eslint-plugin-secure-coding 1.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (155) hide show
  1. package/AGENTS.md +196 -0
  2. package/CHANGELOG.md +105 -0
  3. package/LICENSE +23 -0
  4. package/README.md +377 -0
  5. package/package.json +80 -0
  6. package/src/index.d.ts +32 -0
  7. package/src/index.js +345 -0
  8. package/src/index.js.map +1 -0
  9. package/src/rules/security/database-injection.d.ts +13 -0
  10. package/src/rules/security/database-injection.js +407 -0
  11. package/src/rules/security/database-injection.js.map +1 -0
  12. package/src/rules/security/detect-child-process.d.ts +11 -0
  13. package/src/rules/security/detect-child-process.js +460 -0
  14. package/src/rules/security/detect-child-process.js.map +1 -0
  15. package/src/rules/security/detect-eval-with-expression.d.ts +9 -0
  16. package/src/rules/security/detect-eval-with-expression.js +393 -0
  17. package/src/rules/security/detect-eval-with-expression.js.map +1 -0
  18. package/src/rules/security/detect-non-literal-fs-filename.d.ts +7 -0
  19. package/src/rules/security/detect-non-literal-fs-filename.js +322 -0
  20. package/src/rules/security/detect-non-literal-fs-filename.js.map +1 -0
  21. package/src/rules/security/detect-non-literal-regexp.d.ts +9 -0
  22. package/src/rules/security/detect-non-literal-regexp.js +387 -0
  23. package/src/rules/security/detect-non-literal-regexp.js.map +1 -0
  24. package/src/rules/security/detect-object-injection.d.ts +11 -0
  25. package/src/rules/security/detect-object-injection.js +411 -0
  26. package/src/rules/security/detect-object-injection.js.map +1 -0
  27. package/src/rules/security/no-buffer-overread.d.ts +14 -0
  28. package/src/rules/security/no-buffer-overread.js +519 -0
  29. package/src/rules/security/no-buffer-overread.js.map +1 -0
  30. package/src/rules/security/no-clickjacking.d.ts +10 -0
  31. package/src/rules/security/no-clickjacking.js +381 -0
  32. package/src/rules/security/no-clickjacking.js.map +1 -0
  33. package/src/rules/security/no-directive-injection.d.ts +12 -0
  34. package/src/rules/security/no-directive-injection.js +446 -0
  35. package/src/rules/security/no-directive-injection.js.map +1 -0
  36. package/src/rules/security/no-document-cookie.d.ts +5 -0
  37. package/src/rules/security/no-document-cookie.js +90 -0
  38. package/src/rules/security/no-document-cookie.js.map +1 -0
  39. package/src/rules/security/no-electron-security-issues.d.ts +10 -0
  40. package/src/rules/security/no-electron-security-issues.js +421 -0
  41. package/src/rules/security/no-electron-security-issues.js.map +1 -0
  42. package/src/rules/security/no-exposed-sensitive-data.d.ts +11 -0
  43. package/src/rules/security/no-exposed-sensitive-data.js +341 -0
  44. package/src/rules/security/no-exposed-sensitive-data.js.map +1 -0
  45. package/src/rules/security/no-format-string-injection.d.ts +17 -0
  46. package/src/rules/security/no-format-string-injection.js +653 -0
  47. package/src/rules/security/no-format-string-injection.js.map +1 -0
  48. package/src/rules/security/no-graphql-injection.d.ts +12 -0
  49. package/src/rules/security/no-graphql-injection.js +410 -0
  50. package/src/rules/security/no-graphql-injection.js.map +1 -0
  51. package/src/rules/security/no-hardcoded-credentials.d.ts +26 -0
  52. package/src/rules/security/no-hardcoded-credentials.js +377 -0
  53. package/src/rules/security/no-hardcoded-credentials.js.map +1 -0
  54. package/src/rules/security/no-improper-sanitization.d.ts +12 -0
  55. package/src/rules/security/no-improper-sanitization.js +408 -0
  56. package/src/rules/security/no-improper-sanitization.js.map +1 -0
  57. package/src/rules/security/no-improper-type-validation.d.ts +10 -0
  58. package/src/rules/security/no-improper-type-validation.js +420 -0
  59. package/src/rules/security/no-improper-type-validation.js.map +1 -0
  60. package/src/rules/security/no-insecure-comparison.d.ts +7 -0
  61. package/src/rules/security/no-insecure-comparison.js +125 -0
