model}/auth-helper-detector.ts +1 -1
  823. package/src/model/cross-file-taint.ts +374 -0
  824. package/src/model/framework-models/django.ts +82 -0
  825. package/src/model/framework-models/express.ts +54 -0
  826. package/src/model/framework-models/index.ts +116 -0
  827. package/src/model/framework-models/nextjs.ts +69 -0
  828. package/src/model/framework-models/prisma.ts +57 -0
  829. package/src/model/framework-models/react.ts +63 -0
  830. package/src/model/framework-models/sequelize.ts +63 -0
  831. package/src/model/framework-models/types.ts +46 -0
  832. package/src/model/function-classifier.ts +184 -0
  833. package/src/model/import-resolver.ts +453 -0
  834. package/src/{utils → model}/imported-auth-detector.ts +21 -85
  835. package/src/model/index.ts +353 -0
  836. package/src/{utils → model}/middleware-detector.ts +156 -17
  837. package/src/model/module-graph.ts +254 -0
  838. package/src/{utils → model}/oauth-flow-detector.ts +1 -1
  839. package/src/{utils/project-context-builder.ts → model/project-context.ts} +1 -1
  840. package/src/model/route-auth-resolver.ts +216 -0
  841. package/src/model/route-discovery/express.ts +251 -0
  842. package/src/model/route-discovery/index.ts +83 -0
  843. package/src/model/route-discovery/nextjs.ts +216 -0
  844. package/src/model/route-discovery/python.ts +214 -0
  845. package/src/model/route-discovery/types.ts +48 -0
  846. package/src/model/route-discovery/utils.ts +54 -0
  847. package/src/model/sanitiser-detection.ts +268 -0
  848. package/src/model/sink-matcher.ts +178 -0
  849. package/src/model/sink-patterns.ts +109 -0
  850. package/src/model/source-discovery.ts +209 -0
  851. package/src/model/taint-tracker.ts +333 -0
  852. package/src/model/taint-types.ts +149 -0
  853. package/src/{utils → model}/trpc-analyzer.ts +1 -1
  854. package/src/{utils/context-helpers.ts → parse/file-classifier.ts} +54 -0
  855. package/src/{utils → parse}/path-exclusions.ts +1 -1
  856. package/src/pipeline/config.ts +81 -0
  857. package/src/pipeline/index.ts +437 -0
  858. package/src/{modes → pipeline/modes}/incremental.ts +5 -5
  859. package/src/postprocess/aggregation.ts +74 -0
  860. package/src/postprocess/contradictions.ts +128 -0
  861. package/src/postprocess/dedup.ts +62 -0
  862. package/src/{filtering → postprocess/filtering}/__tests__/pipeline.test.ts +1 -1
  863. package/src/{filtering → postprocess/filtering}/context-adjustments.ts +2 -2
  864. package/src/{filtering → postprocess/filtering}/pipeline.ts +2 -2
  865. package/src/postprocess/index.ts +118 -0
  866. package/src/{suppression → postprocess/suppression}/config-loader.ts +1 -1
  867. package/src/{suppression → postprocess/suppression}/hash.ts +1 -1
  868. package/src/{suppression → postprocess/suppression}/inline-parser.ts +1 -1
  869. package/src/{suppression → postprocess/suppression}/manager.ts +1 -1
  870. package/src/{suppression → postprocess/suppression}/types.ts +2 -2
  871. package/src/postprocess/validation-cap.ts +66 -0
  872. package/src/report/build-result.ts +94 -0
  873. package/src/report/enrichment.ts +52 -0
  874. package/src/{formatters → report/formatters}/ai-context.ts +1 -1
  875. package/src/{formatters → report/formatters}/cli-terminal.ts +11 -11
  876. package/src/{formatters → report/formatters}/github-comment.ts +1 -1
  877. package/src/{formatters → report/formatters}/grouping.ts +8 -8
  878. package/src/{formatters → report/formatters}/ide/claude-code.ts +1 -1
  879. package/src/{formatters → report/formatters}/ide/cursor.ts +1 -1
  880. package/src/{formatters → report/formatters}/ide/windsurf.ts +1 -1
  881. package/src/{formatters → report/formatters}/vscode-diagnostic.ts +1 -1
  882. package/src/report/summary.ts +70 -0
  883. package/src/score/adjustments.ts +387 -0
  884. package/src/{layer3/anthropic → score}/auto-dismiss.ts +15 -14
  885. package/src/score/confidence.ts +66 -0
  886. package/src/score/index.ts +316 -0
  887. package/src/score/types.ts +187 -0
  888. package/src/{baseline → shared/baseline}/__tests__/diff.test.ts +2 -2
  889. package/src/{baseline → shared/baseline}/diff.ts +1 -1
  890. package/src/{baseline → shared/baseline}/manager.ts +1 -1
  891. package/src/{category-filter.ts → shared/category-filter.ts} +1 -1
  892. package/src/{utils → shared}/code-analysis.ts +1 -1
  893. package/src/{rules → shared/rules}/__tests__/metadata.test.ts +7 -0
  894. package/src/{rules → shared/rules}/framework-fixes.ts +1 -1
  895. package/src/{rules → shared/rules}/metadata.ts +94 -0
  896. package/src/{types.ts → shared/types.ts} +22 -5
  897. package/src/tiers.ts +18 -1
  898. package/src/validate/__tests__/context-extractor.test.ts +191 -0
  899. package/src/validate/__tests__/prompt-assembly.test.ts +233 -0
  900. package/src/validate/__tests__/request-builder.test.ts +347 -0
  901. package/src/{layer3/anthropic → validate}/index.ts +8 -7
  902. package/src/{layer3/anthropic → validate}/prompts/index.ts +2 -0
  903. package/src/validate/prompts/modules/ai-patterns.ts +153 -0
  904. package/src/validate/prompts/modules/auth-access.ts +22 -0
  905. package/src/validate/prompts/modules/common.ts +183 -0
  906. package/src/validate/prompts/modules/index.ts +204 -0
  907. package/src/validate/prompts/modules/owasp-classic.ts +81 -0
  908. package/src/validate/prompts/modules/secrets-crypto.ts +65 -0
  909. package/src/validate/prompts/modules/xss-prompt.ts +19 -0
  910. package/src/validate/prompts/validation.ts +20 -0
  911. package/src/{layer3/anthropic → validate}/providers/anthropic.ts +28 -27
  912. package/src/validate/providers/index.ts +8 -0
  913. package/src/{layer3/anthropic → validate}/providers/openai.ts +30 -25
  914. package/src/validate/request-builder.ts +448 -0
  915. package/src/{layer3/anthropic → validate}/types.ts +1 -1
  916. package/src/validate/utils/context-extractor.ts +220 -0
  917. package/src/{layer3/anthropic → validate}/utils/index.ts +10 -0
  918. package/src/{layer3/anthropic → validate}/utils/response-parser.ts +2 -1
  919. package/src/layer3/anthropic/prompts/validation.ts +0 -419
  920. package/src/layer3/anthropic/providers/index.ts +0 -8
  921. package/src/layer3/anthropic/request-builder.ts +0 -150
  922. package/src/layer3/index.ts +0 -168
  923. /package/src/{layer3 → detect/config}/__tests__/osv-check.test.ts +0 -0
  924. /package/src/{layer2 → detect/structural}/__tests__/math-random-enhanced.test.ts +0 -0
  925. /package/src/{layer2 → detect/structural}/dangerous-functions/child-process.ts +0 -0
  926. /package/src/{layer2 → detect/structural}/dangerous-functions/utils/helpers.ts +0 -0
  927. /package/src/{layer2 → detect/structural}/dangerous-functions/utils/index.ts +0 -0
