eslint-plugin-secure-coding 2.3.2 → 2.3.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -0
- package/package.json +3 -10
- package/src/index.ts +605 -0
- package/src/rules/__tests__/integration-demo.test.ts +290 -0
- package/src/rules/__tests__/integration-llm.test.ts +89 -0
- package/src/rules/database-injection/database-injection.test.ts +456 -0
- package/src/rules/database-injection/index.ts +488 -0
- package/src/rules/detect-child-process/detect-child-process.test.ts +207 -0
- package/src/rules/detect-child-process/index.ts +634 -0
- package/src/rules/detect-eval-with-expression/detect-eval-with-expression.test.ts +416 -0
- package/src/rules/detect-eval-with-expression/index.ts +463 -0
- package/src/rules/detect-mixed-content/detect-mixed-content.test.ts +28 -0
- package/src/rules/detect-mixed-content/index.ts +52 -0
- package/src/rules/detect-non-literal-fs-filename/detect-non-literal-fs-filename.test.ts +269 -0
- package/src/rules/detect-non-literal-fs-filename/index.ts +551 -0
- package/src/rules/detect-non-literal-regexp/detect-non-literal-regexp.test.ts +189 -0
- package/src/rules/detect-non-literal-regexp/index.ts +490 -0
- package/src/rules/detect-object-injection/detect-object-injection.test.ts +440 -0
- package/src/rules/detect-object-injection/index.ts +674 -0
- package/src/rules/detect-suspicious-dependencies/detect-suspicious-dependencies.test.ts +32 -0
- package/src/rules/detect-suspicious-dependencies/index.ts +84 -0
- package/src/rules/detect-weak-password-validation/detect-weak-password-validation.test.ts +31 -0
- package/src/rules/detect-weak-password-validation/index.ts +68 -0
- package/src/rules/no-allow-arbitrary-loads/index.ts +54 -0
- package/src/rules/no-allow-arbitrary-loads/no-allow-arbitrary-loads.test.ts +28 -0
- package/src/rules/no-arbitrary-file-access/index.ts +238 -0
- package/src/rules/no-arbitrary-file-access/no-arbitrary-file-access.test.ts +119 -0
- package/src/rules/no-buffer-overread/index.ts +724 -0
- package/src/rules/no-buffer-overread/no-buffer-overread.test.ts +313 -0
- package/src/rules/no-clickjacking/index.ts +481 -0
- package/src/rules/no-clickjacking/no-clickjacking.test.ts +253 -0
- package/src/rules/no-client-side-auth-logic/index.ts +81 -0
- package/src/rules/no-client-side-auth-logic/no-client-side-auth-logic.test.ts +33 -0
- package/src/rules/no-credentials-in-query-params/index.ts +69 -0
- package/src/rules/no-credentials-in-query-params/no-credentials-in-query-params.test.ts +33 -0
- package/src/rules/no-credentials-in-storage-api/index.ts +64 -0
- package/src/rules/no-credentials-in-storage-api/no-credentials-in-storage-api.test.ts +31 -0
- package/src/rules/no-data-in-temp-storage/index.ts +75 -0
- package/src/rules/no-data-in-temp-storage/no-data-in-temp-storage.test.ts +33 -0
- package/src/rules/no-debug-code-in-production/index.ts +59 -0
- package/src/rules/no-debug-code-in-production/no-debug-code-in-production.test.ts +26 -0
- package/src/rules/no-directive-injection/index.ts +551 -0
- package/src/rules/no-directive-injection/no-directive-injection.test.ts +305 -0
- package/src/rules/no-disabled-certificate-validation/index.ts +72 -0
- package/src/rules/no-disabled-certificate-validation/no-disabled-certificate-validation.test.ts +33 -0
- package/src/rules/no-document-cookie/index.ts +113 -0
- package/src/rules/no-document-cookie/no-document-cookie.test.ts +382 -0
- package/src/rules/no-dynamic-dependency-loading/index.ts +60 -0
- package/src/rules/no-dynamic-dependency-loading/no-dynamic-dependency-loading.test.ts +27 -0
- package/src/rules/no-electron-security-issues/index.ts +504 -0
- package/src/rules/no-electron-security-issues/no-electron-security-issues.test.ts +324 -0
- package/src/rules/no-exposed-debug-endpoints/index.ts +73 -0
- package/src/rules/no-exposed-debug-endpoints/no-exposed-debug-endpoints.test.ts +40 -0
- package/src/rules/no-exposed-sensitive-data/index.ts +428 -0
- package/src/rules/no-exposed-sensitive-data/no-exposed-sensitive-data.test.ts +75 -0
- package/src/rules/no-format-string-injection/index.ts +801 -0
- package/src/rules/no-format-string-injection/no-format-string-injection.test.ts +437 -0
- package/src/rules/no-graphql-injection/index.ts +508 -0
- package/src/rules/no-graphql-injection/no-graphql-injection.test.ts +371 -0
- package/src/rules/no-hardcoded-credentials/index.ts +478 -0
- package/src/rules/no-hardcoded-credentials/no-hardcoded-credentials.test.ts +639 -0
- package/src/rules/no-hardcoded-session-tokens/index.ts +69 -0
- package/src/rules/no-hardcoded-session-tokens/no-hardcoded-session-tokens.test.ts +42 -0
- package/src/rules/no-http-urls/index.ts +131 -0
- package/src/rules/no-http-urls/no-http-urls.test.ts +60 -0
- package/src/rules/no-improper-sanitization/index.ts +502 -0
- package/src/rules/no-improper-sanitization/no-improper-sanitization.test.ts +156 -0
- package/src/rules/no-improper-type-validation/index.ts +572 -0
