eslint-plugin-secure-coding 2.3.2 → 2.3.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -0
- package/package.json +3 -10
- package/src/index.ts +605 -0
- package/src/rules/__tests__/integration-demo.test.ts +290 -0
- package/src/rules/__tests__/integration-llm.test.ts +89 -0
- package/src/rules/database-injection/database-injection.test.ts +456 -0
- package/src/rules/database-injection/index.ts +488 -0
- package/src/rules/detect-child-process/detect-child-process.test.ts +207 -0
- package/src/rules/detect-child-process/index.ts +634 -0
- package/src/rules/detect-eval-with-expression/detect-eval-with-expression.test.ts +416 -0
- package/src/rules/detect-eval-with-expression/index.ts +463 -0
- package/src/rules/detect-mixed-content/detect-mixed-content.test.ts +28 -0
- package/src/rules/detect-mixed-content/index.ts +52 -0
- package/src/rules/detect-non-literal-fs-filename/detect-non-literal-fs-filename.test.ts +269 -0
- package/src/rules/detect-non-literal-fs-filename/index.ts +551 -0
- package/src/rules/detect-non-literal-regexp/detect-non-literal-regexp.test.ts +189 -0
- package/src/rules/detect-non-literal-regexp/index.ts +490 -0
- package/src/rules/detect-object-injection/detect-object-injection.test.ts +440 -0
- package/src/rules/detect-object-injection/index.ts +674 -0
- package/src/rules/detect-suspicious-dependencies/detect-suspicious-dependencies.test.ts +32 -0
- package/src/rules/detect-suspicious-dependencies/index.ts +84 -0
- package/src/rules/detect-weak-password-validation/detect-weak-password-validation.test.ts +31 -0
- package/src/rules/detect-weak-password-validation/index.ts +68 -0
- package/src/rules/no-allow-arbitrary-loads/index.ts +54 -0
- package/src/rules/no-allow-arbitrary-loads/no-allow-arbitrary-loads.test.ts +28 -0
- package/src/rules/no-arbitrary-file-access/index.ts +238 -0
- package/src/rules/no-arbitrary-file-access/no-arbitrary-file-access.test.ts +119 -0
- package/src/rules/no-buffer-overread/index.ts +724 -0
- package/src/rules/no-buffer-overread/no-buffer-overread.test.ts +313 -0
- package/src/rules/no-clickjacking/index.ts +481 -0
- package/src/rules/no-clickjacking/no-clickjacking.test.ts +253 -0
- package/src/rules/no-client-side-auth-logic/index.ts +81 -0
- package/src/rules/no-client-side-auth-logic/no-client-side-auth-logic.test.ts +33 -0
- package/src/rules/no-credentials-in-query-params/index.ts +69 -0
- package/src/rules/no-credentials-in-query-params/no-credentials-in-query-params.test.ts +33 -0
- package/src/rules/no-credentials-in-storage-api/index.ts +64 -0
- package/src/rules/no-credentials-in-storage-api/no-credentials-in-storage-api.test.ts +31 -0
- package/src/rules/no-data-in-temp-storage/index.ts +75 -0
- package/src/rules/no-data-in-temp-storage/no-data-in-temp-storage.test.ts +33 -0
- package/src/rules/no-debug-code-in-production/index.ts +59 -0
- package/src/rules/no-debug-code-in-production/no-debug-code-in-production.test.ts +26 -0
- package/src/rules/no-directive-injection/index.ts +551 -0
- package/src/rules/no-directive-injection/no-directive-injection.test.ts +305 -0
- package/src/rules/no-disabled-certificate-validation/index.ts +72 -0
- package/src/rules/no-disabled-certificate-validation/no-disabled-certificate-validation.test.ts +33 -0
- package/src/rules/no-document-cookie/index.ts +113 -0
- package/src/rules/no-document-cookie/no-document-cookie.test.ts +382 -0
- package/src/rules/no-dynamic-dependency-loading/index.ts +60 -0
