@push.rocks/smartmta 5.1.3 → 5.2.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (98) hide show
  1. package/changelog.md +15 -0
  2. package/dist_ts/00_commitinfo_data.d.ts +8 -0
  3. package/dist_ts/00_commitinfo_data.js +9 -0
  4. package/dist_ts/index.d.ts +3 -0
  5. package/dist_ts/index.js +4 -0
  6. package/dist_ts/logger.d.ts +17 -0
  7. package/dist_ts/logger.js +76 -0
  8. package/dist_ts/mail/core/classes.bouncemanager.d.ts +185 -0
  9. package/dist_ts/mail/core/classes.bouncemanager.js +569 -0
  10. package/dist_ts/mail/core/classes.email.d.ts +291 -0
  11. package/dist_ts/mail/core/classes.email.js +802 -0
  12. package/dist_ts/mail/core/classes.emailvalidator.d.ts +61 -0
  13. package/dist_ts/mail/core/classes.emailvalidator.js +184 -0
  14. package/dist_ts/mail/core/classes.templatemanager.d.ts +95 -0
  15. package/dist_ts/mail/core/classes.templatemanager.js +240 -0
  16. package/dist_ts/mail/core/index.d.ts +4 -0
  17. package/dist_ts/mail/core/index.js +6 -0
  18. package/dist_ts/mail/delivery/classes.delivery.queue.d.ts +163 -0
  19. package/dist_ts/mail/delivery/classes.delivery.queue.js +488 -0
  20. package/dist_ts/mail/delivery/classes.delivery.system.d.ts +160 -0
  21. package/dist_ts/mail/delivery/classes.delivery.system.js +630 -0
  22. package/dist_ts/mail/delivery/classes.unified.rate.limiter.d.ts +200 -0
  23. package/dist_ts/mail/delivery/classes.unified.rate.limiter.js +820 -0
  24. package/dist_ts/mail/delivery/index.d.ts +4 -0
  25. package/dist_ts/mail/delivery/index.js +6 -0
  26. package/dist_ts/mail/delivery/interfaces.d.ts +140 -0
  27. package/dist_ts/mail/delivery/interfaces.js +17 -0
  28. package/dist_ts/mail/index.d.ts +7 -0
  29. package/dist_ts/mail/index.js +12 -0
  30. package/dist_ts/mail/routing/classes.dkim.manager.d.ts +25 -0
  31. package/dist_ts/mail/routing/classes.dkim.manager.js +127 -0
  32. package/dist_ts/mail/routing/classes.dns.manager.d.ts +79 -0
  33. package/dist_ts/mail/routing/classes.dns.manager.js +415 -0
  34. package/dist_ts/mail/routing/classes.domain.registry.d.ts +54 -0
  35. package/dist_ts/mail/routing/classes.domain.registry.js +119 -0
  36. package/dist_ts/mail/routing/classes.email.action.executor.d.ts +33 -0
  37. package/dist_ts/mail/routing/classes.email.action.executor.js +137 -0
  38. package/dist_ts/mail/routing/classes.email.router.d.ts +171 -0
  39. package/dist_ts/mail/routing/classes.email.router.js +494 -0
  40. package/dist_ts/mail/routing/classes.unified.email.server.d.ts +241 -0
  41. package/dist_ts/mail/routing/classes.unified.email.server.js +935 -0
  42. package/dist_ts/mail/routing/index.d.ts +7 -0
  43. package/dist_ts/mail/routing/index.js +9 -0
  44. package/dist_ts/mail/routing/interfaces.d.ts +187 -0
  45. package/dist_ts/mail/routing/interfaces.js +2 -0
  46. package/dist_ts/mail/security/classes.dkimcreator.d.ts +72 -0
  47. package/dist_ts/mail/security/classes.dkimcreator.js +360 -0
  48. package/dist_ts/mail/security/classes.spfverifier.d.ts +62 -0
  49. package/dist_ts/mail/security/classes.spfverifier.js +87 -0
  50. package/dist_ts/mail/security/index.d.ts +2 -0
  51. package/dist_ts/mail/security/index.js +4 -0
  52. package/dist_ts/paths.d.ts +14 -0
  53. package/dist_ts/paths.js +39 -0
  54. package/dist_ts/plugins.d.ts +24 -0
  55. package/dist_ts/plugins.js +28 -0
  56. package/dist_ts/security/classes.contentscanner.d.ts +130 -0
  57. package/dist_ts/security/classes.contentscanner.js +338 -0
  58. package/dist_ts/security/classes.ipreputationchecker.d.ts +73 -0
  59. package/dist_ts/security/classes.ipreputationchecker.js +263 -0
  60. package/dist_ts/security/classes.rustsecuritybridge.d.ts +403 -0
  61. package/dist_ts/security/classes.rustsecuritybridge.js +502 -0
  62. package/dist_ts/security/classes.securitylogger.d.ts +140 -0
  63. package/dist_ts/security/classes.securitylogger.js +235 -0
  64. package/dist_ts/security/index.d.ts +4 -0
  65. package/dist_ts/security/index.js +5 -0
  66. package/package.json +6 -1
  67. package/ts/00_commitinfo_data.ts +8 -0
  68. package/ts/index.ts +3 -0
  69. package/ts/logger.ts +91 -0
  70. package/ts/mail/core/classes.bouncemanager.ts +731 -0
  71. package/ts/mail/core/classes.email.ts +942 -0