  928. /package/src/{layer2 → detect/structural}/dangerous-functions/utils/schema-validation.ts +0 -0
  929. /package/src/{utils → model}/route-hierarchy.ts +0 -0
  930. /package/src/{filtering → postprocess/filtering}/index.ts +0 -0
  931. /package/src/{suppression → postprocess/suppression}/__tests__/config-loader.test.ts +0 -0
  932. /package/src/{suppression → postprocess/suppression}/__tests__/hash.test.ts +0 -0
  933. /package/src/{suppression → postprocess/suppression}/__tests__/inline-parser.test.ts +0 -0
  934. /package/src/{suppression → postprocess/suppression}/__tests__/manager.test.ts +0 -0
  935. /package/src/{suppression → postprocess/suppression}/index.ts +0 -0
  936. /package/src/{formatters → report/formatters}/__tests__/ai-context.test.ts +0 -0
  937. /package/src/{formatters → report/formatters}/ide/__tests__/ide.test.ts +0 -0
  938. /package/src/{formatters → report/formatters}/ide/index.ts +0 -0
  939. /package/src/{formatters → report/formatters}/index.ts +0 -0
  940. /package/src/{utils → shared}/__tests__/code-analysis.test.ts +0 -0
  941. /package/src/{utils → shared}/__tests__/parsed-file.test.ts +0 -0
  942. /package/src/{ai-context → shared/ai-context}/__tests__/manager.test.ts +0 -0
  943. /package/src/{ai-context → shared/ai-context}/index.ts +0 -0
  944. /package/src/{ai-context → shared/ai-context}/manager.ts +0 -0
  945. /package/src/{baseline → shared/baseline}/__tests__/manager.test.ts +0 -0
  946. /package/src/{baseline → shared/baseline}/index.ts +0 -0
  947. /package/src/{baseline → shared/baseline}/types.ts +0 -0
  948. /package/src/{utils → shared}/comment-analyzer.ts +0 -0
  949. /package/src/{utils → shared}/diff-detector.ts +0 -0
  950. /package/src/{utils → shared}/diff-parser.ts +0 -0
  951. /package/src/{utils → shared}/environment-context.ts +0 -0
  952. /package/src/{utils → shared}/intent-detector.ts +0 -0
  953. /package/src/{utils → shared}/parsed-file.ts +0 -0
  954. /package/src/{utils → shared}/registry-clients.ts +0 -0
  955. /package/src/{rules → shared/rules}/__tests__/framework-fixes.test.ts +0 -0
  956. /package/src/{rules → shared/rules}/index.ts +0 -0
  957. /package/src/{utils → shared}/schema-semantics.ts +0 -0
  958. /package/src/{layer3/anthropic → validate}/clients.ts +0 -0
  959. /package/src/{layer3/anthropic → validate}/prompts/semantic-analysis.ts +0 -0
  960. /package/src/{layer3/anthropic → validate}/utils/path-helpers.ts +0 -0
  961. /package/src/{layer3/anthropic → validate}/utils/retry.ts +0 -0
@@ -0,0 +1,819 @@
1
+ "use strict";
2
+ /**
3
+ * Rule Metadata Registry
4
+ *
5
+ * Provides comprehensive metadata for all vulnerability categories including:
6
+ * - whyItMatters: Business impact explanation
7
+ * - fixSteps: Step-by-step remediation guidance
8
+ * - evidence: What triggers this finding
9
+ * - references: OWASP/CWE documentation links
10
+ *
11
+ * This metadata enables actionable output for every finding,
12
+ * regardless of whether AI validation is used.
13
+ */
14
+ Object.defineProperty(exports, "__esModule", { value: true });
15
+ exports.RULE_REGISTRY = void 0;
16
+ exports.getRuleMetadata = getRuleMetadata;
17
+ exports.getAllCategories = getAllCategories;
18
+ exports.hasMetadata = hasMetadata;
19
+ /**
20
+ * Comprehensive metadata registry for all vulnerability categories
21
+ */
22
+ exports.RULE_REGISTRY = {
23
+ // ==========================================================================
24
+ // Secrets & Credentials
25
+ // ==========================================================================
26
+ hardcoded_secret: {
27
+ name: 'Hardcoded Secret',
28
+ whyItMatters: 'Hardcoded secrets in source code can be extracted from version control history or compiled binaries, leading to unauthorized access to APIs, databases, or infrastructure.',
29
+ fixSteps: [
30
+ 'Remove the secret from source code immediately',
31
+ 'Rotate the compromised credential (generate a new one)',
32
+ 'Store the new secret in environment variables or a secrets manager',
33
+ 'Update your code to read from process.env or your secrets manager',
34
+ 'Verify the old secret is invalidated and not in git history',
35
+ ],
36
+ evidence: 'Detected a pattern matching known API key or credential formats',
37
+ references: [
38
+ 'https://owasp.org/www-community/vulnerabilities/Use_of_hard-coded_password',
39
+ 'https://cwe.mitre.org/data/definitions/798.html',
40
+ ],
41
+ },
42
+ high_entropy_string: {
43
+ name: 'High Entropy String',
44
+ whyItMatters: 'High-entropy strings often indicate secrets, API keys, or tokens that may be unintentionally exposed, potentially granting attackers access to protected resources.',
45
+ fixSteps: [
46
+ 'Verify whether this string is actually a secret or credential',
47
+ 'If it is a secret, move it to environment variables',
48
+ 'If it is a hash, constant, or non-sensitive data, consider adding an inline suppression comment',
49
+ 'Use a secrets manager for production deployments',
50
+ ],
51
+ evidence: 'String has high Shannon entropy (randomness) characteristic of secrets',
52
+ references: [
53
+ 'https://owasp.org/www-community/vulnerabilities/Use_of_hard-coded_password',
54
+ 'https://cwe.mitre.org/data/definitions/798.html',
55
+ ],
56
+ },
57
+ sensitive_variable: {
58
+ name: 'Sensitive Variable Name',
59
+ whyItMatters: 'Variables with names suggesting sensitive data (password, secret, key) may indicate hardcoded credentials or improper handling of sensitive information.',
60
+ fixSteps: [
61
+ 'Review whether this variable contains actual sensitive data',
62
+ 'If so, ensure the value comes from environment variables or a secrets manager',
63
+ 'Never log or expose this variable in error messages or responses',
64
+ 'Consider using more generic variable names if the data is not actually sensitive',
65
+ ],
66
+ evidence: 'Variable name matches sensitive patterns (password, secret, apiKey, etc.)',
67
+ references: [
68
+ 'https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/04-Authentication_Testing/04-Testing_for_Weak_Password_Policy',
69
+ ],
70
+ },
71
+ // ==========================================================================
72
+ // Injection Vulnerabilities
73
+ // ==========================================================================
74
+ sql_injection: {
75
+ name: 'SQL Injection',
76
+ whyItMatters: 'SQL injection allows attackers to read, modify, or delete database records, bypass authentication, and potentially execute commands on the database server.',
77
+ fixSteps: [
78
+ 'Replace string concatenation with parameterized queries or prepared statements',
79
+ 'Use your ORM\'s query builder instead of raw SQL',
80
+ 'Validate and sanitize all user inputs before use',