- package/src/rules/no-improper-type-validation/no-improper-type-validation.test.ts +372 -0
- package/src/rules/no-insecure-comparison/index.ts +232 -0
- package/src/rules/no-insecure-comparison/no-insecure-comparison.test.ts +218 -0
- package/src/rules/no-insecure-cookie-settings/index.ts +391 -0
- package/src/rules/no-insecure-cookie-settings/no-insecure-cookie-settings.test.ts +409 -0
- package/src/rules/no-insecure-jwt/index.ts +467 -0
- package/src/rules/no-insecure-jwt/no-insecure-jwt.test.ts +259 -0
- package/src/rules/no-insecure-redirects/index.ts +267 -0
- package/src/rules/no-insecure-redirects/no-insecure-redirects.test.ts +108 -0
- package/src/rules/no-insecure-websocket/index.ts +72 -0
- package/src/rules/no-insecure-websocket/no-insecure-websocket.test.ts +42 -0
- package/src/rules/no-insufficient-postmessage-validation/index.ts +497 -0
- package/src/rules/no-insufficient-postmessage-validation/no-insufficient-postmessage-validation.test.ts +360 -0
- package/src/rules/no-insufficient-random/index.ts +288 -0
- package/src/rules/no-insufficient-random/no-insufficient-random.test.ts +246 -0
- package/src/rules/no-ldap-injection/index.ts +547 -0
- package/src/rules/no-ldap-injection/no-ldap-injection.test.ts +317 -0
- package/src/rules/no-missing-authentication/index.ts +408 -0
- package/src/rules/no-missing-authentication/no-missing-authentication.test.ts +350 -0
- package/src/rules/no-missing-cors-check/index.ts +453 -0
- package/src/rules/no-missing-cors-check/no-missing-cors-check.test.ts +392 -0
- package/src/rules/no-missing-csrf-protection/index.ts +229 -0
- package/src/rules/no-missing-csrf-protection/no-missing-csrf-protection.test.ts +222 -0
- package/src/rules/no-missing-security-headers/index.ts +266 -0
- package/src/rules/no-missing-security-headers/no-missing-security-headers.test.ts +98 -0
- package/src/rules/no-password-in-url/index.ts +64 -0
- package/src/rules/no-password-in-url/no-password-in-url.test.ts +27 -0
- package/src/rules/no-permissive-cors/index.ts +78 -0
- package/src/rules/no-permissive-cors/no-permissive-cors.test.ts +28 -0
- package/src/rules/no-pii-in-logs/index.ts +83 -0
- package/src/rules/no-pii-in-logs/no-pii-in-logs.test.ts +26 -0
- package/src/rules/no-postmessage-origin-wildcard/index.ts +67 -0
- package/src/rules/no-postmessage-origin-wildcard/no-postmessage-origin-wildcard.test.ts +27 -0
- package/src/rules/no-privilege-escalation/index.ts +403 -0
- package/src/rules/no-privilege-escalation/no-privilege-escalation.test.ts +306 -0
- package/src/rules/no-redos-vulnerable-regex/index.ts +379 -0
- package/src/rules/no-redos-vulnerable-regex/no-redos-vulnerable-regex.test.ts +83 -0
- package/src/rules/no-sensitive-data-exposure/index.ts +294 -0
- package/src/rules/no-sensitive-data-exposure/no-sensitive-data-exposure.test.ts +262 -0
- package/src/rules/no-sensitive-data-in-analytics/index.ts +73 -0
- package/src/rules/no-sensitive-data-in-analytics/no-sensitive-data-in-analytics.test.ts +42 -0
- package/src/rules/no-sensitive-data-in-cache/index.ts +59 -0
- package/src/rules/no-sensitive-data-in-cache/no-sensitive-data-in-cache.test.ts +32 -0
- package/src/rules/no-sql-injection/index.ts +424 -0
- package/src/rules/no-sql-injection/no-sql-injection.test.ts +303 -0
- package/src/rules/no-timing-attack/index.ts +552 -0
- package/src/rules/no-timing-attack/no-timing-attack.test.ts +348 -0
- package/src/rules/no-toctou-vulnerability/index.ts +250 -0
- package/src/rules/no-toctou-vulnerability/no-toctou-vulnerability.test.ts +60 -0
- package/src/rules/no-tracking-without-consent/index.ts +78 -0
- package/src/rules/no-tracking-without-consent/no-tracking-without-consent.test.ts +34 -0
- package/src/rules/no-unchecked-loop-condition/index.ts +781 -0
- package/src/rules/no-unchecked-loop-condition/no-unchecked-loop-condition.test.ts +459 -0
- package/src/rules/no-unencrypted-local-storage/index.ts +73 -0
- package/src/rules/no-unencrypted-local-storage/no-unencrypted-local-storage.test.ts +41 -0
- package/src/rules/no-unencrypted-transmission/index.ts +296 -0
- package/src/rules/no-unencrypted-transmission/no-unencrypted-transmission.test.ts +287 -0
- package/src/rules/no-unescaped-url-parameter/index.ts +424 -0
- package/src/rules/no-unescaped-url-parameter/no-unescaped-url-parameter.test.ts +263 -0
- package/src/rules/no-unlimited-resource-allocation/index.ts +767 -0
- package/src/rules/no-unlimited-resource-allocation/no-unlimited-resource-allocation.test.ts +544 -0
- package/src/rules/no-unsafe-deserialization/index.ts +593 -0
- package/src/rules/no-unsafe-deserialization/no-unsafe-deserialization.test.ts +310 -0
- package/src/rules/no-unsafe-dynamic-require/index.ts +125 -0
- package/src/rules/no-unsafe-dynamic-require/no-unsafe-dynamic-require.test.ts +151 -0
- package/src/rules/no-unsafe-regex-construction/index.ts +370 -0
- package/src/rules/no-unsafe-regex-construction/no-unsafe-regex-construction.test.ts +181 -0
- package/src/rules/no-unsanitized-html/index.ts +400 -0
