eslint-plugin-node-security 4.0.0 โ†’ 4.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/CHANGELOG.md +4 -0
  2. package/README.md +199 -27
  3. package/package.json +1 -1
package/CHANGELOG.md CHANGED
@@ -1,3 +1,7 @@
1
+ # 4.0.0 (2026-02-02)
2
+
3
+ This was a version bump only for eslint-plugin-node-security to align it with other projects, there were no code changes.
4
+
1
5
  # Changelog
2
6
 
3
7
  All notable changes to `eslint-plugin-node-security` will be documented in this file.
package/README.md CHANGED
@@ -1,50 +1,222 @@
1
- # eslint-plugin-node-security
1
+ <p align="center">
2
+ <a href="https://eslint.interlace.tools" target="blank"><img src="https://eslint.interlace.tools/eslint-interlace-logo-light.svg" alt="ESLint Interlace Logo" width="120" /></a>
3
+ </p>
2
4
 
3
- Security-focused ESLint plugin for Node.js built-in modules (fs, child_process, vm, path, Buffer). Detects command injection, path traversal, code execution vulnerabilities with AI-parseable error messages.
5
+ <p align="center">
6
+ Security-focused ESLint plugin for Node.js built-in modules (fs, child_process, vm, crypto, Buffer).
7
+ </p>
4
8
 
5
- Part of the [Interlace ESLint Ecosystem](https://github.com/ofri-peretz/eslint).
9
+ <p align="center">
10
+ <a href="https://www.npmjs.com/package/eslint-plugin-node-security" target="_blank"><img src="https://img.shields.io/npm/v/eslint-plugin-node-security.svg" alt="NPM Version" /></a>
11
+ <a href="https://www.npmjs.com/package/eslint-plugin-node-security" target="_blank"><img src="https://img.shields.io/npm/dm/eslint-plugin-node-security.svg" alt="NPM Downloads" /></a>
12
+ <a href="https://opensource.org/licenses/MIT" target="_blank"><img src="https://img.shields.io/badge/License-MIT-yellow.svg" alt="Package License" /></a>
13
+ <a href="https://app.codecov.io/gh/ofri-peretz/eslint/components?components%5B0%5D=node-security" target="_blank"><img src="https://codecov.io/gh/ofri-peretz/eslint/graph/badge.svg?component=node-security" alt="Codecov" /></a>
14
+ <a href="https://github.com/ofri-peretz/eslint" target="_blank"><img src="https://img.shields.io/badge/Since-Dec_2025-blue?logo=rocket&logoColor=white" alt="Since Dec 2025" /></a>
15
+ </p>
6
16
 
7
- ## Features
17
+ ## Description
8
18
 
9
- - **LLM-Optimized**: Error messages are designed to be easily parsed and resolved by AI assistants (Cursor, GitHub Copilot, etc.).
10
- - **OWASP Coverage**: Implements rules for OWASP Top 10 and OWASP Mobile Top 10.
11
- - **Node.js Core Security**: Specific focus on built-in modules which are most susceptible to critical vulnerabilities.
12
- - **Strict Interface**: Verified with high-fidelity unit tests.
19
+ This plugin provides comprehensive security rules for Node.js core modules, detecting command injection, path traversal, code execution vulnerabilities, and cryptographic weaknesses. It focuses on the modules most susceptible to critical vulnerabilities: `fs`, `child_process`, `vm`, `crypto`, and `Buffer`. By integrating these checks, you proactively identify and mitigate security risks in your Node.js applications.
13
20
 
14
- ## Installation
21
+ ## Philosophy
22
+
23
+ **Interlace** fosters **strength through integration**. Instead of stacking isolated rules, we **interlace** security directly into your workflow to create a resilient fabric of code. We believe tools should **guide rather than gatekeep**, providing educational feedback that strengthens the developer with every interaction.