81
+ 'Apply the principle of least privilege to database accounts',
82
+ ],
83
+ evidence: 'User input is concatenated into SQL query strings',
84
+ references: [
85
+ 'https://owasp.org/www-community/attacks/SQL_Injection',
86
+ 'https://cwe.mitre.org/data/definitions/89.html',
87
+ ],
88
+ },
89
+ xss: {
90
+ name: 'Cross-Site Scripting (XSS)',
91
+ whyItMatters: 'XSS allows attackers to inject malicious scripts into web pages, stealing user sessions, credentials, or sensitive data displayed to victims.',
92
+ fixSteps: [
93
+ 'Escape all user input before rendering in HTML',
94
+ 'Use framework-provided sanitization (React JSX auto-escapes)',
95
+ 'Avoid innerHTML, document.write, or dangerouslySetInnerHTML with user data',
96
+ 'Implement Content Security Policy (CSP) headers',
97
+ ],
98
+ evidence: 'User input flows to DOM sinks without proper escaping',
99
+ references: [
100
+ 'https://owasp.org/www-community/attacks/xss/',
101
+ 'https://cwe.mitre.org/data/definitions/79.html',
102
+ ],
103
+ },
104
+ command_injection: {
105
+ name: 'Command Injection',
106
+ whyItMatters: 'Command injection allows attackers to execute arbitrary system commands, potentially taking full control of the server, accessing sensitive files, or pivoting to other systems.',
107
+ fixSteps: [
108
+ 'Avoid passing user input to shell commands entirely',
109
+ 'If shell commands are necessary, use parameterized execution (execFile, not exec)',
110
+ 'Validate and sanitize inputs against a strict allowlist',
111
+ 'Use language-native libraries instead of shell commands where possible',
112
+ ],
113
+ evidence: 'User input is passed to shell execution functions',
114
+ references: [
115
+ 'https://owasp.org/www-community/attacks/Command_Injection',
116
+ 'https://cwe.mitre.org/data/definitions/78.html',
117
+ ],
118
+ },
119
+ // ==========================================================================
120
+ // Authentication & Authorization
121
+ // ==========================================================================
122
+ missing_auth: {
123
+ name: 'Missing Authentication',
124
+ whyItMatters: 'Endpoints without authentication can be accessed by anyone, potentially exposing sensitive data or allowing unauthorized actions.',
125
+ fixSteps: [
126
+ 'Add authentication middleware to protect this route',
127
+ 'Verify user identity using session tokens, JWTs, or API keys',
128
+ 'Implement authorization checks to ensure users can only access their own data',
129
+ 'For public endpoints, document them explicitly and ensure they expose no sensitive data',
130
+ ],
131
+ evidence: 'Route handler lacks visible authentication checks',
132
+ references: [
133
+ 'https://owasp.org/API-Security/editions/2023/en/0xa2-broken-authentication/',
134
+ 'https://cwe.mitre.org/data/definitions/306.html',
135
+ ],
136
+ },
137
+ security_bypass: {
138
+ name: 'Security Bypass Logic',
139
+ whyItMatters: 'Security bypass patterns (like checking for admin in predictable ways) may allow attackers to circumvent access controls and gain unauthorized privileges.',
140
+ fixSteps: [
141
+ 'Review the authentication and authorization logic',
142
+ 'Ensure bypass conditions are intentional and documented',
143
+ 'Use proper role-based access control (RBAC) instead of flag-based checks',
144
+ 'Log all uses of bypass mechanisms for audit purposes',
145
+ ],
146
+ evidence: 'Code contains patterns that could bypass security checks',
147
+ references: [
148
+ 'https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/04-Authentication_Testing/',
149
+ 'https://cwe.mitre.org/data/definitions/284.html',
150
+ ],
151
+ },
152
+ // ==========================================================================
153
+ // Data Exposure
154
+ // ==========================================================================
155
+ data_exposure: {
156
+ name: 'Data Exposure',
157
+ whyItMatters: 'Exposing sensitive data in logs, error messages, or API responses can leak credentials, personal information, or system details to attackers.',
158
+ fixSteps: [
159
+ 'Review what data is being logged or returned in responses',
160
+ 'Remove sensitive fields before logging or sending to clients',
161
+ 'Use structured logging with field filtering for sensitive data',
162
+ 'Return generic error messages to users, log details server-side only',
163
+ ],
164
+ evidence: 'Sensitive data may be exposed in logs or responses',
165
+ references: [
166
+ 'https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/09-Testing_for_Weak_Cryptography/04-Testing_for_Weak_Encryption',
167
+ 'https://cwe.mitre.org/data/definitions/200.html',
168
+ ],
169
+ },
170
+ sensitive_url: {
171
+ name: 'Sensitive URL',
172
+ whyItMatters: 'Hardcoded URLs may expose internal services, development endpoints, or contain sensitive information that could be exploited by attackers.',
173
+ fixSteps: [
174
+ 'Move URLs to environment variables or configuration files',
175
+ 'Use different configurations for development and production',
176
+ 'Ensure internal service URLs are not exposed in client-side code',
177
+ 'Review whether the URL exposes sensitive paths or parameters',
178
+ ],
179
+ evidence: 'URL detected that may expose sensitive endpoints or internal services',
180
+ references: [
181
+ 'https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/02-Configuration_and_Deployment_Management_Testing/',
182
+ ],
183
+ },
184
+ // ==========================================================================
185
+ // Configuration & Infrastructure
186
+ // ==========================================================================
187
+ insecure_config: {
188
+ name: 'Insecure Configuration',
189
+ whyItMatters: 'Insecure configuration settings can disable security features, expose debug information, or weaken encryption, making the application vulnerable to attacks.',
190
+ fixSteps: [
191
+ 'Review the configuration value and understand its security implications',
192
+ 'Enable security features that are disabled (HTTPS, CORS restrictions, etc.)',
193
+ 'Use secure defaults and environment-specific configuration',
194
+ 'Audit all configuration changes for security impact',
195
+ ],
196
+ evidence: 'Configuration setting detected that weakens security posture',
197
+ references: [
198
+ 'https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/02-Configuration_and_Deployment_Management_Testing/',
199
+ 'https://cwe.mitre.org/data/definitions/16.html',
200
+ ],
201
+ },
202
+ cors_misconfiguration: {
203
+ name: 'CORS Misconfiguration',
204
+ whyItMatters: 'Overly permissive CORS settings (like origin: "*") can allow malicious websites to make authenticated requests to your API, potentially stealing user data.',