- package/src/rules/no-unsanitized-html/no-unsanitized-html.test.ts +488 -0
- package/src/rules/no-unvalidated-deeplinks/index.ts +73 -0
- package/src/rules/no-unvalidated-deeplinks/no-unvalidated-deeplinks.test.ts +29 -0
- package/src/rules/no-unvalidated-user-input/index.ts +498 -0
- package/src/rules/no-unvalidated-user-input/no-unvalidated-user-input.test.ts +463 -0
- package/src/rules/no-verbose-error-messages/index.ts +83 -0
- package/src/rules/no-verbose-error-messages/no-verbose-error-messages.test.ts +34 -0
- package/src/rules/no-weak-crypto/index.ts +447 -0
- package/src/rules/no-weak-crypto/no-weak-crypto.test.ts +297 -0
- package/src/rules/no-weak-password-recovery/index.ts +509 -0
- package/src/rules/no-weak-password-recovery/no-weak-password-recovery.test.ts +184 -0
- package/src/rules/no-xpath-injection/index.ts +596 -0
- package/src/rules/no-xpath-injection/no-xpath-injection.test.ts +405 -0
- package/src/rules/no-xxe-injection/index.ts +342 -0
- package/src/rules/no-xxe-injection/no-xxe-injection.test.ts +122 -0
- package/src/rules/no-zip-slip/index.ts +526 -0
- package/src/rules/no-zip-slip/no-zip-slip.test.ts +305 -0
- package/src/rules/require-backend-authorization/index.ts +71 -0
- package/src/rules/require-backend-authorization/require-backend-authorization.test.ts +31 -0
- package/src/rules/require-code-minification/index.ts +54 -0
- package/src/rules/require-code-minification/require-code-minification.test.ts +30 -0
- package/src/rules/require-csp-headers/index.ts +74 -0
- package/src/rules/require-csp-headers/require-csp-headers.test.ts +34 -0
- package/src/rules/require-data-minimization/index.ts +65 -0
- package/src/rules/require-data-minimization/require-data-minimization.test.ts +31 -0
- package/src/rules/require-dependency-integrity/index.ts +78 -0
- package/src/rules/require-dependency-integrity/require-dependency-integrity.test.ts +44 -0
- package/src/rules/require-https-only/index.ts +75 -0
- package/src/rules/require-https-only/require-https-only.test.ts +26 -0
- package/src/rules/require-mime-type-validation/index.ts +77 -0
- package/src/rules/require-mime-type-validation/require-mime-type-validation.test.ts +32 -0
- package/src/rules/require-network-timeout/index.ts +58 -0
- package/src/rules/require-network-timeout/require-network-timeout.test.ts +26 -0
- package/src/rules/require-package-lock/index.ts +75 -0
- package/src/rules/require-package-lock/require-package-lock.test.ts +27 -0
- package/src/rules/require-secure-credential-storage/index.ts +60 -0
- package/src/rules/require-secure-credential-storage/require-secure-credential-storage.test.ts +26 -0
- package/src/rules/require-secure-defaults/index.ts +54 -0
- package/src/rules/require-secure-defaults/require-secure-defaults.test.ts +26 -0
- package/src/rules/require-secure-deletion/index.ts +52 -0
- package/src/rules/require-secure-deletion/require-secure-deletion.test.ts +29 -0
- package/src/rules/require-storage-encryption/index.ts +60 -0
- package/src/rules/require-storage-encryption/require-storage-encryption.test.ts +26 -0
- package/src/rules/require-url-validation/index.ts +85 -0
- package/src/rules/require-url-validation/require-url-validation.test.ts +32 -0
- package/src/types/{index.d.ts → index.ts} +157 -53
- package/src/index.d.ts +0 -32
- package/src/index.js +0 -465
- package/src/rules/database-injection/index.d.ts +0 -13
- package/src/rules/database-injection/index.js +0 -406
- package/src/rules/detect-child-process/index.d.ts +0 -11
- package/src/rules/detect-child-process/index.js +0 -529
- package/src/rules/detect-eval-with-expression/index.d.ts +0 -9
- package/src/rules/detect-eval-with-expression/index.js +0 -392
- package/src/rules/detect-mixed-content/index.d.ts +0 -8
- package/src/rules/detect-mixed-content/index.js +0 -44
- package/src/rules/detect-non-literal-fs-filename/index.d.ts +0 -7
- package/src/rules/detect-non-literal-fs-filename/index.js +0 -454
- package/src/rules/detect-non-literal-regexp/index.d.ts +0 -9
- package/src/rules/detect-non-literal-regexp/index.js +0 -403
- package/src/rules/detect-object-injection/index.d.ts +0 -11
- package/src/rules/detect-object-injection/index.js +0 -560
- package/src/rules/detect-suspicious-dependencies/index.d.ts +0 -8
- package/src/rules/detect-suspicious-dependencies/index.js +0 -71
- package/src/rules/detect-weak-password-validation/index.d.ts +0 -6
- package/src/rules/detect-weak-password-validation/index.js +0 -58
- package/src/rules/no-allow-arbitrary-loads/index.d.ts +0 -8
- package/src/rules/no-allow-arbitrary-loads/index.js +0 -47
- package/src/rules/no-arbitrary-file-access/index.d.ts +0 -13
- package/src/rules/no-arbitrary-file-access/index.js +0 -195
- package/src/rules/no-buffer-overread/index.d.ts +0 -29
- package/src/rules/no-buffer-overread/index.js +0 -606
- package/src/rules/no-clickjacking/index.d.ts +0 -10
- package/src/rules/no-clickjacking/index.js +0 -396