24
+
25
+ ## Getting Started
26
+
27
+ - To check out the [guide](https://eslint.interlace.tools/docs/node-security), visit [eslint.interlace.tools](https://eslint.interlace.tools). ๐Ÿ“š
28
+ - ่ฆๆŸฅ็œ‹ไธญๆ–‡ [ๆŒ‡ๅ—](https://eslint.interlace.tools/docs/node-security), ่ฏท่ฎฟ้—ฎ [eslint.interlace.tools](https://eslint.interlace.tools). ๐Ÿ“š
29
+ - [๊ฐ€์ด๋“œ](https://eslint.interlace.tools/docs/node-security) ๋ฌธ์„œ๋Š” [eslint.interlace.tools](https://eslint.interlace.tools)์—์„œ ํ™•์ธํ•˜์‹ค ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๐Ÿ“š
30
+ - [ใ‚ฌใ‚คใƒ‰](https://eslint.interlace.tools/docs/node-security)ใฏ [eslint.interlace.tools](https://eslint.interlace.tools)ใงใ”็ขบ่ชใใ ใ•ใ„ใ€‚ ๐Ÿ“š
31
+ - Para ver la [guรญa](https://eslint.interlace.tools/docs/node-security), visita [eslint.interlace.tools](https://eslint.interlace.tools). ๐Ÿ“š
32
+ - ู„ู„ุงุทู„ุงุน ุนู„ู‰ [ุงู„ุฏู„ูŠู„](https://eslint.interlace.tools/docs/node-security)ุŒ ู‚ู… ุจุฒูŠุงุฑุฉ [eslint.interlace.tools](https://eslint.interlace.tools). ๐Ÿ“š
15
33
 
16
34
  ```bash
17
- npm add -D eslint-plugin-node-security
35
+ npm install eslint-plugin-node-security --save-dev
18
36
  ```
19
37
 
20
- ## Usage (Flat Config)
38
+ ## ๐Ÿ’ก What You Get
39
+
40
+ - **31 security rules** covering Node.js core module vulnerabilities
41
+ - **Command Injection Detection** for `child_process.exec`, `spawn`, and `execFile`
42
+ - **Path Traversal Prevention** for `fs` module operations
43
+ - **TOCTOU Race Condition Detection** for file system operations
44
+ - **Cryptographic Security** for weak algorithms and key management
45
+ - **LLM-optimized messages** with CWE references and fix guidance
46
+
47
+ ## โš™๏ธ Configuration Presets
48
+
49
+ | Preset | Description |
50
+ | :------------ | :---------------------------------------------------- |
51
+ | `recommended` | Balanced security for most Node.js projects |
52
+ | `strict` | Maximum security enforcement (all rules as errors) |
53
+ | `fs-security` | Focus on file system vulnerabilities (CWE-22, CWE-73) |
54
+ | `crypto` | Cryptographic security rules only |
55
+
56
+ ---
57
+
58
+ ## ๐Ÿข Enterprise Integration Example
59
+
60
+ ```bash
61
+ # Install once at the repo root
62
+ npm add -D eslint-plugin-node-security
21
63
 
22
- ```javascript
64
+ # eslint.config.js (org-standard)
23
65
  import nodeSecurity from 'eslint-plugin-node-security';
24
66
 
25
67
  export default [
68
+ // Baseline for all Node.js services
26
69
  nodeSecurity.configs.recommended,
70
+
71
+ // Strict enforcement for security-critical services
72
+ {
73
+ files: ['services/auth/**', 'services/payments/**'],
74
+ ...nodeSecurity.configs.strict,
75
+ },
76
+
77
+ // File handling services need extra fs protection
27
78
  {
28
- rules: {
29
- 'node-security/detect-child-process': 'error',
30
- },
79
+ files: ['services/file-upload/**', 'services/export/**'],
80
+ ...nodeSecurity.configs['fs-security'],
31
81
  },
32
82
  ];
33
83
  ```
34
84
 
85
+ ---
86
+
87
+ ## AI-Optimized Messages
88
+
89
+ This plugin is optimized for ESLint's [Model Context Protocol (MCP)](https://eslint.org/docs/latest/use/mcp), enabling AI assistants like **Cursor**, **GitHub Copilot**, and **Claude** to:
90
+
91
+ - Understand the exact vulnerability type via CWE references
92
+ - Apply the correct fix using structured guidance
93
+ - Provide educational context to developers
94
+
95
+ ```bash
96
+ src/utils/exec.ts
97
+ 15:5 error ๐Ÿ”’ CWE-78 OWASP:A03-Injection CVSS:9.8 | Command Injection detected | CRITICAL [SOC2,PCI-DSS]
98
+ Fix: Use execFile() with args array: execFile('ls', ['-la', dir]) | https://owasp.org/...
99
+ ```
100
+
101
+ ```json
102
+ // .cursor/mcp.json
103
+ {
104
+ "mcpServers": {
105
+ "eslint": {
106
+ "command": "npx",
107
+ "args": ["@eslint/mcp@latest"]
108
+ }
109
+ }
110
+ }
111
+ ```
112
+
113
+ By providing this structured context (CWE, OWASP, Fix), we enable AI tools to **reason** about the security flaw rather than hallucinating. This allows Copilot/Cursor to suggest the _exact_ correct fix immediately.