- package/src/rules/no-dynamic-dependency-loading/no-dynamic-dependency-loading.test.ts +27 -0
- package/src/rules/no-electron-security-issues/index.ts +504 -0
- package/src/rules/no-electron-security-issues/no-electron-security-issues.test.ts +324 -0
- package/src/rules/no-exposed-debug-endpoints/index.ts +73 -0
- package/src/rules/no-exposed-debug-endpoints/no-exposed-debug-endpoints.test.ts +40 -0
- package/src/rules/no-exposed-sensitive-data/index.ts +428 -0
- package/src/rules/no-exposed-sensitive-data/no-exposed-sensitive-data.test.ts +75 -0
- package/src/rules/no-format-string-injection/index.ts +801 -0
- package/src/rules/no-format-string-injection/no-format-string-injection.test.ts +437 -0
- package/src/rules/no-graphql-injection/index.ts +508 -0
- package/src/rules/no-graphql-injection/no-graphql-injection.test.ts +371 -0
- package/src/rules/no-hardcoded-credentials/index.ts +478 -0
- package/src/rules/no-hardcoded-credentials/no-hardcoded-credentials.test.ts +639 -0
- package/src/rules/no-hardcoded-session-tokens/index.ts +69 -0
- package/src/rules/no-hardcoded-session-tokens/no-hardcoded-session-tokens.test.ts +42 -0
- package/src/rules/no-http-urls/index.ts +131 -0
- package/src/rules/no-http-urls/no-http-urls.test.ts +60 -0
- package/src/rules/no-improper-sanitization/index.ts +502 -0
- package/src/rules/no-improper-sanitization/no-improper-sanitization.test.ts +156 -0
- package/src/rules/no-improper-type-validation/index.ts +572 -0
- package/src/rules/no-improper-type-validation/no-improper-type-validation.test.ts +372 -0
- package/src/rules/no-insecure-comparison/index.ts +232 -0
- package/src/rules/no-insecure-comparison/no-insecure-comparison.test.ts +218 -0
- package/src/rules/no-insecure-cookie-settings/index.ts +391 -0
- package/src/rules/no-insecure-cookie-settings/no-insecure-cookie-settings.test.ts +409 -0
- package/src/rules/no-insecure-jwt/index.ts +467 -0
- package/src/rules/no-insecure-jwt/no-insecure-jwt.test.ts +259 -0
- package/src/rules/no-insecure-redirects/index.ts +267 -0
- package/src/rules/no-insecure-redirects/no-insecure-redirects.test.ts +108 -0
- package/src/rules/no-insecure-websocket/index.ts +72 -0
- package/src/rules/no-insecure-websocket/no-insecure-websocket.test.ts +42 -0
- package/src/rules/no-insufficient-postmessage-validation/index.ts +497 -0
- package/src/rules/no-insufficient-postmessage-validation/no-insufficient-postmessage-validation.test.ts +360 -0
- package/src/rules/no-insufficient-random/index.ts +288 -0
- package/src/rules/no-insufficient-random/no-insufficient-random.test.ts +246 -0
- package/src/rules/no-ldap-injection/index.ts +547 -0
- package/src/rules/no-ldap-injection/no-ldap-injection.test.ts +317 -0
- package/src/rules/no-missing-authentication/index.ts +408 -0
- package/src/rules/no-missing-authentication/no-missing-authentication.test.ts +350 -0
- package/src/rules/no-missing-cors-check/index.ts +453 -0
- package/src/rules/no-missing-cors-check/no-missing-cors-check.test.ts +392 -0
- package/src/rules/no-missing-csrf-protection/index.ts +229 -0
- package/src/rules/no-missing-csrf-protection/no-missing-csrf-protection.test.ts +222 -0
- package/src/rules/no-missing-security-headers/index.ts +266 -0
- package/src/rules/no-missing-security-headers/no-missing-security-headers.test.ts +98 -0
- package/src/rules/no-password-in-url/index.ts +64 -0
- package/src/rules/no-password-in-url/no-password-in-url.test.ts +27 -0
- package/src/rules/no-permissive-cors/index.ts +78 -0