  62. package/src/rules/security/no-insecure-comparison.js.map +1 -0
  63. package/src/rules/security/no-insecure-cookie-settings.d.ts +9 -0
  64. package/src/rules/security/no-insecure-cookie-settings.js +305 -0
  65. package/src/rules/security/no-insecure-cookie-settings.js.map +1 -0
  66. package/src/rules/security/no-insecure-jwt.d.ts +10 -0
  67. package/src/rules/security/no-insecure-jwt.js +338 -0
  68. package/src/rules/security/no-insecure-jwt.js.map +1 -0
  69. package/src/rules/security/no-insecure-redirects.d.ts +7 -0
  70. package/src/rules/security/no-insecure-redirects.js +215 -0
  71. package/src/rules/security/no-insecure-redirects.js.map +1 -0
  72. package/src/rules/security/no-insufficient-postmessage-validation.d.ts +14 -0
  73. package/src/rules/security/no-insufficient-postmessage-validation.js +390 -0
  74. package/src/rules/security/no-insufficient-postmessage-validation.js.map +1 -0
  75. package/src/rules/security/no-insufficient-random.d.ts +9 -0
  76. package/src/rules/security/no-insufficient-random.js +207 -0
  77. package/src/rules/security/no-insufficient-random.js.map +1 -0
  78. package/src/rules/security/no-ldap-injection.d.ts +10 -0
  79. package/src/rules/security/no-ldap-injection.js +449 -0
  80. package/src/rules/security/no-ldap-injection.js.map +1 -0
  81. package/src/rules/security/no-missing-authentication.d.ts +13 -0
  82. package/src/rules/security/no-missing-authentication.js +322 -0
  83. package/src/rules/security/no-missing-authentication.js.map +1 -0
  84. package/src/rules/security/no-missing-cors-check.d.ts +9 -0
  85. package/src/rules/security/no-missing-cors-check.js +449 -0
  86. package/src/rules/security/no-missing-cors-check.js.map +1 -0
  87. package/src/rules/security/no-missing-csrf-protection.d.ts +11 -0
  88. package/src/rules/security/no-missing-csrf-protection.js +183 -0
  89. package/src/rules/security/no-missing-csrf-protection.js.map +1 -0
  90. package/src/rules/security/no-missing-security-headers.d.ts +7 -0
  91. package/src/rules/security/no-missing-security-headers.js +217 -0
  92. package/src/rules/security/no-missing-security-headers.js.map +1 -0
  93. package/src/rules/security/no-privilege-escalation.d.ts +13 -0
  94. package/src/rules/security/no-privilege-escalation.js +321 -0
  95. package/src/rules/security/no-privilege-escalation.js.map +1 -0
  96. package/src/rules/security/no-redos-vulnerable-regex.d.ts +7 -0
  97. package/src/rules/security/no-redos-vulnerable-regex.js +307 -0
  98. package/src/rules/security/no-redos-vulnerable-regex.js.map +1 -0
  99. package/src/rules/security/no-sensitive-data-exposure.d.ts +11 -0
  100. package/src/rules/security/no-sensitive-data-exposure.js +251 -0
  101. package/src/rules/security/no-sensitive-data-exposure.js.map +1 -0
  102. package/src/rules/security/no-sql-injection.d.ts +10 -0
  103. package/src/rules/security/no-sql-injection.js +332 -0
  104. package/src/rules/security/no-sql-injection.js.map +1 -0
  105. package/src/rules/security/no-timing-attack.d.ts +10 -0
  106. package/src/rules/security/no-timing-attack.js +358 -0
  107. package/src/rules/security/no-timing-attack.js.map +1 -0
  108. package/src/rules/security/no-toctou-vulnerability.d.ts +7 -0
  109. package/src/rules/security/no-toctou-vulnerability.js +165 -0
  110. package/src/rules/security/no-toctou-vulnerability.js.map +1 -0
  111. package/src/rules/security/no-unchecked-loop-condition.d.ts +12 -0
  112. package/src/rules/security/no-unchecked-loop-condition.js +635 -0
  113. package/src/rules/security/no-unchecked-loop-condition.js.map +1 -0
  114. package/src/rules/security/no-unencrypted-transmission.d.ts +11 -0
  115. package/src/rules/security/no-unencrypted-transmission.js +237 -0
  116. package/src/rules/security/no-unencrypted-transmission.js.map +1 -0
  117. package/src/rules/security/no-unescaped-url-parameter.d.ts +9 -0
  118. package/src/rules/security/no-unescaped-url-parameter.js +266 -0