114
+
115
+ ---
116
+
117
+ ## ๐Ÿ”’ Privacy
118
+
119
+ This plugin runs **100% locally**. No data ever leaves your machine.
120
+
121
+ ---
122
+
35
123
  ## Rules
36
124
 
37
- | Rule | Description | CWE |
38
- | :--------------------------------------------------------------------------------- | :----------------------------------------- | :------ |
39
- | [`detect-child-process`](./docs/rules/detect-child-process.md) | Detects dangerous child_process.exec calls | CWE-78 |
40
- | [`detect-eval-with-expression`](./docs/rules/detect-eval-with-expression.md) | Detects eval() with dynamic expressions | CWE-95 |
41
- | [`detect-non-literal-fs-filename`](./docs/rules/detect-non-literal-fs-filename.md) | Detects user-controlled file paths | CWE-22 |
42
- | [`no-unsafe-dynamic-require`](./docs/rules/no-unsafe-dynamic-require.md) | Prevents arbitrary module loading | CWE-706 |
43
- | [`no-buffer-overread`](./docs/rules/no-buffer-overread.md) | Detects buffer access beyond bounds | CWE-126 |
44
- | [`no-toctou-vulnerability`](./docs/rules/no-toctou-vulnerability.md) | Detects Race Conditions in file ops | CWE-367 |
45
- | [`no-zip-slip`](./docs/rules/no-zip-slip.md) | Prevents Zip Slip directory traversal | CWE-22 |
46
- | [`no-arbitrary-file-access`](./docs/rules/no-arbitrary-file-access.md) | Prevents arbitrary file read/write | CWE-22 |
125
+ **Legend**
126
+
127
+ | Icon | Description |
128
+ | :--: | :----------------------------------------------------------------- |
129
+ | ๐Ÿ’ผ | **Recommended**: Included in the recommended preset. |
130
+ | โš ๏ธ | **Warns**: Set to warn in recommended preset. |
131
+ | ๐Ÿ”ง | **Auto-fixable**: Automatically fixable by the `--fix` CLI option. |
132
+ | ๐Ÿ’ก | **Suggestions**: Providing code suggestions in IDE. |
133
+ | ๐Ÿšซ | **Deprecated**: This rule is deprecated. |
134
+
135
+ ### Command Execution & Code Injection
136
+
137
+ | Rule | CWE | CVSS | Description | ๐Ÿ’ผ | โš ๏ธ | ๐Ÿ”ง | ๐Ÿ’ก |
138
+ | :------------------------------------------------------------------------------------------------------- | :-----: | :--: | :-------------------------------------- | :-: | :-: | :-: | :-: |
139
+ | [detect-child-process](https://eslint.interlace.tools/docs/node-security/rules/detect-child-process) | CWE-78 | 9.8 | Detect dangerous child_process calls | ๐Ÿ’ผ | | | ๐Ÿ’ก |
140
+ | [detect-eval-with-expression](https://eslint.interlace.tools/docs/node-security/rules/detect-eval-with-expression) | CWE-95 | 9.8 | Detect eval() with dynamic expressions | ๐Ÿ’ผ | | | |
141
+ | [no-unsafe-dynamic-require](https://eslint.interlace.tools/docs/node-security/rules/no-unsafe-dynamic-require) | CWE-706 | 7.5 | Prevent arbitrary module loading | ๐Ÿ’ผ | | | ๐Ÿ’ก |
142
+ | [no-dynamic-require](https://eslint.interlace.tools/docs/node-security/rules/no-dynamic-require) | CWE-706 | 7.5 | Detect dynamic require() calls | | โš ๏ธ | | |
143
+
144
+ ### File System Security
145
+
146
+ | Rule | CWE | CVSS | Description | ๐Ÿ’ผ | โš ๏ธ | ๐Ÿ”ง | ๐Ÿ’ก |
147
+ | :------------------------------------------------------------------------------------------------------- | :-----: | :--: | :-------------------------------------- | :-: | :-: | :-: | :-: |
148
+ | [detect-non-literal-fs-filename](https://eslint.interlace.tools/docs/node-security/rules/detect-non-literal-fs-filename) | CWE-22 | 7.5 | Detect user-controlled file paths | ๐Ÿ’ผ | | | ๐Ÿ’ก |
149