- package/src/rules/no-permissive-cors/no-permissive-cors.test.ts +28 -0
- package/src/rules/no-pii-in-logs/index.ts +83 -0
- package/src/rules/no-pii-in-logs/no-pii-in-logs.test.ts +26 -0
- package/src/rules/no-postmessage-origin-wildcard/index.ts +67 -0
- package/src/rules/no-postmessage-origin-wildcard/no-postmessage-origin-wildcard.test.ts +27 -0
- package/src/rules/no-privilege-escalation/index.ts +403 -0
- package/src/rules/no-privilege-escalation/no-privilege-escalation.test.ts +306 -0
- package/src/rules/no-redos-vulnerable-regex/index.ts +379 -0
- package/src/rules/no-redos-vulnerable-regex/no-redos-vulnerable-regex.test.ts +83 -0
- package/src/rules/no-sensitive-data-exposure/index.ts +294 -0
- package/src/rules/no-sensitive-data-exposure/no-sensitive-data-exposure.test.ts +262 -0
- package/src/rules/no-sensitive-data-in-analytics/index.ts +73 -0
- package/src/rules/no-sensitive-data-in-analytics/no-sensitive-data-in-analytics.test.ts +42 -0
- package/src/rules/no-sensitive-data-in-cache/index.ts +59 -0
- package/src/rules/no-sensitive-data-in-cache/no-sensitive-data-in-cache.test.ts +32 -0
- package/src/rules/no-sql-injection/index.ts +424 -0
- package/src/rules/no-sql-injection/no-sql-injection.test.ts +303 -0
- package/src/rules/no-timing-attack/index.ts +552 -0
- package/src/rules/no-timing-attack/no-timing-attack.test.ts +348 -0
- package/src/rules/no-toctou-vulnerability/index.ts +250 -0
- package/src/rules/no-toctou-vulnerability/no-toctou-vulnerability.test.ts +60 -0
- package/src/rules/no-tracking-without-consent/index.ts +78 -0
- package/src/rules/no-tracking-without-consent/no-tracking-without-consent.test.ts +34 -0
- package/src/rules/no-unchecked-loop-condition/index.ts +781 -0
- package/src/rules/no-unchecked-loop-condition/no-unchecked-loop-condition.test.ts +459 -0
- package/src/rules/no-unencrypted-local-storage/index.ts +73 -0
- package/src/rules/no-unencrypted-local-storage/no-unencrypted-local-storage.test.ts +41 -0
- package/src/rules/no-unencrypted-transmission/index.ts +296 -0
- package/src/rules/no-unencrypted-transmission/no-unencrypted-transmission.test.ts +287 -0
- package/src/rules/no-unescaped-url-parameter/index.ts +424 -0
- package/src/rules/no-unescaped-url-parameter/no-unescaped-url-parameter.test.ts +263 -0
- package/src/rules/no-unlimited-resource-allocation/index.ts +767 -0
- package/src/rules/no-unlimited-resource-allocation/no-unlimited-resource-allocation.test.ts +544 -0
- package/src/rules/no-unsafe-deserialization/index.ts +593 -0
- package/src/rules/no-unsafe-deserialization/no-unsafe-deserialization.test.ts +310 -0
- package/src/rules/no-unsafe-dynamic-require/index.ts +125 -0
- package/src/rules/no-unsafe-dynamic-require/no-unsafe-dynamic-require.test.ts +151 -0
- package/src/rules/no-unsafe-regex-construction/index.ts +370 -0
- package/src/rules/no-unsafe-regex-construction/no-unsafe-regex-construction.test.ts +181 -0
- package/src/rules/no-unsanitized-html/index.ts +400 -0
- package/src/rules/no-unsanitized-html/no-unsanitized-html.test.ts +488 -0
- package/src/rules/no-unvalidated-deeplinks/index.ts +73 -0
- package/src/rules/no-unvalidated-deeplinks/no-unvalidated-deeplinks.test.ts +29 -0
- package/src/rules/no-unvalidated-user-input/index.ts +498 -0
- package/src/rules/no-unvalidated-user-input/no-unvalidated-user-input.test.ts +463 -0
- package/src/rules/no-verbose-error-messages/index.ts +83 -0
- package/src/rules/no-verbose-error-messages/no-verbose-error-messages.test.ts +34 -0