  72. package/ts/mail/core/classes.emailvalidator.ts +239 -0
  73. package/ts/mail/core/classes.templatemanager.ts +320 -0
  74. package/ts/mail/core/index.ts +5 -0
  75. package/ts/mail/delivery/classes.delivery.queue.ts +645 -0
  76. package/ts/mail/delivery/classes.delivery.system.ts +816 -0
  77. package/ts/mail/delivery/classes.unified.rate.limiter.ts +1053 -0
  78. package/ts/mail/delivery/index.ts +5 -0
  79. package/ts/mail/delivery/interfaces.ts +167 -0
  80. package/ts/mail/index.ts +17 -0
  81. package/ts/mail/routing/classes.dkim.manager.ts +157 -0
  82. package/ts/mail/routing/classes.dns.manager.ts +573 -0
  83. package/ts/mail/routing/classes.domain.registry.ts +139 -0
  84. package/ts/mail/routing/classes.email.action.executor.ts +175 -0
  85. package/ts/mail/routing/classes.email.router.ts +575 -0
  86. package/ts/mail/routing/classes.unified.email.server.ts +1207 -0
  87. package/ts/mail/routing/index.ts +9 -0
  88. package/ts/mail/routing/interfaces.ts +202 -0
  89. package/ts/mail/security/classes.dkimcreator.ts +447 -0
  90. package/ts/mail/security/classes.spfverifier.ts +126 -0
  91. package/ts/mail/security/index.ts +3 -0
  92. package/ts/paths.ts +48 -0
  93. package/ts/plugins.ts +53 -0
  94. package/ts/security/classes.contentscanner.ts +400 -0
  95. package/ts/security/classes.ipreputationchecker.ts +315 -0
  96. package/ts/security/classes.rustsecuritybridge.ts +964 -0
  97. package/ts/security/classes.securitylogger.ts +299 -0
  98. package/ts/security/index.ts +40 -0
@@ -0,0 +1,338 @@
1
+ import * as plugins from '../plugins.js';
2
+ import * as paths from '../paths.js';
3
+ import { logger } from '../logger.js';
4
+ import { Email } from '../mail/core/classes.email.js';
5
+ import { SecurityLogger, SecurityLogLevel, SecurityEventType } from './classes.securitylogger.js';
6
+ import { RustSecurityBridge } from './classes.rustsecuritybridge.js';
7
+ import { LRUCache } from 'lru-cache';
8
+ /**
9
+ * Threat categories
10
+ */
11
+ export var ThreatCategory;
12
+ (function (ThreatCategory) {
13
+ ThreatCategory["SPAM"] = "spam";
14
+ ThreatCategory["PHISHING"] = "phishing";
15
+ ThreatCategory["MALWARE"] = "malware";
16
+ ThreatCategory["EXECUTABLE"] = "executable";
17
+ ThreatCategory["SUSPICIOUS_LINK"] = "suspicious_link";
18
+ ThreatCategory["MALICIOUS_MACRO"] = "malicious_macro";
19
+ ThreatCategory["XSS"] = "xss";
20
+ ThreatCategory["SENSITIVE_DATA"] = "sensitive_data";
21
+ ThreatCategory["BLACKLISTED_CONTENT"] = "blacklisted_content";
22
+ ThreatCategory["CUSTOM_RULE"] = "custom_rule";
23
+ })(ThreatCategory || (ThreatCategory = {}));
24
+ /**
25
+ * Content Scanner for detecting malicious email content
26
+ */
27
+ export class ContentScanner {
28
+ static instance;
29
+ scanCache;
30
+ options;
31
+ /**
32
+ * Default options for the content scanner
33
+ */
34
+ static DEFAULT_OPTIONS = {
35
+ maxCacheSize: 10000,
36
+ cacheTTL: 24 * 60 * 60 * 1000, // 24 hours
37
+ scanSubject: true,
38
+ scanBody: true,
39
+ scanAttachments: true,
40
+ maxAttachmentSizeToScan: 10 * 1024 * 1024, // 10MB
41
+ scanAttachmentNames: true,
42
+ blockExecutables: true,
43
+ blockMacros: true,
44
+ customRules: [],
45
+ minThreatScore: 30, // Minimum score to consider content as a threat
46
+ highThreatScore: 70 // Score above which content is considered high threat
47
+ };
48
+ /**
49
+ * Constructor for the ContentScanner
50
+ * @param options Configuration options
51
+ */
52
+ constructor(options = {}) {
53
+ // Merge with default options
54
+ this.options = {
55
+ ...ContentScanner.DEFAULT_OPTIONS,
56
+ ...options
57
+ };
58
+ // Initialize cache
59
+ this.scanCache = new LRUCache({
60
+ max: this.options.maxCacheSize,
61
+ ttl: this.options.cacheTTL,
62
+ });
63
+ logger.log('info', 'ContentScanner initialized');
64
+ }
65
+ /**
66
+ * Get the singleton instance of the scanner
67
+ * @param options Configuration options
68
+ * @returns Singleton scanner instance
69
+ */
70
+ static getInstance(options = {}) {
71
+ if (!ContentScanner.instance) {
72
+ ContentScanner.instance = new ContentScanner(options);
73
+ }
74
+ return ContentScanner.instance;
75
+ }
76
+ /**
77
+ * Scan an email for malicious content.