  119. package/src/rules/security/no-unescaped-url-parameter.js.map +1 -0
  120. package/src/rules/security/no-unlimited-resource-allocation.d.ts +12 -0
  121. package/src/rules/security/no-unlimited-resource-allocation.js +659 -0
  122. package/src/rules/security/no-unlimited-resource-allocation.js.map +1 -0
  123. package/src/rules/security/no-unsafe-deserialization.d.ts +10 -0
  124. package/src/rules/security/no-unsafe-deserialization.js +501 -0
  125. package/src/rules/security/no-unsafe-deserialization.js.map +1 -0
  126. package/src/rules/security/no-unsafe-dynamic-require.d.ts +5 -0
  127. package/src/rules/security/no-unsafe-dynamic-require.js +107 -0
  128. package/src/rules/security/no-unsafe-dynamic-require.js.map +1 -0
  129. package/src/rules/security/no-unsafe-regex-construction.d.ts +9 -0
  130. package/src/rules/security/no-unsafe-regex-construction.js +292 -0
  131. package/src/rules/security/no-unsafe-regex-construction.js.map +1 -0
  132. package/src/rules/security/no-unsanitized-html.d.ts +9 -0
  133. package/src/rules/security/no-unsanitized-html.js +347 -0
  134. package/src/rules/security/no-unsanitized-html.js.map +1 -0
  135. package/src/rules/security/no-unvalidated-user-input.d.ts +9 -0
  136. package/src/rules/security/no-unvalidated-user-input.js +418 -0
  137. package/src/rules/security/no-unvalidated-user-input.js.map +1 -0
  138. package/src/rules/security/no-weak-crypto.d.ts +11 -0
  139. package/src/rules/security/no-weak-crypto.js +350 -0
  140. package/src/rules/security/no-weak-crypto.js.map +1 -0
  141. package/src/rules/security/no-weak-password-recovery.d.ts +12 -0
  142. package/src/rules/security/no-weak-password-recovery.js +401 -0
  143. package/src/rules/security/no-weak-password-recovery.js.map +1 -0
  144. package/src/rules/security/no-xpath-injection.d.ts +10 -0
  145. package/src/rules/security/no-xpath-injection.js +487 -0
  146. package/src/rules/security/no-xpath-injection.js.map +1 -0
  147. package/src/rules/security/no-xxe-injection.d.ts +7 -0
  148. package/src/rules/security/no-xxe-injection.js +270 -0
  149. package/src/rules/security/no-xxe-injection.js.map +1 -0
  150. package/src/rules/security/no-zip-slip.d.ts +9 -0
  151. package/src/rules/security/no-zip-slip.js +446 -0
  152. package/src/rules/security/no-zip-slip.js.map +1 -0
  153. package/src/types/index.d.ts +131 -0
  154. package/src/types/index.js +18 -0
  155. package/src/types/index.js.map +1 -0
@@ -0,0 +1,341 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.noExposedSensitiveData = void 0;
4
+ const eslint_devkit_1 = require("@interlace/eslint-devkit");
5
+ const eslint_devkit_2 = require("@interlace/eslint-devkit");
6
+ /**
7
+ * Default sensitive data patterns
8
+ */
9
+ const DEFAULT_SENSITIVE_PATTERNS = [
10
+ 'ssn',
11
+ 'social',
12
+ 'credit',
13
+ 'card',
14
+ 'password',
15
+ 'secret',
16
+ 'token',
17
+ 'apiKey',
18
+ 'apikey',
19
+ 'api_key',
20
+ 'privateKey',
21
+ 'private_key',
22
+ 'accessToken',
23
+ 'access_token',
24
+ 'refreshToken',
25
+ 'refresh_token',
26
+ 'authToken',
27
+ 'auth_token',
28
+ ];
29
+ /**
30
+ * Default logging/output patterns
31
+ */
32
+ const DEFAULT_LOGGING_PATTERNS = [
33
+ 'log',
34
+ 'console',
35
+ 'print',
36
+ 'debug',
37
+ 'error',
38
+ 'warn',
39
+ 'info',
40
+ 'trace',
41
+ 'response',
42
+ 'res.',
43
+ 'req.',
44
+ ];
45
+ /**
46
+ * Sensitive data regex patterns
47
+ */
48
+ const SENSITIVE_DATA_PATTERNS = {
49
+ // SSN pattern (XXX-XX-XXXX)
50
+ ssn: /\b\d{3}-\d{2}-\d{4}\b/,
51
+ // Credit card pattern (basic - 13-19 digits, may have spaces/dashes)
52
+ creditCard: /\b(?:\d{4}[-\s]?){3}\d{1,4}\b/,
53
+ // Email with sensitive context
54
+ sensitiveEmail: /\b(?:password|secret|token|key|credential)[\w.-]*@[\w.-]+\.\w+\b/i,
55
+ };
56
+ /**
57
+ * Check if a string contains sensitive data patterns
58
+ */
59
+ function containsSensitiveData(value, sensitivePatterns) {
60
+ // Check for SSN pattern
61
+ if (SENSITIVE_DATA_PATTERNS.ssn.test(value)) {
62
+ return { isSensitive: true, type: 'SSN pattern detected' };
