eslint-plugin-sdl-2 1.0.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (418) hide show
  1. package/CHANGELOG.md +5316 -0
  2. package/LICENSE +21 -0
  3. package/README.md +133 -0
  4. package/dist/_internal/ast-utils.d.ts +17 -0
  5. package/dist/_internal/ast-utils.d.ts.map +1 -0
  6. package/dist/_internal/ast-utils.js +93 -0
  7. package/dist/_internal/ast-utils.js.map +1 -0
  8. package/dist/_internal/config-references.d.ts +5 -0
  9. package/dist/_internal/config-references.d.ts.map +1 -0
  10. package/dist/_internal/config-references.js +13 -0
  11. package/dist/_internal/config-references.js.map +1 -0
  12. package/dist/_internal/create-rule.d.ts +9 -0
  13. package/dist/_internal/create-rule.d.ts.map +1 -0
  14. package/dist/_internal/create-rule.js +6 -0
  15. package/dist/_internal/create-rule.js.map +1 -0
  16. package/dist/_internal/domparser.d.ts +19 -0
  17. package/dist/_internal/domparser.d.ts.map +1 -0
  18. package/dist/_internal/domparser.js +45 -0
  19. package/dist/_internal/domparser.js.map +1 -0
  20. package/dist/_internal/electron-web-preferences.d.ts +14 -0
  21. package/dist/_internal/electron-web-preferences.d.ts.map +1 -0
  22. package/dist/_internal/electron-web-preferences.js +63 -0
  23. package/dist/_internal/electron-web-preferences.js.map +1 -0
  24. package/dist/_internal/estree-utils.d.ts +51 -0
  25. package/dist/_internal/estree-utils.d.ts.map +1 -0
  26. package/dist/_internal/estree-utils.js +112 -0
  27. package/dist/_internal/estree-utils.js.map +1 -0
  28. package/dist/_internal/node-tls-config.d.ts +44 -0
  29. package/dist/_internal/node-tls-config.d.ts.map +1 -0
  30. package/dist/_internal/node-tls-config.js +101 -0
  31. package/dist/_internal/node-tls-config.js.map +1 -0
  32. package/dist/_internal/rules-registry.d.ts +10 -0
  33. package/dist/_internal/rules-registry.d.ts.map +1 -0
  34. package/dist/_internal/rules-registry.js +148 -0
  35. package/dist/_internal/rules-registry.js.map +1 -0
  36. package/dist/_internal/script-element.d.ts +7 -0
  37. package/dist/_internal/script-element.d.ts.map +1 -0
  38. package/dist/_internal/script-element.js +46 -0
  39. package/dist/_internal/script-element.js.map +1 -0
  40. package/dist/_internal/worker-code-loading.d.ts +69 -0
  41. package/dist/_internal/worker-code-loading.d.ts.map +1 -0
  42. package/dist/_internal/worker-code-loading.js +134 -0
  43. package/dist/_internal/worker-code-loading.js.map +1 -0
  44. package/dist/plugin.cjs +6036 -0
  45. package/dist/plugin.cjs.map +7 -0
  46. package/dist/plugin.d.cts +11 -0
  47. package/dist/plugin.d.ts +11 -0
  48. package/dist/plugin.d.ts.map +1 -0
  49. package/dist/plugin.js +235 -0
  50. package/dist/plugin.js.map +1 -0
  51. package/dist/rules/no-angular-bypass-sanitizer.d.ts +5 -0
  52. package/dist/rules/no-angular-bypass-sanitizer.d.ts.map +1 -0
  53. package/dist/rules/no-angular-bypass-sanitizer.js +32 -0
  54. package/dist/rules/no-angular-bypass-sanitizer.js.map +1 -0
  55. package/dist/rules/no-angular-bypass-security-trust-html.d.ts +5 -0
  56. package/dist/rules/no-angular-bypass-security-trust-html.d.ts.map +1 -0
  57. package/dist/rules/no-angular-bypass-security-trust-html.js +51 -0
  58. package/dist/rules/no-angular-bypass-security-trust-html.js.map +1 -0
  59. package/dist/rules/no-angular-innerhtml-binding.d.ts +5 -0
  60. package/dist/rules/no-angular-innerhtml-binding.d.ts.map +1 -0
  61. package/dist/rules/no-angular-innerhtml-binding.js +57 -0
  62. package/dist/rules/no-angular-innerhtml-binding.js.map +1 -0
  63. package/dist/rules/no-angular-sanitization-trusted-urls.d.ts +5 -0
  64. package/dist/rules/no-angular-sanitization-trusted-urls.d.ts.map +1 -0
  65. package/dist/rules/no-angular-sanitization-trusted-urls.js +32 -0
  66. package/dist/rules/no-angular-sanitization-trusted-urls.js.map +1 -0
  67. package/dist/rules/no-angularjs-bypass-sce.d.ts +5 -0
  68. package/dist/rules/no-angularjs-bypass-sce.d.ts.map +1 -0
  69. package/dist/rules/no-angularjs-bypass-sce.js +80 -0
  70. package/dist/rules/no-angularjs-bypass-sce.js.map +1 -0
  71. package/dist/rules/no-angularjs-enable-svg.d.ts +5 -0
  72. package/dist/rules/no-angularjs-enable-svg.d.ts.map +1 -0
  73. package/dist/rules/no-angularjs-enable-svg.js +48 -0
  74. package/dist/rules/no-angularjs-enable-svg.js.map +1 -0
  75. package/dist/rules/no-angularjs-ng-bind-html-without-sanitize.d.ts +5 -0
  76. package/dist/rules/no-angularjs-ng-bind-html-without-sanitize.d.ts.map +1 -0
  77. package/dist/rules/no-angularjs-ng-bind-html-without-sanitize.js +64 -0
  78. package/dist/rules/no-angularjs-ng-bind-html-without-sanitize.js.map +1 -0
  79. package/dist/rules/no-angularjs-sanitization-whitelist.d.ts +5 -0
  80. package/dist/rules/no-angularjs-sanitization-whitelist.d.ts.map +1 -0
  81. package/dist/rules/no-angularjs-sanitization-whitelist.js +32 -0
  82. package/dist/rules/no-angularjs-sanitization-whitelist.js.map +1 -0
  83. package/dist/rules/no-angularjs-sce-resource-url-wildcard.d.ts +5 -0
  84. package/dist/rules/no-angularjs-sce-resource-url-wildcard.d.ts.map +1 -0
  85. package/dist/rules/no-angularjs-sce-resource-url-wildcard.js +69 -0
  86. package/dist/rules/no-angularjs-sce-resource-url-wildcard.js.map +1 -0
  87. package/dist/rules/no-child-process-exec.d.ts +5 -0
  88. package/dist/rules/no-child-process-exec.d.ts.map +1 -0
  89. package/dist/rules/no-child-process-exec.js +141 -0
  90. package/dist/rules/no-child-process-exec.js.map +1 -0
  91. package/dist/rules/no-child-process-shell-true.d.ts +5 -0
  92. package/dist/rules/no-child-process-shell-true.d.ts.map +1 -0
  93. package/dist/rules/no-child-process-shell-true.js +89 -0
  94. package/dist/rules/no-child-process-shell-true.js.map +1 -0
  95. package/dist/rules/no-cookies.d.ts +5 -0
  96. package/dist/rules/no-cookies.d.ts.map +1 -0
  97. package/dist/rules/no-cookies.js +38 -0
  98. package/dist/rules/no-cookies.js.map +1 -0
  99. package/dist/rules/no-document-domain.d.ts +5 -0
  100. package/dist/rules/no-document-domain.d.ts.map +1 -0
  101. package/dist/rules/no-document-domain.js +41 -0
  102. package/dist/rules/no-document-domain.js.map +1 -0
  103. package/dist/rules/no-document-execcommand-insert-html.d.ts +5 -0
  104. package/dist/rules/no-document-execcommand-insert-html.d.ts.map +1 -0
  105. package/dist/rules/no-document-execcommand-insert-html.js +57 -0
  106. package/dist/rules/no-document-execcommand-insert-html.js.map +1 -0
  107. package/dist/rules/no-document-parse-html-unsafe.d.ts +5 -0
  108. package/dist/rules/no-document-parse-html-unsafe.d.ts.map +1 -0
  109. package/dist/rules/no-document-parse-html-unsafe.js +67 -0
  110. package/dist/rules/no-document-parse-html-unsafe.js.map +1 -0
  111. package/dist/rules/no-document-write.d.ts +5 -0
  112. package/dist/rules/no-document-write.d.ts.map +1 -0
  113. package/dist/rules/no-document-write.js +40 -0
  114. package/dist/rules/no-document-write.js.map +1 -0
  115. package/dist/rules/no-domparser-html-without-sanitization.d.ts +5 -0
  116. package/dist/rules/no-domparser-html-without-sanitization.d.ts.map +1 -0
  117. package/dist/rules/no-domparser-html-without-sanitization.js +56 -0
  118. package/dist/rules/no-domparser-html-without-sanitization.js.map +1 -0
  119. package/dist/rules/no-domparser-svg-without-sanitization.d.ts +5 -0
  120. package/dist/rules/no-domparser-svg-without-sanitization.d.ts.map +1 -0
  121. package/dist/rules/no-domparser-svg-without-sanitization.js +56 -0
  122. package/dist/rules/no-domparser-svg-without-sanitization.js.map +1 -0
  123. package/dist/rules/no-dynamic-import-unsafe-url.d.ts +5 -0
  124. package/dist/rules/no-dynamic-import-unsafe-url.d.ts.map +1 -0
  125. package/dist/rules/no-dynamic-import-unsafe-url.js +47 -0
  126. package/dist/rules/no-dynamic-import-unsafe-url.js.map +1 -0