- package/src/rules/no-weak-crypto/index.ts +447 -0
- package/src/rules/no-weak-crypto/no-weak-crypto.test.ts +297 -0
- package/src/rules/no-weak-password-recovery/index.ts +509 -0
- package/src/rules/no-weak-password-recovery/no-weak-password-recovery.test.ts +184 -0
- package/src/rules/no-xpath-injection/index.ts +596 -0
- package/src/rules/no-xpath-injection/no-xpath-injection.test.ts +405 -0
- package/src/rules/no-xxe-injection/index.ts +342 -0
- package/src/rules/no-xxe-injection/no-xxe-injection.test.ts +122 -0
- package/src/rules/no-zip-slip/index.ts +526 -0
- package/src/rules/no-zip-slip/no-zip-slip.test.ts +305 -0
- package/src/rules/require-backend-authorization/index.ts +71 -0
- package/src/rules/require-backend-authorization/require-backend-authorization.test.ts +31 -0
- package/src/rules/require-code-minification/index.ts +54 -0
- package/src/rules/require-code-minification/require-code-minification.test.ts +30 -0
- package/src/rules/require-csp-headers/index.ts +74 -0
- package/src/rules/require-csp-headers/require-csp-headers.test.ts +34 -0
- package/src/rules/require-data-minimization/index.ts +65 -0
- package/src/rules/require-data-minimization/require-data-minimization.test.ts +31 -0
- package/src/rules/require-dependency-integrity/index.ts +78 -0
- package/src/rules/require-dependency-integrity/require-dependency-integrity.test.ts +44 -0
- package/src/rules/require-https-only/index.ts +75 -0
- package/src/rules/require-https-only/require-https-only.test.ts +26 -0
- package/src/rules/require-mime-type-validation/index.ts +77 -0
- package/src/rules/require-mime-type-validation/require-mime-type-validation.test.ts +32 -0
- package/src/rules/require-network-timeout/index.ts +58 -0
- package/src/rules/require-network-timeout/require-network-timeout.test.ts +26 -0
- package/src/rules/require-package-lock/index.ts +75 -0
- package/src/rules/require-package-lock/require-package-lock.test.ts +27 -0
- package/src/rules/require-secure-credential-storage/index.ts +60 -0
- package/src/rules/require-secure-credential-storage/require-secure-credential-storage.test.ts +26 -0
- package/src/rules/require-secure-defaults/index.ts +54 -0
- package/src/rules/require-secure-defaults/require-secure-defaults.test.ts +26 -0
- package/src/rules/require-secure-deletion/index.ts +52 -0
- package/src/rules/require-secure-deletion/require-secure-deletion.test.ts +29 -0
- package/src/rules/require-storage-encryption/index.ts +60 -0
- package/src/rules/require-storage-encryption/require-storage-encryption.test.ts +26 -0
- package/src/rules/require-url-validation/index.ts +85 -0
- package/src/rules/require-url-validation/require-url-validation.test.ts +32 -0
- package/src/types/{index.d.ts → index.ts} +157 -53
- package/src/index.d.ts +0 -32
- package/src/index.js +0 -465
- package/src/rules/database-injection/index.d.ts +0 -13
- package/src/rules/database-injection/index.js +0 -406
- package/src/rules/detect-child-process/index.d.ts +0 -11
- package/src/rules/detect-child-process/index.js +0 -529
- package/src/rules/detect-eval-with-expression/index.d.ts +0 -9
- package/src/rules/detect-eval-with-expression/index.js +0 -392
- package/src/rules/detect-mixed-content/index.d.ts +0 -8
- package/src/rules/detect-mixed-content/index.js +0 -44
- package/src/rules/detect-non-literal-fs-filename/index.d.ts +0 -7
- package/src/rules/detect-non-literal-fs-filename/index.js +0 -454
- package/src/rules/detect-non-literal-regexp/index.d.ts +0 -9
