eslint-plugin-secure-coding 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (155) hide show
  1. package/AGENTS.md +196 -0
  2. package/CHANGELOG.md +105 -0
  3. package/LICENSE +23 -0
  4. package/README.md +377 -0
  5. package/package.json +80 -0
  6. package/src/index.d.ts +32 -0
  7. package/src/index.js +345 -0
  8. package/src/index.js.map +1 -0
  9. package/src/rules/security/database-injection.d.ts +13 -0
  10. package/src/rules/security/database-injection.js +407 -0
  11. package/src/rules/security/database-injection.js.map +1 -0
  12. package/src/rules/security/detect-child-process.d.ts +11 -0
  13. package/src/rules/security/detect-child-process.js +460 -0
  14. package/src/rules/security/detect-child-process.js.map +1 -0
  15. package/src/rules/security/detect-eval-with-expression.d.ts +9 -0
  16. package/src/rules/security/detect-eval-with-expression.js +393 -0
  17. package/src/rules/security/detect-eval-with-expression.js.map +1 -0
  18. package/src/rules/security/detect-non-literal-fs-filename.d.ts +7 -0
  19. package/src/rules/security/detect-non-literal-fs-filename.js +322 -0
  20. package/src/rules/security/detect-non-literal-fs-filename.js.map +1 -0
  21. package/src/rules/security/detect-non-literal-regexp.d.ts +9 -0
  22. package/src/rules/security/detect-non-literal-regexp.js +387 -0
  23. package/src/rules/security/detect-non-literal-regexp.js.map +1 -0
  24. package/src/rules/security/detect-object-injection.d.ts +11 -0
  25. package/src/rules/security/detect-object-injection.js +411 -0
  26. package/src/rules/security/detect-object-injection.js.map +1 -0
  27. package/src/rules/security/no-buffer-overread.d.ts +14 -0
  28. package/src/rules/security/no-buffer-overread.js +519 -0
  29. package/src/rules/security/no-buffer-overread.js.map +1 -0
  30. package/src/rules/security/no-clickjacking.d.ts +10 -0
  31. package/src/rules/security/no-clickjacking.js +381 -0
  32. package/src/rules/security/no-clickjacking.js.map +1 -0
  33. package/src/rules/security/no-directive-injection.d.ts +12 -0
  34. package/src/rules/security/no-directive-injection.js +446 -0
  35. package/src/rules/security/no-directive-injection.js.map +1 -0
  36. package/src/rules/security/no-document-cookie.d.ts +5 -0
  37. package/src/rules/security/no-document-cookie.js +90 -0
  38. package/src/rules/security/no-document-cookie.js.map +1 -0
  39. package/src/rules/security/no-electron-security-issues.d.ts +10 -0
  40. package/src/rules/security/no-electron-security-issues.js +421 -0
  41. package/src/rules/security/no-electron-security-issues.js.map +1 -0
  42. package/src/rules/security/no-exposed-sensitive-data.d.ts +11 -0
  43. package/src/rules/security/no-exposed-sensitive-data.js +341 -0
  44. package/src/rules/security/no-exposed-sensitive-data.js.map +1 -0
  45. package/src/rules/security/no-format-string-injection.d.ts +17 -0
  46. package/src/rules/security/no-format-string-injection.js +653 -0
  47. package/src/rules/security/no-format-string-injection.js.map +1 -0
  48. package/src/rules/security/no-graphql-injection.d.ts +12 -0
  49. package/src/rules/security/no-graphql-injection.js +410 -0
  50. package/src/rules/security/no-graphql-injection.js.map +1 -0
  51. package/src/rules/security/no-hardcoded-credentials.d.ts +26 -0
  52. package/src/rules/security/no-hardcoded-credentials.js +377 -0
  53. package/src/rules/security/no-hardcoded-credentials.js.map +1 -0
  54. package/src/rules/security/no-improper-sanitization.d.ts +12 -0
  55. package/src/rules/security/no-improper-sanitization.js +408 -0
  56. package/src/rules/security/no-improper-sanitization.js.map +1 -0
  57. package/src/rules/security/no-improper-type-validation.d.ts +10 -0
  58. package/src/rules/security/no-improper-type-validation.js +420 -0
  59. package/src/rules/security/no-improper-type-validation.js.map +1 -0
  60. package/src/rules/security/no-insecure-comparison.d.ts +7 -0
  61. package/src/rules/security/no-insecure-comparison.js +125 -0
  62. package/src/rules/security/no-insecure-comparison.js.map +1 -0
  63. package/src/rules/security/no-insecure-cookie-settings.d.ts +9 -0
  64. package/src/rules/security/no-insecure-cookie-settings.js +305 -0
  65. package/src/rules/security/no-insecure-cookie-settings.js.map +1 -0
  66. package/src/rules/security/no-insecure-jwt.d.ts +10 -0
  67. package/src/rules/security/no-insecure-jwt.js +338 -0
  68. package/src/rules/security/no-insecure-jwt.js.map +1 -0
  69. package/src/rules/security/no-insecure-redirects.d.ts +7 -0
  70. package/src/rules/security/no-insecure-redirects.js +215 -0
  71. package/src/rules/security/no-insecure-redirects.js.map +1 -0
  72. package/src/rules/security/no-insufficient-postmessage-validation.d.ts +14 -0
  73. package/src/rules/security/no-insufficient-postmessage-validation.js +390 -0
  74. package/src/rules/security/no-insufficient-postmessage-validation.js.map +1 -0
  75. package/src/rules/security/no-insufficient-random.d.ts +9 -0
  76. package/src/rules/security/no-insufficient-random.js +207 -0
  77. package/src/rules/security/no-insufficient-random.js.map +1 -0
  78. package/src/rules/security/no-ldap-injection.d.ts +10 -0
  79. package/src/rules/security/no-ldap-injection.js +449 -0
  80. package/src/rules/security/no-ldap-injection.js.map +1 -0
  81. package/src/rules/security/no-missing-authentication.d.ts +13 -0
  82. package/src/rules/security/no-missing-authentication.js +322 -0
  83. package/src/rules/security/no-missing-authentication.js.map +1 -0
  84. package/src/rules/security/no-missing-cors-check.d.ts +9 -0
  85. package/src/rules/security/no-missing-cors-check.js +449 -0
  86. package/src/rules/security/no-missing-cors-check.js.map +1 -0