78
+ * Delegates text/subject/html/filename pattern scanning to Rust.
79
+ * Binary attachment scanning (PE headers, VBA macros) stays in TS.
80
+ * @param email The email to scan
81
+ * @returns Scan result
82
+ */
83
+ async scanEmail(email) {
84
+ try {
85
+ // Generate a cache key from the email
86
+ const cacheKey = this.generateCacheKey(email);
87
+ // Check cache first
88
+ const cachedResult = this.scanCache.get(cacheKey);
89
+ if (cachedResult) {
90
+ logger.log('info', `Using cached scan result for email ${email.getMessageId()}`);
91
+ return cachedResult;
92
+ }
93
+ // Delegate text/subject/html/filename scanning to Rust
94
+ const bridge = RustSecurityBridge.getInstance();
95
+ const rustResult = await bridge.scanContent({
96
+ subject: this.options.scanSubject ? email.subject : undefined,
97
+ textBody: this.options.scanBody ? email.text : undefined,
98
+ htmlBody: this.options.scanBody ? email.html : undefined,
99
+ attachmentNames: this.options.scanAttachmentNames
100
+ ? email.attachments?.map(a => a.filename) ?? []
101
+ : [],
102
+ });
103
+ const result = {
104
+ isClean: true,
105
+ threatScore: rustResult.threatScore,
106
+ threatType: rustResult.threatType ?? undefined,
107
+ threatDetails: rustResult.threatDetails ?? undefined,
108
+ scannedElements: rustResult.scannedElements,
109
+ timestamp: Date.now(),
110
+ };
111
+ // Attachment binary scanning stays in TS (PE headers, macro detection)
112
+ if (this.options.scanAttachments && email.attachments?.length > 0) {
113
+ for (const attachment of email.attachments) {
114
+ this.scanAttachmentBinary(attachment, result);
115
+ }
116
+ }
117
+ // Apply custom rules (TS-only, runtime-configured)
118
+ this.applyCustomRules(email, result);
119
+ // Determine if the email is clean based on threat score
120
+ result.isClean = result.threatScore < this.options.minThreatScore;
121
+ // Save to cache
122
+ this.scanCache.set(cacheKey, result);
123
+ // Log high threat findings
124
+ if (result.threatScore >= this.options.highThreatScore) {
125
+ this.logHighThreatFound(email, result);
126
+ }
127
+ else if (!result.isClean) {
128
+ this.logThreatFound(email, result);
129
+ }
130
+ return result;
131
+ }
132
+ catch (error) {
133
+ logger.log('error', `Error scanning email: ${error.message}`, {
134
+ messageId: email.getMessageId(),
135
+ error: error.stack
136
+ });
137
+ // Return a safe default with error indication
138
+ return {
139
+ isClean: true,
140
+ threatScore: 0,
141
+ scannedElements: ['error'],
142
+ timestamp: Date.now(),
143
+ threatType: 'scan_error',
144
+ threatDetails: `Scan error: ${error.message}`
145
+ };
146
+ }
147
+ }
148
+ /**
149
+ * Generate a cache key from an email
150
+ * @param email The email to generate a key for
151
+ * @returns Cache key
152
+ */
153
+ generateCacheKey(email) {
154
+ // Use message ID if available
155
+ if (email.getMessageId()) {
156
+ return `email:${email.getMessageId()}`;
157
+ }
158
+ // Fallback to a hash of key content
159
+ const contentToHash = [
160
+ email.from,
161
+ email.subject || '',
162
+ email.text?.substring(0, 1000) || '',
163
+ email.html?.substring(0, 1000) || '',
164
+ email.attachments?.length || 0
165
+ ].join(':');
166
+ return `email:${plugins.crypto.createHash('sha256').update(contentToHash).digest('hex')}`;
167
+ }
168
+ /**
169
+ * Scan attachment binary content for PE headers and VBA macros.
170
+ * This stays in TS because it accesses raw Buffer data (too large for IPC).
171
+ * @param attachment The attachment to scan
172
+ * @param result The scan result to update
173
+ */
174
+ scanAttachmentBinary(attachment, result) {
175
+ if (!attachment.content) {
176
+ return;
177
+ }
178
+ // Skip large attachments
179
+ if (attachment.content.length > this.options.maxAttachmentSizeToScan) {
180
+ return;
181
+ }
182
+ const filename = attachment.filename.toLowerCase();
183
+ // Check for PE headers (Windows executables disguised with non-.exe extensions)
184
+ if (attachment.content.length > 64 &&
185
+ attachment.content[0] === 0x4D &&
186
+ attachment.content[1] === 0x5A) { // 'MZ' header
187
+ result.threatScore += 80;
188
+ result.threatType = ThreatCategory.EXECUTABLE;
189
+ result.threatDetails = `Attachment contains executable code: ${filename}`;
190
+ return;
191
+ }
192
+ // Check for VBA macro indicators in Office documents
193
+ if (this.options.blockMacros && this.likelyContainsMacros(attachment)) {
194
+ result.threatScore += 60;
195
+ result.threatType = ThreatCategory.MALICIOUS_MACRO;
196
+ result.threatDetails = `Attachment appears to contain macros: ${filename}`;
197
+ }
198
+ }
199
+ /**
200
+ * Apply custom rules (runtime-configured patterns) to the email.