  127. package/dist/rules/no-electron-allow-running-insecure-content.d.ts +5 -0
  128. package/dist/rules/no-electron-allow-running-insecure-content.d.ts.map +1 -0
  129. package/dist/rules/no-electron-allow-running-insecure-content.js +30 -0
  130. package/dist/rules/no-electron-allow-running-insecure-content.js.map +1 -0
  131. package/dist/rules/no-electron-dangerous-blink-features.d.ts +5 -0
  132. package/dist/rules/no-electron-dangerous-blink-features.d.ts.map +1 -0
  133. package/dist/rules/no-electron-dangerous-blink-features.js +89 -0
  134. package/dist/rules/no-electron-dangerous-blink-features.js.map +1 -0
  135. package/dist/rules/no-electron-disable-context-isolation.d.ts +5 -0
  136. package/dist/rules/no-electron-disable-context-isolation.d.ts.map +1 -0
  137. package/dist/rules/no-electron-disable-context-isolation.js +30 -0
  138. package/dist/rules/no-electron-disable-context-isolation.js.map +1 -0
  139. package/dist/rules/no-electron-disable-sandbox.d.ts +5 -0
  140. package/dist/rules/no-electron-disable-sandbox.d.ts.map +1 -0
  141. package/dist/rules/no-electron-disable-sandbox.js +30 -0
  142. package/dist/rules/no-electron-disable-sandbox.js.map +1 -0
  143. package/dist/rules/no-electron-disable-web-security.d.ts +5 -0
  144. package/dist/rules/no-electron-disable-web-security.d.ts.map +1 -0
  145. package/dist/rules/no-electron-disable-web-security.js +30 -0
  146. package/dist/rules/no-electron-disable-web-security.js.map +1 -0
  147. package/dist/rules/no-electron-enable-remote-module.d.ts +5 -0
  148. package/dist/rules/no-electron-enable-remote-module.d.ts.map +1 -0
  149. package/dist/rules/no-electron-enable-remote-module.js +30 -0
  150. package/dist/rules/no-electron-enable-remote-module.js.map +1 -0
  151. package/dist/rules/no-electron-enable-webview-tag.d.ts +5 -0
  152. package/dist/rules/no-electron-enable-webview-tag.d.ts.map +1 -0
  153. package/dist/rules/no-electron-enable-webview-tag.js +30 -0
  154. package/dist/rules/no-electron-enable-webview-tag.js.map +1 -0
  155. package/dist/rules/no-electron-experimental-features.d.ts +5 -0
  156. package/dist/rules/no-electron-experimental-features.d.ts.map +1 -0
  157. package/dist/rules/no-electron-experimental-features.js +30 -0
  158. package/dist/rules/no-electron-experimental-features.js.map +1 -0
  159. package/dist/rules/no-electron-expose-raw-ipc-renderer.d.ts +5 -0
  160. package/dist/rules/no-electron-expose-raw-ipc-renderer.d.ts.map +1 -0
  161. package/dist/rules/no-electron-expose-raw-ipc-renderer.js +108 -0
  162. package/dist/rules/no-electron-expose-raw-ipc-renderer.js.map +1 -0
  163. package/dist/rules/no-electron-insecure-certificate-error-handler.d.ts +5 -0
  164. package/dist/rules/no-electron-insecure-certificate-error-handler.d.ts.map +1 -0
  165. package/dist/rules/no-electron-insecure-certificate-error-handler.js +91 -0
  166. package/dist/rules/no-electron-insecure-certificate-error-handler.js.map +1 -0
  167. package/dist/rules/no-electron-insecure-certificate-verify-proc.d.ts +5 -0
  168. package/dist/rules/no-electron-insecure-certificate-verify-proc.d.ts.map +1 -0
  169. package/dist/rules/no-electron-insecure-certificate-verify-proc.js +75 -0
  170. package/dist/rules/no-electron-insecure-certificate-verify-proc.js.map +1 -0
  171. package/dist/rules/no-electron-insecure-permission-request-handler.d.ts +5 -0
  172. package/dist/rules/no-electron-insecure-permission-request-handler.d.ts.map +1 -0
  173. package/dist/rules/no-electron-insecure-permission-request-handler.js +75 -0
  174. package/dist/rules/no-electron-insecure-permission-request-handler.js.map +1 -0
  175. package/dist/rules/no-electron-node-integration.d.ts +5 -0
  176. package/dist/rules/no-electron-node-integration.d.ts.map +1 -0
  177. package/dist/rules/no-electron-node-integration.js +52 -0
  178. package/dist/rules/no-electron-node-integration.js.map +1 -0
  179. package/dist/rules/no-electron-permission-check-handler-allow-all.d.ts +5 -0
  180. package/dist/rules/no-electron-permission-check-handler-allow-all.d.ts.map +1 -0
  181. package/dist/rules/no-electron-permission-check-handler-allow-all.js +63 -0
  182. package/dist/rules/no-electron-permission-check-handler-allow-all.js.map +1 -0
  183. package/dist/rules/no-electron-unchecked-ipc-sender.d.ts +5 -0
  184. package/dist/rules/no-electron-unchecked-ipc-sender.d.ts.map +1 -0
  185. package/dist/rules/no-electron-unchecked-ipc-sender.js +90 -0
  186. package/dist/rules/no-electron-unchecked-ipc-sender.js.map +1 -0
  187. package/dist/rules/no-electron-unrestricted-navigation.d.ts +5 -0
  188. package/dist/rules/no-electron-unrestricted-navigation.d.ts.map +1 -0
  189. package/dist/rules/no-electron-unrestricted-navigation.js +100 -0
  190. package/dist/rules/no-electron-unrestricted-navigation.js.map +1 -0
  191. package/dist/rules/no-electron-untrusted-open-external.d.ts +5 -0
  192. package/dist/rules/no-electron-untrusted-open-external.d.ts.map +1 -0
  193. package/dist/rules/no-electron-untrusted-open-external.js +92 -0
  194. package/dist/rules/no-electron-untrusted-open-external.js.map +1 -0
  195. package/dist/rules/no-electron-webview-allowpopups.d.ts +5 -0
  196. package/dist/rules/no-electron-webview-allowpopups.d.ts.map +1 -0
  197. package/dist/rules/no-electron-webview-allowpopups.js +85 -0
  198. package/dist/rules/no-electron-webview-allowpopups.js.map +1 -0
  199. package/dist/rules/no-electron-webview-insecure-webpreferences.d.ts +5 -0
  200. package/dist/rules/no-electron-webview-insecure-webpreferences.d.ts.map +1 -0
  201. package/dist/rules/no-electron-webview-insecure-webpreferences.js +88 -0
  202. package/dist/rules/no-electron-webview-insecure-webpreferences.js.map +1 -0
  203. package/dist/rules/no-electron-webview-node-integration.d.ts +5 -0
  204. package/dist/rules/no-electron-webview-node-integration.d.ts.map +1 -0
  205. package/dist/rules/no-electron-webview-node-integration.js +107 -0
  206. package/dist/rules/no-electron-webview-node-integration.js.map +1 -0
  207. package/dist/rules/no-html-method.d.ts +5 -0
  208. package/dist/rules/no-html-method.d.ts.map +1 -0
  209. package/dist/rules/no-html-method.js +42 -0
  210. package/dist/rules/no-html-method.js.map +1 -0
  211. package/dist/rules/no-http-request-to-insecure-protocol.d.ts +5 -0
  212. package/dist/rules/no-http-request-to-insecure-protocol.d.ts.map +1 -0
  213. package/dist/rules/no-http-request-to-insecure-protocol.js +94 -0
  214. package/dist/rules/no-http-request-to-insecure-protocol.js.map +1 -0
  215. package/dist/rules/no-iframe-srcdoc.d.ts +5 -0
  216. package/dist/rules/no-iframe-srcdoc.d.ts.map +1 -0
  217. package/dist/rules/no-iframe-srcdoc.js +144 -0
  218. package/dist/rules/no-iframe-srcdoc.js.map +1 -0
  219. package/dist/rules/no-inner-html.d.ts +5 -0
  220. package/dist/rules/no-inner-html.d.ts.map +1 -0
  221. package/dist/rules/no-inner-html.js +67 -0
  222. package/dist/rules/no-inner-html.js.map +1 -0
  223. package/dist/rules/no-insecure-random.d.ts +5 -0
  224. package/dist/rules/no-insecure-random.d.ts.map +1 -0
  225. package/dist/rules/no-insecure-random.js +95 -0
  226. package/dist/rules/no-insecure-random.js.map +1 -0
  227. package/dist/rules/no-insecure-tls-agent-options.d.ts +5 -0
  228. package/dist/rules/no-insecure-tls-agent-options.d.ts.map +1 -0
  229. package/dist/rules/no-insecure-tls-agent-options.js +73 -0
  230. package/dist/rules/no-insecure-tls-agent-options.js.map +1 -0
  231. package/dist/rules/no-insecure-url.d.ts +12 -0
  232. package/dist/rules/no-insecure-url.d.ts.map +1 -0
  233. package/dist/rules/no-insecure-url.js +142 -0
  234. package/dist/rules/no-insecure-url.js.map +1 -0
  235. package/dist/rules/no-location-javascript-url.d.ts +5 -0
  236. package/dist/rules/no-location-javascript-url.d.ts.map +1 -0
  237. package/dist/rules/no-location-javascript-url.js +98 -0