- package/src/rules/detect-non-literal-regexp/index.js +0 -403
- package/src/rules/detect-object-injection/index.d.ts +0 -11
- package/src/rules/detect-object-injection/index.js +0 -560
- package/src/rules/detect-suspicious-dependencies/index.d.ts +0 -8
- package/src/rules/detect-suspicious-dependencies/index.js +0 -71
- package/src/rules/detect-weak-password-validation/index.d.ts +0 -6
- package/src/rules/detect-weak-password-validation/index.js +0 -58
- package/src/rules/no-allow-arbitrary-loads/index.d.ts +0 -8
- package/src/rules/no-allow-arbitrary-loads/index.js +0 -47
- package/src/rules/no-arbitrary-file-access/index.d.ts +0 -13
- package/src/rules/no-arbitrary-file-access/index.js +0 -195
- package/src/rules/no-buffer-overread/index.d.ts +0 -29
- package/src/rules/no-buffer-overread/index.js +0 -606
- package/src/rules/no-clickjacking/index.d.ts +0 -10
- package/src/rules/no-clickjacking/index.js +0 -396
- package/src/rules/no-client-side-auth-logic/index.d.ts +0 -6
- package/src/rules/no-client-side-auth-logic/index.js +0 -69
- package/src/rules/no-credentials-in-query-params/index.d.ts +0 -8
- package/src/rules/no-credentials-in-query-params/index.js +0 -57
- package/src/rules/no-credentials-in-storage-api/index.d.ts +0 -6
- package/src/rules/no-credentials-in-storage-api/index.js +0 -54
- package/src/rules/no-data-in-temp-storage/index.d.ts +0 -6
- package/src/rules/no-data-in-temp-storage/index.js +0 -64
- package/src/rules/no-debug-code-in-production/index.d.ts +0 -8
- package/src/rules/no-debug-code-in-production/index.js +0 -51
- package/src/rules/no-directive-injection/index.d.ts +0 -12
- package/src/rules/no-directive-injection/index.js +0 -457
- package/src/rules/no-disabled-certificate-validation/index.d.ts +0 -6
- package/src/rules/no-disabled-certificate-validation/index.js +0 -61
- package/src/rules/no-document-cookie/index.d.ts +0 -5
- package/src/rules/no-document-cookie/index.js +0 -89
- package/src/rules/no-dynamic-dependency-loading/index.d.ts +0 -8
- package/src/rules/no-dynamic-dependency-loading/index.js +0 -51
- package/src/rules/no-electron-security-issues/index.d.ts +0 -10
- package/src/rules/no-electron-security-issues/index.js +0 -423
- package/src/rules/no-exposed-debug-endpoints/index.d.ts +0 -6
- package/src/rules/no-exposed-debug-endpoints/index.js +0 -62
- package/src/rules/no-exposed-sensitive-data/index.d.ts +0 -11
- package/src/rules/no-exposed-sensitive-data/index.js +0 -340
- package/src/rules/no-format-string-injection/index.d.ts +0 -17
- package/src/rules/no-format-string-injection/index.js +0 -660
- package/src/rules/no-graphql-injection/index.d.ts +0 -12
- package/src/rules/no-graphql-injection/index.js +0 -411
- package/src/rules/no-hardcoded-credentials/index.d.ts +0 -26
- package/src/rules/no-hardcoded-credentials/index.js +0 -376
- package/src/rules/no-hardcoded-session-tokens/index.d.ts +0 -6
- package/src/rules/no-hardcoded-session-tokens/index.js +0 -59
- package/src/rules/no-http-urls/index.d.ts +0 -12
- package/src/rules/no-http-urls/index.js +0 -114
- package/src/rules/no-improper-sanitization/index.d.ts +0 -12
- package/src/rules/no-improper-sanitization/index.js +0 -411
- package/src/rules/no-improper-type-validation/index.d.ts +0 -10
- package/src/rules/no-improper-type-validation/index.js +0 -475
- package/src/rules/no-insecure-comparison/index.d.ts +0 -7
- package/src/rules/no-insecure-comparison/index.js +0 -193