201
+ * These stay in TS because they are configured at runtime.
202
+ * @param email The email to check
203
+ * @param result The scan result to update
204
+ */
205
+ applyCustomRules(email, result) {
206
+ if (!this.options.customRules.length) {
207
+ return;
208
+ }
209
+ const textsToCheck = [];
210
+ if (email.subject)
211
+ textsToCheck.push(email.subject);
212
+ if (email.text)
213
+ textsToCheck.push(email.text);
214
+ if (email.html)
215
+ textsToCheck.push(email.html);
216
+ for (const rule of this.options.customRules) {
217
+ const pattern = rule.pattern instanceof RegExp ? rule.pattern : new RegExp(rule.pattern, 'i');
218
+ for (const text of textsToCheck) {
219
+ if (pattern.test(text)) {
220
+ result.threatScore += rule.score;
221
+ result.threatType = rule.type;
222
+ result.threatDetails = rule.description;
223
+ return;
224
+ }
225
+ }
226
+ }
227
+ }
228
+ /**
229
+ * Extract text from a binary buffer for scanning
230
+ * @param buffer Binary content
231
+ * @returns Extracted text (may be partial)
232
+ */
233
+ extractTextFromBuffer(buffer) {
234
+ try {
235
+ // Limit the amount we convert to avoid memory issues
236
+ const sampleSize = Math.min(buffer.length, 100 * 1024); // 100KB max sample
237
+ const sample = buffer.slice(0, sampleSize);
238
+ // Try to convert to string, filtering out non-printable chars
239
+ return sample.toString('utf8')
240
+ .replace(/[\x00-\x09\x0B-\x1F\x7F-\x9F]/g, '') // Remove control chars
241
+ .replace(/\uFFFD/g, ''); // Remove replacement char
242
+ }
243
+ catch (error) {
244
+ logger.log('warn', `Error extracting text from buffer: ${error.message}`);
245
+ return '';
246
+ }
247
+ }
248
+ /**
249
+ * Check if an Office document likely contains macros
250
+ * @param attachment The attachment to check
251
+ * @returns Whether the file likely contains macros
252
+ */
253
+ likelyContainsMacros(attachment) {
254
+ const content = this.extractTextFromBuffer(attachment.content);
255
+ const macroIndicators = [
256
+ /vbaProject\.bin/i,
257
+ /Microsoft VBA/i,
258
+ /\bVBA\b/,
259
+ /Auto_Open/i,
260
+ /AutoExec/i,
261
+ /DocumentOpen/i,
262
+ /AutoOpen/i,
263
+ /\bExecute\(/i,
264
+ /\bShell\(/i,
265
+ /\bCreateObject\(/i
266
+ ];
267
+ for (const indicator of macroIndicators) {
268
+ if (indicator.test(content)) {
269
+ return true;
270
+ }
271
+ }
272
+ return false;
273
+ }
274
+ /**
275
+ * Log a high threat finding to the security logger
276
+ * @param email The email containing the threat
277
+ * @param result The scan result
278
+ */
279
+ logHighThreatFound(email, result) {
280
+ SecurityLogger.getInstance().logEvent({
281
+ level: SecurityLogLevel.ERROR,
282
+ type: SecurityEventType.MALWARE,
283
+ message: `High threat content detected in email from ${email.from} to ${email.to.join(', ')}`,
284
+ details: {
285
+ messageId: email.getMessageId(),
286
+ threatType: result.threatType,
287
+ threatDetails: result.threatDetails,
288
+ threatScore: result.threatScore,
289
+ scannedElements: result.scannedElements,
290
+ subject: email.subject
291
+ },
292
+ success: false,
293
+ domain: email.getFromDomain()
294
+ });
295
+ }
296
+ /**
297