  87. package/src/rules/security/no-missing-csrf-protection.d.ts +11 -0
  88. package/src/rules/security/no-missing-csrf-protection.js +183 -0
  89. package/src/rules/security/no-missing-csrf-protection.js.map +1 -0
  90. package/src/rules/security/no-missing-security-headers.d.ts +7 -0
  91. package/src/rules/security/no-missing-security-headers.js +217 -0
  92. package/src/rules/security/no-missing-security-headers.js.map +1 -0
  93. package/src/rules/security/no-privilege-escalation.d.ts +13 -0
  94. package/src/rules/security/no-privilege-escalation.js +321 -0
  95. package/src/rules/security/no-privilege-escalation.js.map +1 -0
  96. package/src/rules/security/no-redos-vulnerable-regex.d.ts +7 -0
  97. package/src/rules/security/no-redos-vulnerable-regex.js +307 -0
  98. package/src/rules/security/no-redos-vulnerable-regex.js.map +1 -0
  99. package/src/rules/security/no-sensitive-data-exposure.d.ts +11 -0
  100. package/src/rules/security/no-sensitive-data-exposure.js +251 -0
  101. package/src/rules/security/no-sensitive-data-exposure.js.map +1 -0
  102. package/src/rules/security/no-sql-injection.d.ts +10 -0
  103. package/src/rules/security/no-sql-injection.js +332 -0
  104. package/src/rules/security/no-sql-injection.js.map +1 -0
  105. package/src/rules/security/no-timing-attack.d.ts +10 -0
  106. package/src/rules/security/no-timing-attack.js +358 -0
  107. package/src/rules/security/no-timing-attack.js.map +1 -0
  108. package/src/rules/security/no-toctou-vulnerability.d.ts +7 -0
  109. package/src/rules/security/no-toctou-vulnerability.js +165 -0
  110. package/src/rules/security/no-toctou-vulnerability.js.map +1 -0
  111. package/src/rules/security/no-unchecked-loop-condition.d.ts +12 -0
  112. package/src/rules/security/no-unchecked-loop-condition.js +635 -0
  113. package/src/rules/security/no-unchecked-loop-condition.js.map +1 -0
  114. package/src/rules/security/no-unencrypted-transmission.d.ts +11 -0
  115. package/src/rules/security/no-unencrypted-transmission.js +237 -0
  116. package/src/rules/security/no-unencrypted-transmission.js.map +1 -0
  117. package/src/rules/security/no-unescaped-url-parameter.d.ts +9 -0
  118. package/src/rules/security/no-unescaped-url-parameter.js +266 -0
  119. package/src/rules/security/no-unescaped-url-parameter.js.map +1 -0
  120. package/src/rules/security/no-unlimited-resource-allocation.d.ts +12 -0
  121. package/src/rules/security/no-unlimited-resource-allocation.js +659 -0
  122. package/src/rules/security/no-unlimited-resource-allocation.js.map +1 -0
  123. package/src/rules/security/no-unsafe-deserialization.d.ts +10 -0
  124. package/src/rules/security/no-unsafe-deserialization.js +501 -0
  125. package/src/rules/security/no-unsafe-deserialization.js.map +1 -0
  126. package/src/rules/security/no-unsafe-dynamic-require.d.ts +5 -0
  127. package/src/rules/security/no-unsafe-dynamic-require.js +107 -0
  128. package/src/rules/security/no-unsafe-dynamic-require.js.map +1 -0
  129. package/src/rules/security/no-unsafe-regex-construction.d.ts +9 -0
  130. package/src/rules/security/no-unsafe-regex-construction.js +292 -0
  131. package/src/rules/security/no-unsafe-regex-construction.js.map +1 -0
  132. package/src/rules/security/no-unsanitized-html.d.ts +9 -0
  133. package/src/rules/security/no-unsanitized-html.js +347 -0
  134. package/src/rules/security/no-unsanitized-html.js.map +1 -0
  135. package/src/rules/security/no-unvalidated-user-input.d.ts +9 -0
  136. package/src/rules/security/no-unvalidated-user-input.js +418 -0
  137. package/src/rules/security/no-unvalidated-user-input.js.map +1 -0
  138. package/src/rules/security/no-weak-crypto.d.ts +11 -0
  139. package/src/rules/security/no-weak-crypto.js +350 -0
  140. package/src/rules/security/no-weak-crypto.js.map +1 -0
  141. package/src/rules/security/no-weak-password-recovery.d.ts +12 -0
  142. package/src/rules/security/no-weak-password-recovery.js +401 -0
  143. package/src/rules/security/no-weak-password-recovery.js.map +1 -0
  144. package/src/rules/security/no-xpath-injection.d.ts +10 -0
  145. package/src/rules/security/no-xpath-injection.js +487 -0
  146. package/src/rules/security/no-xpath-injection.js.map +1 -0
  147. package/src/rules/security/no-xxe-injection.d.ts +7 -0
  148. package/src/rules/security/no-xxe-injection.js +270 -0
  149. package/src/rules/security/no-xxe-injection.js.map +1 -0
  150. package/src/rules/security/no-zip-slip.d.ts +9 -0
  151. package/src/rules/security/no-zip-slip.js +446 -0
  152. package/src/rules/security/no-zip-slip.js.map +1 -0
  153. package/src/types/index.d.ts +131 -0
  154. package/src/types/index.js +18 -0
  155. package/src/types/index.js.map +1 -0
@@ -0,0 +1,421 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.noElectronSecurityIssues = void 0;
4
+ const eslint_devkit_1 = require("@interlace/eslint-devkit");
5
+ const eslint_devkit_2 = require("@interlace/eslint-devkit");
6
+ const eslint_devkit_3 = require("@interlace/eslint-devkit");
7
+ exports.noElectronSecurityIssues = (0, eslint_devkit_1.createRule)({
8
+ name: 'no-electron-security-issues',
9
+ meta: {
10
+ type: 'problem',
11
+ docs: {
12
+ description: 'Detects Electron security vulnerabilities and insecure configurations',
13
+ },
14
+ fixable: 'code',
15
+ hasSuggestions: true,
16
+ messages: {
17
+ electronSecurityIssue: (0, eslint_devkit_2.formatLLMMessage)({
18
+ icon: eslint_devkit_2.MessageIcons.SECURITY,
19
+ issueName: 'Electron Security Issue',
20
+ cwe: 'CWE-16',
21
+ description: 'Electron security vulnerability detected',
22
+ severity: '{{severity}}',
23
+ fix: '{{safeAlternative}}',
24
+ documentationLink: 'https://electronjs.org/docs/tutorial/security',