- package/src/rules/no-insecure-cookie-settings/index.d.ts +0 -9
- package/src/rules/no-insecure-cookie-settings/index.js +0 -306
- package/src/rules/no-insecure-jwt/index.d.ts +0 -10
- package/src/rules/no-insecure-jwt/index.js +0 -380
- package/src/rules/no-insecure-redirects/index.d.ts +0 -7
- package/src/rules/no-insecure-redirects/index.js +0 -216
- package/src/rules/no-insecure-websocket/index.d.ts +0 -6
- package/src/rules/no-insecure-websocket/index.js +0 -61
- package/src/rules/no-insufficient-postmessage-validation/index.d.ts +0 -14
- package/src/rules/no-insufficient-postmessage-validation/index.js +0 -392
- package/src/rules/no-insufficient-random/index.d.ts +0 -9
- package/src/rules/no-insufficient-random/index.js +0 -208
- package/src/rules/no-ldap-injection/index.d.ts +0 -10
- package/src/rules/no-ldap-injection/index.js +0 -455
- package/src/rules/no-missing-authentication/index.d.ts +0 -13
- package/src/rules/no-missing-authentication/index.js +0 -333
- package/src/rules/no-missing-cors-check/index.d.ts +0 -9
- package/src/rules/no-missing-cors-check/index.js +0 -399
- package/src/rules/no-missing-csrf-protection/index.d.ts +0 -11
- package/src/rules/no-missing-csrf-protection/index.js +0 -180
- package/src/rules/no-missing-security-headers/index.d.ts +0 -7
- package/src/rules/no-missing-security-headers/index.js +0 -218
- package/src/rules/no-password-in-url/index.d.ts +0 -8
- package/src/rules/no-password-in-url/index.js +0 -54
- package/src/rules/no-permissive-cors/index.d.ts +0 -8
- package/src/rules/no-permissive-cors/index.js +0 -65
- package/src/rules/no-pii-in-logs/index.d.ts +0 -8
- package/src/rules/no-pii-in-logs/index.js +0 -70
- package/src/rules/no-postmessage-origin-wildcard/index.d.ts +0 -8
- package/src/rules/no-postmessage-origin-wildcard/index.js +0 -56
- package/src/rules/no-privilege-escalation/index.d.ts +0 -13
- package/src/rules/no-privilege-escalation/index.js +0 -321
- package/src/rules/no-redos-vulnerable-regex/index.d.ts +0 -7
- package/src/rules/no-redos-vulnerable-regex/index.js +0 -306
- package/src/rules/no-sensitive-data-exposure/index.d.ts +0 -11
- package/src/rules/no-sensitive-data-exposure/index.js +0 -250
- package/src/rules/no-sensitive-data-in-analytics/index.d.ts +0 -8
- package/src/rules/no-sensitive-data-in-analytics/index.js +0 -62
- package/src/rules/no-sensitive-data-in-cache/index.d.ts +0 -8
- package/src/rules/no-sensitive-data-in-cache/index.js +0 -52
- package/src/rules/no-sql-injection/index.d.ts +0 -10
- package/src/rules/no-sql-injection/index.js +0 -335
- package/src/rules/no-timing-attack/index.d.ts +0 -10
- package/src/rules/no-timing-attack/index.js +0 -447
- package/src/rules/no-toctou-vulnerability/index.d.ts +0 -7
- package/src/rules/no-toctou-vulnerability/index.js +0 -208
- package/src/rules/no-tracking-without-consent/index.d.ts +0 -6
- package/src/rules/no-tracking-without-consent/index.js +0 -67
- package/src/rules/no-unchecked-loop-condition/index.d.ts +0 -12
- package/src/rules/no-unchecked-loop-condition/index.js +0 -646
- package/src/rules/no-unencrypted-local-storage/index.d.ts +0 -8
- package/src/rules/no-unencrypted-local-storage/index.js +0 -61
- package/src/rules/no-unencrypted-transmission/index.d.ts +0 -11
- package/src/rules/no-unencrypted-transmission/index.js +0 -236
- package/src/rules/no-unescaped-url-parameter/index.d.ts +0 -9
- package/src/rules/no-unescaped-url-parameter/index.js +0 -355
- package/src/rules/no-unlimited-resource-allocation/index.d.ts +0 -12