+ * Log a threat finding to the security logger
298
+ * @param email The email containing the threat
299
+ * @param result The scan result
300
+ */
301
+ logThreatFound(email, result) {
302
+ SecurityLogger.getInstance().logEvent({
303
+ level: SecurityLogLevel.WARN,
304
+ type: SecurityEventType.SPAM,
305
+ message: `Suspicious content detected in email from ${email.from} to ${email.to.join(', ')}`,
306
+ details: {
307
+ messageId: email.getMessageId(),
308
+ threatType: result.threatType,
309
+ threatDetails: result.threatDetails,
310
+ threatScore: result.threatScore,
311
+ scannedElements: result.scannedElements,
312
+ subject: email.subject
313
+ },
314
+ success: false,
315
+ domain: email.getFromDomain()
316
+ });
317
+ }
318
+ /**
319
+ * Get threat level description based on score
320
+ * @param score Threat score
321
+ * @returns Threat level description
322
+ */
323
+ static getThreatLevel(score) {
324
+ if (score < 20) {
325
+ return 'none';
326
+ }
327
+ else if (score < 40) {
328
+ return 'low';
329
+ }
330
+ else if (score < 70) {
331
+ return 'medium';
332
+ }
333
+ else {
334
+ return 'high';
335
+ }
336
+ }
337
+ }
338
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"classes.contentscanner.js","sourceRoot":"","sources":["../../ts/security/classes.contentscanner.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,OAAO,MAAM,eAAe,CAAC;AACzC,OAAO,KAAK,KAAK,MAAM,aAAa,CAAC;AACrC,OAAO,EAAE,MAAM,EAAE,MAAM,cAAc,CAAC;AACtC,OAAO,EAAE,KAAK,EAAE,MAAM,+BAA+B,CAAC;AAEtD,OAAO,EAAE,cAAc,EAAE,gBAAgB,EAAE,iBAAiB,EAAE,MAAM,6BAA6B,CAAC;AAClG,OAAO,EAAE,kBAAkB,EAAE,MAAM,iCAAiC,CAAC;AACrE,OAAO,EAAE,QAAQ,EAAE,MAAM,WAAW,CAAC;AAqCrC;;GAEG;AACH,MAAM,CAAN,IAAY,cAWX;AAXD,WAAY,cAAc;IACxB,+BAAa,CAAA;IACb,uCAAqB,CAAA;IACrB,qCAAmB,CAAA;IACnB,2CAAyB,CAAA;IACzB,qDAAmC,CAAA;IACnC,qDAAmC,CAAA;IACnC,6BAAW,CAAA;IACX,mDAAiC,CAAA;IACjC,6DAA2C,CAAA;IAC3C,6CAA2B,CAAA;AAC7B,CAAC,EAXW,cAAc,KAAd,cAAc,QAWzB;AAED;;GAEG;AACH,MAAM,OAAO,cAAc;IACjB,MAAM,CAAC,QAAQ,CAAiB;IAChC,SAAS,CAAgC;IACzC,OAAO,CAAmC;IAElD;;OAEG;IACK,MAAM,CAAU,eAAe,GAAqC;QAC1E,YAAY,EAAE,KAAK;QACnB,QAAQ,EAAE,EAAE,GAAG,EAAE,GAAG,EAAE,GAAG,IAAI,EAAE,WAAW;QAC1C,WAAW,EAAE,IAAI;QACjB,QAAQ,EAAE,IAAI;QACd,eAAe,EAAE,IAAI;QACrB,uBAAuB,EAAE,EAAE,GAAG,IAAI,GAAG,IAAI,EAAE,OAAO;QAClD,mBAAmB,EAAE,IAAI;QACzB,gBAAgB,EAAE,IAAI;QACtB,WAAW,EAAE,IAAI;QACjB,WAAW,EAAE,EAAE;QACf,cAAc,EAAE,EAAE,EAAE,gDAAgD;QACpE,eAAe,EAAE,EAAE,CAAE,sDAAsD;KAC5E,CAAC;IAEF;;;OAGG;IACH,YAAY,UAAkC,EAAE;QAC9C,6BAA6B;QAC7B,IAAI,CAAC,OAAO,GAAG;YACb,GAAG,cAAc,CAAC,eAAe;YACjC,GAAG,OAAO;SACX,CAAC;QAEF,mBAAmB;QACnB,IAAI,CAAC,SAAS,GAAG,IAAI,QAAQ,CAAsB;YACjD,GAAG,EAAE,IAAI,CAAC,OAAO,CAAC,YAAY;YAC9B,GAAG,EAAE,IAAI,CAAC,OAAO,CAAC,QAAQ;SAC3B,CAAC,CAAC;QAEH,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,4BAA4B,CAAC,CAAC;IACnD,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,WAAW,CAAC,UAAkC,EAAE;QAC5D,IAAI,CAAC,cAAc,CAAC,QAAQ,EAAE,CAAC;YAC7B,cAAc,CAAC,QAAQ,GAAG,IAAI,cAAc,CAAC,OAAO,CAAC,CAAC;QACxD,CAAC;QACD,OAAO,cAAc,CAAC,QAAQ,CAAC;IACjC,CAAC;IAED;;;;;;OAMG;IACI,KAAK,CAAC,SAAS,CAAC,KAAY;QACjC,IAAI,CAAC;YACH,sCAAsC;YACtC,MAAM,QAAQ,GAAG,IAAI,CAAC,gBAAgB,CAAC,KAAK,CAAC,CAAC;YAE9C,oBAAoB;YACpB,MAAM,YAAY,GAAG