25
+ }),
26
+ nodeIntegrationEnabled: (0, eslint_devkit_2.formatLLMMessage)({
27
+ icon: eslint_devkit_2.MessageIcons.SECURITY,
28
+ issueName: 'Node Integration Enabled',
29
+ cwe: 'CWE-16',
30
+ description: 'nodeIntegration enabled allows Node.js access in renderer',
31
+ severity: 'CRITICAL',
32
+ fix: 'Set nodeIntegration: false and use secure preload scripts',
33
+ documentationLink: 'https://electronjs.org/docs/tutorial/security#2-do-not-enable-nodejs-integration-for-remote-content',
34
+ }),
35
+ contextIsolationDisabled: (0, eslint_devkit_2.formatLLMMessage)({
36
+ icon: eslint_devkit_2.MessageIcons.SECURITY,
37
+ issueName: 'Context Isolation Disabled',
38
+ cwe: 'CWE-16',
39
+ description: 'contextIsolation disabled removes security boundary',
40
+ severity: 'CRITICAL',
41
+ fix: 'Enable contextIsolation and use preload scripts',
42
+ documentationLink: 'https://electronjs.org/docs/tutorial/context-isolation',
43
+ }),
44
+ webSecurityDisabled: (0, eslint_devkit_2.formatLLMMessage)({
45
+ icon: eslint_devkit_2.MessageIcons.SECURITY,
46
+ issueName: 'Web Security Disabled',
47
+ cwe: 'CWE-16',
48
+ description: 'webSecurity disabled removes CORS and security protections',
49
+ severity: 'HIGH',
50
+ fix: 'Keep webSecurity enabled',
51
+ documentationLink: 'https://electronjs.org/docs/tutorial/security#6-define-a-content-security-policy',
52
+ }),
53
+ insecureContentEnabled: (0, eslint_devkit_2.formatLLMMessage)({
54
+ icon: eslint_devkit_2.MessageIcons.SECURITY,
55
+ issueName: 'Insecure Content Enabled',
56
+ cwe: 'CWE-16',
57
+ description: 'allowRunningInsecureContent allows mixed content',
58
+ severity: 'MEDIUM',
59
+ fix: 'Set allowRunningInsecureContent: false',
60
+ documentationLink: 'https://electronjs.org/docs/tutorial/security#5-do-not-disable-websecurity',
61
+ }),
62
+ unsafePreloadScript: (0, eslint_devkit_2.formatLLMMessage)({
63
+ icon: eslint_devkit_2.MessageIcons.SECURITY,
64
+ issueName: 'Unsafe Preload Script',
65
+ cwe: 'CWE-16',
66
+ description: 'Preload script may expose sensitive APIs',
67
+ severity: 'HIGH',
68
+ fix: 'Use minimal, secure preload scripts',
69
+ documentationLink: 'https://electronjs.org/docs/tutorial/security#3-enable-context-isolation-for-remote-content',
70
+ }),
71
+ directNodeAccess: (0, eslint_devkit_2.formatLLMMessage)({
72
+ icon: eslint_devkit_2.MessageIcons.SECURITY,
73
+ issueName: 'Direct Node Access',
74
+ cwe: 'CWE-16',
75
+ description: 'Direct access to Node.js APIs in renderer process',
76
+ severity: 'HIGH',
77
+ fix: 'Access Node.js APIs only through secure IPC channels',
78
+ documentationLink: 'https://electronjs.org/docs/tutorial/security#3-enable-context-isolation-for-remote-content',
79
+ }),
80
+ insecureIpcPattern: (0, eslint_devkit_2.formatLLMMessage)({
81
+ icon: eslint_devkit_2.MessageIcons.SECURITY,
82
+ issueName: 'Insecure IPC Pattern',
83
+ cwe: 'CWE-16',
84
+ description: 'IPC communication lacks proper validation',
85
+ severity: 'MEDIUM',
86
+ fix: 'Validate IPC messages and restrict channels',
87
+ documentationLink: 'https://electronjs.org/docs/tutorial/security#7-do-not-use-the-ipc-transport-for-sensitive-data',
88
+ }),
89
+ missingSandbox: (0, eslint_devkit_2.formatLLMMessage)({
90
+ icon: eslint_devkit_2.MessageIcons.SECURITY,
91
+ issueName: 'Missing Sandbox',
92
+ cwe: 'CWE-16',
93
+ description: 'BrowserWindow not sandboxed',
94
+ severity: 'MEDIUM',
95
+ fix: 'Enable sandbox for untrusted content',
96
+ documentationLink: 'https://electronjs.org/docs/tutorial/sandbox',
97
+ }),
98
+ enableSecurityFeatures: (0, eslint_devkit_2.formatLLMMessage)({
99
+ icon: eslint_devkit_2.MessageIcons.INFO,
100
+ issueName: 'Enable Security Features',
101
+ description: 'Enable Electron security features',
102
+ severity: 'LOW',
103
+ fix: 'Set contextIsolation: true, nodeIntegration: false',
104
+ documentationLink: 'https://electronjs.org/docs/tutorial/security',
105
+ }),
106
+ useContextIsolation: (0, eslint_devkit_2.formatLLMMessage)({
107
+ icon: eslint_devkit_2.MessageIcons.INFO,
108
+ issueName: 'Use Context Isolation',
109
+ description: 'Use context isolation for security',
110
+ severity: 'LOW',
111
+ fix: 'Enable contextIsolation in BrowserWindow options',
112
+ documentationLink: 'https://electronjs.org/docs/tutorial/context-isolation',
113
+ }),
114
+ securePreloadScripts: (0, eslint_devkit_2.formatLLMMessage)({
115
+ icon: eslint_devkit_2.MessageIcons.INFO,
116
+ issueName: 'Secure Preload Scripts',
117
+ description: 'Use secure preload scripts',
118
+ severity: 'LOW',
119
+ fix: 'Limit APIs exposed in preload scripts',
120
+ documentationLink: 'https://electronjs.org/docs/tutorial/security#3-enable-context-isolation-for-remote-content',
121
+ }),
122
+ strategySecureDefaults: (0, eslint_devkit_2.formatLLMMessage)({
123
+ icon: eslint_devkit_2.MessageIcons.STRATEGY,
124
+ issueName: 'Secure Defaults Strategy',
125
+ description: 'Use secure defaults for Electron applications',
126
+ severity: 'LOW',
127
+ fix: 'Start with secure configuration and relax only when necessary',
128
+ documentationLink: 'https://electronjs.org/docs/tutorial/security',
129
+ }),
130
+ strategyProcessSeparation: (0, eslint_devkit_2.formatLLMMessage)({
131
+ icon: eslint_devkit_2.MessageIcons.STRATEGY,
132
+ issueName: 'Process Separation Strategy',
133
+ description: 'Separate main and renderer processes properly',
134
+ severity: 'LOW',
135
+ fix: 'Keep Node.js APIs in main process, use IPC for communication',
136
+ documentationLink: 'https://electronjs.org/docs/tutorial/application-architecture',
137
+ }),
138
+ strategyInputValidation: (0, eslint_devkit_2.formatLLMMessage)({
139