- package/src/rules/no-unlimited-resource-allocation/index.js +0 -643
- package/src/rules/no-unsafe-deserialization/index.d.ts +0 -10
- package/src/rules/no-unsafe-deserialization/index.js +0 -491
- package/src/rules/no-unsafe-dynamic-require/index.d.ts +0 -5
- package/src/rules/no-unsafe-dynamic-require/index.js +0 -106
- package/src/rules/no-unsafe-regex-construction/index.d.ts +0 -9
- package/src/rules/no-unsafe-regex-construction/index.js +0 -291
- package/src/rules/no-unsanitized-html/index.d.ts +0 -9
- package/src/rules/no-unsanitized-html/index.js +0 -335
- package/src/rules/no-unvalidated-deeplinks/index.d.ts +0 -6
- package/src/rules/no-unvalidated-deeplinks/index.js +0 -62
- package/src/rules/no-unvalidated-user-input/index.d.ts +0 -9
- package/src/rules/no-unvalidated-user-input/index.js +0 -420
- package/src/rules/no-verbose-error-messages/index.d.ts +0 -8
- package/src/rules/no-verbose-error-messages/index.js +0 -68
- package/src/rules/no-weak-crypto/index.d.ts +0 -11
- package/src/rules/no-weak-crypto/index.js +0 -351
- package/src/rules/no-weak-password-recovery/index.d.ts +0 -12
- package/src/rules/no-weak-password-recovery/index.js +0 -424
- package/src/rules/no-xpath-injection/index.d.ts +0 -10
- package/src/rules/no-xpath-injection/index.js +0 -487
- package/src/rules/no-xxe-injection/index.d.ts +0 -7
- package/src/rules/no-xxe-injection/index.js +0 -266
- package/src/rules/no-zip-slip/index.d.ts +0 -9
- package/src/rules/no-zip-slip/index.js +0 -445
- package/src/rules/require-backend-authorization/index.d.ts +0 -6
- package/src/rules/require-backend-authorization/index.js +0 -60
- package/src/rules/require-code-minification/index.d.ts +0 -8
- package/src/rules/require-code-minification/index.js +0 -47
- package/src/rules/require-csp-headers/index.d.ts +0 -6
- package/src/rules/require-csp-headers/index.js +0 -64
- package/src/rules/require-data-minimization/index.d.ts +0 -8
- package/src/rules/require-data-minimization/index.js +0 -53
- package/src/rules/require-dependency-integrity/index.d.ts +0 -6
- package/src/rules/require-dependency-integrity/index.js +0 -64
- package/src/rules/require-https-only/index.d.ts +0 -8
- package/src/rules/require-https-only/index.js +0 -62
- package/src/rules/require-mime-type-validation/index.d.ts +0 -6
- package/src/rules/require-mime-type-validation/index.js +0 -66
- package/src/rules/require-network-timeout/index.d.ts +0 -8
- package/src/rules/require-network-timeout/index.js +0 -50
- package/src/rules/require-package-lock/index.d.ts +0 -8
- package/src/rules/require-package-lock/index.js +0 -63
- package/src/rules/require-secure-credential-storage/index.d.ts +0 -8
- package/src/rules/require-secure-credential-storage/index.js +0 -50
- package/src/rules/require-secure-defaults/index.d.ts +0 -8
- package/src/rules/require-secure-defaults/index.js +0 -47
- package/src/rules/require-secure-deletion/index.d.ts +0 -8
- package/src/rules/require-secure-deletion/index.js +0 -44
- package/src/rules/require-storage-encryption/index.d.ts +0 -8
- package/src/rules/require-storage-encryption/index.js +0 -50
- package/src/rules/require-url-validation/index.d.ts +0 -6
- package/src/rules/require-url-validation/index.js +0 -72
- package/src/types/index.js +0 -17
|
@@ -0,0 +1,428 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* ESLint Rule: no-exposed-sensitive-data
|
|
3
|
+
* Detects exposure of PII/sensitive data (SSN, credit card numbers in logs, etc.)