,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,QAAQ,CAAC,CAAC;YAClD,IAAI,YAAY,EAAE,CAAC;gBACjB,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sCAAsC,KAAK,CAAC,YAAY,EAAE,EAAE,CAAC,CAAC;gBACjF,OAAO,YAAY,CAAC;YACtB,CAAC;YAED,uDAAuD;YACvD,MAAM,MAAM,GAAG,kBAAkB,CAAC,WAAW,EAAE,CAAC;YAChD,MAAM,UAAU,GAAG,MAAM,MAAM,CAAC,WAAW,CAAC;gBAC1C,OAAO,EAAE,IAAI,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS;gBAC7D,QAAQ,EAAE,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS;gBACxD,QAAQ,EAAE,IAAI,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS;gBACxD,eAAe,EAAE,IAAI,CAAC,OAAO,CAAC,mBAAmB;oBAC/C,CAAC,CAAC,KAAK,CAAC,WAAW,EAAE,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,CAAC,IAAI,EAAE;oBAC/C,CAAC,CAAC,EAAE;aACP,CAAC,CAAC;YAEH,MAAM,MAAM,GAAgB;gBAC1B,OAAO,EAAE,IAAI;gBACb,WAAW,EAAE,UAAU,CAAC,WAAW;gBACnC,UAAU,EAAE,UAAU,CAAC,UAAU,IAAI,SAAS;gBAC9C,aAAa,EAAE,UAAU,CAAC,aAAa,IAAI,SAAS;gBACpD,eAAe,EAAE,UAAU,CAAC,eAAe;gBAC3C,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;aACtB,CAAC;YAEF,uEAAuE;YACvE,IAAI,IAAI,CAAC,OAAO,CAAC,eAAe,IAAI,KAAK,CAAC,WAAW,EAAE,MAAM,GAAG,CAAC,EAAE,CAAC;gBAClE,KAAK,MAAM,UAAU,IAAI,KAAK,CAAC,WAAW,EAAE,CAAC;oBAC3C,IAAI,CAAC,oBAAoB,CAAC,UAAU,EAAE,MAAM,CAAC,CAAC;gBAChD,CAAC;YACH,CAAC;YAED,mDAAmD;YACnD,IAAI,CAAC,gBAAgB,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;YAErC,wDAAwD;YACxD,MAAM,CAAC,OAAO,GAAG,MAAM,CAAC,WAAW,GAAG,IAAI,CAAC,OAAO,CAAC,cAAc,CAAC;YAElE,gBAAgB;YAChB,IAAI,CAAC,SAAS,CAAC,GAAG,CAAC,QAAQ,EAAE,MAAM,CAAC,CAAC;YAErC,2BAA2B;YAC3B,IAAI,MAAM,CAAC,WAAW,IAAI,IAAI,CAAC,OAAO,CAAC,eAAe,EAAE,CAAC;gBACvD,IAAI,CAAC,kBAAkB,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;YACzC,CAAC;iBAAM,IAAI,CAAC,MAAM,CAAC,OAAO,EAAE,CAAC;gBAC3B,IAAI,CAAC,cAAc,CAAC,KAAK,EAAE,MAAM,CAAC,CAAC;YACrC,CAAC;YAED,OAAO,MAAM,CAAC;QAChB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,OAAO,EAAE,yBAAyB,KAAK,CAAC,OAAO,EAAE,EAAE;gBAC5D,SAAS,EAAE,KAAK,CAAC,YAAY,EAAE;gBAC/B,KAAK,EAAE,KAAK,CAAC,KAAK;aACnB,CAAC,CAAC;YAEH,8CAA8C;YAC9C,OAAO;gBACL,OAAO,EAAE,IAAI;gBACb,WAAW,EAAE,CAAC;gBACd,eAAe,EAAE,CAAC,OAAO,CAAC;gBAC1B,SAAS,EAAE,IAAI,CAAC,GAAG,EAAE;gBACrB,UAAU,EAAE,YAAY;gBACxB,aAAa,EAAE,eAAe,KAAK,CAAC,OAAO,EAAE;aAC9C,CAAC;QACJ,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,gBAAgB,CAAC,KAAY;QACnC,8BAA8B;QAC9B,IAAI,KAAK,CAAC,YAAY,EAAE,EAAE,CAAC;YACzB,OAAO,SAAS,KAAK,CAAC,YAAY,EAAE,EAAE,CAAC;QACzC,CAAC;QAED,oCAAoC;QACpC,MAAM,aAAa,GAAG;YACpB,KAAK,CAAC,IAAI;YACV,KAAK,CAAC,OAAO,IAAI,EAAE;YACnB,KAAK,CAAC,IAAI,EAAE,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,IAAI,EAAE;YACpC,KAAK,CAAC,IAAI,EAAE,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,IAAI,EAAE;YACpC,KAAK,CAAC,WAAW,EAAE,MAAM,IAAI,CAAC;SAC/B,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC;QAEZ,OAAO,SAAS,OAAO,CAAC,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC,MAAM,CAAC,aAAa,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC;IAC5F,CAAC;IAED;;;;;OAKG;IACK,oBAAoB,CAAC,UAAuB,EAAE,MAAmB;QACvE,IAAI,CAAC,UAAU,CAAC,OAAO,EAAE,CAAC;YACxB,OAAO;QACT,CAAC;QAED,yBAAyB;QACzB,IAAI,UAAU,CAAC,OAAO,CAAC,MAAM,GAAG,IAAI,CAAC,OAAO,CAAC,uBAAuB,EAAE,CAAC;YACrE,OAAO;QACT,CAAC;QAED,MAAM,QAAQ,GAAG,UAAU,CAAC,QAAQ,CAAC,WAAW,EAAE,CAAC;QAEnD,gFAAgF;QAChF,IAAI,UAAU,CAAC,OAAO,CAAC,MAAM,GAAG,EAAE;YAC9B,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,KAAK,IAAI;YAC9B,UAAU,CAAC,OAAO,CAAC,CAAC,CAAC,KAAK,IAAI,EAAE,CAAC,CAAC,cAAc;YAClD,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;YACzB,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,UAAU,CAAC;YAC9C,MAAM,CAAC,aAAa,GAAG,wCAAwC,QAAQ,EAAE,CAAC;YAC1E,OAAO;QACT,CAAC;QAED,qDAAqD;QACrD,IAAI,IAAI,CAAC,OAAO,CAAC,WAAW,IAAI,IAAI,CAAC,oBAAoB,CAAC,UAAU,CAAC,EAAE,CAAC;YACtE,MAAM,CAAC,WAAW,IAAI,EAAE,CAAC;YACzB,MAAM,CAAC,UAAU,GAAG,cAAc,CAAC,eAAe,CAAC;YACnD,MAAM,CAAC,aAAa,GAAG,yCAAyC,QAAQ,EAAE,CAAC;QAC7E,CAAC;IACH,CAAC;IAED;;;;;OAKG;IACK,gBAAgB,CAAC,KAAY,EAAE,MAAmB;QACxD,IAAI,CAAC,IAAI,CAAC,OAAO,CAAC,WAAW,CAAC,MAAM,EAAE,CAAC;YACrC,OAAO;QACT,CAAC;QAED,MAAM,YAAY,GAAa,EAAE,CAAC;QAClC,IAAI,KAAK,CAAC,OAAO;YAAE,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC;QACpD,IAAI,KAAK,CAAC,IAAI;YAAE,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QAC9C,IAAI,KAAK,CAAC,IAAI;YAAE,YAAY,CAAC,IAAI,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC;QAE9C,KAAK,MAAM,IAAI,IAAI,IAAI,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC;YAC5C,MAAM,OAAO,GAAG,IAAI,CAAC,OAAO,YAAY,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,MAAM,CAAC,IAAI,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;YAC9F,KAAK,MAAM,IAAI,IAAI,YAAY,EAAE,CAAC;gBAChC,IAAI,OAAO,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE,CAAC;oBACvB,MAAM,CAAC,WAAW,IAAI,IAAI,CAAC,KAAK,CAAC;oBACjC,MAAM,CAAC,UAAU,GAAG,IAAI,CAAC,IAAI,CAAC;oBAC9B,MAAM,CAAC,aAAa,GAAG,IAAI,CAAC,WAAW,CAAC;oBACxC,OAAO;gBACT,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,qBAAqB,CAAC,MAAc;QAC1C,IAAI,CAAC;YACH,qDAAqD;YACrD,MAAM,UAAU,GAAG,IAAI,CAAC,GAAG,CAAC,MAAM,CAAC,MAAM,EAAE,GAAG,GAAG,IAAI,CAAC,CAAC,CAAC,mBAAmB;YAC3E,MAAM,MAAM,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,EAAE,UAAU,CAAC,CAAC;YAE3C,8DAA8D;YAC9D,OAAO,MAAM,CAAC,QAAQ,CAAC,MAAM,CAAC;iBAC3B,OAAO,CAAC,gCAAgC,EAAE,EAAE,CAAC,CAAC,uBAAuB;iBACrE,OAAO,CAAC,SAAS,EAAE,EAAE,CAAC,CAAC,CAAC,0BAA0B;QACvD,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,MAAM,CAAC,GAAG,CAAC,MAAM,EAAE,sCAAsC,KAAK,CAAC,OAAO,EAAE,CAAC,CAAC;YAC1E,OAAO,EAAE,CAAC;QACZ,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,oBAAoB,CAAC,UAAuB;QAClD,MAAM,OAAO,GAAG,IAAI,CAAC,qBAAqB,CAAC,UAAU,CAAC,OAAO,CAAC,CAAC;QAC/D,MAAM,eAAe,GAAG;YACtB,kBAAkB;YAClB,gBAAgB;YAChB,SAAS;YACT,YAAY;YACZ,WAAW;YACX,eAAe;YACf,WAAW;YACX,cAAc;YACd,YAAY;YACZ,mBAAmB;SACpB,CAAC;QAEF,KAAK,MAAM,SAAS,IAAI,eAAe,EAAE,CAAC;YACxC,IAAI,SAAS,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC;gBAC5B,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QAED,OAAO,KAAK,CAAC;IACf,CAAC;IAED;;;;OAIG;IACK,kBAAkB,CAAC,KAAY,EAAE,MAAmB;QAC1D,cAAc,CAAC,WAAW,EAAE,CAAC,QAAQ,CAAC;YACpC,KAAK,EAAE,gBAAgB,CAAC,KAAK;YAC7B,IAAI,EAAE,iBAAiB,CAAC,OAAO;YAC/B,OAAO,EAAE,8CAA8C,KAAK,CAAC,IAAI,OAAO,KAAK,CAAC,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE;YAC7F,OAAO,EAAE;gBACP,SAAS,EAAE,KAAK,CAAC,YAAY,EAAE;gBAC/B,UAAU,EAAE,MAAM,CAAC,UAAU;gBAC7B,aAAa,EAAE,MAAM,CAAC,aAAa;gBACnC,WAAW,EAAE,MAAM,CAAC,WAAW;gBAC/B,eAAe,EAAE,MAAM,CAAC,eAAe;gBACvC,OAAO,EAAE,KAAK,