205
+ fixSteps: [
206
+ 'Replace wildcard origin ("*") with a specific list of allowed origins',
207
+ 'Validate the Origin header against your allowlist',
208
+ 'Disable credentials (cookies, auth headers) for cross-origin requests unless necessary',
209
+ 'Review which endpoints truly need CORS access',
210
+ ],
211
+ evidence: 'CORS configuration allows requests from any origin',
212
+ references: [
213
+ 'https://owasp.org/www-community/attacks/CORS_OriginHeaderScrutiny',
214
+ 'https://cwe.mitre.org/data/definitions/942.html',
215
+ ],
216
+ },
217
+ root_container: {
218
+ name: 'Container Running as Root',
219
+ whyItMatters: 'Containers running as root give attackers full privileges if compromised, allowing them to escape the container or access the host system.',
220
+ fixSteps: [
221
+ 'Add a USER directive to your Dockerfile to run as non-root',
222
+ 'Create a dedicated user for your application',
223
+ 'Ensure file permissions allow the non-root user to operate',
224
+ 'Use rootless container runtimes where possible',
225
+ ],
226
+ evidence: 'Dockerfile or container config runs processes as root user',
227
+ references: [
228
+ 'https://docs.docker.com/develop/develop-images/dockerfile_best-practices/#user',
229
+ 'https://cwe.mitre.org/data/definitions/250.html',
230
+ ],
231
+ },
232
+ // ==========================================================================
233
+ // Dangerous Functions & Patterns
234
+ // ==========================================================================
235
+ dangerous_function: {
236
+ name: 'Dangerous Function',
237
+ whyItMatters: 'Functions like eval(), innerHTML, or exec() can execute arbitrary code if passed untrusted input, leading to code injection or XSS attacks.',
238
+ fixSteps: [
239
+ 'Identify whether the input to this function is user-controlled',
240
+ 'Replace with safer alternatives (JSON.parse instead of eval, textContent instead of innerHTML)',
241
+ 'If the dangerous function is necessary, validate and sanitize all inputs',
242
+ 'Consider using a sandboxed execution environment for code evaluation',
243
+ ],
244
+ evidence: 'Use of function known to be dangerous when handling untrusted input',
245
+ references: [
246
+ 'https://owasp.org/www-community/attacks/Code_Injection',
247
+ 'https://cwe.mitre.org/data/definitions/95.html',
248
+ ],
249
+ },
250
+ weak_crypto: {
251
+ name: 'Weak Cryptography',
252
+ whyItMatters: 'Weak cryptographic algorithms (MD5, SHA1, DES) or insecure random number generation can be broken by attackers, compromising data confidentiality and integrity.',
253
+ fixSteps: [
254
+ 'Replace weak hash functions (MD5, SHA1) with SHA-256 or stronger',
255
+ 'Use crypto.randomBytes() or crypto.getRandomValues() for security-sensitive randomness',
256
+ 'Replace DES/3DES with AES-256-GCM for encryption',
257
+ 'Use established libraries for cryptographic operations',
258
+ ],
259
+ evidence: 'Use of cryptographic functions known to be weak or deprecated',
260
+ references: [
261
+ 'https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/09-Testing_for_Weak_Cryptography/',
262
+ 'https://cwe.mitre.org/data/definitions/327.html',
263
+ ],
264
+ },
265
+ dangerous_file: {
266
+ name: 'Dangerous File Operation',
267
+ whyItMatters: 'Unsafe file operations can lead to path traversal attacks, allowing attackers to read or write arbitrary files on the server.',
268
+ fixSteps: [
269
+ 'Validate and sanitize all file paths before use',
270
+ 'Use path.join() with a base directory to prevent traversal',
271
+ 'Implement an allowlist of permitted directories',
272
+ 'Set appropriate file permissions and chroot where possible',
273
+ ],
274
+ evidence: 'File operation may be vulnerable to path traversal',
275
+ references: [
276
+ 'https://owasp.org/www-community/attacks/Path_Traversal',
277
+ 'https://cwe.mitre.org/data/definitions/22.html',
278
+ ],
279
+ },
280
+ // ==========================================================================
281
+ // Supply Chain & Dependencies
282
+ // ==========================================================================
283
+ suspicious_package: {
284
+ name: 'Suspicious Package',
285
+ whyItMatters: 'Unknown or typosquatted packages may be malicious, potentially executing harmful code, stealing credentials, or compromising your build pipeline.',
286
+ fixSteps: [
287
+ 'Verify the package name is correct and matches the intended library',
288
+ 'Check the package on npm/PyPI for legitimacy (downloads, maintainers, repo)',
289
+ 'If suspicious, remove the dependency and find an alternative',
290
+ 'Use lockfiles and integrity checking to prevent supply chain attacks',
291
+ ],
292
+ evidence: 'Package may be typosquatted, AI-hallucinated, or otherwise suspicious',
293
+ references: [
294
+ 'https://owasp.org/www-project-dependency-check/',
295
+ 'https://cwe.mitre.org/data/definitions/829.html',
296
+ ],
297
+ },
298
+ // ==========================================================================
299
+ // AI-Specific Categories
300
+ // ==========================================================================
301
+ ai_pattern: {
302
+ name: 'AI-Generated Code Pattern',
303
+ whyItMatters: 'AI-generated code may contain subtle security issues, use deprecated patterns, or include placeholder code that should be reviewed before production use.',
304
+ fixSteps: [
305
+ 'Review this code section for security best practices',
306
+ 'Verify any hardcoded values are intentional',
307
+ 'Check for proper error handling and input validation',
308
+ 'Ensure the code follows your team\'s security standards',
309
+ ],
310
+ evidence: 'Code pattern suggests AI-generated content that may need review',
311
+ references: [
312
+ 'https://owasp.org/www-project-top-ten/',
313
+ ],
314
+ },
315
+ ai_prompt_injection: {
316
+ name: 'AI Prompt Injection',
317
+ whyItMatters: 'User input included in AI prompts without proper sanitization can manipulate the AI\'s behavior, potentially extracting sensitive data or performing unauthorized actions.',
318
+ fixSteps: [
319
+ 'Separate user input from system instructions using clear delimiters',
320
+ 'Use role-based prompting (system vs user messages) in your LLM API calls',
321
+ 'Validate and sanitize user inputs before including in prompts',
322
+ 'Implement output filtering to catch potential jailbreak attempts',
323
+ ],
324
+ evidence: 'User input flows directly into AI prompt without sanitization',
325
+ references: [
326
+ 'https://owasp.org/www-project-top-10-for-large-language-model-applications/',
327
+ 'https://genai.owasp.org/llmrisk/llm01-prompt-injection/',
328
+ ],