  238. package/dist/rules/no-location-javascript-url.js.map +1 -0
  239. package/dist/rules/no-message-event-without-origin-check.d.ts +5 -0
  240. package/dist/rules/no-message-event-without-origin-check.d.ts.map +1 -0
  241. package/dist/rules/no-message-event-without-origin-check.js +183 -0
  242. package/dist/rules/no-message-event-without-origin-check.js.map +1 -0
  243. package/dist/rules/no-msapp-exec-unsafe.d.ts +5 -0
  244. package/dist/rules/no-msapp-exec-unsafe.d.ts.map +1 -0
  245. package/dist/rules/no-msapp-exec-unsafe.js +32 -0
  246. package/dist/rules/no-msapp-exec-unsafe.js.map +1 -0
  247. package/dist/rules/no-node-tls-check-server-identity-bypass.d.ts +5 -0
  248. package/dist/rules/no-node-tls-check-server-identity-bypass.d.ts.map +1 -0
  249. package/dist/rules/no-node-tls-check-server-identity-bypass.js +95 -0
  250. package/dist/rules/no-node-tls-check-server-identity-bypass.js.map +1 -0
  251. package/dist/rules/no-node-tls-legacy-protocol.d.ts +5 -0
  252. package/dist/rules/no-node-tls-legacy-protocol.d.ts.map +1 -0
  253. package/dist/rules/no-node-tls-legacy-protocol.js +106 -0
  254. package/dist/rules/no-node-tls-legacy-protocol.js.map +1 -0
  255. package/dist/rules/no-node-tls-reject-unauthorized-zero.d.ts +5 -0
  256. package/dist/rules/no-node-tls-reject-unauthorized-zero.d.ts.map +1 -0
  257. package/dist/rules/no-node-tls-reject-unauthorized-zero.js +93 -0
  258. package/dist/rules/no-node-tls-reject-unauthorized-zero.js.map +1 -0
  259. package/dist/rules/no-node-tls-security-level-zero.d.ts +5 -0
  260. package/dist/rules/no-node-tls-security-level-zero.d.ts.map +1 -0
  261. package/dist/rules/no-node-tls-security-level-zero.js +80 -0
  262. package/dist/rules/no-node-tls-security-level-zero.js.map +1 -0
  263. package/dist/rules/no-node-vm-run-in-context.d.ts +5 -0
  264. package/dist/rules/no-node-vm-run-in-context.d.ts.map +1 -0
  265. package/dist/rules/no-node-vm-run-in-context.js +186 -0
  266. package/dist/rules/no-node-vm-run-in-context.js.map +1 -0
  267. package/dist/rules/no-node-vm-source-text-module.d.ts +5 -0
  268. package/dist/rules/no-node-vm-source-text-module.d.ts.map +1 -0
  269. package/dist/rules/no-node-vm-source-text-module.js +126 -0
  270. package/dist/rules/no-node-vm-source-text-module.js.map +1 -0
  271. package/dist/rules/no-node-worker-threads-eval.d.ts +5 -0
  272. package/dist/rules/no-node-worker-threads-eval.d.ts.map +1 -0
  273. package/dist/rules/no-node-worker-threads-eval.js +151 -0
  274. package/dist/rules/no-node-worker-threads-eval.js.map +1 -0
  275. package/dist/rules/no-nonnull-assertion-on-security-input.d.ts +5 -0
  276. package/dist/rules/no-nonnull-assertion-on-security-input.d.ts.map +1 -0
  277. package/dist/rules/no-nonnull-assertion-on-security-input.js +48 -0
  278. package/dist/rules/no-nonnull-assertion-on-security-input.js.map +1 -0
  279. package/dist/rules/no-postmessage-star-origin.d.ts +5 -0
  280. package/dist/rules/no-postmessage-star-origin.d.ts.map +1 -0
  281. package/dist/rules/no-postmessage-star-origin.js +58 -0
  282. package/dist/rules/no-postmessage-star-origin.js.map +1 -0
  283. package/dist/rules/no-postmessage-without-origin-allowlist.d.ts +5 -0
  284. package/dist/rules/no-postmessage-without-origin-allowlist.d.ts.map +1 -0
  285. package/dist/rules/no-postmessage-without-origin-allowlist.js +80 -0
  286. package/dist/rules/no-postmessage-without-origin-allowlist.js.map +1 -0
  287. package/dist/rules/no-range-create-contextual-fragment.d.ts +5 -0
  288. package/dist/rules/no-range-create-contextual-fragment.d.ts.map +1 -0
  289. package/dist/rules/no-range-create-contextual-fragment.js +64 -0
  290. package/dist/rules/no-range-create-contextual-fragment.js.map +1 -0
  291. package/dist/rules/no-script-src-data-url.d.ts +5 -0
  292. package/dist/rules/no-script-src-data-url.d.ts.map +1 -0
  293. package/dist/rules/no-script-src-data-url.js +108 -0
  294. package/dist/rules/no-script-src-data-url.js.map +1 -0
  295. package/dist/rules/no-script-text.d.ts +5 -0
  296. package/dist/rules/no-script-text.d.ts.map +1 -0
  297. package/dist/rules/no-script-text.js +52 -0
  298. package/dist/rules/no-script-text.js.map +1 -0
  299. package/dist/rules/no-service-worker-unsafe-script-url.d.ts +5 -0
  300. package/dist/rules/no-service-worker-unsafe-script-url.d.ts.map +1 -0
  301. package/dist/rules/no-service-worker-unsafe-script-url.js +52 -0
  302. package/dist/rules/no-service-worker-unsafe-script-url.js.map +1 -0
  303. package/dist/rules/no-set-html-unsafe.d.ts +5 -0
  304. package/dist/rules/no-set-html-unsafe.d.ts.map +1 -0
  305. package/dist/rules/no-set-html-unsafe.js +48 -0
  306. package/dist/rules/no-set-html-unsafe.js.map +1 -0
  307. package/dist/rules/no-trusted-types-policy-pass-through.d.ts +5 -0
  308. package/dist/rules/no-trusted-types-policy-pass-through.d.ts.map +1 -0
  309. package/dist/rules/no-trusted-types-policy-pass-through.js +115 -0
  310. package/dist/rules/no-trusted-types-policy-pass-through.js.map +1 -0
  311. package/dist/rules/no-unsafe-alloc.d.ts +5 -0
  312. package/dist/rules/no-unsafe-alloc.d.ts.map +1 -0
  313. package/dist/rules/no-unsafe-alloc.js +51 -0
  314. package/dist/rules/no-unsafe-alloc.js.map +1 -0
  315. package/dist/rules/no-unsafe-cast-to-trusted-types.d.ts +5 -0
  316. package/dist/rules/no-unsafe-cast-to-trusted-types.d.ts.map +1 -0
  317. package/dist/rules/no-unsafe-cast-to-trusted-types.js +89 -0
  318. package/dist/rules/no-unsafe-cast-to-trusted-types.js.map +1 -0
  319. package/dist/rules/no-window-open-without-noopener.d.ts +5 -0
  320. package/dist/rules/no-window-open-without-noopener.d.ts.map +1 -0
  321. package/dist/rules/no-window-open-without-noopener.js +84 -0
  322. package/dist/rules/no-window-open-without-noopener.js.map +1 -0
  323. package/dist/rules/no-winjs-html-unsafe.d.ts +5 -0
  324. package/dist/rules/no-winjs-html-unsafe.d.ts.map +1 -0
  325. package/dist/rules/no-winjs-html-unsafe.js +32 -0
  326. package/dist/rules/no-winjs-html-unsafe.js.map +1 -0
  327. package/dist/rules/no-worker-blob-url.d.ts +5 -0
  328. package/dist/rules/no-worker-blob-url.d.ts.map +1 -0
  329. package/dist/rules/no-worker-blob-url.js +64 -0
  330. package/dist/rules/no-worker-blob-url.js.map +1 -0
  331. package/dist/rules/no-worker-data-url.d.ts +5 -0
  332. package/dist/rules/no-worker-data-url.d.ts.map +1 -0
  333. package/dist/rules/no-worker-data-url.js +67 -0
  334. package/dist/rules/no-worker-data-url.js.map +1 -0
  335. package/docs/rules/getting-started.md +70 -0
  336. package/docs/rules/no-angular-bypass-sanitizer.md +69 -0
  337. package/docs/rules/no-angular-bypass-security-trust-html.md +59 -0
  338. package/docs/rules/no-angular-innerhtml-binding.md +59 -0
  339. package/docs/rules/no-angular-sanitization-trusted-urls.md +64 -0
  340. package/docs/rules/no-angularjs-bypass-sce.md +64 -0
  341. package/docs/rules/no-angularjs-enable-svg.md +59 -0
  342. package/docs/rules/no-angularjs-ng-bind-html-without-sanitize.md +59 -0
  343. package/docs/rules/no-angularjs-sanitization-whitelist.md +63 -0
  344. package/docs/rules/no-angularjs-sce-resource-url-wildcard.md +62 -0
  345. package/docs/rules/no-child-process-exec.md +101 -0
  346. package/docs/rules/no-child-process-shell-true.md +59 -0
  347. package/docs/rules/no-cookies.md +61 -0
  348. package/docs/rules/no-document-domain.md +59 -0
  349. package/docs/rules/no-document-execcommand-insert-html.md +69 -0
  350. package/docs/rules/no-document-parse-html-unsafe.md +72 -0
  351. package/docs/rules/no-document-write.md +64 -0
  352. package/docs/rules/no-domparser-html-without-sanitization.md +59 -0
  353. package/docs/rules/no-domparser-svg-without-sanitization.md +71 -0
  354. package/docs/rules/no-dynamic-import-unsafe-url.md +81 -0
  355. package/docs/rules/no-electron-allow-running-insecure-content.md +69 -0