+ | [no-arbitrary-file-access](https://eslint.interlace.tools/docs/node-security/rules/no-arbitrary-file-access) | CWE-22 | 7.5 | Prevent arbitrary file read/write | ๐Ÿ’ผ | | | |
150
+ | [no-zip-slip](https://eslint.interlace.tools/docs/node-security/rules/no-zip-slip) | CWE-22 | 8.1 | Prevent Zip Slip directory traversal | ๐Ÿ’ผ | | | |
151
+ | [no-toctou-vulnerability](https://eslint.interlace.tools/docs/node-security/rules/no-toctou-vulnerability) | CWE-367 | 7.0 | Detect race conditions in file ops | ๐Ÿ’ผ | | | ๐Ÿ’ก |
152
+ | [no-data-in-temp-storage](https://eslint.interlace.tools/docs/node-security/rules/no-data-in-temp-storage) | CWE-312 | 7.5 | Prevent sensitive data in temp files | | โš ๏ธ | | |
153
+ | [require-secure-deletion](https://eslint.interlace.tools/docs/node-security/rules/require-secure-deletion) | CWE-459 | 7.5 | Require secure file deletion | | | | |
154
+ | [require-storage-encryption](https://eslint.interlace.tools/docs/node-security/rules/require-storage-encryption) | CWE-311 | 7.5 | Require encryption for stored data | | | | |
155
+
156
+ ### Buffer & Memory Safety
157
+
158
+ | Rule | CWE | CVSS | Description | ๐Ÿ’ผ | โš ๏ธ | ๐Ÿ”ง | ๐Ÿ’ก |
159
+ | :------------------------------------------------------------------------------------------------------- | :-----: | :--: | :-------------------------------------- | :-: | :-: | :-: | :-: |
160
+ | [no-buffer-overread](https://eslint.interlace.tools/docs/node-security/rules/no-buffer-overread) | CWE-126 | 7.5 | Detect buffer access beyond bounds | ๐Ÿ’ผ | | | |
161
+
162
+ ### Cryptographic Security
163
+
164
+ | Rule | CWE | CVSS | Description | ๐Ÿ’ผ | โš ๏ธ | ๐Ÿ”ง | ๐Ÿ’ก |
165
+ | :------------------------------------------------------------------------------------------------------- | :-----: | :--: | :-------------------------------------- | :-: | :-: | :-: | :-: |
166
+ | [no-weak-hash-algorithm](https://eslint.interlace.tools/docs/node-security/rules/no-weak-hash-algorithm) | CWE-327 | 7.5 | Detect weak hash algorithms (MD5, SHA1) | ๐Ÿ’ผ | | | ๐Ÿ’ก |
167
+ | [no-weak-cipher-algorithm](https://eslint.interlace.tools/docs/node-security/rules/no-weak-cipher-algorithm) | CWE-327 | 7.5 | Detect weak cipher algorithms (DES, RC4)| ๐Ÿ’ผ | | | ๐Ÿ’ก |
168
+ | [no-deprecated-cipher-method](https://eslint.interlace.tools/docs/node-security/rules/no-deprecated-cipher-method) | CWE-327 | 5.0 | Detect deprecated cipher methods | ๐Ÿ’ผ | | | ๐Ÿ’ก |
169
+ | [no-static-iv](https://eslint.interlace.tools/docs/node-security/rules/no-static-iv) | CWE-329 | 7.5 | Detect static initialization vectors | ๐Ÿ’ผ | | | ๐Ÿ’ก |
170
+ | [no-ecb-mode](https://eslint.interlace.tools/docs/node-security/rules/no-ecb-mode) | CWE-327 | 7.5 | Detect insecure ECB cipher mode | ๐Ÿ’ผ | | | ๐Ÿ’ก |
171
+ | [no-insecure-key-derivation](https://eslint.interlace.tools/docs/node-security/rules/no-insecure-key-derivation) | CWE-916 | 7.5 | Detect weak key derivation functions | ๐Ÿ’ผ | | | ๐Ÿ’ก |
172
+ | [no-insecure-rsa-padding](https://eslint.interlace.tools/docs/node-security/rules/no-insecure-rsa-padding) | CWE-327 | 7.4 | Detect insecure RSA padding | ๐Ÿ’ผ | | | ๐Ÿ’ก |
173
+ | [no-sha1-hash](https://eslint.interlace.tools/docs/node-security/rules/no-sha1-hash) | CWE-327 | 7.5 | Detect SHA1 usage in security contexts | ๐Ÿ’ผ | | | ๐Ÿ’ก |
174
+ | [no-timing-unsafe-compare](https://eslint.interlace.tools/docs/node-security/rules/no-timing-unsafe-compare) | CWE-208 | 5.9 | Detect timing-unsafe comparisons | ๐Ÿ’ผ | โš ๏ธ | | ๐Ÿ’ก |
175