63
+ }
64
+ // Check for credit card pattern
65
+ if (SENSITIVE_DATA_PATTERNS.creditCard.test(value)) {
66
+ return { isSensitive: true, type: 'Credit card pattern detected' };
67
+ }
68
+ // Check for sensitive keywords in variable names or values
69
+ const lowerValue = value.toLowerCase();
70
+ for (const pattern of sensitivePatterns) {
71
+ if (lowerValue.includes(pattern.toLowerCase())) {
72
+ // Check if it's in a sensitive context (not just a comment or documentation)
73
+ if (/\b(?:log|console|print|debug|error|warn|info|trace|response|res\.|req\.|body|query|params)\b/i.test(value) ||
74
+ /\b(?:password|secret|token|key|credential)\s*[:=]/i.test(value)) {
75
+ return { isSensitive: true, type: `Sensitive data keyword: ${pattern}` };
76
+ }
77
+ }
78
+ }
79
+ return { isSensitive: false, type: '' };
80
+ }
81
+ /**
82
+ * Check if a string matches any ignore pattern
83
+ */
84
+ function matchesIgnorePattern(text, patterns) {
85
+ return patterns.some(pattern => {
86
+ try {
87
+ const regex = new RegExp(pattern, 'i');
88
+ return regex.test(text);
89
+ }
90
+ catch {
91
+ return false;
92
+ }
93
+ });
94
+ }
95
+ /**
96
+ * Check if a node is in a logging or output context
97
+ */
98
+ function isInLoggingContext(node, sourceCode, loggingPatterns) {
99
+ // Build regex pattern from logging patterns
100
+ const patternRegex = new RegExp(`\\b(?:${loggingPatterns.map(p => p.replace(/[.*+?^${}()|[\]\\]/g, '\\$&')).join('|')})\\b`, 'i');
101
+ let current = node;
102
+ // Check parent chain for logging calls
103
+ while (current && 'parent' in current && current.parent) {
104
+ current = current.parent;
105
+ if (current.type === 'CallExpression') {
106
+ const callExpr = current;
107
+ const callText = sourceCode.getText(current);
108
+ // Check if it's a logging method call
109
+ if (callExpr.callee.type === 'MemberExpression') {
110
+ const memberExpr = callExpr.callee;
111
+ if (memberExpr.object.type === 'Identifier' && memberExpr.property.type === 'Identifier') {
112
+ const objName = memberExpr.object.name.toLowerCase();
113
+ const propName = memberExpr.property.name.toLowerCase();
114
+ // Check against logging patterns
115
+ if (loggingPatterns.some(p => objName.includes(p.toLowerCase()) || propName.includes(p.toLowerCase()))) {
116
+ return true;
117
+ }
118
+ }
119
+ }
120
+ // Also check for patterns in the call text
121
+ if (patternRegex.test(callText)) {
122
+ return true;
123
+ }
124
+ }
125
+ // Check if it's in an object expression that's being logged
126
+ if (current.type === 'ObjectExpression') {
127
+ // Check if parent is a CallExpression with logging
128
+ if (current.parent && current.parent.type === 'CallExpression') {
129
+ const parentCall = current.parent;
130
+ const callText = sourceCode.getText(parentCall);
131
+ if (patternRegex.test(callText)) {
132
+ return true;
133
+ }
134
+ }
135
+ }
136
+ }
137
+ return false;
138
+ }
139
+ exports.noExposedSensitiveData = (0, eslint_devkit_2.createRule)({
140
+ name: 'no-exposed-sensitive-data',
141
+ meta: {
142
+ type: 'problem',
143
+ docs: {
144
+ description: 'Detects exposure of PII/sensitive data (SSN, credit card numbers in logs, etc.)',
145
+ },
146
+ hasSuggestions: true,
147
+ messages: {
148
+ exposedSensitiveData: (0, eslint_devkit_1.formatLLMMessage)({
149
+ icon: eslint_devkit_1.MessageIcons.SECURITY,
150
+ issueName: 'Exposed Sensitive Data',
151
+ cwe: 'CWE-200',
152
+ description: 'Sensitive data exposure detected: {{issue}}',
153
+ severity: 'CRITICAL',
154
+ fix: '{{safeAlternative}}',
155
+ documentationLink: 'https://cwe.mitre.org/data/definitions/200.html',
156
+ }),
157
+ sanitizeData: (0, eslint_devkit_1.formatLLMMessage)({
158
+ icon: eslint_devkit_1.MessageIcons.INFO,
159
+ issueName: 'Sanitize Data',
160
+ description: 'Remove or mask sensitive information',
161
+ severity: 'LOW',
162
+ fix: 'Mask or remove sensitive data before logging/transmitting',
163
+ documentationLink: 'https://cwe.mitre.org/data/definitions/200.html',