- package/src/rules/no-client-side-auth-logic/index.d.ts +0 -6
- package/src/rules/no-client-side-auth-logic/index.js +0 -69
- package/src/rules/no-credentials-in-query-params/index.d.ts +0 -8
- package/src/rules/no-credentials-in-query-params/index.js +0 -57
- package/src/rules/no-credentials-in-storage-api/index.d.ts +0 -6
- package/src/rules/no-credentials-in-storage-api/index.js +0 -54
- package/src/rules/no-data-in-temp-storage/index.d.ts +0 -6
- package/src/rules/no-data-in-temp-storage/index.js +0 -64
- package/src/rules/no-debug-code-in-production/index.d.ts +0 -8
- package/src/rules/no-debug-code-in-production/index.js +0 -51
- package/src/rules/no-directive-injection/index.d.ts +0 -12
- package/src/rules/no-directive-injection/index.js +0 -457
- package/src/rules/no-disabled-certificate-validation/index.d.ts +0 -6
- package/src/rules/no-disabled-certificate-validation/index.js +0 -61
- package/src/rules/no-document-cookie/index.d.ts +0 -5
- package/src/rules/no-document-cookie/index.js +0 -89
- package/src/rules/no-dynamic-dependency-loading/index.d.ts +0 -8
- package/src/rules/no-dynamic-dependency-loading/index.js +0 -51
- package/src/rules/no-electron-security-issues/index.d.ts +0 -10
- package/src/rules/no-electron-security-issues/index.js +0 -423
- package/src/rules/no-exposed-debug-endpoints/index.d.ts +0 -6
- package/src/rules/no-exposed-debug-endpoints/index.js +0 -62
- package/src/rules/no-exposed-sensitive-data/index.d.ts +0 -11
- package/src/rules/no-exposed-sensitive-data/index.js +0 -340
- package/src/rules/no-format-string-injection/index.d.ts +0 -17
- package/src/rules/no-format-string-injection/index.js +0 -660
- package/src/rules/no-graphql-injection/index.d.ts +0 -12
- package/src/rules/no-graphql-injection/index.js +0 -411
- package/src/rules/no-hardcoded-credentials/index.d.ts +0 -26
- package/src/rules/no-hardcoded-credentials/index.js +0 -376
- package/src/rules/no-hardcoded-session-tokens/index.d.ts +0 -6
- package/src/rules/no-hardcoded-session-tokens/index.js +0 -59
- package/src/rules/no-http-urls/index.d.ts +0 -12
- package/src/rules/no-http-urls/index.js +0 -114
- package/src/rules/no-improper-sanitization/index.d.ts +0 -12
- package/src/rules/no-improper-sanitization/index.js +0 -411
- package/src/rules/no-improper-type-validation/index.d.ts +0 -10
- package/src/rules/no-improper-type-validation/index.js +0 -475
- package/src/rules/no-insecure-comparison/index.d.ts +0 -7
- package/src/rules/no-insecure-comparison/index.js +0 -193
- package/src/rules/no-insecure-cookie-settings/index.d.ts +0 -9
- package/src/rules/no-insecure-cookie-settings/index.js +0 -306
- package/src/rules/no-insecure-jwt/index.d.ts +0 -10
- package/src/rules/no-insecure-jwt/index.js +0 -380
- package/src/rules/no-insecure-redirects/index.d.ts +0 -7
- package/src/rules/no-insecure-redirects/index.js +0 -216
- package/src/rules/no-insecure-websocket/index.d.ts +0 -6
- package/src/rules/no-insecure-websocket/index.js +0 -61
- package/src/rules/no-insufficient-postmessage-validation/index.d.ts +0 -14
- package/src/rules/no-insufficient-postmessage-validation/index.js +0 -392
- package/src/rules/no-insufficient-random/index.d.ts +0 -9
- package/src/rules/no-insufficient-random/index.js +0 -208
- package/src/rules/no-ldap-injection/index.d.ts +0 -10
- package/src/rules/no-ldap-injection/index.js +0 -455
- package/src/rules/no-missing-authentication/index.d.ts +0 -13
- package/src/rules/no-missing-authentication/index.js +0 -333
- package/src/rules/no-missing-cors-check/index.d.ts +0 -9
- package/src/rules/no-missing-cors-check/index.js +0 -399
- package/src/rules/no-missing-csrf-protection/index.d.ts +0 -11
- package/src/rules/no-missing-csrf-protection/index.js +0 -180
- package/src/rules/no-missing-security-headers/index.d.ts +0 -7
- package/src/rules/no-missing-security-headers/index.js +0 -218
- package/src/rules/no-password-in-url/index.d.ts +0 -8
- package/src/rules/no-password-in-url/index.js +0 -54
- package/src/rules/no-permissive-cors/index.d.ts +0 -8
- package/src/rules/no-permissive-cors/index.js +0 -65
- package/src/rules/no-pii-in-logs/index.d.ts +0 -8
- package/src/rules/no-pii-in-logs/index.js +0 -70
- package/src/rules/no-postmessage-origin-wildcard/index.d.ts +0 -8
- package/src/rules/no-postmessage-origin-wildcard/index.js +0 -56
- package/src/rules/no-privilege-escalation/index.d.ts +0 -13
- package/src/rules/no-privilege-escalation/index.js +0 -321
- package/src/rules/no-redos-vulnerable-regex/index.d.ts +0 -7
- package/src/rules/no-redos-vulnerable-regex/index.js +0 -306
- package/src/rules/no-sensitive-data-exposure/index.d.ts +0 -11
- package/src/rules/no-sensitive-data-exposure/index.js +0 -250
- package/src/rules/no-sensitive-data-in-analytics/index.d.ts +0 -8
- package/src/rules/no-sensitive-data-in-analytics/index.js +0 -62
- package/src/rules/no-sensitive-data-in-cache/index.d.ts +0 -8
- package/src/rules/no-sensitive-data-in-cache/index.js +0 -52
- package/src/rules/no-sql-injection/index.d.ts +0 -10