329
+ },
330
+ ai_unsafe_execution: {
331
+ name: 'AI Unsafe Execution',
332
+ whyItMatters: 'Executing AI-generated code or SQL without validation can lead to code injection, data manipulation, or system compromise.',
333
+ fixSteps: [
334
+ 'Never execute AI output directly without validation',
335
+ 'Use sandboxed environments (vm2, isolated-vm) for code execution',
336
+ 'Apply parameterized queries for any AI-generated SQL',
337
+ 'Implement strict output schema validation before use',
338
+ ],
339
+ evidence: 'AI-generated content flows to dangerous execution sinks',
340
+ references: [
341
+ 'https://owasp.org/www-project-top-10-for-large-language-model-applications/',
342
+ 'https://genai.owasp.org/llmrisk/llm02-insecure-output-handling/',
343
+ ],
344
+ },
345
+ ai_overpermissive_tool: {
346
+ name: 'AI Overpermissive Tool',
347
+ whyItMatters: 'AI agent tools with excessive permissions can be exploited through prompt injection to access sensitive data, execute commands, or bypass security controls.',
348
+ fixSteps: [
349
+ 'Apply principle of least privilege to all AI agent tools',
350
+ 'Implement user-scoped access controls in tool implementations',
351
+ 'Add allowlists for permitted operations (files, URLs, commands)',
352
+ 'Require explicit user confirmation for sensitive operations',
353
+ ],
354
+ evidence: 'AI agent tool has broad permissions without proper restrictions',
355
+ references: [
356
+ 'https://owasp.org/www-project-top-10-for-large-language-model-applications/',
357
+ 'https://genai.owasp.org/llmrisk/llm08-excessive-agency/',
358
+ ],
359
+ },
360
+ ai_rag_exfiltration: {
361
+ name: 'AI RAG Data Exfiltration',
362
+ whyItMatters: 'RAG systems without proper access controls can leak data across tenant boundaries or expose sensitive information in retrieved context.',
363
+ fixSteps: [
364
+ 'Add user/tenant filtering to all vector store queries',
365
+ 'Validate that retrieved documents belong to the requesting user',
366
+ 'Filter or redact sensitive fields before returning RAG results',
367
+ 'Implement RLS (Row Level Security) at the database level',
368
+ ],
369
+ evidence: 'RAG query lacks user/tenant scoping or exposes raw context',
370
+ references: [
371
+ 'https://owasp.org/www-project-top-10-for-large-language-model-applications/',
372
+ 'https://genai.owasp.org/llmrisk/llm06-sensitive-information-disclosure/',
373
+ ],
374
+ },
375
+ ai_endpoint_unprotected: {
376
+ name: 'AI Endpoint Unprotected',
377
+ whyItMatters: 'Unprotected AI endpoints can incur significant API costs from abuse and may allow attackers to extract system prompts or manipulate AI behavior.',
378
+ fixSteps: [
379
+ 'Add authentication middleware to protect AI endpoints',
380
+ 'Implement rate limiting to prevent abuse',
381
+ 'Consider usage quotas per user to control costs',
382
+ 'Log and monitor AI endpoint usage for anomalies',
383
+ ],
384
+ evidence: 'AI/LLM endpoint lacks authentication or rate limiting',
385
+ references: [
386
+ 'https://owasp.org/API-Security/editions/2023/en/0xa2-broken-authentication/',
387
+ 'https://genai.owasp.org/',
388
+ ],
389
+ },
390
+ ai_schema_mismatch: {
391
+ name: 'AI Schema Validation Missing',
392
+ whyItMatters: 'AI-generated structured output without schema validation may contain malformed data, unexpected types, or malicious payloads that cause application errors or security issues.',
393
+ fixSteps: [
394
+ 'Define a strict schema for expected AI output (using zod, joi, or ajv)',
395
+ 'Validate all AI responses against the schema before use',
396
+ 'Use OpenAI Structured Outputs or similar features where available',
397
+ 'Implement fallback handling for validation failures',
398
+ ],
399
+ evidence: 'AI output is parsed or used without schema validation',
400
+ references: [
401
+ 'https://owasp.org/www-project-top-10-for-large-language-model-applications/',
402
+ 'https://genai.owasp.org/llmrisk/llm02-insecure-output-handling/',
403
+ ],
404
+ },
405
+ // ==========================================================================
406
+ // AI Detection Roadmap Phase 1
407
+ // ==========================================================================
408
+ ai_package_hallucination: {
409
+ name: 'AI Package Hallucination',
410
+ whyItMatters: 'AI-generated code frequently references packages that don\'t exist (USENIX research shows ~20% hallucination rate). Attackers can register these fake package names and inject malicious code into your supply chain.',
411
+ fixSteps: [
412
+ 'Verify the package exists: run "npm view <package>" or check npmjs.com',
413
+ 'Search for the correct package name that provides the functionality you need',
414
+ 'Remove the hallucinated dependency from package.json',
415
+ 'Consider using AI coding assistants with package validation enabled',
416
+ ],
417
+ evidence: 'Package name matches known hallucination patterns or verified fake packages',
418
+ references: [
419
+ 'https://arxiv.org/abs/2406.10279',
420
+ 'https://owasp.org/www-project-dependency-check/',
421
+ 'https://cwe.mitre.org/data/definitions/829.html',
422
+ ],
423
+ },
424
+ ai_rag_corpus_poisoning: {
425
+ name: 'RAG Corpus Poisoning Risk',
426
+ whyItMatters: 'User-uploaded content directly embedded into RAG corpus without sanitization can inject malicious instructions, causing the AI to leak data, execute harmful actions, or provide manipulated responses.',
427
+ fixSteps: [
428
+ 'Sanitize and validate all user uploads before embedding',
429
+ 'Strip or escape instruction-like content from documents',
430
+ 'Implement content classification to detect prompt injection attempts',
431
+ 'Use separate corpus namespaces for different trust levels',
432
+ ],
433
+ evidence: 'User upload flows directly to embedding/indexing without sanitization',
434
+ references: [
435
+ 'https://owasp.org/www-project-top-10-for-large-language-model-applications/',
436
+ 'https://genai.owasp.org/llmrisk/llm03-training-data-poisoning/',
437
+ ],
438
+ },
439
+ ai_rag_pii_leakage: {
440
+ name: 'RAG PII Leakage',
441
+ whyItMatters: 'PII (Personally Identifiable Information) in RAG-indexed documents may be exposed in retrieval responses, violating privacy regulations and user trust.',
442
+ fixSteps: [
443
+ 'Scan documents for PII before embedding (names, emails, SSNs, etc.)',
444
+ 'Redact or mask PII in documents before indexing',
445
+ 'Filter PII fields from retrieval responses',
446
+ 'Implement access controls to restrict who can query which documents',
447
+ ],
448
+ evidence: 'PII fields detected in embedded documents or retrieval responses',
449
+ references: [
450
+ 'https://genai.owasp.org/llmrisk/llm06-sensitive-information-disclosure/',