164
+ }),
165
+ },
166
+ schema: [
167
+ {
168
+ type: 'object',
169
+ properties: {
170
+ allowInTests: {
171
+ type: 'boolean',
172
+ default: false,
173
+ description: 'Allow sensitive data in test files',
174
+ },
175
+ sensitivePatterns: {
176
+ type: 'array',
177
+ items: { type: 'string' },
178
+ default: [],
179
+ description: 'Patterns to detect sensitive data',
180
+ },
181
+ loggingPatterns: {
182
+ type: 'array',
183
+ items: { type: 'string' },
184
+ default: [],
185
+ description: 'Logging/output patterns to detect',
186
+ },
187
+ ignorePatterns: {
188
+ type: 'array',
189
+ items: { type: 'string' },
190
+ default: [],
191
+ description: 'Additional safe patterns to ignore',
192
+ },
193
+ },
194
+ additionalProperties: false,
195
+ },
196
+ ],
197
+ },
198
+ defaultOptions: [
199
+ {
200
+ allowInTests: false,
201
+ sensitivePatterns: [],
202
+ loggingPatterns: [],
203
+ ignorePatterns: [],
204
+ },
205
+ ],
206
+ create(context, [options = {}]) {
207
+ const { allowInTests = false, sensitivePatterns, loggingPatterns, ignorePatterns = [], } = options;
208
+ const patternsToCheck = sensitivePatterns && sensitivePatterns.length > 0
209
+ ? sensitivePatterns
210
+ : DEFAULT_SENSITIVE_PATTERNS;
211
+ const loggingPatternsToCheck = loggingPatterns && loggingPatterns.length > 0
212
+ ? loggingPatterns
213
+ : DEFAULT_LOGGING_PATTERNS;
214
+ const filename = context.getFilename();
215
+ const isTestFile = allowInTests && /\.(test|spec)\.(ts|tsx|js|jsx)$/.test(filename);
216
+ const sourceCode = context.sourceCode || context.sourceCode;
217
+ function checkLiteral(node) {
218
+ if (isTestFile) {
219
+ return;
220
+ }
221
+ if (typeof node.value !== 'string') {
222
+ return;
223
+ }
224
+ const value = node.value;
225
+ const text = sourceCode.getText(node);
226
+ // Check if it matches any ignore pattern
227
+ if (matchesIgnorePattern(text, ignorePatterns)) {
228
+ return;
229
+ }
230
+ // Only check if in logging/output context
231
+ if (!isInLoggingContext(node, sourceCode, loggingPatternsToCheck)) {
232
+ return;
233
+ }
234
+ const { isSensitive, type } = containsSensitiveData(value, patternsToCheck);
235
+ if (isSensitive) {
236
+ // For SSN and credit card patterns, don't provide auto-fix suggestions
237
+ // as they require manual review
238
+ const isPatternMatch = type.includes('pattern detected');
239
+ context.report({
240
+ node,
241
+ messageId: 'exposedSensitiveData',
242
+ data: {
243
+ issue: `${type} in logging/output context`,
244
+ safeAlternative: 'Remove or mask sensitive data before logging: logger.info({ userId: user.id }) instead of logger.info({ password: user.password })',
245
+ },
246
+ ...(isPatternMatch ? {} : {
247
+ suggest: [
248
+ {
249
+ messageId: 'sanitizeData',
250
+ fix(fixer) {
251
+ // Suggest removing or masking the sensitive data
252
+ return fixer.replaceText(node, '"***REDACTED***"');
253
+ },
254
+ },
255
+ ],
256
+ }),
257
+ });
258
+ }
259
+ }
260
+ function checkIdentifier(node) {
261
+ if (isTestFile) {
262
+ return;
263
+ }
264
+ const name = node.name;
265
+ const text = sourceCode.getText(node);
266
+ // Check if it matches any ignore pattern
267
+ if (matchesIgnorePattern(text, ignorePatterns)) {
268
+ return;
269
+ }
270
+ // Only check if in logging/output context
271
+ if (!isInLoggingContext(node, sourceCode, loggingPatternsToCheck)) {
272
+ return;
273
+ }
274
+ // Check if identifier name contains sensitive patterns
275
+ const lowerName = name.toLowerCase();
276
+ for (const pattern of patternsToCheck) {
277
+ if (lowerName.includes(pattern.toLowerCase())) {
278
+ // Check if it's being accessed in a sensitive way
279
+ if (node.parent) {
280
+ const parentText = sourceCode.getText(node.parent);
281
+ // Build regex pattern from logging patterns
282
+ const loggingPatternRegex = new RegExp(`\\b(?:${loggingPatternsToCheck.map(p => p.replace(/[.*+?^${}()|[\]\\]/g, '\\$&')).join('|')})\\b`, 'i');
283
+ if (loggingPatternRegex.test(parentText)) {