- package/src/rules/no-sql-injection/index.js +0 -335
- package/src/rules/no-timing-attack/index.d.ts +0 -10
- package/src/rules/no-timing-attack/index.js +0 -447
- package/src/rules/no-toctou-vulnerability/index.d.ts +0 -7
- package/src/rules/no-toctou-vulnerability/index.js +0 -208
- package/src/rules/no-tracking-without-consent/index.d.ts +0 -6
- package/src/rules/no-tracking-without-consent/index.js +0 -67
- package/src/rules/no-unchecked-loop-condition/index.d.ts +0 -12
- package/src/rules/no-unchecked-loop-condition/index.js +0 -646
- package/src/rules/no-unencrypted-local-storage/index.d.ts +0 -8
- package/src/rules/no-unencrypted-local-storage/index.js +0 -61
- package/src/rules/no-unencrypted-transmission/index.d.ts +0 -11
- package/src/rules/no-unencrypted-transmission/index.js +0 -236
- package/src/rules/no-unescaped-url-parameter/index.d.ts +0 -9
- package/src/rules/no-unescaped-url-parameter/index.js +0 -355
- package/src/rules/no-unlimited-resource-allocation/index.d.ts +0 -12
- package/src/rules/no-unlimited-resource-allocation/index.js +0 -643
- package/src/rules/no-unsafe-deserialization/index.d.ts +0 -10
- package/src/rules/no-unsafe-deserialization/index.js +0 -491
- package/src/rules/no-unsafe-dynamic-require/index.d.ts +0 -5
- package/src/rules/no-unsafe-dynamic-require/index.js +0 -106
- package/src/rules/no-unsafe-regex-construction/index.d.ts +0 -9
- package/src/rules/no-unsafe-regex-construction/index.js +0 -291
- package/src/rules/no-unsanitized-html/index.d.ts +0 -9
- package/src/rules/no-unsanitized-html/index.js +0 -335
- package/src/rules/no-unvalidated-deeplinks/index.d.ts +0 -6
- package/src/rules/no-unvalidated-deeplinks/index.js +0 -62
- package/src/rules/no-unvalidated-user-input/index.d.ts +0 -9
- package/src/rules/no-unvalidated-user-input/index.js +0 -420
- package/src/rules/no-verbose-error-messages/index.d.ts +0 -8
- package/src/rules/no-verbose-error-messages/index.js +0 -68
- package/src/rules/no-weak-crypto/index.d.ts +0 -11
- package/src/rules/no-weak-crypto/index.js +0 -351
- package/src/rules/no-weak-password-recovery/index.d.ts +0 -12
- package/src/rules/no-weak-password-recovery/index.js +0 -424
- package/src/rules/no-xpath-injection/index.d.ts +0 -10
- package/src/rules/no-xpath-injection/index.js +0 -487
- package/src/rules/no-xxe-injection/index.d.ts +0 -7
- package/src/rules/no-xxe-injection/index.js +0 -266
- package/src/rules/no-zip-slip/index.d.ts +0 -9
- package/src/rules/no-zip-slip/index.js +0 -445
- package/src/rules/require-backend-authorization/index.d.ts +0 -6
- package/src/rules/require-backend-authorization/index.js +0 -60
- package/src/rules/require-code-minification/index.d.ts +0 -8
- package/src/rules/require-code-minification/index.js +0 -47
- package/src/rules/require-csp-headers/index.d.ts +0 -6
- package/src/rules/require-csp-headers/index.js +0 -64
- package/src/rules/require-data-minimization/index.d.ts +0 -8
- package/src/rules/require-data-minimization/index.js +0 -53
- package/src/rules/require-dependency-integrity/index.d.ts +0 -6
- package/src/rules/require-dependency-integrity/index.js +0 -64
- package/src/rules/require-https-only/index.d.ts +0 -8
- package/src/rules/require-https-only/index.js +0 -62
- package/src/rules/require-mime-type-validation/index.d.ts +0 -6
- package/src/rules/require-mime-type-validation/index.js +0 -66
- package/src/rules/require-network-timeout/index.d.ts +0 -8
- package/src/rules/require-network-timeout/index.js +0 -50
- package/src/rules/require-package-lock/index.d.ts +0 -8
- package/src/rules/require-package-lock/index.js +0 -63
- package/src/rules/require-secure-credential-storage/index.d.ts +0 -8
- package/src/rules/require-secure-credential-storage/index.js +0 -50
- package/src/rules/require-secure-defaults/index.d.ts +0 -8
- package/src/rules/require-secure-defaults/index.js +0 -47
- package/src/rules/require-secure-deletion/index.d.ts +0 -8
- package/src/rules/require-secure-deletion/index.js +0 -44
- package/src/rules/require-storage-encryption/index.d.ts +0 -8
- package/src/rules/require-storage-encryption/index.js +0 -50
- package/src/rules/require-url-validation/index.d.ts +0 -6
- package/src/rules/require-url-validation/index.js +0 -72
- package/src/types/index.js +0 -17
|
@@ -0,0 +1,440 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Comprehensive tests for detect-object-injection rule
|
|
3
|
+
* Security: CWE-915 (Prototype Pollution)
|
|
4
|
+
*
|
|
5
|
+
* Type-Aware Feature:
|
|
6
|
+
* This rule supports TypeScript type-aware checking to reduce false positives.
|
|
7
|
+
* When TypeScript parser services are available (parserOptions.project configured),
|
|
8
|
+
* the rule can detect if a property key is constrained to a union of safe string
|
|
9
|
+
* literals (e.g., 'name' | 'email') and will NOT flag these as dangerous.
|
|
10
|
+
*
|
|
11
|
+
* Without type information, all dynamic property accesses are flagged.