+ | [no-self-signed-certs](https://eslint.interlace.tools/docs/node-security/rules/no-self-signed-certs) | CWE-295 | 7.5 | Detect self-signed certificate usage | ๐Ÿ’ผ | | | ๐Ÿ’ก |
176
+ | [no-cryptojs](https://eslint.interlace.tools/docs/node-security/rules/no-cryptojs) | CWE-327 | 5.0 | Discourage crypto-js in favor of native | ๐Ÿ’ผ | โš ๏ธ | | ๐Ÿ’ก |
177
+ | [no-cryptojs-weak-random](https://eslint.interlace.tools/docs/node-security/rules/no-cryptojs-weak-random) | CWE-338 | 5.3 | Detect weak random from crypto-js | ๐Ÿ’ผ | | | ๐Ÿ’ก |
178
+ | [prefer-native-crypto](https://eslint.interlace.tools/docs/node-security/rules/prefer-native-crypto) | CWE-327 | 5.0 | Prefer Node.js native crypto | ๐Ÿ’ผ | โš ๏ธ | | ๐Ÿ’ก |
179
+ | [require-secure-credential-storage](https://eslint.interlace.tools/docs/node-security/rules/require-secure-credential-storage) | CWE-522 | 7.5 | Require secure credential storage | | | | |
180
+
181
+ ### Dependency & Supply Chain Security
182
+
183
+ | Rule | CWE | CVSS | Description | ๐Ÿ’ผ | โš ๏ธ | ๐Ÿ”ง | ๐Ÿ’ก |
184
+ | :------------------------------------------------------------------------------------------------------- | :-----: | :--: | :-------------------------------------- | :-: | :-: | :-: | :-: |
185
+ | [detect-suspicious-dependencies](https://eslint.interlace.tools/docs/node-security/rules/detect-suspicious-dependencies) | CWE-829 | 8.2 | Detect typosquatting packages | ๐Ÿ’ผ | | | |
186
+ | [no-dynamic-dependency-loading](https://eslint.interlace.tools/docs/node-security/rules/no-dynamic-dependency-loading) | CWE-829 | 7.5 | Prevent runtime dependency loading | | โš ๏ธ | | |
187
+ | [require-dependency-integrity](https://eslint.interlace.tools/docs/node-security/rules/require-dependency-integrity) | CWE-494 | 7.5 | Require integrity checks for deps | | | | |
188
+ | [lock-file](https://eslint.interlace.tools/docs/node-security/rules/lock-file) | CWE-829 | 7.5 | Ensure package lock file exists | ๐Ÿ’ผ | | | |
189
+
190
+ ### Data Protection
191
+
192
+ | Rule | CWE | CVSS | Description | ๐Ÿ’ผ | โš ๏ธ | ๐Ÿ”ง | ๐Ÿ’ก |
193
+ | :------------------------------------------------------------------------------------------------------- | :-----: | :--: | :-------------------------------------- | :-: | :-: | :-: | :-: |
194
+ | [no-pii-in-logs](https://eslint.interlace.tools/docs/node-security/rules/no-pii-in-logs) | CWE-532 | 7.5 | Prevent PII in log statements | | โš ๏ธ | | |
195
+
196
+ ---
197
+
198
+ ## ๐Ÿ”— Related ESLint Plugins
199
+
200
+ Part of the **Interlace ESLint Ecosystem** โ€” AI-native security plugins with LLM-optimized error messages:
201
+
202
+ | Plugin | Downloads | Description |
203
+ | :--------------------------------------------------------------------------------------------------- | :------------------------------------------------------------------------------------------------------------------------------------------------------------------: | :------------------------------------------ |
204
+ | [`eslint-plugin-secure-coding`](https://www.npmjs.com/package/eslint-plugin-secure-coding) | [![downloads](https://img.shields.io/npm/dt/eslint-plugin-secure-coding.svg?style=flat-square)](https://www.npmjs.com/package/eslint-plugin-secure-coding) | General security rules & OWASP guidelines. |
205
+ | [`eslint-plugin-pg`](https://www.npmjs.com/package/eslint-plugin-pg) | [![downloads](https://img.shields.io/npm/dt/eslint-plugin-pg.svg?style=flat-square)](https://www.npmjs.com/package/eslint-plugin-pg) | PostgreSQL security & best practices. |