284
+ // Get the actual property name from context
285
+ const actualPropertyName = name;
286
+ context.report({
287
+ node,
288
+ messageId: 'exposedSensitiveData',
289
+ data: {
290
+ issue: `Sensitive variable "${name}" exposed in logging/output`,
291
+ safeAlternative: `Remove or mask sensitive data: logger.info({ userId: user.id }) instead of logger.info({ ${actualPropertyName}: user.${actualPropertyName} })`,
292
+ },
293
+ // Don't provide auto-fix suggestions for identifiers (too risky)
294
+ });
295
+ break;
296
+ }
297
+ }
298
+ }
299
+ }
300
+ }
301
+ function checkMemberExpression(node) {
302
+ if (isTestFile) {
303
+ return;
304
+ }
305
+ const text = sourceCode.getText(node);
306
+ // Check if it matches any ignore pattern
307
+ if (matchesIgnorePattern(text, ignorePatterns)) {
308
+ return;
309
+ }
310
+ // Only check if in logging/output context
311
+ if (!isInLoggingContext(node, sourceCode, loggingPatternsToCheck)) {
312
+ return;
313
+ }
314
+ // Check if property name contains sensitive patterns
315
+ if (node.property.type === 'Identifier') {
316
+ const propertyName = node.property.name.toLowerCase();
317
+ for (const pattern of patternsToCheck) {
318
+ if (propertyName.includes(pattern.toLowerCase())) {
319
+ const objectName = node.object.type === 'Identifier' ? node.object.name : 'object';
320
+ context.report({
321
+ node,
322
+ messageId: 'exposedSensitiveData',
323
+ data: {
324
+ issue: `Sensitive property "${node.property.name}" exposed in logging/output`,
325
+ safeAlternative: `Remove or mask sensitive data: logger.info({ userId: user.id }) instead of logger.info({ ${node.property.name}: ${objectName}.${node.property.name} })`,
326
+ },
327
+ // Don't provide auto-fix suggestions for property access (too risky)
328
+ });
329
+ break;
330
+ }
331
+ }
332
+ }
333
+ }
334
+ return {
335
+ Literal: checkLiteral,
336
+ Identifier: checkIdentifier,
337
+ MemberExpression: checkMemberExpression,
338
+ };
339
+ },
340
+ });
341
+ //# sourceMappingURL=no-exposed-sensitive-data.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"no-exposed-sensitive-data.js","sourceRoot":"","sources":["../../../../../../packages/eslint-plugin-secure-coding/src/rules/security/no-exposed-sensitive-data.ts"],"names":[],"mappings":";;;AASA,4DAA0E;AAC1E,4DAAsD;AAoBtD;;GAEG;AACH,MAAM,0BAA0B,GAAG;IACjC,KAAK;IACL,QAAQ;IACR,QAAQ;IACR,MAAM;IACN,UAAU;IACV,QAAQ;IACR,OAAO;IACP,QAAQ;IACR,QAAQ;IACR,SAAS;IACT,YAAY;IACZ,aAAa;IACb,aAAa;IACb,cAAc;IACd,cAAc;IACd,eAAe;IACf,WAAW;IACX,YAAY;CACb,CAAC;AAEF;;GAEG;AACH,MAAM,wBAAwB,GAAG;IAC/B,KAAK;IACL,SAAS;IACT,OAAO;IACP,OAAO;IACP,OAAO;IACP,MAAM;IACN,MAAM;IACN,OAAO;IACP,UAAU;IACV,MAAM;IACN,MAAM;CACP,CAAC;AAEF;;GAEG;AACH,MAAM,uBAAuB,GAAG;IAC9B,4BAA4B;IAC5B,GAAG,EAAE,uBAAuB;IAE5B,qEAAqE;IACrE,UAAU,EAAE,+BAA+B;IAE3C,+BAA+B;IAC/B,cAAc,EAAE,mEAAmE;CACpF,CAAC;AAEF;;GAEG;AACH,SAAS,qBAAqB,CAC5B,KAAa,EACb,iBAA2B;IAE3B,wBAAwB;IACxB,IAAI,uBAAuB,CAAC,GAAG,CAAC,IAAI,CAAC,KAAK,CAAC,EAAE,CAAC;QAC5C,OAAO,EAAE,WAAW,EAAE,IAAI,EAAE,IAAI,EAAE,sBAAsB,EAAE,CAAC;IAC7D,CAAC;IAED,gCAAgC;IAChC,IAAI,uBAAuB,CAAC,UAAU,CAAC,IAAI,CAAC,KAAK,CAAC,EAAE,CAAC;QACnD,OAAO,EAAE,WAAW,EAAE,IAAI,EAAE,IAAI,EAAE,8BAA8B,EAAE,CAAC;IACrE,CAAC;IAED,2DAA2D;IAC3D,MAAM,UAAU,GAAG,KAAK,CAAC,WAAW,EAAE,CAAC;IACvC,KAAK,MAAM,OAAO,IAAI,iBAAiB,EAAE,CAAC;QACxC,IAAI,UAAU,CAAC,QAAQ,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,EAAE,CAAC;YAC/C,6EAA6E;YAC7E,IACE,+FAA+F,CAAC,IAAI,CAAC,KAAK,CAAC;gBAC3G,oDAAoD,CAAC,IAAI,CAAC,KAAK,CAAC,EAChE,CAAC;gBACD,OAAO,EAAE,WAAW,EAAE,IAAI,EAAE,IAAI,EAAE,2BAA2B,OAAO,EAAE,EAAE,CAAC;YAC3E,CAAC;QACH,CAAC;IACH,CAAC;IAED,OAAO,EAAE,WAAW,EAAE,KAAK,EAAE,IAAI,EAAE,EAAE,EAAE,CAAC;AAC1C,CAAC;AAED;;GAEG;AACH,SAAS,oBAAoB,CAAC,IAAY,EAAE,QAAkB;IAC5D,OAAO,QAAQ,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE;QAC7B,IAAI,CAAC;YACH,MAAM,KAAK,GAAG,IAAI,MAAM,CAAC,OAAO,EAAE,GAAG,CAAC,CAAC;YACvC,OAAO,KAAK,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;QAC1B,CAAC;QAAC,MAAM,CAAC;YACP,OAAO,KAAK,CAAC;QACf,CAAC;IACH,CAAC,CAAC,CAAC