|
|
12
|
+
*
|
|
13
|
+
* @see https://portswigger.net/web-security/prototype-pollution
|
|
14
|
+
*/
|
|
15
|
+
import { RuleTester } from '@typescript-eslint/rule-tester';
|
|
16
|
+
import { describe, it, afterAll } from 'vitest';
|
|
17
|
+
import parser from '@typescript-eslint/parser';
|
|
18
|
+
import { detectObjectInjection } from './index';
|
|
19
|
+
|
|
20
|
+
// Configure RuleTester for Vitest
|
|
21
|
+
RuleTester.afterAll = afterAll;
|
|
22
|
+
RuleTester.it = it;
|
|
23
|
+
RuleTester.itOnly = it.only;
|
|
24
|
+
RuleTester.describe = describe;
|
|
25
|
+
|
|
26
|
+
// Use Flat Config format (ESLint 9+)
|
|
27
|
+
// Note: Without parserOptions.project, type-aware checking is not available
|
|
28
|
+
// Tests here verify the fallback behavior (flags all dynamic access)
|
|
29
|
+
const ruleTester = new RuleTester({
|
|
30
|
+
languageOptions: {
|
|
31
|
+
parser,
|
|
32
|
+
ecmaVersion: 2022,
|
|
33
|
+
sourceType: 'module',
|
|
34
|
+
},
|
|
35
|
+
});
|
|
36
|
+
|
|
37
|
+
describe('detect-object-injection', () => {
|
|
38
|
+
describe('Valid Code', () => {
|
|
39
|
+
ruleTester.run('valid - safe object access', detectObjectInjection, {
|
|
40
|
+
valid: [
|
|
41
|
+
// Literal property access
|
|
42
|
+
{
|
|
43
|
+
code: 'obj.name = value;',
|
|
44
|
+
},
|
|
45
|
+
{
|
|
46
|
+
code: 'obj["name"] = value;',
|
|
47
|
+
},
|
|
48
|
+
{
|
|
49
|
+
code: 'const val = obj.name;',
|
|
50
|
+
},
|
|
51
|
+
{
|
|
52
|
+
code: 'const val = obj["name"];',
|
|
53
|
+
},
|
|
54
|
+
// Dot notation
|
|
55
|
+
{
|
|
56
|
+
code: 'obj.property = value;',
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
code: 'const val = obj.property;',
|
|
60
|
+
},
|
|
61
|
+
// Template literal with no expressions
|
|
62
|
+
{
|
|
63
|
+
code: 'obj["static"] = value;',
|
|
64
|
+
},
|
|
65
|
+
// Line 383: Early return in isHighRiskAssignment for non-member assignments
|
|
66
|
+
{
|
|
67
|
+
code: 'const x = value;',
|
|
68
|
+
},
|
|
69
|
+
{
|
|
70
|
+
code: 'let y = 5;',
|
|
71
|
+
},
|
|
72
|
+
{
|
|
73
|
+
code: 'z += 10;',
|
|
74
|
+
},
|
|
75
|
+
// Numeric index access - should be safe (array access)
|
|
76
|
+
{
|
|
77
|
+
code: `
|
|
78
|
+
const items = ['a', 'b', 'c'];
|
|
79
|
+
const first = items[0];
|
|
80
|
+
const second = items[1];
|
|
81
|
+
`,
|
|
82
|
+
},
|
|
83
|
+
// Validated with includes() - should be safe
|
|
84
|
+
{
|
|
85
|
+
code: `
|
|
86
|
+
const VALID_KEYS = ['name', 'email', 'age'];
|
|
87
|
+
function getField(obj, key) {
|
|
88
|
+
if (VALID_KEYS.includes(key)) {
|
|
89
|
+
return obj[key];
|
|
90
|
+
}
|
|
91
|
+
}
|
|
92
|
+
`,
|
|
93
|
+
},
|
|
94
|
+
// Validated with hasOwnProperty - should be safe
|
|
95
|
+
{
|
|
96
|
+
code: `
|
|
97
|
+
function safeGet(obj, key) {
|
|
98
|
+
if (Object.prototype.hasOwnProperty.call(obj, key)) {
|
|
99
|
+
return obj[key];
|
|
100
|
+
}
|
|
101
|
+
}
|
|
102
|
+
`,
|
|
103
|
+
},
|
|
104
|
+
// Validated with Object.hasOwn - should be safe
|
|
105
|
+
{
|
|
106
|
+
code: `
|
|
107
|
+
function safeGet(obj, key) {
|
|
108
|
+
if (Object.hasOwn(obj, key)) {
|
|
109
|
+
return obj[key];
|
|
110
|
+
}
|
|
111
|
+
}
|
|
112
|
+
`,
|
|
113
|
+
},
|
|
114
|
+
// Validated with simple hasOwnProperty - should be safe
|
|
115
|
+
{
|
|
116
|
+
code: `
|
|
117
|
+
function safeGet(obj, key) {
|
|
118
|
+
if (obj.hasOwnProperty(key)) {
|
|
119
|
+
return obj[key];
|
|
120
|
+
}
|
|
121
|
+
}
|
|
122
|
+
`,
|
|
123
|
+
},
|
|
124
|
+
// Validated with 'in' operator - should be safe
|
|
125
|
+
{
|
|
126
|
+
code: `
|
|
127
|
+
function safeGet(obj, key) {
|
|
128
|
+
if (key in obj) {
|
|
129
|
+
return obj[key];
|
|
130
|
+
}
|
|
131
|
+
}
|
|
132
|
+
`,
|
|
133
|
+
},
|
|
134
|
+
// Validated and assigned - should be safe
|
|
135
|
+
{
|
|
136
|
+
code: `
|
|
137
|
+
const ALLOWED = ['light', 'dark', 'system'];
|
|
138
|
+
function setTheme(userTheme) {
|
|
139
|
+
if (!ALLOWED.includes(userTheme)) {
|
|
140
|
+
throw new Error('Invalid theme');
|
|
141
|
+
}
|
|
142
|
+
config[userTheme] = true;
|
|
143
|
+
}
|
|
144
|
+
`,
|
|
145
|
+
},
|
|
146
|
+
],
|
|
147
|
+
invalid: [],
|
|
148
|
+
});
|
|
149
|
+
});
|
|
150
|
+
|
|
151
|
+
describe('Invalid Code - Bracket Notation', () => {
|
|
152
|
+
ruleTester.run('invalid - dynamic property access', detectObjectInjection, {
|
|
153
|
+
valid: [],
|
|
154
|
+
invalid: [
|
|
155
|
+
// Note: Rule may not detect all dynamic property access patterns
|
|
156
|
+
// Rule checks for dangerous patterns but may miss some cases
|
|
157
|
+
// These represent expected behavior - rule may need enhancement
|
|
158
|
+
{
|
|
159
|
+
code: 'obj[userInput] = value;',
|
|
160