  356. package/docs/rules/no-electron-dangerous-blink-features.md +77 -0
  357. package/docs/rules/no-electron-disable-context-isolation.md +69 -0
  358. package/docs/rules/no-electron-disable-sandbox.md +69 -0
  359. package/docs/rules/no-electron-disable-web-security.md +69 -0
  360. package/docs/rules/no-electron-enable-remote-module.md +69 -0
  361. package/docs/rules/no-electron-enable-webview-tag.md +77 -0
  362. package/docs/rules/no-electron-experimental-features.md +77 -0
  363. package/docs/rules/no-electron-expose-raw-ipc-renderer.md +79 -0
  364. package/docs/rules/no-electron-insecure-certificate-error-handler.md +72 -0
  365. package/docs/rules/no-electron-insecure-certificate-verify-proc.md +63 -0
  366. package/docs/rules/no-electron-insecure-permission-request-handler.md +67 -0
  367. package/docs/rules/no-electron-node-integration.md +70 -0
  368. package/docs/rules/no-electron-permission-check-handler-allow-all.md +66 -0
  369. package/docs/rules/no-electron-unchecked-ipc-sender.md +62 -0
  370. package/docs/rules/no-electron-unrestricted-navigation.md +64 -0
  371. package/docs/rules/no-electron-untrusted-open-external.md +65 -0
  372. package/docs/rules/no-electron-webview-allowpopups.md +59 -0
  373. package/docs/rules/no-electron-webview-insecure-webpreferences.md +84 -0
  374. package/docs/rules/no-electron-webview-node-integration.md +59 -0
  375. package/docs/rules/no-html-method.md +58 -0
  376. package/docs/rules/no-http-request-to-insecure-protocol.md +59 -0
  377. package/docs/rules/no-iframe-srcdoc.md +76 -0
  378. package/docs/rules/no-inner-html.md +65 -0
  379. package/docs/rules/no-insecure-random.md +66 -0
  380. package/docs/rules/no-insecure-tls-agent-options.md +59 -0
  381. package/docs/rules/no-insecure-url.md +72 -0
  382. package/docs/rules/no-location-javascript-url.md +59 -0
  383. package/docs/rules/no-message-event-without-origin-check.md +82 -0
  384. package/docs/rules/no-msapp-exec-unsafe.md +59 -0
  385. package/docs/rules/no-node-tls-check-server-identity-bypass.md +88 -0
  386. package/docs/rules/no-node-tls-legacy-protocol.md +80 -0
  387. package/docs/rules/no-node-tls-reject-unauthorized-zero.md +61 -0
  388. package/docs/rules/no-node-tls-security-level-zero.md +77 -0
  389. package/docs/rules/no-node-vm-run-in-context.md +89 -0
  390. package/docs/rules/no-node-vm-source-text-module.md +79 -0
  391. package/docs/rules/no-node-worker-threads-eval.md +82 -0
  392. package/docs/rules/no-nonnull-assertion-on-security-input.md +59 -0
  393. package/docs/rules/no-postmessage-star-origin.md +59 -0
  394. package/docs/rules/no-postmessage-without-origin-allowlist.md +59 -0
  395. package/docs/rules/no-range-create-contextual-fragment.md +64 -0
  396. package/docs/rules/no-script-src-data-url.md +83 -0
  397. package/docs/rules/no-script-text.md +80 -0
  398. package/docs/rules/no-service-worker-unsafe-script-url.md +85 -0
  399. package/docs/rules/no-set-html-unsafe.md +64 -0
  400. package/docs/rules/no-trusted-types-policy-pass-through.md +68 -0
  401. package/docs/rules/no-unsafe-alloc.md +62 -0
  402. package/docs/rules/no-unsafe-cast-to-trusted-types.md +59 -0
  403. package/docs/rules/no-window-open-without-noopener.md +63 -0
  404. package/docs/rules/no-winjs-html-unsafe.md +60 -0
  405. package/docs/rules/no-worker-blob-url.md +86 -0
  406. package/docs/rules/no-worker-data-url.md +85 -0
  407. package/docs/rules/overview.md +111 -0
  408. package/docs/rules/presets/angular.md +35 -0
  409. package/docs/rules/presets/angularjs.md +36 -0
  410. package/docs/rules/presets/common.md +59 -0
  411. package/docs/rules/presets/electron.md +51 -0
  412. package/docs/rules/presets/index.md +26 -0
  413. package/docs/rules/presets/node.md +43 -0
  414. package/docs/rules/presets/react.md +33 -0
  415. package/docs/rules/presets/recommended.md +104 -0
  416. package/docs/rules/presets/required.md +99 -0
  417. package/docs/rules/presets/typescript.md +34 -0
  418. package/package.json +583 -0
@@ -0,0 +1,48 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ const SECURITY_INPUT_PATTERN = /html|input|message|origin|payload|token|url/iu;
3
+ const isSecuritySensitiveExpression = (expression) => {
4
+ if (expression.type === "Identifier") {
5
+ return SECURITY_INPUT_PATTERN.test(expression.name);
6
+ }
7
+ if (expression.type === "MemberExpression" &&
8
+ !expression.computed &&
9
+ expression.property.type === "Identifier") {
10
+ return SECURITY_INPUT_PATTERN.test(expression.property.name);
11
+ }
12
+ return false;
13
+ };
14
+ /** Rule implementation. */
15
+ const rule = createRule({
16
+ create(context) {
17
+ return {
18
+ TSNonNullExpression(node) {
19
+ if (!isSecuritySensitiveExpression(node.expression)) {
20
+ return;
21
+ }
22
+ context.report({
23
+ messageId: "default",
24
+ node,
25
+ });
26
+ },
27
+ };
28
+ },
29
+ defaultOptions: [],
30
+ meta: {
31
+ deprecated: false,
32
+ docs: {
33
+ description: "disallow non-null assertions on likely security-sensitive input values.",
34
+ frozen: false,
35
+ recommended: false,
36
+ url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-nonnull-assertion-on-security-input",
37
+ },
38
+ messages: {
39
+ default: "Avoid non-null assertions on security-sensitive inputs; validate before use.",
40
+ },
41
+ schema: [],
42
+ type: "problem",
43
+ },
44
+ name: "no-nonnull-assertion-on-security-input",
45
+ });
46
+ export default rule;
47
+ /* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
48
+ //# sourceMappingURL=no-nonnull-assertion-on-security-input.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-nonnull-assertion-on-security-input.js","sourceRoot":"","sources":["../../src/rules/no-nonnull-assertion-on-security-input.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAIzD,MAAM,sBAAsB,GAAG,+CAA+C,CAAC;AAE/E,MAAM,6BAA6B,GAAG,CAClC,UAA+B,EACxB,EAAE;IACT,IAAI,UAAU,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;QACnC,OAAO,sBAAsB,CAAC,IAAI,CAAC,UAAU,CAAC,IAAI,CAAC,CAAC;IACxD,CAAC;IAED,IACI,UAAU,CAAC,IAAI,KAAK,kBAAkB;QACtC,CAAC,UAAU,CAAC,QAAQ;QACpB,UAAU,CAAC,QAAQ,CAAC,IAAI,KAAK,YAAY,EAC3C,CAAC;QACC,OAAO,sBAAsB,CAAC,IAAI,CAAC,UAAU,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC;IACjE,CAAC;IAED,OAAO,KAAK,CAAC;AACjB,CAAC,CAAC;AAEF,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,mBAAmB,CAAC,IAAkC;gBAClD,IAAI,CAAC,6BAA6B,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;oBAClD,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI;iBACP,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,yEAAyE;YAC7E,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,oGAAoG;SAC5G;QACD,QAAQ,EAAE;YACN,OAAO,EACH,8EAA8E;SACrF;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,wCAAwC;CACjD,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
@@ -0,0 +1,5 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ /** Rule implementation. */
3
+ declare const rule: ReturnType<typeof createRule>;
4
+ export default rule;
5
+ //# sourceMappingURL=no-postmessage-star-origin.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-postmessage-star-origin.d.ts","sourceRoot":"","sources":["../../src/rules/no-postmessage-star-origin.ts"],"names":[],"mappings":"AAQA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAIzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CAwEtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
@@ -0,0 +1,58 @@
1
+ import { arrayIncludes, isDefined } from "ts-extras";
2
+ import { getFullTypeChecker, getNodeTypeAsString, } from "../_internal/ast-utils.js";
3
+ import { createRule } from "../_internal/create-rule.js";
4
+ /** Rule implementation. */
5
+ const rule = createRule({
6
+ create(context) {
7
+ const fullTypeChecker = getFullTypeChecker(context);
8
+ return {
9
+ "CallExpression[arguments.length>=2][arguments.length<=3][callee.property.name='postMessage']"(node) {
10
+ const [, targetOrigin] = node.arguments;
11
+ if (!isDefined(targetOrigin) ||