;AACL,CAAC;AAED;;GAEG;AACH,SAAS,kBAAkB,CACzB,IAAmB,EACnB,UAA+B,EAC/B,eAAyB;IAEzB,4CAA4C;IAC5C,MAAM,YAAY,GAAG,IAAI,MAAM,CAC7B,SAAS,eAAe,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,qBAAqB,EAAE,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,MAAM,EAC3F,GAAG,CACJ,CAAC;IAEF,IAAI,OAAO,GAAyB,IAAI,CAAC;IAEzC,uCAAuC;IACvC,OAAO,OAAO,IAAI,QAAQ,IAAI,OAAO,IAAI,OAAO,CAAC,MAAM,EAAE,CAAC;QACxD,OAAO,GAAG,OAAO,CAAC,MAAuB,CAAC;QAE1C,IAAI,OAAO,CAAC,IAAI,KAAK,gBAAgB,EAAE,CAAC;YACtC,MAAM,QAAQ,GAAG,OAAkC,CAAC;YACpD,MAAM,QAAQ,GAAG,UAAU,CAAC,OAAO,CAAC,OAAO,CAAC,CAAC;YAE7C,sCAAsC;YACtC,IAAI,QAAQ,CAAC,MAAM,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;gBAChD,MAAM,UAAU,GAAG,QAAQ,CAAC,MAAM,CAAC;gBACnC,IAAI,UAAU,CAAC,MAAM,CAAC,IAAI,KAAK,YAAY,IAAI,UAAU,CAAC,QAAQ,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;oBACzF,MAAM,OAAO,GAAG,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;oBACrD,MAAM,QAAQ,GAAG,UAAU,CAAC,QAAQ,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;oBAExD,iCAAiC;oBACjC,IAAI,eAAe,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,OAAO,CAAC,QAAQ,CAAC,CAAC,CAAC,WAAW,EAAE,CAAC,IAAI,QAAQ,CAAC,QAAQ,CAAC,CAAC,CAAC,WAAW,EAAE,CAAC,CAAC,EAAE,CAAC;wBACvG,OAAO,IAAI,CAAC;oBACd,CAAC;gBACH,CAAC;YACH,CAAC;YAED,2CAA2C;YAC3C,IAAI,YAAY,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC;gBAChC,OAAO,IAAI,CAAC;YACd,CAAC;QACH,CAAC;QAED,4DAA4D;QAC5D,IAAI,OAAO,CAAC,IAAI,KAAK,kBAAkB,EAAE,CAAC;YACxC,mDAAmD;YACnD,IAAI,OAAO,CAAC,MAAM,IAAI,OAAO,CAAC,MAAM,CAAC,IAAI,KAAK,gBAAgB,EAAE,CAAC;gBAC/D,MAAM,UAAU,GAAG,OAAO,CAAC,MAAiC,CAAC;gBAC7D,MAAM,QAAQ,GAAG,UAAU,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC;gBAChD,IAAI,YAAY,CAAC,IAAI,CAAC,QAAQ,CAAC,EAAE,CAAC;oBAChC,OAAO,IAAI,CAAC;gBACd,CAAC;YACH,CAAC;QACH,CAAC;IACH,CAAC;IAED,OAAO,KAAK,CAAC;AACf,CAAC;AAEY,QAAA,sBAAsB,GAAG,IAAA,0BAAU,EAA0B;IACxE,IAAI,EAAE,2BAA2B;IACjC,IAAI,EAAE;QACJ,IAAI,EAAE,SAAS;QACf,IAAI,EAAE;YACJ,WAAW,EAAE,iFAAiF;SAC/F;QACD,cAAc,EAAE,IAAI;QACpB,QAAQ,EAAE;YACR,oBAAoB,EAAE,IAAA,gCAAgB,EAAC;gBACrC,IAAI,EAAE,4BAAY,CAAC,QAAQ;gBAC3B,SAAS,EAAE,wBAAwB;gBACnC,GAAG,EAAE,SAAS;gBACd,WAAW,EAAE,6CAA6C;gBAC1D,QAAQ,EAAE,UAAU;gBACpB,GAAG,EAAE,qBAAqB;gBAC1B,iBAAiB,EAAE,iDAAiD;aACrE,CAAC;YACF,YAAY,EAAE,IAAA,gCAAgB,EAAC;gBAC7B,IAAI,EAAE,4BAAY,CAAC,IAAI;gBACvB,SAAS,EAAE,eAAe;gBAC1B,WAAW,EAAE,sCAAsC;gBACnD,QAAQ,EAAE,KAAK;gBACf,GAAG,EAAE,2DAA2D;gBAChE,iBAAiB,EAAE,iDAAiD;aACrE,CAAC;SACH;QACD,MAAM,EAAE;YACN;gBACE,IAAI,EAAE,QAAQ;gBACd,UAAU,EAAE;oBACV,YAAY,EAAE;wBACZ,IAAI,EAAE,SAAS;wBACf,OAAO,EAAE,KAAK;wBACd,WAAW,EAAE,oCAAoC;qBAClD;oBACD,iBAAiB,EAAE;wBACjB,IAAI,EAAE,OAAO;wBACb,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE;wBACzB,OAAO,EAAE,EAAE;wBACX,WAAW,EAAE,mCAAmC;qBACjD;oBACD,eAAe,EAAE;wBACf,IAAI,EAAE,OAAO;wBACb,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE;wBACzB,OAAO,EAAE,EAAE;wBACX,WAAW,EAAE,mCAAmC;qBACjD;oBACD,cAAc,EAAE;wBACd,IAAI,EAAE,OAAO;wBACb,KAAK,EAAE,EAAE,IAAI,EAAE,QAAQ,EAAE;wBACzB,OAAO,EAAE,EAAE;wBACX,WAAW,EAAE,oCAAoC;qBAClD;iBACF;gBACD,oBAAoB,EAAE,KAAK;aAC5B;SACF;KACF;IACD,cAAc,EAAE;QACd;YACE,YAAY,EAAE,KAAK;YACnB,iBAAiB,EAAE,EAAE;YACrB,eAAe,EAAE,EAAE;YACnB,cAAc,EAAE,EAAE;SACnB;KACF;IACD,MAAM,CACJ,OAAsD,EACtD,CAAC,OAAO,GAAG,EAAE,CAAC;QAEd,MAAM,EACJ,YAAY,GAAG,KAAK,EACpB,iBAAiB,EACjB,eAAe,EACf,cAAc,GAAG,EAAE,GACpB,GAAG,OAAkB,CAAC;QAEvB,MAAM,eAAe,GAAG,iBAAiB,IAAI,iBAAiB,CAAC,MAAM,GAAG,CAAC;YACvE,CAAC,CAAC,iBAAiB;YACnB,CAAC,CAAC,0BAA0B,CAAC;QAE/B,MAAM,sBAAsB,GAAG,eAAe,IAAI,eAAe,CAAC,MAAM,GAAG,CAAC;YAC1E,CAAC,CAAC,eAAe;YACjB,CAAC,CAAC,wBAAwB,CAAC;QAE7B,MAAM,QAAQ,GAAG,OAAO,CAAC,WAAW,EAAE,CAAC;QACvC,MAAM,UAAU,GAAG,YAAY,IAAI,iCAAiC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;QACpF,MAAM,UAAU,GAAG,OAAO,CAAC,UAAU,IAAI,OAAO,CAAC,UAAU,CAAC;QAE5D,SAAS,YAAY,CAAC,IAAsB;YAC1C,IAAI,UAAU,EAAE,CAAC;gBACf,OAAO;YACT,CAAC;YAED,IAAI,OAAO,IAAI,CAAC,KAAK,KAAK,QAAQ,EAAE,CAAC;gBACnC,OAAO;YACT,CAAC;YAED,MAAM,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC;YACzB,MAAM,IAAI,GAAG,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;YAEtC,yCAAyC;YACzC,IAAI,oBAAoB,CAAC,IAAI