451
+ 'https://owasp.org/www-community/vulnerabilities/Information_exposure_through_an_error_message',
452
+ ],
453
+ },
454
+ ai_mcp_tool_poisoning: {
455
+ name: 'MCP Tool Poisoning',
456
+ whyItMatters: 'MCP (Model Context Protocol) tools that return unvalidated external content can be exploited through indirect prompt injection, causing the AI to execute malicious instructions embedded in the content.',
457
+ fixSteps: [
458
+ 'Validate and sanitize all external content before returning in tool responses',
459
+ 'Strip instruction-like patterns from retrieved content',
460
+ 'Implement content classification to detect injection attempts',
461
+ 'Use structured output formats instead of free-form text where possible',
462
+ ],
463
+ evidence: 'MCP tool returns external content without validation or sanitization',
464
+ references: [
465
+ 'https://modelcontextprotocol.io/docs/concepts/tools',
466
+ 'https://genai.owasp.org/llmrisk/llm01-prompt-injection/',
467
+ 'https://invariantlabs.ai/blog/mcp-security-notification-tool-poisoning-attacks',
468
+ ],
469
+ },
470
+ ai_mcp_credential_issue: {
471
+ name: 'MCP Credential Exposure',
472
+ whyItMatters: 'MCP tools exposing credentials in parameters or responses can leak sensitive authentication tokens, API keys, or user credentials to the AI model or logs.',
473
+ fixSteps: [
474
+ 'Never pass credentials as tool parameters - use server-side auth',
475
+ 'Filter credentials from tool responses before returning to the model',
476
+ 'Use OAuth or session-based auth instead of passing tokens',
477
+ 'Audit MCP tool responses for credential patterns',
478
+ ],
479
+ evidence: 'MCP tool parameter or response contains credential patterns',
480
+ references: [
481
+ 'https://modelcontextprotocol.io/docs/concepts/tools',
482
+ 'https://cwe.mitre.org/data/definitions/522.html',
483
+ ],
484
+ },
485
+ ai_mcp_confused_deputy: {
486
+ name: 'MCP Confused Deputy',
487
+ whyItMatters: 'MCP tools performing operations without proper user context can be exploited to access other users\' data or perform unauthorized actions (confused deputy attack).',
488
+ fixSteps: [
489
+ 'Always pass and validate user context in tool implementations',
490
+ 'Implement proper authorization checks within tool handlers',
491
+ 'Use session-scoped credentials, not shared service accounts',
492
+ 'Log user context with all tool operations for audit trails',
493
+ ],
494
+ evidence: 'MCP tool performs data operations without user/tenant scoping',
495
+ references: [
496
+ 'https://modelcontextprotocol.io/docs/concepts/tools',
497
+ 'https://cwe.mitre.org/data/definitions/441.html',
498
+ 'https://genai.owasp.org/llmrisk/llm08-excessive-agency/',
499
+ ],
500
+ },
501
+ // ==========================================================================
502
+ // Phase 1 Enhancement Backlog
503
+ // ==========================================================================
504
+ ai_mcp_description_injection: {
505
+ name: 'MCP Tool Description Injection',
506
+ whyItMatters: 'Tool descriptions containing user input or prompt injection keywords can manipulate AI behavior, causing it to ignore instructions, bypass security controls, or execute unintended actions.',
507
+ fixSteps: [
508
+ 'Use static, hardcoded descriptions for all MCP tools',
509
+ 'Never interpolate user input into tool descriptions',
510
+ 'Avoid manipulation keywords (ignore, bypass, override) in descriptions',
511
+ 'Review and audit all tool metadata for injection vectors',
512
+ ],
513
+ evidence: 'MCP tool description contains dynamic content or injection keywords',
514
+ references: [
515
+ 'https://modelcontextprotocol.io/docs/concepts/tools',
516
+ 'https://genai.owasp.org/llmrisk/llm01-prompt-injection/',
517
+ 'https://arxiv.org/abs/2302.12173',
518
+ ],
519
+ },
520
+ ai_mcp_server_shadowing: {
521
+ name: 'MCP Server Shadowing Risk',
522
+ whyItMatters: 'MCP server configuration from untrusted sources can allow attackers to inject malicious servers that shadow legitimate tools, intercepting data or executing malicious actions.',
523
+ fixSteps: [
524
+ 'Define MCP servers in code, not from environment variables or user input',
525
+ 'Validate server URLs against an explicit allowlist',
526
+ 'Implement tool name conflict detection',
527
+ 'Use signed server manifests where supported',
528
+ ],
529
+ evidence: 'MCP server configuration loaded from user input or environment',
530
+ references: [
531
+ 'https://modelcontextprotocol.io/docs/concepts/transports',
532
+ 'https://cwe.mitre.org/data/definitions/441.html',
533
+ ],
534
+ },
535
+ ai_mcp_config_secrets: {
536
+ name: 'MCP Config Contains Secrets',
537
+ whyItMatters: 'Secrets hardcoded in MCP configuration files can be exposed through version control, logs, or file access, leading to unauthorized API access or credential theft.',
538
+ fixSteps: [
539
+ 'Move all secrets to environment variables',
540
+ 'Use a secrets manager for production deployments',
541
+ 'Reference secrets as ${ENV_VAR} in config files',
542
+ 'Ensure MCP config files are not committed to version control',
543
+ ],
544
+ evidence: 'API key, token, or secret found in MCP configuration file',
545
+ references: [
546
+ 'https://cwe.mitre.org/data/definitions/798.html',
547
+ 'https://owasp.org/www-community/vulnerabilities/Use_of_hard-coded_password',
548
+ ],
549
+ },
550
+ ai_mcp_config_permissions: {
551
+ name: 'MCP Overpermissive Config',
552
+ whyItMatters: 'Overly permissive MCP settings (disabled approval, wildcard permissions, infinite timeouts) reduce security controls and increase the blast radius of potential attacks.',
553
+ fixSteps: [
554
+ 'Enable tool approval for sensitive operations',
555
+ 'Explicitly list allowed tools instead of using wildcards',
556
+ 'Set reasonable timeouts for tool execution',
557
+ 'Enable TLS/HTTPS for all remote MCP servers',
558
+ ],
559
+ evidence: 'MCP configuration disables security features or uses overpermissive settings',
560
+ references: [
561
+ 'https://modelcontextprotocol.io/docs/concepts/tools',
562
+ 'https://cwe.mitre.org/data/definitions/732.html',
563
+ ],
564
+ },
565
+ ai_rag_query_injection: {
566
+ name: 'RAG Query Injection',
567
+ whyItMatters: 'User input flowing directly to RAG queries without validation can manipulate retrieval results, potentially surfacing unauthorized data or injecting adversarial instructions.',
568
+ fixSteps: [
569
+ 'Validate and sanitize user queries before retrieval',
570
+ 'Implement query length limits and content validation',
571
+ 'Use parameterized queries where supported',
572
+ 'Add rate limiting to prevent query abuse',
573
+ ],
574