12
+ targetOrigin.type !== "Literal" ||
13
+ targetOrigin.value !== "*") {
14
+ return;
15
+ }
16
+ if (isDefined(fullTypeChecker) &&
17
+ node.callee.type === "MemberExpression") {
18
+ const calleeObjectType = getNodeTypeAsString(fullTypeChecker, node.callee.object, context);
19
+ if (!arrayIncludes(["any", "Window"], calleeObjectType)) {
20
+ return;
21
+ }
22
+ }
23
+ context.report({
24
+ messageId: "default",
25
+ node: targetOrigin,
26
+ suggest: [
27
+ {
28
+ fix(fixer) {
29
+ return fixer.replaceText(targetOrigin, "location.origin");
30
+ },
31
+ messageId: "replaceWithExplicitOrigin",
32
+ },
33
+ ],
34
+ });
35
+ },
36
+ };
37
+ },
38
+ defaultOptions: [],
39
+ meta: {
40
+ deprecated: false,
41
+ docs: {
42
+ description: "disallow '*' targetOrigin in postMessage calls to prevent cross-origin data leakage.",
43
+ frozen: false,
44
+ recommended: false,
45
+ url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-postmessage-star-origin",
46
+ },
47
+ hasSuggestions: true,
48
+ messages: {
49
+ default: "Do not use '*' as targetOrigin when sending data with postMessage.",
50
+ replaceWithExplicitOrigin: "Replace '*' with a specific trusted origin, such as location.origin.",
51
+ },
52
+ schema: [],
53
+ type: "problem",
54
+ },
55
+ name: "no-postmessage-star-origin",
56
+ });
57
+ export default rule;
58
+ //# sourceMappingURL=no-postmessage-star-origin.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-postmessage-star-origin.js","sourceRoot":"","sources":["../../src/rules/no-postmessage-star-origin.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,aAAa,EAAE,SAAS,EAAE,MAAM,WAAW,CAAC;AAErD,OAAO,EACH,kBAAkB,EAClB,mBAAmB,GACtB,MAAM,2BAA2B,CAAC;AACnC,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAIzD,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,MAAM,eAAe,GAAG,kBAAkB,CAAC,OAAO,CAAC,CAAC;QAEpD,OAAO;YACH,8FAA8F,CAC1F,IAA6B;gBAE7B,MAAM,CAAC,EAAE,YAAY,CAAC,GAAG,IAAI,CAAC,SAAS,CAAC;gBAExC,IACI,CAAC,SAAS,CAAC,YAAY,CAAC;oBACxB,YAAY,CAAC,IAAI,KAAK,SAAS;oBAC/B,YAAY,CAAC,KAAK,KAAK,GAAG,EAC5B,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,IACI,SAAS,CAAC,eAAe,CAAC;oBAC1B,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,kBAAkB,EACzC,CAAC;oBACC,MAAM,gBAAgB,GAAG,mBAAmB,CACxC,eAAe,EACf,IAAI,CAAC,MAAM,CAAC,MAAM,EAClB,OAAO,CACV,CAAC;oBAEF,IAAI,CAAC,aAAa,CAAC,CAAC,KAAK,EAAE,QAAQ,CAAC,EAAE,gBAAgB,CAAC,EAAE,CAAC;wBACtD,OAAO;oBACX,CAAC;gBACL,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI,EAAE,YAAY;oBAClB,OAAO,EAAE;wBACL;4BACI,GAAG,CAAC,KAAK;gCACL,OAAO,KAAK,CAAC,WAAW,CACpB,YAAY,EACZ,iBAAiB,CACpB,CAAC;4BACN,CAAC;4BACD,SAAS,EAAE,2BAA2B;yBACzC;qBACJ;iBACJ,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,sFAAsF;YAC1F,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,wFAAwF;SAChG;QACD,cAAc,EAAE,IAAI;QACpB,QAAQ,EAAE;YACN,OAAO,EACH,oEAAoE;YACxE,yBAAyB,EACrB,sEAAsE;SAC7E;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,4BAA4B;CACrC,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC"}
@@ -0,0 +1,5 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ /** Rule implementation. */
3
+ declare const rule: ReturnType<typeof createRule>;
4
+ export default rule;
5
+ //# sourceMappingURL=no-postmessage-without-origin-allowlist.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-postmessage-without-origin-allowlist.d.ts","sourceRoot":"","sources":["../../src/rules/no-postmessage-without-origin-allowlist.ts"],"names":[],"mappings":"AAKA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAoDzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CAwDtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
@@ -0,0 +1,80 @@
1
+ import { arrayFirst } from "ts-extras";
2
+ import { createRule } from "../_internal/create-rule.js";
3
+ const getMemberPropertyName = (memberExpression) => {
4
+ if (!memberExpression.computed &&
5
+ memberExpression.property.type === "Identifier") {
6
+ return memberExpression.property.name;
7
+ }
8
+ if (memberExpression.property.type === "Literal" &&
9
+ typeof memberExpression.property.value === "string") {
10
+ return memberExpression.property.value;
11
+ }
12
+ return undefined;
13
+ };
14
+ const getStaticStringValue = (node) => {
15
+ if (node.type === "Literal" && typeof node.value === "string") {
16
+ return node.value;
17
+ }
18
+ if (node.type === "TemplateLiteral" && node.expressions.length === 0) {
19
+ return arrayFirst(node.quasis)?.value.cooked ?? undefined;
20
+ }
21
+ return undefined;
22
+ };
23
+ const isAllowedOriginLiteral = (origin) => {
24
+ const normalizedOrigin = origin.trim();
25
+ if (normalizedOrigin === "") {
26
+ return false;
27
+ }
28
+ if (normalizedOrigin.includes("*")) {
29
+ return false;
30
+ }
31
+ return /^https?:\/\//iu.test(normalizedOrigin);
32
+ };
33
+ /** Rule implementation. */
34
+ const rule = createRule({
35
+ create(context) {
36
+ return {
37
+ CallExpression(node) {
38
+ if (node.callee.type !== "MemberExpression") {
39
+ return;
40
+ }
41
+ if (getMemberPropertyName(node.callee) !== "postMessage") {
42
+ return;
43
+ }
44
+ const [, secondArgument] = node.arguments;
45
+ if (secondArgument === undefined ||
46
+ secondArgument.type === "SpreadElement") {
47
+ return;
48
+ }
49
+ const secondArgumentValue = getStaticStringValue(secondArgument);
50
+ if (typeof secondArgumentValue === "string" &&
51
+ isAllowedOriginLiteral(secondArgumentValue)) {
52
+ return;
53
+ }
54
+ context.report({
55
+ messageId: "default",
56
+ node: secondArgument,
57
+ });
58
+ },
59
+ };
60
+ },
61
+ defaultOptions: [],
62
+ meta: {
63
+ deprecated: false,
64
+ docs: {
65
+ description: "require explicit, allowlisted postMessage target origins instead of wildcard/dynamic values.",
66
+ frozen: false,
67
+ recommended: false,
68
+ url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-postmessage-without-origin-allowlist",
69
+ },
70
+ messages: {
71
+ default: "Use a strict, explicit allowlisted origin for postMessage targetOrigin.",
72
+ },
73
+ schema: [],
74
+ type: "problem",
75
+ },
76
+ name: "no-postmessage-without-origin-allowlist",
77
+ });
78
+ export default rule;
79
+ /* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
80
+ //# sourceMappingURL=no-postmessage-without-origin-allowlist.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-postmessage-without-origin-allowlist.js","sourceRoot":"","sources":["../../src/rules/no-postmessage-without-origin-allowlist.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,WAAW,CAAC;AAEvC,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAIzD,MAAM,qBAAqB,GAAG,CAC1B,gBAA2C,EACzB,EAAE;IACpB,IACI,CAAC,gBAAgB,CAAC,QAAQ;QAC1B,gBAAgB,CAAC,QAAQ,CAAC,IAAI,KAAK,YAAY,EACjD,CAAC;QACC,OAAO,gBAAgB,CAAC,QAAQ,CAAC,IAAI,CAAC;IAC1C,CAAC;IAED,IACI,gBAAgB,CAAC,QAAQ,CAAC,IAAI,KAAK,SAAS;QAC5C,OAAO,gBAAgB,CAAC,QAAQ,CAAC,KAAK,KAAK,QAAQ,EACrD,CAAC;QACC,OAAO,gBAAgB,CAAC,QAAQ,CAAC,KAAK,CAAC;IAC3C,CAAC;IAED,OAAO,SAAS,CAAC;AACrB,CAAC,CAAC;AAEF,MAAM,oBAAoB,GAAG,CACzB,IAAyB,EACP,EAAE;IACpB,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,IAAI,OAAO,IAAI,CAAC,KAAK,KAAK,QAAQ,EAAE,CAAC;QAC5D,OAAO,IAAI,CAAC,KAAK,CAAC;IACtB,CAAC;IAED,IAAI,IAAI,CAAC,IAAI,KAAK,iBAAiB,IAAI,IAAI,CAAC,WAAW,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;QACnE,OAAO,UAAU,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,KAAK,CAAC,MAAM,IAAI,SAAS,CAAC;IAC9D,CAAC;IAED,OAAO,SAAS,CAAC;AACrB,CAAC,CAAC;AAEF,MAAM,sBAAsB,GAAG,CAAC,MAAc,EAAW,EAAE;IACvD,MAAM,gBAAgB,GAAG,MAAM,CAAC,IAAI,EAAE,CAAC;IAEvC,IAAI,gBAAgB,KAAK,EAAE,EAAE,CAAC;QAC1B,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,IAAI,gBAAgB,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;QACjC,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,OAAO,gBAAgB,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;AACnD,CAAC,CAAC;AAEF,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,cAAc,CAAC,IAA6B;gBACxC,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;oBAC1C,OAAO;gBACX,CAAC;gBAED,IAAI,qBAAqB,CAAC,IAAI,CAAC,MAAM,CAAC,KAAK,aAAa,EAAE,CAAC;oBACvD,OAAO;gBACX,CAAC;gBAED,MAAM,CAAC,EAAE,cAAc,CAAC,GAAG,IAAI,CAAC,SAAS,CAAC;gBAE1C,IACI,cAAc,KAAK,SAAS;oBAC5B,cAAc,CAAC,IAAI,KAAK,eAAe,EACzC,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,MAAM,mBAAmB,GACrB,oBAAoB,CAAC,cAAc,CAAC,CAAC;gBAEzC,IACI,OAAO,mBAAmB,KAAK,QAAQ;oBACvC,sBAAsB,CAAC,mBAAmB,CAAC,EAC7C,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI,EAAE,cAAc;iBACvB,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,8FAA8F;YAClG,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,qGAAqG;SAC7G;QACD,QAAQ,EAAE;YACN,OAAO,EACH,yEAAyE;SAChF;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,yCAAyC;CAClD,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