+ icon: eslint_devkit_2.MessageIcons.STRATEGY,
140
+ issueName: 'Input Validation Strategy',
141
+ description: 'Validate all inputs in Electron applications',
142
+ severity: 'LOW',
143
+ fix: 'Validate IPC messages and user inputs',
144
+ documentationLink: 'https://electronjs.org/docs/tutorial/security#7-do-not-use-the-ipc-transport-for-sensitive-data',
145
+ })
146
+ },
147
+ schema: [
148
+ {
149
+ type: 'object',
150
+ properties: {
151
+ allowInDev: {
152
+ type: 'boolean',
153
+ default: false,
154
+ description: 'Allow insecure settings in development'
155
+ },
156
+ safePreloadPatterns: {
157
+ type: 'array',
158
+ items: { type: 'string' },
159
+ default: ['contextBridge', 'ipcRenderer'],
160
+ },
161
+ allowedIpcChannels: {
162
+ type: 'array',
163
+ items: { type: 'string' },
164
+ default: [],
165
+ },
166
+ trustedSanitizers: {
167
+ type: 'array',
168
+ items: { type: 'string' },
169
+ default: [],
170
+ description: 'Additional function names to consider as safe',
171
+ },
172
+ trustedAnnotations: {
173
+ type: 'array',
174
+ items: { type: 'string' },
175
+ default: [],
176
+ description: 'Additional JSDoc annotations to consider as safe markers',
177
+ },
178
+ strictMode: {
179
+ type: 'boolean',
180
+ default: false,
181
+ description: 'Disable all false positive detection (strict mode)',
182
+ },
183
+ },
184
+ additionalProperties: false,
185
+ },
186
+ ],
187
+ },
188
+ defaultOptions: [
189
+ {
190
+ allowInDev: false,
191
+ safePreloadPatterns: ['contextBridge', 'ipcRenderer'],
192
+ allowedIpcChannels: [],
193
+ trustedSanitizers: [],
194
+ trustedAnnotations: [],
195
+ strictMode: false,
196
+ },
197
+ ],
198
+ create(context) {
199
+ const options = context.options[0] || {};
200
+ const { allowedIpcChannels = [], trustedSanitizers = [], trustedAnnotations = [], strictMode = false, } = options;
201
+ const filename = context.filename || context.getFilename();
202
+ // Create safety checker for false positive detection
203
+ const safetyChecker = (0, eslint_devkit_3.createSafetyChecker)({
204
+ trustedSanitizers,
205
+ trustedAnnotations,
206
+ trustedOrmPatterns: [],
207
+ strictMode,
208
+ });
209
+ /**
210
+ * Check if this is an Electron BrowserWindow creation
211
+ */
212
+ const isBrowserWindowCreation = (node) => {
213
+ return node.callee.type === 'Identifier' &&
214
+ node.callee.name === 'BrowserWindow';
215
+ };
216
+ /**
217
+ * Check if BrowserWindow options contain insecure settings
218
+ */
219
+ const checkBrowserWindowOptions = (optionsNode) => {
220
+ for (const prop of optionsNode.properties) {
221
+ if (prop.type === 'Property' &&
222
+ prop.key.type === 'Identifier') {
223
+ const key = prop.key.name;
224
+ const value = prop.value;
225
+ // Check for insecure boolean options
226
+ if (['nodeIntegration', 'contextIsolation', 'webSecurity', 'allowRunningInsecureContent', 'sandbox'].includes(key)) {
227
+ if (value.type === 'Literal') {
228
+ const isInsecure = ((key === 'nodeIntegration' && value.value === true) ||
229
+ (key === 'contextIsolation' && value.value === false) ||
230
+ (key === 'webSecurity' && value.value === false) ||
231
+ (key === 'allowRunningInsecureContent' && value.value === true) ||
232
+ (key === 'sandbox' && value.value === false));
233
+ if (isInsecure) {
234
+ // FALSE POSITIVE REDUCTION
235
+ if (safetyChecker.isSafe(prop, context)) {
236
+ continue;
237
+ }
238
+ const messageId = (key === 'nodeIntegration' ? 'nodeIntegrationEnabled' :
239
+ key === 'contextIsolation' ? 'contextIsolationDisabled' :
240
+ key === 'webSecurity' ? 'webSecurityDisabled' :
241
+ key === 'allowRunningInsecureContent' ? 'insecureContentEnabled' :
242
+ 'missingSandbox');
243
+ context.report({
244
+ node: prop,
245
+ messageId,
246
+ data: {
247
+ filePath: filename,
248
+ line: String(prop.loc?.start.line ?? 0),
249
+ },
250
+ });
251
+ }
252
+ }
253
+ }
254
+ }
255
+ }
256
+ };
257
+ /**
258
+ * Check if this is an IPC call
259
+ */
260
+ const isIpcCall = (node) => {
261
+ const callee = node.callee;
262
+ if (callee.type === 'MemberExpression' &&
263
+ callee.object.type === 'Identifier' &&
264
+ ['ipcMain', 'ipcRenderer'].includes(callee.object.name) &&
265
+ callee.property.type === 'Identifier') {
266
+ return ['send', 'invoke', 'handle', 'on', 'once'].includes(callee.property.name);
267
+ }
268
+ return false;
269
+ };
270
+ /**
271
+ * Check for unsafe IPC patterns
272
+ */
273
+ const checkIpcCall = (node) => {
274
+ const args = node.arguments;
275
+ if (args.length === 0) {
276
+ return;
277
+ }
278
+ // Check channel name (first argument)
279
+ const channelArg = args[0];
280
+ if (channelArg.type === 'Literal' && typeof channelArg.value === 'string') {
281
+ const channel = channelArg.value;
282
+ // Check if channel is allowed
283
+ if (allowedIpcChannels.length > 0 && !allowedIpcChannels.includes(channel)) {
284
+ // FALSE POSITIVE REDUCTION
285
+ if (safetyChecker.isSafe(node, context)) {
286
+ return;
287
+ }
288
+ context.report({
289
+ node: channelArg,
290
+ messageId: 'insecureIpcPattern',
291
+ data: {
292
+ filePath: filename,
293
+ line: String(node.loc?.start.line ?? 0),
294
+ },
295
+ });
296
+ }
297
+ }
298
+ };
299
+ /**
300
+ * Check for direct Node.js API access in renderer-like files
301
+ */
302
+ const isRendererFile = () => {
303
+ const fileName = filename.toLowerCase();
304
+ return fileName.includes('renderer') ||
305
+ fileName.includes('preload') ||
306
+ fileName.includes('ui') ||
307
+ fileName.includes('view');
308
+ };
309
+ /**
310
+ * Check for Node.js API usage
311
+ */
312
+ const isNodeApiCall = (node) => {
313
+ const callee = node.callee;
314
+ // Check for require('fs'), require('child_process'), etc.