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
161
|
+
},
|
|
162
|
+
{
|
|
163
|
+
code: 'const val = obj[userKey];',
|
|
164
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
165
|
+
},
|
|
166
|
+
{
|
|
167
|
+
code: 'obj[`${prefix}${key}`] = value;',
|
|
168
|
+
// Template literal with expressions - should report once on AssignmentExpression
|
|
169
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
170
|
+
},
|
|
171
|
+
{
|
|
172
|
+
code: `
|
|
173
|
+
const key = getUserInput();
|
|
174
|
+
obj[key] = value;
|
|
175
|
+
`,
|
|
176
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
177
|
+
},
|
|
178
|
+
{
|
|
179
|
+
code: 'obj[config.key] = value;',
|
|
180
|
+
// Nested property access - should report once on AssignmentExpression
|
|
181
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
182
|
+
},
|
|
183
|
+
],
|
|
184
|
+
});
|
|
185
|
+
});
|
|
186
|
+
|
|
187
|
+
describe('Invalid Code - Prototype Pollution', () => {
|
|
188
|
+
ruleTester.run('invalid - prototype pollution patterns', detectObjectInjection, {
|
|
189
|
+
valid: [],
|
|
190
|
+
invalid: [
|
|
191
|
+
// Note: Rule may not detect literal dangerous properties
|
|
192
|
+
// Rule checks for dynamic access patterns but may miss literal dangerous properties
|
|
193
|
+
// These represent expected behavior - rule may need enhancement
|
|
194
|
+
{
|
|
195
|
+
code: 'obj["__proto__"] = value;',
|
|
196
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
197
|
+
},
|
|
198
|
+
{
|
|
199
|
+
code: 'obj[prototypeKey] = value;',
|
|
200
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
201
|
+
},
|
|
202
|
+
{
|
|
203
|
+
code: 'obj["constructor"] = value;',
|
|
204
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
205
|
+
},
|
|
206
|
+
],
|
|
207
|
+
});
|
|
208
|
+
});
|
|
209
|
+
|
|
210
|
+
describe('Suggestions', () => {
|
|
211
|
+
ruleTester.run('suggestions for fixes', detectObjectInjection, {
|
|
212
|
+
valid: [],
|
|
213
|
+
invalid: [
|
|
214
|
+
{
|
|
215
|
+
code: 'obj[userInput] = value;',
|
|
216
|
+
errors: [
|
|
217
|
+
{
|
|
218
|
+
messageId: 'objectInjection',
|
|
219
|
+
// Note: Rule may not provide suggestions in all cases
|
|
220
|
+
},
|
|
221
|
+
],
|
|
222
|
+
},
|
|
223
|
+
],
|
|
224
|
+
});
|
|
225
|
+
});
|
|
226
|
+
|
|
227
|
+
describe('Edge Cases', () => {
|
|
228
|
+
ruleTester.run('edge cases', detectObjectInjection, {
|
|
229
|
+
valid: [
|
|
230
|
+
// Literal strings (if allowLiterals is true)
|
|
231
|
+
{
|
|
232
|
+
code: 'obj["name"] = value;',
|
|
233
|
+
options: [{ allowLiterals: true }],
|
|
234
|
+
},
|
|
235
|
+
],
|
|
236
|
+
invalid: [
|
|
237
|
+
{
|
|
238
|
+
code: 'obj[userInput] = value;',
|
|
239
|
+
options: [{ allowLiterals: true }],
|
|
240
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
241
|
+
},
|
|
242
|
+
],
|
|
243
|
+
});
|
|
244
|
+
});
|
|
245
|
+
|
|
246
|
+
describe('Options', () => {
|
|
247
|
+
ruleTester.run('options testing', detectObjectInjection, {
|
|
248
|
+
valid: [
|
|
249
|
+
{
|
|
250
|
+
code: 'obj["name"] = value;',
|
|
251
|
+
options: [{ allowLiterals: true }],
|
|
252
|
+
},
|
|
253
|
+
// Line 329: Early return when allowLiterals is false but literal is safe
|
|
254
|
+
{
|
|
255
|
+
code: 'obj["safeProperty"] = value;',
|
|
256
|
+
options: [{ allowLiterals: false }],
|
|
257
|
+
},
|
|
258
|
+
{
|
|
259
|
+
code: 'user["email"] = value;',
|
|
260
|
+
options: [{ allowLiterals: false }],
|
|
261
|
+
},
|
|
262
|
+
],
|
|
263
|
+
invalid: [
|
|
264
|
+
{
|
|
265
|
+
code: 'obj[userInput] = value;',
|
|
266
|
+
options: [{ allowLiterals: true }],
|
|
267
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
268
|
+
},
|
|
269
|
+
{
|
|
270
|
+
code: 'obj[dangerousKey] = value;',
|
|
271
|
+
options: [{ dangerousProperties: ['dangerousKey'] }],
|
|
272
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
273
|
+
},
|
|
274
|
+
],
|
|
275
|
+
});
|
|
276
|
+
});
|
|
277
|
+
|
|
278
|
+
describe('Type-Aware Detection (without parserOptions.project)', () => {
|
|
279
|
+
/**
|
|
280
|
+
* Note: These tests run WITHOUT TypeScript type information (no parserOptions.project).
|
|
281
|
+
* Without type info, the rule falls back to flagging ALL dynamic property accesses.
|
|
282
|
+
*
|
|
283
|
+
* When parserOptions.project IS configured (in a real TypeScript project),
|
|
284
|
+
* the rule uses type information to detect:
|
|
285
|
+
* - Union types like 'name' | 'email' → SAFE (not flagged)
|
|
286
|
+
* - Single literal types like const key: 'name' → SAFE (not flagged)
|
|
287
|
+
* - String type (any string) → DANGEROUS (flagged)
|
|
288
|
+
*
|
|
289
|
+
* See the rule's JSDoc for detailed type-aware behavior.