@@ -0,0 +1,5 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ /** Rule implementation. */
3
+ declare const rule: ReturnType<typeof createRule>;
4
+ export default rule;
5
+ //# sourceMappingURL=no-range-create-contextual-fragment.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-range-create-contextual-fragment.d.ts","sourceRoot":"","sources":["../../src/rules/no-range-create-contextual-fragment.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAyCzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CA4CtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
@@ -0,0 +1,64 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ import { getMemberPropertyName, getStaticStringValue, } from "../_internal/estree-utils.js";
3
+ const isSanitizedExpression = (node) => {
4
+ if (node.type !== "CallExpression") {
5
+ return false;
6
+ }
7
+ if (node.callee.type === "Identifier") {
8
+ return /createhtml|sanitize|trusted/u.test(node.callee.name.toLowerCase());
9
+ }
10
+ if (node.callee.type !== "MemberExpression") {
11
+ return false;
12
+ }
13
+ const propertyName = getMemberPropertyName(node.callee);
14
+ return (typeof propertyName === "string" &&
15
+ /createhtml|sanitize|trusted/u.test(propertyName.toLowerCase()));
16
+ };
17
+ const isCreateContextualFragmentCall = (node) => {
18
+ if (node.callee.type !== "MemberExpression") {
19
+ return false;
20
+ }
21
+ return getMemberPropertyName(node.callee) === "createContextualFragment";
22
+ };
23
+ /** Rule implementation. */
24
+ const rule = createRule({
25
+ create(context) {
26
+ return {
27
+ CallExpression(node) {
28
+ if (!isCreateContextualFragmentCall(node)) {
29
+ return;
30
+ }
31
+ const [firstArgument] = node.arguments;
32
+ if (firstArgument === undefined ||
33
+ firstArgument.type === "SpreadElement" ||
34
+ getStaticStringValue(firstArgument) === "" ||
35
+ isSanitizedExpression(firstArgument)) {
36
+ return;
37
+ }
38
+ context.report({
39
+ messageId: "default",
40
+ node: firstArgument,
41
+ });
42
+ },
43
+ };
44
+ },
45
+ defaultOptions: [],
46
+ meta: {
47
+ deprecated: false,
48
+ docs: {
49
+ description: "disallow Range.createContextualFragment(...) calls on unsanitized HTML input.",
50
+ frozen: false,
51
+ recommended: false,
52
+ url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-range-create-contextual-fragment",
53
+ },
54
+ messages: {
55
+ default: "Sanitize HTML before passing it to Range.createContextualFragment().",
56
+ },
57
+ schema: [],
58
+ type: "problem",
59
+ },
60
+ name: "no-range-create-contextual-fragment",
61
+ });
62
+ export default rule;
63
+ /* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
64
+ //# sourceMappingURL=no-range-create-contextual-fragment.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-range-create-contextual-fragment.js","sourceRoot":"","sources":["../../src/rules/no-range-create-contextual-fragment.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACzD,OAAO,EACH,qBAAqB,EACrB,oBAAoB,GACvB,MAAM,8BAA8B,CAAC;AAItC,MAAM,qBAAqB,GAAG,CAAC,IAAyB,EAAW,EAAE;IACjE,IAAI,IAAI,CAAC,IAAI,KAAK,gBAAgB,EAAE,CAAC;QACjC,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;QACpC,OAAO,8BAA8B,CAAC,IAAI,CACtC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,EAAE,CACjC,CAAC;IACN,CAAC;IAED,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;QAC1C,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,MAAM,YAAY,GAAG,qBAAqB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;IAExD,OAAO,CACH,OAAO,YAAY,KAAK,QAAQ;QAChC,8BAA8B,CAAC,IAAI,CAAC,YAAY,CAAC,WAAW,EAAE,CAAC,CAClE,CAAC;AACN,CAAC,CAAC;AAEF,MAAM,8BAA8B,GAAG,CACnC,IAA6B,EACtB,EAAE;IACT,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;QAC1C,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,OAAO,qBAAqB,CAAC,IAAI,CAAC,MAAM,CAAC,KAAK,0BAA0B,CAAC;AAC7E,CAAC,CAAC;AAEF,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,cAAc,CAAC,IAA6B;gBACxC,IAAI,CAAC,8BAA8B,CAAC,IAAI,CAAC,EAAE,CAAC;oBACxC,OAAO;gBACX,CAAC;gBAED,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,SAAS,CAAC;gBAEvC,IACI,aAAa,KAAK,SAAS;oBAC3B,aAAa,CAAC,IAAI,KAAK,eAAe;oBACtC,oBAAoB,CAAC,aAAa,CAAC,KAAK,EAAE;oBAC1C,qBAAqB,CAAC,aAAa,CAAC,EACtC,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI,EAAE,aAAa;iBACtB,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,+EAA+E;YACnF,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,iGAAiG;SACzG;QACD,QAAQ,EAAE;YACN,OAAO,EACH,sEAAsE;SAC7E;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,qCAAqC;CAC9C,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
@@ -0,0 +1,5 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ /** Rule implementation. */
3
+ declare const rule: ReturnType<typeof createRule>;
4
+ export default rule;
5
+ //# sourceMappingURL=no-script-src-data-url.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-script-src-data-url.d.ts","sourceRoot":"","sources":["../../src/rules/no-script-src-data-url.ts"],"names":[],"mappings":"AAIA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AA0BzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CAiItC,CAAC;AAEH,eAAe,IAAI,CAAC"}
@@ -0,0 +1,108 @@
1
+ import { getFullTypeChecker } from "../_internal/ast-utils.js";
2
+ import { createRule } from "../_internal/create-rule.js";
3
+ import { getMemberPropertyName, getStaticJsxAttributeStringValue, getStaticStringValue, } from "../_internal/estree-utils.js";
4
+ import { isLikelyScriptElement } from "../_internal/script-element.js";
5
+ const isDataUrl = (value) => /^\s*data:/iu.test(value);
6
+ const isJsxScriptElement = (node) => node.name.type === "JSXIdentifier" &&
7
+ node.name.name.toLowerCase() === "script";
8
+ const getJsxAttributeName = (attributeNode) => {
9
+ if (attributeNode.name.type !== "JSXIdentifier") {
10
+ return undefined;
11
+ }
12
+ return attributeNode.name.name.toLowerCase();
13
+ };
14
+ /** Rule implementation. */
15
+ const rule = createRule({
16
+ create(context) {
17
+ const fullTypeChecker = getFullTypeChecker(context);
18
+ return {
19
+ AssignmentExpression(node) {
20
+ if (node.left.type !== "MemberExpression") {
21
+ return;
22
+ }
23
+ if (getMemberPropertyName(node.left) !== "src") {
24
+ return;
25
+ }
26
+ const configuredValue = getStaticStringValue(node.right);
27
+ if (typeof configuredValue !== "string" ||
28
+ !isDataUrl(configuredValue) ||
29
+ !isLikelyScriptElement(node.left.object, context, fullTypeChecker)) {
30
+ return;
31
+ }
32
+ context.report({
33
+ messageId: "default",
34
+ node: node.right,
35
+ });
36
+ },
37
+ CallExpression(node) {
38
+ if (node.callee.type !== "MemberExpression") {
39
+ return;
40
+ }
41
+ const methodName = getMemberPropertyName(node.callee);
42
+ if (methodName !== "setAttribute" &&
43
+ methodName !== "setAttributeNS") {
44
+ return;
45
+ }
46
+ const [firstArgument, secondArgument] = node.arguments;
47
+ if (firstArgument === undefined ||
48
+ firstArgument.type === "SpreadElement" ||
49
+ getStaticStringValue(firstArgument) !== "src" ||
50
+ secondArgument === undefined ||
51
+ secondArgument.type === "SpreadElement") {
52
+ return;
53
+ }
54
+ const configuredValue = getStaticStringValue(secondArgument);
55
+ if (typeof configuredValue !== "string" ||