+ evidence: 'User input flows to vector store query without validation',
575
+ references: [
576
+ 'https://genai.owasp.org/llmrisk/llm01-prompt-injection/',
577
+ 'https://owasp.org/www-project-top-10-for-large-language-model-applications/',
578
+ ],
579
+ },
580
+ ai_rag_embedding_poisoning: {
581
+ name: 'RAG Embedding Poisoning',
582
+ whyItMatters: 'User-controlled content embedded without validation can poison the vector corpus with adversarial documents designed to manipulate retrieval results or inject malicious instructions.',
583
+ fixSteps: [
584
+ 'Validate and sanitize user content before embedding',
585
+ 'Implement content classification to detect malicious documents',
586
+ 'Set similarity thresholds to filter low-relevance results',
587
+ 'Check for duplicate or near-duplicate documents before embedding',
588
+ ],
589
+ evidence: 'User content embedded without validation or similarity threshold missing',
590
+ references: [
591
+ 'https://genai.owasp.org/llmrisk/llm03-training-data-poisoning/',
592
+ 'https://arxiv.org/abs/2310.19156',
593
+ ],
594
+ },
595
+ ai_rag_chunk_injection: {
596
+ name: 'RAG Chunk Boundary Exploitation',
597
+ whyItMatters: 'Improper chunk handling can allow attackers to inject content that spans chunk boundaries, potentially manipulating context or injecting instructions that bypass per-chunk validation.',
598
+ fixSteps: [
599
+ 'Validate each chunk individually before embedding',
600
+ 'Use clear separators when joining retrieved chunks',
601
+ 'Generate chunk metadata server-side, not from user input',
602
+ 'Configure appropriate chunk sizes and overlap',
603
+ ],
604
+ evidence: 'User content chunked without validation or chunks joined without separators',
605
+ references: [
606
+ 'https://genai.owasp.org/llmrisk/llm01-prompt-injection/',
607
+ 'https://owasp.org/www-project-top-10-for-large-language-model-applications/',
608
+ ],
609
+ },
610
+ ai_package_typosquat: {
611
+ name: 'Package Typosquatting',
612
+ whyItMatters: 'Typosquatting attacks use package names similar to popular packages to trick developers into installing malicious code. These packages can steal credentials, inject backdoors, or exfiltrate data.',
613
+ fixSteps: [
614
+ 'Verify the package name is correct (check spelling against the popular package)',
615
+ 'Run "npm view <package>" to confirm the package exists and is legitimate',
616
+ 'Review the package\'s repository, maintainers, and recent activity',
617
+ 'Consider using lockfiles and integrity hashes to prevent substitution',
618
+ ],
619
+ evidence: 'Package name is very similar to a popular package (possible typosquat)',
620
+ references: [
621
+ 'https://snyk.io/blog/typosquatting-attacks/',
622
+ 'https://cwe.mitre.org/data/definitions/829.html',
623
+ 'https://owasp.org/www-project-dependency-check/',
624
+ ],
625
+ },
626
+ ai_package_malicious: {
627
+ name: 'Malicious Package',
628
+ whyItMatters: 'This package has been flagged as malicious by security advisories. It may contain malware, data exfiltration code, or other harmful functionality that could compromise your systems.',
629
+ fixSteps: [
630
+ 'Remove this package immediately from your dependencies',
631
+ 'Audit your codebase for any data the package may have accessed',
632
+ 'Check for unexpected network connections or file access',
633
+ 'Rotate any credentials that may have been exposed',
634
+ 'Report the incident to your security team',
635
+ ],
636
+ evidence: 'Package flagged as malicious in OSV.dev or security advisories',
637
+ references: [
638
+ 'https://osv.dev/',
639
+ 'https://socket.dev/blog/npm-malware',
640
+ 'https://cwe.mitre.org/data/definitions/506.html',
641
+ ],
642
+ },
643
+ // ==========================================================================
644
+ // AI Detection Roadmap Phase 2
645
+ // ==========================================================================
646
+ ai_unsafe_model_load: {
647
+ name: 'Unsafe Model Loading',
648
+ whyItMatters: 'Loading ML models with pickle, joblib, or torch.load enables arbitrary code execution. Attackers can embed malicious code in model files that runs when the model is loaded, compromising your entire system.',
649
+ fixSteps: [
650
+ 'Use weights_only=True for torch.load() to load only tensors',
651
+ 'Use safe_mode=True for TensorFlow/Keras model loading',
652
+ 'Prefer SafeTensors format over pickle-based formats',
653
+ 'Download models only from trusted sources (official repos)',
654
+ 'Verify model checksums/hashes before loading',
655
+ ],
656
+ evidence: 'Detected pickle.load, joblib.load, or torch.load without safe mode',
657
+ references: [
658
+ 'https://genai.owasp.org/llmrisk/llm05-supply-chain-vulnerabilities/',
659
+ 'https://cwe.mitre.org/data/definitions/502.html',
660
+ 'https://huggingface.co/docs/safetensors/index',
661
+ ],
662
+ },
663
+ ai_unverified_model: {
664
+ name: 'Unverified Model Source',
665
+ whyItMatters: 'Loading ML models without integrity verification allows attackers to serve poisoned models via man-in-the-middle attacks or compromised registries. Malicious models can produce harmful outputs or contain backdoors.',
666
+ fixSteps: [
667
+ 'Download models from official sources (Hugging Face Hub, official repos)',
668
+ 'Verify model checksums/hashes against published values',
669
+ 'Use model signing and verification where available',
670
+ 'Pin specific model revisions instead of latest',
671
+ 'Avoid trust_remote_code=True unless absolutely necessary',
672
+ ],
673
+ evidence: 'Model loaded from untrusted source or without integrity verification',
674
+ references: [
675
+ 'https://genai.owasp.org/llmrisk/llm05-supply-chain-vulnerabilities/',
676
+ 'https://cwe.mitre.org/data/definitions/494.html',
677
+ 'https://cwe.mitre.org/data/definitions/829.html',
678
+ ],
679
+ },
680
+ ai_unsafe_finetuning: {
681
+ name: 'Unsafe Fine-tuning Data',
682
+ whyItMatters: 'Training or fine-tuning models on unvalidated user data enables data poisoning attacks. Attackers can inject malicious examples that cause the model to learn harmful behaviors, bypass safety measures, or leak sensitive information.',
683
+ fixSteps: [
684
+ 'Validate and sanitize all training data before use',
685
+ 'Implement content moderation for user-contributed training data',
686
+ 'Use data versioning and auditing for training datasets',
687
+ 'Monitor model behavior for signs of poisoning',
688
+ 'Separate user data from trusted training sources',
689
+ ],
690
+ evidence: 'Training/fine-tuning on user uploads or unvalidated data sources',
691
+ references: [
692
+ 'https://genai.owasp.org/llmrisk/llm03-training-data-poisoning/',
693
+ 'https://cwe.mitre.org/data/definitions/20.html',