|
|
290
|
+
*/
|
|
291
|
+
ruleTester.run('type-aware fallback behavior', detectObjectInjection, {
|
|
292
|
+
valid: [
|
|
293
|
+
// Dot notation is always safe
|
|
294
|
+
{
|
|
295
|
+
code: 'obj.name = value;',
|
|
296
|
+
},
|
|
297
|
+
// String literal bracket notation
|
|
298
|
+
{
|
|
299
|
+
code: 'obj["email"] = value;',
|
|
300
|
+
},
|
|
301
|
+
],
|
|
302
|
+
invalid: [
|
|
303
|
+
// Without type info, const key = 'name' is still an identifier access (flagged)
|
|
304
|
+
// WITH type info and proper literal type inference, this would be SAFE
|
|
305
|
+
{
|
|
306
|
+
code: `
|
|
307
|
+
const key = 'name';
|
|
308
|
+
obj[key] = value;
|
|
309
|
+
`,
|
|
310
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
311
|
+
},
|
|
312
|
+
// Without type information, any identifier access is flagged
|
|
313
|
+
// When type-aware: if key is typed as 'name' | 'email', this would be SAFE
|
|
314
|
+
{
|
|
315
|
+
code: `
|
|
316
|
+
const key: string = getUserInput();
|
|
317
|
+
obj[key] = value;
|
|
318
|
+
`,
|
|
319
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
320
|
+
},
|
|
321
|
+
// Generic string type should always be flagged
|
|
322
|
+
{
|
|
323
|
+
code: `
|
|
324
|
+
function setProperty(obj: object, key: string, value: unknown) {
|
|
325
|
+
obj[key] = value;
|
|
326
|
+
}
|
|
327
|
+
`,
|
|
328
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
329
|
+
},
|
|
330
|
+
// Dynamic access with function return value
|
|
331
|
+
{
|
|
332
|
+
code: `
|
|
333
|
+
const key = getPropertyName();
|
|
334
|
+
obj[key] = value;
|
|
335
|
+
`,
|
|
336
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
337
|
+
},
|
|
338
|
+
],
|
|
339
|
+
});
|
|
340
|
+
});
|
|
341
|
+
|
|
342
|
+
describe('TypeScript Union Type Patterns (documentation)', () => {
|
|
343
|
+
/**
|
|
344
|
+
* These tests document expected behavior when type information IS available.
|
|
345
|
+
* Without parserOptions.project, these tests verify the fallback behavior.
|
|
346
|
+
*
|
|
347
|
+
* With type-aware checking enabled:
|
|
348
|
+
* - Union of safe literals ('name' | 'email') → NOT flagged
|
|
349
|
+
* - Union containing dangerous property ('__proto__' | 'name') → FLAGGED
|
|
350
|
+
* - Generic string → FLAGGED
|
|
351
|
+
*/
|
|
352
|
+
ruleTester.run('union type documentation tests', detectObjectInjection, {
|
|
353
|
+
valid: [
|
|
354
|
+
// These are always safe regardless of type info
|
|
355
|
+
{
|
|
356
|
+
code: 'obj["name"] = value;',
|
|
357
|
+
},
|
|
358
|
+
{
|
|
359
|
+
code: 'obj["email"] = value;',
|
|
360
|
+
},
|
|
361
|
+
{
|
|
362
|
+
code: `
|
|
363
|
+
type SafeKey = 'name' | 'email';
|
|
364
|
+
// With type info, this would be detected as safe
|
|
365
|
+
// Without type info, we'd need the literal usage
|
|
366
|
+
obj["name"] = value;
|
|
367
|
+
`,
|
|
368
|
+
},
|
|
369
|
+
],
|
|
370
|
+
invalid: [
|
|
371
|
+
// Dangerous property literal is ALWAYS flagged
|
|
372
|
+
{
|
|
373
|
+
code: 'obj["__proto__"] = value;',
|
|
374
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
375
|
+
},
|
|
376
|
+
{
|
|
377
|
+
code: 'obj["constructor"] = value;',
|
|
378
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
379
|
+
},
|
|
380
|
+
{
|
|
381
|
+
code: 'obj["prototype"] = value;',
|
|
382
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
383
|
+
},
|
|
384
|
+
// Variable access without type info is flagged
|
|
385
|
+
{
|
|
386
|
+
code: `
|
|
387
|
+
type Key = 'name' | 'email';
|
|
388
|
+
const key: Key = 'name';
|
|
389
|
+
obj[key] = value;
|
|
390
|
+
`,
|
|
391
|
+
// Without type info, this is flagged because 'key' is an identifier
|
|
392
|
+
// WITH type info, this would be SAFE (key is constrained to 'name' | 'email')
|
|
393
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
394
|
+
},
|
|
395
|
+
],
|
|
396
|
+
});
|
|
397
|
+
});
|
|
398
|
+
|
|
399
|
+
describe('Complex Access Patterns', () => {
|
|
400
|
+
ruleTester.run('complex patterns', detectObjectInjection, {
|
|
401
|
+
valid: [
|
|
402
|
+
// Nested dot notation (safe)
|
|
403
|
+
{
|
|
404
|
+
code: 'obj.user.name = value;',
|
|
405
|
+
},
|
|
406
|
+
// Method call result with literal (safe)
|
|
407
|
+
{
|
|
408
|
+
code: 'const result = obj["data"];',
|
|
409
|
+
},
|
|
410
|
+
],
|
|
411
|
+
invalid: [
|
|
412
|
+
// Nested bracket with variable (dangerous)
|
|
413
|
+
{
|
|
414
|
+
code: 'obj.users[userId] = data;',
|
|
415
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
416
|
+
},
|
|
417
|
+
// Chained bracket access (dangerous) - reports on both bracket accesses
|
|
418
|
+
{
|
|
419
|
+
code: 'obj[key1][key2] = value;',
|
|
420
|
+
// Multiple bracket accesses - reports on each dangerous access
|
|
421
|
+
errors: [
|
|
422
|
+
{ messageId: 'objectInjection' },
|
|
423
|
+
{ messageId: 'objectInjection' },
|
|
424
|
+
],
|
|
425
|
+
},
|
|
426
|
+
// Computed property from function (dangerous)
|
|
427
|
+
{
|
|
428
|
+
code: 'obj[getKey()] = value;',
|
|
429
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
430
|
+
},
|
|
431
|
+
// Ternary in bracket (dangerous)
|
|
432
|
+
{
|
|
433
|
+
code: 'obj[condition ? key1 : key2] = value;',
|
|
434
|
+
errors: [{ messageId: 'objectInjection' }],
|
|
435
|
+
},
|
|
436
|
+
],
|
|
437
|
+
});
|
|
438
|
+
});
|
|
439
|
+
});
|
|
440
|
+
|