206
+ | [`eslint-plugin-crypto`](https://www.npmjs.com/package/eslint-plugin-crypto) | [![downloads](https://img.shields.io/npm/dt/eslint-plugin-crypto.svg?style=flat-square)](https://www.npmjs.com/package/eslint-plugin-crypto) | NodeJS Cryptography security rules. |
207
+ | [`eslint-plugin-jwt`](https://www.npmjs.com/package/eslint-plugin-jwt) | [![downloads](https://img.shields.io/npm/dt/eslint-plugin-jwt.svg?style=flat-square)](https://www.npmjs.com/package/eslint-plugin-jwt) | JWT security & best practices. |
208
+ | [`eslint-plugin-browser-security`](https://www.npmjs.com/package/eslint-plugin-browser-security) | [![downloads](https://img.shields.io/npm/dt/eslint-plugin-browser-security.svg?style=flat-square)](https://www.npmjs.com/package/eslint-plugin-browser-security) | Browser-specific security & XSS prevention. |
209
+ | [`eslint-plugin-express-security`](https://www.npmjs.com/package/eslint-plugin-express-security) | [![downloads](https://img.shields.io/npm/dt/eslint-plugin-express-security.svg?style=flat-square)](https://www.npmjs.com/package/eslint-plugin-express-security) | Express.js security hardening rules. |
210
+ | [`eslint-plugin-lambda-security`](https://www.npmjs.com/package/eslint-plugin-lambda-security) | [![downloads](https://img.shields.io/npm/dt/eslint-plugin-lambda-security.svg?style=flat-square)](https://www.npmjs.com/package/eslint-plugin-lambda-security) | AWS Lambda security best practices. |
211
+ | [`eslint-plugin-nestjs-security`](https://www.npmjs.com/package/eslint-plugin-nestjs-security) | [![downloads](https://img.shields.io/npm/dt/eslint-plugin-nestjs-security.svg?style=flat-square)](https://www.npmjs.com/package/eslint-plugin-nestjs-security) | NestJS security rules & patterns. |
212
+ | [`eslint-plugin-mongodb-security`](https://www.npmjs.com/package/eslint-plugin-mongodb-security) | [![downloads](https://img.shields.io/npm/dt/eslint-plugin-mongodb-security.svg?style=flat-square)](https://www.npmjs.com/package/eslint-plugin-mongodb-security) | MongoDB security best practices. |
213
+ | [`eslint-plugin-vercel-ai-security`](https://www.npmjs.com/package/eslint-plugin-vercel-ai-security) | [![downloads](https://img.shields.io/npm/dt/eslint-plugin-vercel-ai-security.svg?style=flat-square)](https://www.npmjs.com/package/eslint-plugin-vercel-ai-security) | Vercel AI SDK security hardening. |
214
+ | [`eslint-plugin-import-next`](https://www.npmjs.com/package/eslint-plugin-import-next) | [![downloads](https://img.shields.io/npm/dt/eslint-plugin-import-next.svg?style=flat-square)](https://www.npmjs.com/package/eslint-plugin-import-next) | Next-gen import sorting & architecture. |
215
+
216
+ ## ๐Ÿ“„ License
47
217
 
48
- ## License
218
+ MIT ยฉ [Ofri Peretz](https://github.com/ofri-peretz)
49
219
 
50
- MIT ยฉ [Ofri Peretz](https://ofriperetz.dev)
220
+ <p align="center">
221
+ <a href="https://eslint.interlace.tools/docs/node-security"><img src="https://eslint.interlace.tools/images/og-secure-coding.png" alt="ESLint Interlace Plugin" width="300" /></a>
222
+ </p>
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "eslint-plugin-node-security",
3
- "version": "4.0.0",
3
+ "version": "4.0.1",
4
4
  "description": "Security-focused ESLint plugin for Node.js built-in modules (fs, child_process, vm, path, Buffer). Detects command injection, path traversal, code execution vulnerabilities with AI-parseable error messages.",
5
5
  "type": "commonjs",
6
6
  "main": "./src/index.js",