694
+ 'https://atlas.mitre.org/techniques/AML.T0020',
695
+ ],
696
+ },
697
+ ai_excessive_agency: {
698
+ name: 'Excessive Agent Autonomy',
699
+ whyItMatters: 'AI agents with unbounded execution (no iteration limits, timeouts, or human oversight) can run indefinitely, consume excessive resources, or take harmful actions without human review. This is especially dangerous when combined with code execution or external tool access.',
700
+ fixSteps: [
701
+ 'Set explicit maxIterations limits (e.g., maxIterations: 10)',
702
+ 'Configure reasonable timeouts for agent execution',
703
+ 'Enable human-in-the-loop for destructive operations',
704
+ 'Implement cost/budget limits for API usage',
705
+ 'Use Docker containers for code execution (never bare metal)',
706
+ ],
707
+ evidence: 'Agent configuration with unbounded loops, no timeout, or disabled human oversight',
708
+ references: [
709
+ 'https://genai.owasp.org/llmrisk/llm08-excessive-agency/',
710
+ 'https://cwe.mitre.org/data/definitions/250.html',
711
+ 'https://docs.crewai.com/concepts/security',
712
+ ],
713
+ },
714
+ // ==========================================================================
715
+ // OWASP Workstream 1: Classic Vulnerability Detectors
716
+ // ==========================================================================
717
+ missing_security_headers: {
718
+ name: 'Missing Security Headers',
719
+ whyItMatters: 'Missing HTTP security headers (CSP, HSTS, X-Frame-Options) leave the application vulnerable to clickjacking, MIME sniffing, XSS, and man-in-the-middle attacks.',
720
+ fixSteps: [
721
+ 'Add helmet middleware for Express apps: app.use(helmet())',
722
+ 'Configure Content-Security-Policy to restrict resource loading',
723
+ 'Enable HSTS (Strict-Transport-Security) for HTTPS enforcement',
724
+ 'Set X-Frame-Options to prevent clickjacking',
725
+ 'Add X-Content-Type-Options: nosniff to prevent MIME sniffing',
726
+ ],
727
+ evidence: 'Server configuration missing critical HTTP security headers',
728
+ references: [
729
+ 'https://owasp.org/www-project-secure-headers/',
730
+ 'https://cwe.mitre.org/data/definitions/693.html',
731
+ ],
732
+ },
733
+ ssrf: {
734
+ name: 'Server-Side Request Forgery (SSRF)',
735
+ whyItMatters: 'SSRF allows attackers to make the server send requests to unintended locations, potentially accessing internal services, cloud metadata endpoints, or performing port scanning from within the network.',
736
+ fixSteps: [
737
+ 'Validate and sanitize all user-supplied URLs before making server-side requests',
738
+ 'Implement an allowlist of permitted domains or IP ranges',
739
+ 'Block requests to private IP ranges (127.0.0.1, 10.x, 192.168.x, 169.254.x)',
740
+ 'Use a URL parser to validate the scheme, host, and port',
741
+ 'Consider using a proxy service for user-supplied URLs',
742
+ ],
743
+ evidence: 'User-controlled input flows to server-side HTTP request without validation',
744
+ references: [
745
+ 'https://owasp.org/www-community/attacks/Server_Side_Request_Forgery',
746
+ 'https://cwe.mitre.org/data/definitions/918.html',
747
+ ],
748
+ },
749
+ log_injection: {
750
+ name: 'Log Injection',
751
+ whyItMatters: 'Unsanitized user input in log statements can forge log entries, inject CRLF sequences to create fake log lines, or exploit log processing tools via injection attacks.',
752
+ fixSteps: [
753
+ 'Sanitize user input before including in log messages (strip newlines, control characters)',
754
+ 'Use structured logging (JSON format) instead of string interpolation',
755
+ 'Parameterize log fields instead of concatenating user input',
756
+ 'Implement log output encoding appropriate to the log format',
757
+ ],
758
+ evidence: 'User-controlled request data flows directly into log statements',
759
+ references: [
760
+ 'https://owasp.org/www-community/attacks/Log_Injection',
761
+ 'https://cwe.mitre.org/data/definitions/117.html',
762
+ ],
763
+ },
764
+ xxe: {
765
+ name: 'XML External Entity (XXE) Injection',
766
+ whyItMatters: 'XXE vulnerabilities allow attackers to read server files, perform SSRF, execute denial-of-service attacks (billion laughs), and potentially achieve remote code execution through XML parsing.',
767
+ fixSteps: [
768
+ 'Disable external entity processing in your XML parser',
769
+ 'Use defusedxml (Python) instead of standard xml library',
770
+ 'Set factory.setFeature("http://apache.org/xml/features/disallow-doctype-decl", true) in Java',
771
+ 'Use JSON instead of XML where possible',
772
+ 'Upgrade XML parsing libraries to versions with secure defaults',
773
+ ],
774
+ evidence: 'XML parser used without disabling external entity processing',
775
+ references: [
776
+ 'https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing',
777
+ 'https://cwe.mitre.org/data/definitions/611.html',
778
+ ],
779
+ },
780
+ // ==========================================================================
781
+ // Agent Skill File Security
782
+ // ==========================================================================
783
+ ai_skill_injection: {
784
+ name: 'Agent Skill Injection',
785
+ whyItMatters: 'AI agent skill/configuration files define agent behavior. Prompt injection, data exfiltration commands, or hidden execution patterns in these files can compromise the agent, exfiltrate sensitive data, or execute arbitrary code on the host system.',
786
+ fixSteps: [
787
+ 'Review the skill file for any instructions that override safety guidelines',
788
+ 'Remove any shell commands that pipe remote content to execution (curl | sh)',
789
+ 'Remove any references to sensitive files or environment variables',
790
+ 'Check for hidden Unicode characters using a hex editor or unicode inspector',
791
+ 'Ensure tool descriptions do not contain injection language',
792
+ ],
793
+ evidence: 'Detected prompt injection, data exfiltration, or hidden execution pattern in agent skill file',
794
+ references: [
795
+ 'https://owasp.org/www-project-top-10-for-large-language-model-applications/',
796
+ 'https://cwe.mitre.org/data/definitions/77.html',
797
+ ],
798
+ },
799
+ };
800
+ /**
801
+ * Get metadata for a vulnerability category
802
+ * Returns undefined if category is not in registry (shouldn't happen for valid categories)
803
+ */
804
+ function getRuleMetadata(category) {
805
+ return exports.RULE_REGISTRY[category];
806
+ }
807
+ /**
808
+ * Get all available rule categories
809
+ */
810
+ function getAllCategories() {
811
+ return Object.keys(exports.RULE_REGISTRY);
812
+ }
813
+ /**
814
+ * Check if a category has metadata
815
+ */
816
+ function hasMetadata(category) {
817
+ return category in exports.RULE_REGISTRY;
818
+ }
819
+ //# sourceMappingURL=metadata.js.map