,EAAE,cAAc,CAAC,EAAE,CAAC;gBAC/C,OAAO;YACT,CAAC;YAED,0CAA0C;YAC1C,IAAI,CAAC,kBAAkB,CAAC,IAAI,EAAE,UAAU,EAAE,sBAAsB,CAAC,EAAE,CAAC;gBAClE,OAAO;YACT,CAAC;YAED,MAAM,EAAE,WAAW,EAAE,IAAI,EAAE,GAAG,qBAAqB,CAAC,KAAK,EAAE,eAAe,CAAC,CAAC;YAE5E,IAAI,WAAW,EAAE,CAAC;gBAChB,uEAAuE;gBACvE,gCAAgC;gBAChC,MAAM,cAAc,GAAG,IAAI,CAAC,QAAQ,CAAC,kBAAkB,CAAC,CAAC;gBACzD,OAAO,CAAC,MAAM,CAAC;oBACb,IAAI;oBACJ,SAAS,EAAE,sBAAsB;oBACjC,IAAI,EAAE;wBACJ,KAAK,EAAE,GAAG,IAAI,4BAA4B;wBAC1C,eAAe,EAAE,oIAAoI;qBACtJ;oBACD,GAAG,CAAC,cAAc,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;wBACxB,OAAO,EAAE;4BACP;gCACE,SAAS,EAAE,cAAc;gCACzB,GAAG,CAAC,KAAyB;oCAC3B,iDAAiD;oCACjD,OAAO,KAAK,CAAC,WAAW,CAAC,IAAI,EAAE,kBAAkB,CAAC,CAAC;gCACrD,CAAC;6BACF;yBACF;qBACF,CAAC;iBACH,CAAC,CAAC;YACL,CAAC;QACH,CAAC;QAED,SAAS,eAAe,CAAC,IAAyB;YAChD,IAAI,UAAU,EAAE,CAAC;gBACf,OAAO;YACT,CAAC;YAED,MAAM,IAAI,GAAG,IAAI,CAAC,IAAI,CAAC;YACvB,MAAM,IAAI,GAAG,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;YAEtC,yCAAyC;YACzC,IAAI,oBAAoB,CAAC,IAAI,EAAE,cAAc,CAAC,EAAE,CAAC;gBAC/C,OAAO;YACT,CAAC;YAED,0CAA0C;YAC1C,IAAI,CAAC,kBAAkB,CAAC,IAAI,EAAE,UAAU,EAAE,sBAAsB,CAAC,EAAE,CAAC;gBAClE,OAAO;YACT,CAAC;YAED,uDAAuD;YACvD,MAAM,SAAS,GAAG,IAAI,CAAC,WAAW,EAAE,CAAC;YACrC,KAAK,MAAM,OAAO,IAAI,eAAe,EAAE,CAAC;gBACtC,IAAI,SAAS,CAAC,QAAQ,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,EAAE,CAAC;oBAC9C,kDAAkD;oBAClD,IAAI,IAAI,CAAC,MAAM,EAAE,CAAC;wBAChB,MAAM,UAAU,GAAG,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;wBACnD,4CAA4C;wBAC5C,MAAM,mBAAmB,GAAG,IAAI,MAAM,CACpC,SAAS,sBAAsB,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,OAAO,CAAC,qBAAqB,EAAE,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,MAAM,EAClG,GAAG,CACJ,CAAC;wBACF,IAAI,mBAAmB,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;4BACzC,4CAA4C;4BAC5C,MAAM,kBAAkB,GAAG,IAAI,CAAC;4BAChC,OAAO,CAAC,MAAM,CAAC;gCACb,IAAI;gCACJ,SAAS,EAAE,sBAAsB;gCACjC,IAAI,EAAE;oCACJ,KAAK,EAAE,uBAAuB,IAAI,6BAA6B;oCAC/D,eAAe,EAAE,4FAA4F,kBAAkB,UAAU,kBAAkB,KAAK;iCACjK;gCACD,iEAAiE;6BAClE,CAAC,CAAC;4BACH,MAAM;wBACR,CAAC;oBACH,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,SAAS,qBAAqB,CAAC,IAA+B;YAC5D,IAAI,UAAU,EAAE,CAAC;gBACf,OAAO;YACT,CAAC;YAED,MAAM,IAAI,GAAG,UAAU,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;YAEtC,yCAAyC;YACzC,IAAI,oBAAoB,CAAC,IAAI,EAAE,cAAc,CAAC,EAAE,CAAC;gBAC/C,OAAO;YACT,CAAC;YAED,0CAA0C;YAC1C,IAAI,CAAC,kBAAkB,CAAC,IAAI,EAAE,UAAU,EAAE,sBAAsB,CAAC,EAAE,CAAC;gBAClE,OAAO;YACT,CAAC;YAED,qDAAqD;YACrD,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,KAAK,YAAY,EAAE,CAAC;gBACxC,MAAM,YAAY,GAAG,IAAI,CAAC,QAAQ,CAAC,IAAI,CAAC,WAAW,EAAE,CAAC;gBACtD,KAAK,MAAM,OAAO,IAAI,eAAe,EAAE,CAAC;oBACtC,IAAI,YAAY,CAAC,QAAQ,CAAC,OAAO,CAAC,WAAW,EAAE,CAAC,EAAE,CAAC;wBAC/C,MAAM,UAAU,GAAG,IAAI,CAAC,MAAM,CAAC,IAAI,KAAK,YAAY,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,QAAQ,CAAC;wBACnF,OAAO,CAAC,MAAM,CAAC;4BACb,IAAI;4BACJ,SAAS,EAAE,sBAAsB;4BACjC,IAAI,EAAE;gCACJ,KAAK,EAAE,uBAAuB,IAAI,CAAC,QAAQ,CAAC,IAAI,6BAA6B;gCAC7E,eAAe,EAAE,4FAA4F,IAAI,CAAC,QAAQ,CAAC,IAAI,KAAK,UAAU,IAAI,IAAI,CAAC,QAAQ,CAAC,IAAI,KAAK;6BAC1K;4BACD,qEAAqE;yBACtE,CAAC,CAAC;wBACL,MAAM;oBACR,CAAC;gBACH,CAAC;YACH,CAAC;QACH,CAAC;QAED,OAAO;YACL,OAAO,EAAE,YAAY;YACrB,UAAU,EAAE,eAAe;YAC3B,gBAAgB,EAAE,qBAAqB;SACxC,CAAC;IACJ,CAAC;CACF,CAAC,CAAC"}
@@ -0,0 +1,17 @@
1
+ export interface Options {
2
+ /** Functions that use format strings */
3
+ formatFunctions?: string[];
4
+ /** Format specifiers to detect */
5
+ formatSpecifiers?: string[];
6
+ /** Variables that contain user input */
7
+ userInputVariables?: string[];
8
+ /** Safe formatting libraries */
9
+ safeFormatLibraries?: string[];
10
+ /** Additional function names to consider as sanitizers */
11
+ trustedSanitizers?: string[];
12
+ /** Additional JSDoc annotations to consider as safe markers */
13
+ trustedAnnotations?: string[];
14
+ /** Disable all false positive detection (strict mode) */
15
+ strictMode?: boolean;
16
+ }
17
+ export declare const noFormatStringInjection: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;