315
+ if (callee.type === 'Identifier' && callee.name === 'require') {
316
+ const arg = node.arguments[0];
317
+ if (arg?.type === 'Literal' && typeof arg.value === 'string') {
318
+ const moduleName = arg.value;
319
+ return ['fs', 'child_process', 'os', 'path', 'crypto', 'http', 'https'].includes(moduleName);
320
+ }
321
+ }
322
+ // Check for global Node.js objects
323
+ if (callee.type === 'MemberExpression' &&
324
+ callee.object.type === 'Identifier' &&
325
+ ['process', 'global', '__dirname', '__filename'].includes(callee.object.name)) {
326
+ return true;
327
+ }
328
+ return false;
329
+ };
330
+ return {
331
+ // Check BrowserWindow creation
332
+ NewExpression(node) {
333
+ try {
334
+ if (isBrowserWindowCreation(node)) {
335
+ const args = node.arguments;
336
+ if (args.length > 0 && args[0]?.type === 'ObjectExpression') {
337
+ checkBrowserWindowOptions(args[0]);
338
+ }
339
+ }
340
+ }
341
+ catch {
342
+ return;
343
+ }
344
+ },
345
+ // Check IPC calls
346
+ CallExpression(node) {
347
+ try {
348
+ if (isIpcCall(node)) {
349
+ checkIpcCall(node);
350
+ }
351
+ // Check for Node.js API usage in renderer files
352
+ if (isRendererFile() && isNodeApiCall(node)) {
353
+ // FALSE POSITIVE REDUCTION
354
+ if (safetyChecker.isSafe(node, context)) {
355
+ return;
356
+ }
357
+ context.report({
358
+ node,
359
+ messageId: 'directNodeAccess',
360
+ data: {
361
+ filePath: filename,
362
+ line: String(node.loc?.start.line ?? 0),
363
+ },
364
+ });
365
+ }
366
+ }
367
+ catch {
368
+ // Skip problematic nodes to avoid rule crashes
369
+ return;
370
+ }
371
+ },
372
+ // Check for preload script issues
373
+ AssignmentExpression(node) {
374
+ try {
375
+ // Look for preload script assignments
376
+ if (node.left.type === 'MemberExpression' &&
377
+ node.left.property.type === 'Identifier' &&
378
+ node.left.property.name === 'preload') {
379
+ if (node.right.type === 'Literal' && typeof node.right.value === 'string') {
380
+ const preloadPath = node.right.value;
381
+ // Check for potentially unsafe preload patterns
382
+ if (preloadPath.includes('node_modules') ||
383
+ preloadPath.includes('http') ||
384
+ preloadPath.includes('remote')) {
385
+ // FALSE POSITIVE REDUCTION
386
+ if (safetyChecker.isSafe(node, context)) {
387
+ return;
388
+ }
389
+ context.report({
390
+ node: node.right,
391
+ messageId: 'unsafePreloadScript',
392
+ data: {
393
+ filePath: filename,
394
+ line: String(node.loc?.start.line ?? 0),
395
+ },
396
+ });
397
+ }
398
+ }
399
+ }
400
+ }
401
+ catch {
402
+ return;
403
+ }
404
+ },
405
+ // Check for insecure webPreferences patterns
406
+ Property(node) {
407
+ try {
408
+ if (node.key.type === 'Identifier' && node.key.name === 'webPreferences') {
409
+ if (node.value.type === 'ObjectExpression') {
410
+ checkBrowserWindowOptions(node.value);
411
+ }
412
+ }
413
+ }
414
+ catch {
415
+ return;
416
+ }
417
+ }
418
+ };
419
+ },
420
+ });
421
+ //# sourceMappingURL=no-electron-security-issues.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-electron-security-issues.js","sourceRoot":"","sources":["../../../../../../packages/eslint-plugin-secure-coding/src/rules/security/no-electron-security-issues.ts"],"names":[],"mappings":";;;AAgBA,4DAAsD;AACtD,4DAA0E;AAC1E,4DAGkC;AAgCrB,QAAA,wBAAwB,GAAG,IAAA,0BAAU,EAA0B;IAC1E,IAAI,EAAE,6BAA6B;IACnC,IAAI,EAAE;QACJ,IAAI,EAAE,SAAS;QACf,IAAI,EAAE;YACJ,WAAW,EAAE,uEAAuE;SACrF;QACD,OAAO,EAAE,MAAM;QACf,cAAc,EAAE,IAAI;QACpB,QAAQ,EAAE;YACR,qBAAqB,EAAE,IAAA,gCAAgB,EAAC;gBACtC,IAAI,EAAE,4BAAY,CAAC,QAAQ;gBAC3B,SAAS,EAAE,yBAAyB;gBACpC,GAAG,EAAE,QAAQ;gBACb,WAAW,EAAE,0CAA0C;gBACvD,QAAQ,EAAE,cAAc;gBACxB,GAAG,EAAE,qBAAqB;gBAC1B,iBAAiB,EAAE,+CAA+C;aACnE,CAAC;YACF,sBAAsB,EAAE,IAAA,gCAAgB,EAAC;gBACvC,IAAI,EAAE,4BAAY,CAAC,QAAQ;gBAC3B,SAAS,EAAE,0BAA0B;gBACrC,GAAG,EAAE,QAAQ;gBACb,WAAW,EAAE,2DAA2D;gBACxE,QAAQ,EAAE,UAAU;gBACpB,GAAG,EAAE,2DAA2D;gBAChE,iBAAiB,EAAE,qGAAqG;aACzH,CAAC;YACF,wBAAwB,EAAE,IAAA,gCAAgB,EAAC;gBACzC,IAAI,EAAE,4BAAY,CAAC,QAAQ;gBAC3B,SAAS,EAAE,4BAA4B;gBACvC,GAAG,EAAE,QAAQ;gBACb,WAAW,EAAE,qDAAqD;gBAClE,QAAQ,EAAE,UAAU;gBACpB,GAAG,EAAE,iDAAiD;gBACtD,iBAAiB,EAAE,wDAAwD;aAC5E,CAAC;YACF,mBAAmB,EAAE,IAAA,gCAAgB,EAAC;gBACpC,IAAI,EAAE,4BAAY,CAAC,QAAQ;gBAC3B,SAAS,EAAE,uBAAuB;gBAClC,GAAG,EAAE,QAAQ;gBACb,WAAW,EAAE,4DAA4D;gBACzE,QAAQ,EAAE,MAAM;gBAChB,GAAG,EAAE,0BAA0B;gBAC/B,iBAAiB,EAAE,kFAAkF;aACtG,CAAC;YACF,sBAAsB,EAAE,IAAA,gCAAgB,EAAC;gBACvC,IAAI,EAAE,4BAAY,CAAC,QAAQ;gBAC3B,SAAS,EAAE,0BAA0B;gBACrC,GAAG,EAAE,QAAQ;gBACb,WAAW,EAAE,kDAAkD;gBAC/D,QAAQ,EAAE,QAAQ;gBAClB,GAAG,EAAE,wCAAwC;gBAC7C,iBAAiB,EAAE,4EAA4E;aAChG,CAAC;YACF,mBAAmB,EAAE,IAAA,gCAAgB,EAAC;gBACpC,IAAI,EAAE,4BAAY,CAAC,QAAQ;gBAC3B,SAAS,EAAE,uBAAuB;gBAClC,GAAG,EAAE,QAAQ;gBACb,WAAW,EAAE,0CAA0C;gBACvD,QAAQ,EAAE,MAAM;gBAChB,GAAG,EAAE,qCAAqC;gBAC1C,iBAAiB,EAAE,6FAA6F;aACjH,CAAC;YACF,gBAAgB,EAAE,IAAA,gCAAgB,EAAC;gBACjC,IAAI,EAAE,4BAAY,CAAC,QAAQ;gBAC3B,SAAS,EAAE,oBAAoB;gBAC/B,GAAG,EAAE,QAAQ;gBACb,WAAW,EAAE,mDAAmD;gBAChE,QAAQ,EAAE,MAAM;gBAChB,GAAG,EAAE,sDAAsD;gBAC3D,iBAAiB,EAAE,6FAA6F;aACjH,CAAC;YACF,kBAAkB,EAAE,IAAA,gCAAgB,EAAC;gBACnC,IAAI,EAAE,4BAAY,CAAC,QAAQ;gBAC3B,SAAS,EAAE,sBAAsB;gBACjC,GAAG,EAAE,QAAQ;gBACb,WAAW,EAAE,2CAA2C;gBACxD,QAAQ,EAAE,QAAQ;gBAClB,GAAG,EAAE,6CAA6C;gBAClD,iBAAiB,EAAE,iGAAiG;aACrH,CAAC;YACF,cAAc,EAAE,IAAA,gCAAgB,EAAC;gBAC/B,IAAI,EAAE,4BAAY,CAAC,QAAQ;gBAC3B,SAAS,EAAE,iBAAiB;gBAC5B,GAAG,EAAE,QAAQ;gBACb,WAAW,EAAE,6BAA6B;gBAC1C,QAAQ,EAAE,QAAQ;gBAClB,GAAG,EAAE,sCAAsC;gBAC3C,iBAAiB,EAAE,8CAA8C;aAClE,CAAC;YACF,sBAAsB,EAAE,IAAA,gCAAgB,EAAC;gBACvC,IAAI,EAAE,4BAAY,CAAC,IAAI;gBACvB,SAAS,EAAE,0BAA0B;gBACrC,WAAW,EAAE,mCAAmC;gBAChD,QAAQ,EAAE,KAAK;gBACf,GAAG,EAAE,oDAAoD;gBACzD,iBAAiB,EAAE,+CAA+C;aACnE,CAAC;YACF,mBAAmB,EAAE,IAAA,gCAAgB,EAAC;gBACpC,IAAI,EAAE,4BAAY,CAAC,IAAI;gBACvB,SAAS,EAAE,uBAAuB;gBAClC,WAAW,EAAE,oCAAoC;gBACjD,QAAQ,EAAE,KAAK;gBACf,GAAG,EAAE,kDAAkD;gBACvD,iBAAiB,EAAE,wDAAwD;aAC5E,CAAC;YACF,oBAAoB,EAAE,IAAA,gCAAgB,EAAC;gBACrC,IAAI,EAAE,4BAAY,CAAC,IAAI;gBACvB,SAAS,EAAE,wBAAwB;gBACnC,WAAW,EAAE,4BAA4B;gBACzC,QAAQ,EAAE,KAAK;gBACf,GAAG,EAAE,uCAAuC;gBAC5C,iBAAiB,EAAE,6FAA6F;aACjH,CAAC;YACF,sBAAsB,EAAE,IAAA,gCAAgB,EAAC;gBACvC,IAAI,EAAE,4BAAY,CAAC,QAAQ;gBAC3B,SAAS,EAAE,0BAA0B;gBACrC,WAAW,EAAE,+CAA+C;gBAC5D,QAAQ,EAAE,KAAK;gBACf,GAAG,EAAE,+DAA+D;gBACpE,iBAAiB,EAAE,+CAA+C;aACnE,CAAC;YACF,yBAAyB,EAAE,IAAA,gCAAgB,EAAC;gBAC1C,IAAI,EAAE,4BAAY,CAAC,QAAQ;gBAC3B,SAAS,EAAE,6BAA6B;gBACxC,WAAW,EAAE,+CAA+C;gBAC5D,QAAQ,EAAE,KAAK;gBACf,GAAG,EAAE,8DAA8D;gBACnE,iBAAiB,EAAE,+DAA+D;aACnF,CAAC;YACF,uBAAuB,EAAE,IAAA,gCAAgB,EAAC;gBACxC,IAAI,EAAE,4BAAY,CAAC,QAAQ;gBAC3B,SAAS,EAAE,2BAA2B;gBACtC,WAAW,EAAE,8CAA8C;gBAC3D,QAAQ,EAAE,KAAK;gBACf,GAAG,EAAE,uCAAuC;gBAC5C,iBAAiB,EAAE,iGAAiG;aACrH,CAAC;SACH;QACD,MAAM,EAAE;YACN;gBACE,IAAI,EAAE,QAAQ;gBACd,UAAU,EAAE;oBACV,UAAU,EAAE;wBACV,IAAI,EAAE,SAAS;wBACf,OAAO,EAAE,KAAK;wBACd,WAAW,EAAE,wCAAwC;qBACtD;oBACD,mBAAmB,EAAE;wBACnB,IAAI,EAAE,OAAO;wBACb,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE;wBACzB,OAAO,EAAE,CAAC,eAAe,EAAE,aAAa,CAAC;qBAC1C;oBACD,kBAAkB,EAAE;wBAClB,IAAI,EAAE,OAAO;wBACb,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE;wBACzB,OAAO,EAAE,EAAE;qBACZ;oBACD,iBAAiB,EAAE;wBACjB,IAAI,EAAE,OAAO;wBACb,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE;wBACzB,OAAO,EAAE,EAAE;wBACX,WAAW,EAAE,+CAA+C;qBAC7D;oBACD,kBAAkB,EAAE;wBAClB,IAAI,EAAE,OAAO;wBACb,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE;wBACzB,OAAO,EAAE,EAAE;wBACX,WAAW,EAAE,0DAA0D;qBACxE;oBACD,UAAU,EAAE;wBACV,IAAI,EAAE,SAAS;wBACf,OAAO,EAAE,KAAK;wBACd,WAAW,EAAE,oDAAoD;qBAClE;iBACF;gBACD,oBAAoB,EAAE,KAAK;aAC5B;SACF;KACF;IACD,cAAc,EAAE;QACd;YACE,UAAU,EAAE,KAAK;YACjB,mBAAmB,EAAE,CAAC,eAAe,EAAE,aAAa,CAAC;YACrD,kBAAkB,EAAE,EAAE;YACtB,iBAAiB,EAAE,EAAE;YACrB,kBAAkB,EAAE,EAAE;YACtB,UAAU,EAAE,KAAK;SAClB;KACF;IACD,MAAM,CAAC,OAAsD;QAC3