56
+ !isDataUrl(configuredValue) ||
57
+ !isLikelyScriptElement(node.callee.object, context, fullTypeChecker)) {
58
+ return;
59
+ }
60
+ context.report({
61
+ messageId: "default",
62
+ node: secondArgument,
63
+ });
64
+ },
65
+ JSXOpeningElement(node) {
66
+ if (!isJsxScriptElement(node)) {
67
+ return;
68
+ }
69
+ for (const attributeNode of node.attributes) {
70
+ if (attributeNode.type !== "JSXAttribute") {
71
+ continue;
72
+ }
73
+ if (getJsxAttributeName(attributeNode) !== "src") {
74
+ continue;
75
+ }
76
+ const staticValue = getStaticJsxAttributeStringValue(attributeNode.value);
77
+ if (typeof staticValue !== "string" ||
78
+ !isDataUrl(staticValue)) {
79
+ continue;
80
+ }
81
+ context.report({
82
+ messageId: "default",
83
+ node: attributeNode,
84
+ });
85
+ }
86
+ },
87
+ };
88
+ },
89
+ defaultOptions: [],
90
+ meta: {
91
+ deprecated: false,
92
+ docs: {
93
+ description: "disallow HTMLScriptElement src values that load executable code from data: URLs.",
94
+ frozen: false,
95
+ recommended: false,
96
+ url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-script-src-data-url",
97
+ },
98
+ messages: {
99
+ default: "Do not load script code from a data: URL; use a reviewed external resource or module instead.",
100
+ },
101
+ schema: [],
102
+ type: "problem",
103
+ },
104
+ name: "no-script-src-data-url",
105
+ });
106
+ export default rule;
107
+ /* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
108
+ //# sourceMappingURL=no-script-src-data-url.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-script-src-data-url.js","sourceRoot":"","sources":["../../src/rules/no-script-src-data-url.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAC;AAC/D,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACzD,OAAO,EACH,qBAAqB,EACrB,gCAAgC,EAChC,oBAAoB,GACvB,MAAM,8BAA8B,CAAC;AACtC,OAAO,EAAE,qBAAqB,EAAE,MAAM,gCAAgC,CAAC;AAIvE,MAAM,SAAS,GAAG,CAAC,KAAa,EAAW,EAAE,CAAC,aAAa,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;AAExE,MAAM,kBAAkB,GAAG,CAAC,IAAgC,EAAW,EAAE,CACrE,IAAI,CAAC,IAAI,CAAC,IAAI,KAAK,eAAe;IAClC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,KAAK,QAAQ,CAAC;AAE9C,MAAM,mBAAmB,GAAG,CACxB,aAAoC,EAClB,EAAE;IACpB,IAAI,aAAa,CAAC,IAAI,CAAC,IAAI,KAAK,eAAe,EAAE,CAAC;QAC9C,OAAO,SAAS,CAAC;IACrB,CAAC;IAED,OAAO,aAAa,CAAC,IAAI,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;AACjD,CAAC,CAAC;AAEF,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,MAAM,eAAe,GAAG,kBAAkB,CAAC,OAAO,CAAC,CAAC;QAEpD,OAAO;YACH,oBAAoB,CAAC,IAAmC;gBACpD,IAAI,IAAI,CAAC,IAAI,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;oBACxC,OAAO;gBACX,CAAC;gBAED,IAAI,qBAAqB,CAAC,IAAI,CAAC,IAAI,CAAC,KAAK,KAAK,EAAE,CAAC;oBAC7C,OAAO;gBACX,CAAC;gBAED,MAAM,eAAe,GAAG,oBAAoB,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;gBAEzD,IACI,OAAO,eAAe,KAAK,QAAQ;oBACnC,CAAC,SAAS,CAAC,eAAe,CAAC;oBAC3B,CAAC,qBAAqB,CAClB,IAAI,CAAC,IAAI,CAAC,MAAM,EAChB,OAAO,EACP,eAAe,CAClB,EACH,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI,EAAE,IAAI,CAAC,KAAK;iBACnB,CAAC,CAAC;YACP,CAAC;YACD,cAAc,CAAC,IAA6B;gBACxC,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;oBAC1C,OAAO;gBACX,CAAC;gBAED,MAAM,UAAU,GAAG,qBAAqB,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;gBAEtD,IACI,UAAU,KAAK,cAAc;oBAC7B,UAAU,KAAK,gBAAgB,EACjC,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,MAAM,CAAC,aAAa,EAAE,cAAc,CAAC,GAAG,IAAI,CAAC,SAAS,CAAC;gBAEvD,IACI,aAAa,KAAK,SAAS;oBAC3B,aAAa,CAAC,IAAI,KAAK,eAAe;oBACtC,oBAAoB,CAAC,aAAa,CAAC,KAAK,KAAK;oBAC7C,cAAc,KAAK,SAAS;oBAC5B,cAAc,CAAC,IAAI,KAAK,eAAe,EACzC,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,MAAM,eAAe,GAAG,oBAAoB,CAAC,cAAc,CAAC,CAAC;gBAE7D,IACI,OAAO,eAAe,KAAK,QAAQ;oBACnC,CAAC,SAAS,CAAC,eAAe,CAAC;oBAC3B,CAAC,qBAAqB,CAClB,IAAI,CAAC,MAAM,CAAC,MAAM,EAClB,OAAO,EACP,eAAe,CAClB,EACH,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI,EAAE,cAAc;iBACvB,CAAC,CAAC;YACP,CAAC;YACD,iBAAiB,CAAC,IAAgC;gBAC9C,IAAI,CAAC,kBAAkB,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC5B,OAAO;gBACX,CAAC;gBAED,KAAK,MAAM,aAAa,IAAI,IAAI,CAAC,UAAU,EAAE,CAAC;oBAC1C,IAAI,aAAa,CAAC,IAAI,KAAK,cAAc,EAAE,CAAC;wBACxC,SAAS;oBACb,CAAC;oBAED,IAAI,mBAAmB,CAAC,aAAa,CAAC,KAAK,KAAK,EAAE,CAAC;wBAC/C,SAAS;oBACb,CAAC;oBAED,MAAM,WAAW,GAAG,gCAAgC,CAChD,aAAa,CAAC,KAAK,CACtB,CAAC;oBAEF,IACI,OAAO,WAAW,KAAK,QAAQ;wBAC/B,CAAC,SAAS,CAAC,WAAW,CAAC,EACzB,CAAC;wBACC,SAAS;oBACb,CAAC;oBAED,OAAO,CAAC,MAAM,CAAC;wBACX,SAAS,EAAE,SAAS;wBACpB,IAAI,EAAE,aAAa;qBACtB,CAAC,CAAC;gBACP,CAAC;YACL,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,kFAAkF;YACtF,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,oFAAoF;SAC5F;QACD,QAAQ,EAAE;YACN,OAAO,EACH,+FAA+F;SACtG;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,wBAAwB;CACjC,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
@@ -0,0 +1,5 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ /** Rule implementation. */
3
+ declare const rule: ReturnType<typeof createRule>;
4
+ export default rule;
5
+ //# sourceMappingURL=no-script-text.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-script-text.d.ts","sourceRoot":"","sources":["../../src/rules/no-script-text.ts"],"names":[],"mappings":"AAIA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAczD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CAuDtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
@@ -0,0 +1,52 @@
1
+ import { getFullTypeChecker } from "../_internal/ast-utils.js";
2
+ import { createRule } from "../_internal/create-rule.js";
3
+ import { getMemberPropertyName, getStaticStringValue, } from "../_internal/estree-utils.js";
4
+ import { isLikelyScriptElement } from "../_internal/script-element.js";
5
+ const isScriptTextPropertyName = (propertyName) => propertyName === "innerText" ||
6
+ propertyName === "text" ||
7
+ propertyName === "textContent";
8
+ /** Rule implementation. */
9
+ const rule = createRule({
10
+ create(context) {
11
+ const fullTypeChecker = getFullTypeChecker(context);
12
+ return {
13
+ AssignmentExpression(node) {
14
+ if (node.left.type !== "MemberExpression") {
15
+ return;
16
+ }
17
+ if (!isScriptTextPropertyName(getMemberPropertyName(node.left))) {
18
+ return;
19
+ }
20
+ if (getStaticStringValue(node.right) === "") {
21
+ return;
22
+ }
23
+ if (!isLikelyScriptElement(node.left.object, context, fullTypeChecker)) {
24
+ return;
25
+ }
26
+ context.report({
27
+ messageId: "default",
28
+ node: node.right,
29
+ });
30
+ },
31
+ };
32
+ },
33
+ defaultOptions: [],
34
+ meta: {
35
+ deprecated: false,
36
+ docs: {
37
+ description: "disallow assigning executable code through HTMLScriptElement text, textContent, or innerText sinks.",
38
+ frozen: false,
39
+ recommended: false,
40
+ url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-script-text",
41
+ },
42
+ messages: {
43
+ default: "Do not inject executable code through script text sinks; load a reviewed script resource or module instead.",
44
+ },
45
+ schema: [],
46
+ type: "problem",
47
+ },
48
+ name: "no-script-text",
49
+ });
50
+ export default rule;
51
+ /* eslint-enable @typescript-eslint/prefer-readonly-parameter-types -- Restore linting after rule implementation declarations. */
52
+ //# sourceMappingURL=no-script-text.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-script-text.js","sourceRoot":"","sources":["../../src/rules/no-script-text.ts"],"names":[],"mappings":"AAGA,OAAO,EAAE,kBAAkB,EAAE,MAAM,2BAA2B,CAAC;AAC/D,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACzD,OAAO,EACH,qBAAqB,EACrB,oBAAoB,GACvB,MAAM,8BAA8B,CAAC;AACtC,OAAO,EAAE,qBAAqB,EAAE,MAAM,gCAAgC,CAAC;AAIvE,MAAM,wBAAwB,GAAG,CAAC,YAAgC,EAAW,EAAE,CAC3E,YAAY,KAAK,WAAW;IAC5B,YAAY,KAAK,MAAM;IACvB,YAAY,KAAK,aAAa,CAAC;AAEnC,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,MAAM,eAAe,GAAG,kBAAkB,CAAC,OAAO,CAAC,CAAC;QAEpD,OAAO;YACH,oBAAoB,CAAC,IAAmC;gBACpD,IAAI,IAAI,CAAC,IAAI,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;oBACxC,OAAO;gBACX,CAAC;gBAED,IACI,CAAC,wBAAwB,CAAC,qBAAqB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,EAC7D,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,IAAI,oBAAoB,CAAC,IAAI,CAAC,KAAK,CAAC,KAAK,EAAE,EAAE,CAAC;oBAC1C,OAAO;gBACX,CAAC;gBAED,IACI,CAAC,qBAAqB,CAClB,IAAI,CAAC,IAAI,CAAC,MAAM,EAChB,OAAO,EACP,eAAe,CAClB,EACH,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI,EAAE,IAAI,CAAC,KAAK;iBACnB,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,qGAAqG;YACzG,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,4EAA4E;SACpF;QACD,QAAQ,EAAE;YACN,OAAO,EACH,6GAA6G;SACpH;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,gBAAgB;CACzB,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC;AACpB,iIAAiI"}