CAAC,OAAO;aACvB;YACD,OAAO,EAAE,KAAK;YACd,MAAM,EAAE,KAAK,CAAC,aAAa,EAAE;SAC9B,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACK,cAAc,CAAC,KAAY,EAAE,MAAmB;QACtD,cAAc,CAAC,WAAW,EAAE,CAAC,QAAQ,CAAC;YACpC,KAAK,EAAE,gBAAgB,CAAC,IAAI;YAC5B,IAAI,EAAE,iBAAiB,CAAC,IAAI;YAC5B,OAAO,EAAE,6CAA6C,KAAK,CAAC,IAAI,OAAO,KAAK,CAAC,EAAE,CAAC,IAAI,CAAC,IAAI,CAAC,EAAE;YAC5F,OAAO,EAAE;gBACP,SAAS,EAAE,KAAK,CAAC,YAAY,EAAE;gBAC/B,UAAU,EAAE,MAAM,CAAC,UAAU;gBAC7B,aAAa,EAAE,MAAM,CAAC,aAAa;gBACnC,WAAW,EAAE,MAAM,CAAC,WAAW;gBAC/B,eAAe,EAAE,MAAM,CAAC,eAAe;gBACvC,OAAO,EAAE,KAAK,CAAC,OAAO;aACvB;YACD,OAAO,EAAE,KAAK;YACd,MAAM,EAAE,KAAK,CAAC,aAAa,EAAE;SAC9B,CAAC,CAAC;IACL,CAAC;IAED;;;;OAIG;IACI,MAAM,CAAC,cAAc,CAAC,KAAa;QACxC,IAAI,KAAK,GAAG,EAAE,EAAE,CAAC;YACf,OAAO,MAAM,CAAC;QAChB,CAAC;aAAM,IAAI,KAAK,GAAG,EAAE,EAAE,CAAC;YACtB,OAAO,KAAK,CAAC;QACf,CAAC;aAAM,IAAI,KAAK,GAAG,EAAE,EAAE,CAAC;YACtB,OAAO,QAAQ,CAAC;QAClB,CAAC;aAAM,CAAC;YACN,OAAO,MAAM,CAAC;QAChB,CAAC;IACH,CAAC"}
@@ -0,0 +1,73 @@
1
+ /**
2
+ * Reputation check result information
3
+ */
4
+ export interface IReputationResult {
5
+ score: number;
6
+ isSpam: boolean;
7
+ isProxy: boolean;
8
+ isTor: boolean;
9
+ isVPN: boolean;
10
+ country?: string;
11
+ asn?: string;
12
+ org?: string;
13
+ blacklists?: string[];
14
+ timestamp: number;
15
+ error?: string;
16
+ }
17
+ /**
18
+ * Reputation threshold scores
19
+ */
20
+ export declare enum ReputationThreshold {
21
+ HIGH_RISK = 20,// Score below this is considered high risk
22
+ MEDIUM_RISK = 50,// Score below this is considered medium risk
23
+ LOW_RISK = 80
24
+ }
25
+ /**
26
+ * IP type classifications
27
+ */
28
+ export declare enum IPType {
29
+ RESIDENTIAL = "residential",
30
+ DATACENTER = "datacenter",
31
+ PROXY = "proxy",
32
+ TOR = "tor",
33
+ VPN = "vpn",
34
+ UNKNOWN = "unknown"
35
+ }
36
+ /**
37
+ * Options for the IP Reputation Checker
38
+ */
39
+ export interface IIPReputationOptions {
40
+ maxCacheSize?: number;
41
+ cacheTTL?: number;
42
+ dnsblServers?: string[];
43
+ highRiskThreshold?: number;
44
+ mediumRiskThreshold?: number;
45
+ lowRiskThreshold?: number;
46
+ enableLocalCache?: boolean;
47
+ enableDNSBL?: boolean;
48
+ enableIPInfo?: boolean;
49
+ }
50
+ /**
51
+ * IP reputation checker — delegates DNSBL lookups to the Rust security bridge.
52
+ * Retains LRU caching and disk persistence in TypeScript.
53
+ */
54
+ export declare class IPReputationChecker {
55
+ private static instance;
56
+ private reputationCache;
57
+ private options;
58
+ private storageManager?;
59
+ private static readonly DEFAULT_OPTIONS;
60
+ constructor(options?: IIPReputationOptions, storageManager?: any);
61
+ static getInstance(options?: IIPReputationOptions, storageManager?: any): IPReputationChecker;
62
+ /**
63
+ * Check an IP address's reputation via the Rust bridge
64
+ */
65
+ checkReputation(ip: string): Promise<IReputationResult>;
66
+ private createErrorResult;
67
+ private isValidIPAddress;
68
+ private logReputationCheck;
69
+ private saveCache;
70
+ private loadCache;
71
+ static getRiskLevel(score: number): 'high' | 'medium' | 'low' | 'trusted';
72
+ updateStorageManager(storageManager: any): void;
73
+ }