D,MAAM,OAAO,GAAG,OAAO,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,EAAE,CAAC;QACzC,MAAM,EACJ,kBAAkB,GAAG,EAAE,EACvB,iBAAiB,GAAG,EAAE,EACtB,kBAAkB,GAAG,EAAE,EACvB,UAAU,GAAG,KAAK,GACnB,GAAY,OAAO,CAAC;QACrB,MAAM,QAAQ,GAAG,OAAO,CAAC,QAAQ,IAAI,OAAO,CAAC,WAAW,EAAE,CAAC;QAE3D,qDAAqD;QACrD,MAAM,aAAa,GAAG,IAAA,mCAAmB,EAAC;YACxC,iBAAiB;YACjB,kBAAkB;YAClB,kBAAkB,EAAE,EAAE;YACtB,UAAU;SACX,CAAC,CAAC;QAEH;;WAEG;QACH,MAAM,uBAAuB,GAAG,CAAC,IAA4B,EAAW,EAAE;YACxE,OAAO,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,YAAY;gBACjC,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,eAAe,CAAC;QAC9C,CAAC,CAAC;QAEF;;WAEG;QACH,MAAM,yBAAyB,GAAG,CAAC,WAAsC,EAAQ,EAAE;YACjF,KAAK,MAAM,IAAI,IAAI,WAAW,CAAC,UAAU,EAAE,CAAC;gBAC1C,IAAI,IAAI,CAAC,IAAI,KAAK,UAAU;oBACxB,IAAI,CAAC,GAAG,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;oBAEnC,MAAM,GAAG,GAAG,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC;oBAC1B,MAAM,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC;oBAEzB,qCAAqC;oBACrC,IAAI,CAAC,iBAAiB,EAAE,kBAAkB,EAAE,aAAa,EAAE,6BAA6B,EAAE,SAAS,CAAC,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;wBACnH,IAAI,KAAK,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;4BAC7B,MAAM,UAAU,GAAG,CACjB,CAAC,GAAG,KAAK,iBAAiB,IAAI,KAAK,CAAC,KAAK,KAAK,IAAI,CAAC;gCACnD,CAAC,GAAG,KAAK,kBAAkB,IAAI,KAAK,CAAC,KAAK,KAAK,KAAK,CAAC;gCACrD,CAAC,GAAG,KAAK,aAAa,IAAI,KAAK,CAAC,KAAK,KAAK,KAAK,CAAC;gCAChD,CAAC,GAAG,KAAK,6BAA6B,IAAI,KAAK,CAAC,KAAK,KAAK,IAAI,CAAC;gCAC/D,CAAC,GAAG,KAAK,SAAS,IAAI,KAAK,CAAC,KAAK,KAAK,KAAK,CAAC,CAC7C,CAAC;4BAEF,IAAI,UAAU,EAAE,CAAC;gCACf,2BAA2B;gCAC3B,IAAI,aAAa,CAAC,MAAM,CAAC,IAAI,EAAE,OAAO,CAAC,EAAE,CAAC;oCACxC,SAAS;gCACX,CAAC;gCAED,MAAM,SAAS,GAAG,CAChB,GAAG,KAAK,iBAAiB,CAAC,CAAC,CAAC,wBAAwB,CAAC,CAAC;oCACtD,GAAG,KAAK,kBAAkB,CAAC,CAAC,CAAC,0BAA0B,CAAC,CAAC;wCACzD,GAAG,KAAK,aAAa,CAAC,CAAC,CAAC,qBAAqB,CAAC,CAAC;4CAC/C,GAAG,KAAK,6BAA6B,CAAC,CAAC,CAAC,wBAAwB,CAAC,CAAC;gDAClE,gBAAgB,CACjB,CAAC;gCAEN,OAAO,CAAC,MAAM,CAAC;oCACb,IAAI,EAAE,IAAI;oCACV,SAAS;oCACT,IAAI,EAAE;wCACJ,QAAQ,EAAE,QAAQ;wCAClB,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,IAAI,CAAC,CAAC;qCACxC;iCACF,CAAC,CAAC;4BACD,CAAC;wBACH,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC,CAAC;QAEF;;WAEG;QACH,MAAM,SAAS,GAAG,CAAC,IAA6B,EAAW,EAAE;YAC3D,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC;YAE3B,IAAI,MAAM,CAAC,IAAI,KAAK,kBAAkB;gBAClC,MAAM,CAAC,MAAM,CAAC,IAAI,KAAK,YAAY;gBACnC,CAAC,SAAS,EAAE,aAAa,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC;gBACvD,MAAM,CAAC,QAAQ,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;gBAC1C,OAAO,CAAC,MAAM,EAAE,QAAQ,EAAE,QAAQ,EAAE,IAAI,EAAE,MAAM,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,QAAQ,CAAC,IAAI,CAAC,CAAC;YACnF,CAAC;YAED,OAAO,KAAK,CAAC;QACf,CAAC,CAAC;QAEF;;WAEG;QACH,MAAM,YAAY,GAAG,CAAC,IAA6B,EAAQ,EAAE;YAC3D,MAAM,IAAI,GAAG,IAAI,CAAC,SAAS,CAAC;YAC5B,IAAI,IAAI,CAAC,MAAM,KAAK,CAAC,EAAE,CAAC;gBACtB,OAAO;YACT,CAAC;YAED,sCAAsC;YACtC,MAAM,UAAU,GAAG,IAAI,CAAC,CAAC,CAAC,CAAC;YAC3B,IAAI,UAAU,CAAC,IAAI,KAAK,SAAS,IAAI,OAAO,UAAU,CAAC,KAAK,KAAK,QAAQ,EAAE,CAAC;gBAC1E,MAAM,OAAO,GAAG,UAAU,CAAC,KAAK,CAAC;gBAEjC,8BAA8B;gBAC9B,IAAI,kBAAkB,CAAC,MAAM,GAAG,CAAC,IAAI,CAAC,kBAAkB,CAAC,QAAQ,CAAC,OAAO,CAAC,EAAE,CAAC;oBAC3E,2BAA2B;oBAC3B,IAAI,aAAa,CAAC,MAAM,CAAC,IAAI,EAAE,OAAO,CAAC,EAAE,CAAC;wBACxC,OAAO;oBACT,CAAC;oBAED,OAAO,CAAC,MAAM,CAAC;wBACb,IAAI,EAAE,UAAU;wBAChB,SAAS,EAAE,oBAAoB;wBAC/B,IAAI,EAAE;4BACJ,QAAQ,EAAE,QAAQ;4BAClB,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,IAAI,CAAC,CAAC;yBACxC;qBACF,CAAC,CAAC;gBACL,CAAC;YACH,CAAC;QACH,CAAC,CAAC;QAEF;;WAEG;QACH,MAAM,cAAc,GAAG,GAAY,EAAE;YACnC,MAAM,QAAQ,GAAG,QAAQ,CAAC,WAAW,EAAE,CAAC;YACxC,OAAO,QAAQ,CAAC,QAAQ,CAAC,UAAU,CAAC;gBAC7B,QAAQ,CAAC,QAAQ,CAAC,SAAS,CAAC;gBAC5B,QAAQ,CAAC,QAAQ,CAAC,IAAI,CAAC;gBACvB,QAAQ,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QACnC,CAAC,CAAC;QAEF;;WAEG;QACH,MAAM,aAAa,GAAG,CAAC,IAA6B,EAAW,EAAE;YAC/D,MAAM,MAAM,GAAG,IAAI,CAAC,MAAM,CAAC;YAE3B,0DAA0D;YAC1D,IAAI,MAAM,CAAC,IAAI,KAAK,YAAY,IAAI,MAAM,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;gBAC9D,MAAM,GAAG,GAAG,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC;gBAC9B,IAAI,GAAG,EAAE,IAAI,KAAK,SAAS,IAAI,OAAO,GAAG,CAAC,KAAK,KAAK,QAAQ,EAAE,CAAC;oBAC7D,MAAM,UAAU,GAAG,GAAG,CAAC,KAAK,CAAC;oBAC7B,OAAO,CAAC,IAAI,EAAE,eAAe,EAAE,IAAI,EAAE,MAAM,EAAE,QAAQ,EAAE,MAAM,EAAE,OAAO,CAAC,CAAC,QAAQ,CAAC,UAAU,CAAC,CAAC;gBAC/F,CAAC;YACH,CAAC;YAED,mCAAmC;YACnC,IAAI,MAAM,CAAC,IAAI,KAAK,kBAAkB;gBAClC,MAAM,CAAC,MAAM,CAAC,IAAI,KAAK,YAAY;gBACnC,CAAC,SAAS,EAAE,QAAQ,EAAE,WAAW,EAAE,YAAY,CAAC,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,EAAE,CAAC;gBAClF,OAAO,IAAI,CAAC;YACd,CAAC;YAED,OAAO,KAAK,CAAC;QACf,CAAC,CAAC;QAEF,OAAO;YACL,+BAA+B;YAC/B,aAAa,CAAC,IAA4B;gBACxC,IAAI,CAAC;oBACH,IAAI,uBAAuB,CAAC,IAAI,CAAC,EAAE,CAAC;wBAClC,MAAM,IAAI,GAAG,IAAI,CAAC,SAAS,CAAC;wBAC5B,IAAI,IAAI,CAAC,MAAM,GAAG,CAAC,IAAI,IAAI,CAAC,CAAC,CAAC,EAAE,IAAI,KAAK,kBAAkB,EAAE,CAAC;4BAC5D,yBAAyB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,CAAC;wBACrC,CAAC;oBACH,CAAC;gBACH,CAAC;gBAAC,MAAM,CAAC;oBACP,OAAO;gBACT,CAAC;YACH,CAAC;YAED,kBAAkB;YAClB,cAAc,CAAC,IAA6B;gBAC1C,IAAI,CAAC;oBACH,IAAI,SAAS,CAAC,IAAI,CAAC,EAAE,CAAC;wBACpB,YAAY,CAAC,IAAI,CAAC,CAAC;oBACrB,CAAC;oBAED,gDAAgD;oBAChD,IAAI,cAAc,EAAE,IAAI,aAAa,CAAC,IAAI,CAAC,EAAE,CAAC;wBAC9C,2BAA2B;wBAC3B,IAAI,aAAa,CAAC,MAAM,CAAC,IAAI,EAAE,OAAO,CAAC,EAAE,CAAC;4BACxC,OAAO;wBACT,CAAC;wBAED,OAAO,CAAC,MAAM,CAAC;4BACb,IAAI;4BACJ,SAAS,EAAE,kBAAkB;4BAC7B,IAAI,EAAE;gCACJ,QAAQ,EAAE,QAAQ;gCAClB,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,IAAI,CAAC,CAAC;6BACxC;yBACF,CAAC,CAAC;oBACL,CAAC;gBACD,CAAC;gBAAC,MAAM,CAAC;oBACP,+CAA+C;oBAC/C,OAAO;gBACT,CAAC;YACH,CAAC;YAED,kCAAkC;YAClC,oBAAoB,CAAC,IAAmC;gBACtD,IAAI,CAAC;oBACH,sCAAsC;oBACtC,IAAI,IAAI,CAAC,IAAI,CAAC,IAAI,KAAK,kBAAkB;wBACrC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,KAAK,YAAY;wBACxC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,IAAI,KAAK,SAAS,EAAE,CAAC;wBAE1C,IAAI,IAAI,CAAC,KAAK,CAAC,IAAI,KAAK,SAAS,IAAI,OAAO,IAAI,CAAC,KAAK,CAAC,KAAK,KAAK,QAAQ,EAAE,CAAC;4BAC1E,MAAM,WAAW,GAAG,IAAI,CAAC,KAAK,CAAC,KAAK,CAAC;4BAErC,gDAAgD;4BAChD,IAAI,WAAW,CAAC,QAAQ,CAAC,cAAc,CAAC;gCACpC,WAAW,CAAC,QAAQ,CAAC,MAAM,CAAC;gCAC5B,WAAW,CAAC,QAAQ,CAAC,QAAQ,CAAC,EAAE,CAAC;gCACnC,2BAA2B;gCAC3B,IAAI,aAAa,CAAC,MAAM,CAAC,IAAI,EAAE,OAAO,CAAC,EAAE,CAAC;oCACxC,OAAO;gCACT,CAAC;gCAED,OAAO,CAAC,MAAM,CAAC;oCACb,IAAI,EAAE,IAAI,CAAC,KAAK;oCAChB,SAAS,EAAE,qBAAqB;oCAChC,IAAI,EAAE;wCACJ,QAAQ,EAAE,QAAQ;wCAClB,IAAI,EAAE,MAAM,CAAC,IAAI,CAAC,GAAG,EAAE,KAAK,CAAC,IAAI,IAAI,CAAC,CAAC;qCACxC;iCACF,CAAC,CAAC;4BACL,CAAC;wBACH,CAAC;oBACH,CAAC;gBACH,CAAC;gBAAC,MAAM,CAAC;oBACP,OAAO;gBACT,CAAC;YACH,CAAC;YAED,6CAA6C;YAC7C,QAAQ,CAAC,IAAuB;gBAC9B,IAAI,CAAC;oBACH,IAAI,IAAI,CAAC,GAAG,CAAC,IAAI,KAAK,YAAY,IAAI,IAAI,CAAC,GAAG,CAAC,IAAI,KAAK,gBAAgB,EAAE,CAAC;wBACzE,IAAI,IAAI,CAAC,KAAK,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;4BAC3C,yBAAyB,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;wBACxC,CAAC;oBACH,CAAC;gBACH,CAAC;gBAAC,MAAM,CAAC;oBACP,OAAO;gBACT,CAAC;YACH,CAAC;SACF,CAAC;IACJ,CAAC;CACF,CAAC,CAAC"}
@@ -0,0 +1,11 @@
1
+ export interface Options {
2
+ /** Allow sensitive data in test files. Default: false */
3
+ allowInTests?: boolean;
4
+ /** Patterns to detect sensitive data. Default: ['ssn', 'social', 'credit', 'card', 'password', 'secret', 'token', 'apiKey'] */
5
+ sensitivePatterns?: string[];
6
+ /** Logging/output patterns to detect. Default: ['log', 'console', 'print', 'debug', 'error', 'warn', 'info', 'trace', 'response', 'res.', 'req.'] */
7
+ loggingPatterns?: string[];
8
+ /** Additional safe patterns to ignore. Default: [] */
9
+ ignorePatterns?: string[];
10
+ }
11
+ export declare const noExposedSensitiveData: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;