@@ -0,0 +1,5 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ /** Rule implementation. */
3
+ declare const rule: ReturnType<typeof createRule>;
4
+ export default rule;
5
+ //# sourceMappingURL=no-service-worker-unsafe-script-url.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-service-worker-unsafe-script-url.d.ts","sourceRoot":"","sources":["../../src/rules/no-service-worker-unsafe-script-url.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AA4BzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CA2CtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
@@ -0,0 +1,52 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ import { getStaticStringValue } from "../_internal/estree-utils.js";
3
+ import { isBlobUrl, isDataUrl, isServiceWorkerRegisterCall, isUrlCreateObjectUrlCall, } from "../_internal/worker-code-loading.js";
4
+ const isJavaScriptUrl = (value) => /^\s*javascript\s*:/iu.test(value);
5
+ const isUnsafeServiceWorkerScriptUrl = (expression) => {
6
+ const configuredValue = getStaticStringValue(expression);
7
+ return ((typeof configuredValue === "string" &&
8
+ (isBlobUrl(configuredValue) ||
9
+ isDataUrl(configuredValue) ||
10
+ isJavaScriptUrl(configuredValue))) ||
11
+ isUrlCreateObjectUrlCall(expression));
12
+ };
13
+ /** Rule implementation. */
14
+ const rule = createRule({
15
+ create(context) {
16
+ return {
17
+ CallExpression(node) {
18
+ if (!isServiceWorkerRegisterCall(node.callee)) {
19
+ return;
20
+ }
21
+ const [firstArgument] = node.arguments;
22
+ if (firstArgument === undefined ||
23
+ firstArgument.type === "SpreadElement" ||
24
+ !isUnsafeServiceWorkerScriptUrl(firstArgument)) {
25
+ return;
26
+ }
27
+ context.report({
28
+ messageId: "default",
29
+ node: firstArgument,
30
+ });
31
+ },
32
+ };
33
+ },
34
+ defaultOptions: [],
35
+ meta: {
36
+ deprecated: false,
37
+ docs: {
38
+ description: "disallow unsafe service worker script URLs such as data:, blob:, javascript:, and direct URL.createObjectURL(...) registrations.",
39
+ frozen: false,
40
+ recommended: false,
41
+ url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-service-worker-unsafe-script-url",
42
+ },
43
+ messages: {
44
+ default: "Do not register a service worker from data:, blob:, javascript:, or URL.createObjectURL(...) script URLs.",
45
+ },
46
+ schema: [],
47
+ type: "problem",
48
+ },
49
+ name: "no-service-worker-unsafe-script-url",
50
+ });
51
+ export default rule;
52
+ //# sourceMappingURL=no-service-worker-unsafe-script-url.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-service-worker-unsafe-script-url.js","sourceRoot":"","sources":["../../src/rules/no-service-worker-unsafe-script-url.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACzD,OAAO,EAAE,oBAAoB,EAAE,MAAM,8BAA8B,CAAC;AACpE,OAAO,EACH,SAAS,EACT,SAAS,EACT,2BAA2B,EAC3B,wBAAwB,GAC3B,MAAM,qCAAqC,CAAC;AAI7C,MAAM,eAAe,GAAG,CAAC,KAAa,EAAW,EAAE,CAC/C,sBAAsB,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;AAEvC,MAAM,8BAA8B,GAAG,CACnC,UAAyC,EAClC,EAAE;IACT,MAAM,eAAe,GAAG,oBAAoB,CAAC,UAAU,CAAC,CAAC;IAEzD,OAAO,CACH,CAAC,OAAO,eAAe,KAAK,QAAQ;QAChC,CAAC,SAAS,CAAC,eAAe,CAAC;YACvB,SAAS,CAAC,eAAe,CAAC;YAC1B,eAAe,CAAC,eAAe,CAAC,CAAC,CAAC;QAC1C,wBAAwB,CAAC,UAAU,CAAC,CACvC,CAAC;AACN,CAAC,CAAC;AAEF,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,cAAc,CAAC,IAA6B;gBACxC,IAAI,CAAC,2BAA2B,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE,CAAC;oBAC5C,OAAO;gBACX,CAAC;gBAED,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,SAAS,CAAC;gBAEvC,IACI,aAAa,KAAK,SAAS;oBAC3B,aAAa,CAAC,IAAI,KAAK,eAAe;oBACtC,CAAC,8BAA8B,CAAC,aAAa,CAAC,EAChD,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI,EAAE,aAAa;iBACtB,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,kIAAkI;YACtI,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,iGAAiG;SACzG;QACD,QAAQ,EAAE;YACN,OAAO,EACH,2GAA2G;SAClH;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,qCAAqC;CAC9C,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC"}
@@ -0,0 +1,5 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ /** Rule implementation. */
3
+ declare const rule: ReturnType<typeof createRule>;
4
+ export default rule;
5
+ //# sourceMappingURL=no-set-html-unsafe.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-set-html-unsafe.d.ts","sourceRoot":"","sources":["../../src/rules/no-set-html-unsafe.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AAgBzD,2BAA2B;AAC3B,QAAA,MAAM,IAAI,EAAE,UAAU,CAAC,OAAO,UAAU,CA2CtC,CAAC;AAEH,eAAe,IAAI,CAAC"}
@@ -0,0 +1,48 @@
1
+ import { createRule } from "../_internal/create-rule.js";
2
+ import { getMemberPropertyName, getStaticStringValue, } from "../_internal/estree-utils.js";
3
+ const isSetHtmlUnsafeCall = (node) => {
4
+ if (node.callee.type !== "MemberExpression") {
5
+ return false;
6
+ }
7
+ return getMemberPropertyName(node.callee) === "setHTMLUnsafe";
8
+ };
9
+ /** Rule implementation. */
10
+ const rule = createRule({
11
+ create(context) {
12
+ return {
13
+ CallExpression(node) {
14
+ if (!isSetHtmlUnsafeCall(node)) {
15
+ return;
16
+ }
17
+ const [firstArgument] = node.arguments;
18
+ if (firstArgument !== undefined &&
19
+ firstArgument.type !== "SpreadElement" &&
20
+ getStaticStringValue(firstArgument) === "") {
21
+ return;
22
+ }
23
+ context.report({
24
+ messageId: "default",
25
+ node,
26
+ });
27
+ },
28
+ };
29
+ },
30
+ defaultOptions: [],
31
+ meta: {
32
+ deprecated: false,
33
+ docs: {
34
+ description: "disallow setHTMLUnsafe() calls that bypass the safer HTML Sanitizer API path.",
35
+ frozen: false,
36
+ recommended: false,
37
+ url: "https://nick2bad4u.github.io/eslint-plugin-SDL-2/docs/rules/no-set-html-unsafe",
38
+ },
39
+ messages: {
40
+ default: "Do not call setHTMLUnsafe(); use setHTML() or build DOM nodes safely instead.",
41
+ },
42
+ schema: [],
43
+ type: "problem",
44
+ },
45
+ name: "no-set-html-unsafe",
46
+ });
47
+ export default rule;
48
+ //# sourceMappingURL=no-set-html-unsafe.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-set-html-unsafe.js","sourceRoot":"","sources":["../../src/rules/no-set-html-unsafe.ts"],"names":[],"mappings":"AAEA,OAAO,EAAE,UAAU,EAAE,MAAM,6BAA6B,CAAC;AACzD,OAAO,EACH,qBAAqB,EACrB,oBAAoB,GACvB,MAAM,8BAA8B,CAAC;AAItC,MAAM,mBAAmB,GAAG,CAAC,IAA6B,EAAW,EAAE;IACnE,IAAI,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;QAC1C,OAAO,KAAK,CAAC;IACjB,CAAC;IAED,OAAO,qBAAqB,CAAC,IAAI,CAAC,MAAM,CAAC,KAAK,eAAe,CAAC;AAClE,CAAC,CAAC;AAEF,2BAA2B;AAC3B,MAAM,IAAI,GAAkC,UAAU,CAAwB;IAC1E,MAAM,CAAC,OAAO;QACV,OAAO;YACH,cAAc,CAAC,IAA6B;gBACxC,IAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC,EAAE,CAAC;oBAC7B,OAAO;gBACX,CAAC;gBAED,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,SAAS,CAAC;gBAEvC,IACI,aAAa,KAAK,SAAS;oBAC3B,aAAa,CAAC,IAAI,KAAK,eAAe;oBACtC,oBAAoB,CAAC,aAAa,CAAC,KAAK,EAAE,EAC5C,CAAC;oBACC,OAAO;gBACX,CAAC;gBAED,OAAO,CAAC,MAAM,CAAC;oBACX,SAAS,EAAE,SAAS;oBACpB,IAAI;iBACP,CAAC,CAAC;YACP,CAAC;SACJ,CAAC;IACN,CAAC;IACD,cAAc,EAAE,EAAE;IAClB,IAAI,EAAE;QACF,UAAU,EAAE,KAAK;QACjB,IAAI,EAAE;YACF,WAAW,EACP,+EAA+E;YACnF,MAAM,EAAE,KAAK;YACb,WAAW,EAAE,KAAK;YAClB,GAAG,EAAE,gFAAgF;SACxF;QACD,QAAQ,EAAE;YACN,OAAO,EACH,+EAA+E;SACtF;QACD,MAAM,EAAE,EAAE;QACV,IAAI,EAAE,SAAS;KAClB;IACD,IAAI,EAAE,oBAAoB;CAC7B,CAAC,CAAC;AAEH,eAAe,IAAI,CAAC"}