|
|
4
|
+
* CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
|
|
5
|
+
*
|
|
6
|
+
* @see https://cwe.mitre.org/data/definitions/200.html
|
|
7
|
+
* @see https://owasp.org/www-community/vulnerabilities/Information_exposure
|
|
8
|
+
*/
|
|
9
|
+
import type { TSESLint, TSESTree } from '@interlace/eslint-devkit';
|
|
10
|
+
import { formatLLMMessage, MessageIcons } from '@interlace/eslint-devkit';
|
|
11
|
+
import { createRule } from '@interlace/eslint-devkit';
|
|
12
|
+
|
|
13
|
+
type MessageIds = 'exposedSensitiveData' | 'sanitizeData';
|
|
14
|
+
|
|
15
|
+
export interface Options {
|
|
16
|
+
/** Allow sensitive data in test files. Default: false */
|
|
17
|
+
allowInTests?: boolean;
|
|
18
|
+
|
|
19
|
+
/** Patterns to detect sensitive data. Default: ['ssn', 'social', 'credit', 'card', 'password', 'secret', 'token', 'apiKey'] */
|
|
20
|
+
sensitivePatterns?: string[];
|
|
21
|
+
|
|
22
|
+
/** Logging/output patterns to detect. Default: ['log', 'console', 'print', 'debug', 'error', 'warn', 'info', 'trace', 'response', 'res.', 'req.'] */
|
|
23
|
+
loggingPatterns?: string[];
|
|
24
|
+
|
|
25
|
+
/** Additional safe patterns to ignore. Default: [] */
|
|
26
|
+
ignorePatterns?: string[];
|
|
27
|
+
}
|
|
28
|
+
|
|
29
|
+
type RuleOptions = [Options?];
|
|
30
|
+
|
|
31
|
+
/**
|
|
32
|
+
* Default sensitive data patterns
|
|
33
|
+
*/
|
|
34
|
+
const DEFAULT_SENSITIVE_PATTERNS = [
|
|
35
|
+
'ssn',
|
|
36
|
+
'social',
|
|
37
|
+
'credit',
|
|
38
|
+
'card',
|
|
39
|
+
'password',
|
|
40
|
+
'secret',
|
|
41
|
+
'token',
|
|
42
|
+
'apiKey',
|
|
43
|
+
'apikey',
|
|
44
|
+
'api_key',
|
|
45
|
+
'privateKey',
|
|
46
|
+
'private_key',
|
|
47
|
+
'accessToken',
|
|
48
|
+
'access_token',
|
|
49
|
+
'refreshToken',
|
|
50
|
+
'refresh_token',
|
|
51
|
+
'authToken',
|
|
52
|
+
'auth_token',
|
|
53
|
+
];
|
|
54
|
+
|
|
55
|
+
/**
|
|
56
|
+
* Default logging/output patterns
|
|
57
|
+
*/
|
|
58
|
+
const DEFAULT_LOGGING_PATTERNS = [
|
|
59
|
+
'log',
|
|
60
|
+
'console',
|
|
61
|
+
'print',
|
|
62
|
+
'debug',
|
|
63
|
+
'error',
|
|
64
|
+
'warn',
|
|
65
|
+
'info',
|
|
66
|
+
'trace',
|
|
67
|
+
'response',
|
|
68
|
+
'res.',
|
|
69
|
+
'req.',
|
|
70
|
+
];
|
|
71
|
+
|
|
72
|
+
/**
|
|
73
|
+
* Sensitive data regex patterns
|
|
74
|
+
*/
|
|
75
|
+
const SENSITIVE_DATA_PATTERNS = {
|
|
76
|
+
// SSN pattern (XXX-XX-XXXX)
|
|
77
|
+
ssn: /\b\d{3}-\d{2}-\d{4}\b/,
|
|
78
|
+
|
|
79
|
+
// Credit card pattern (basic - 13-19 digits, may have spaces/dashes)
|
|
80
|
+
creditCard: /\b(?:\d{4}[-\s]?){3}\d{1,4}\b/,
|
|
81
|
+
|
|
82
|
+
// Email with sensitive context
|
|
83
|
+
sensitiveEmail: /\b(?:password|secret|token|key|credential)[\w.-]*@[\w.-]+\.\w+\b/i,
|
|
84
|
+
};
|
|
85
|
+
|
|
86
|
+
/**
|
|
87
|
+
* Check if a string contains sensitive data patterns
|
|
88
|
+
*/
|
|
89
|
+
function containsSensitiveData(
|
|
90
|
+
value: string,
|
|
91
|
+
sensitivePatterns: string[]
|
|
92
|
+
): { isSensitive: boolean; type: string } {
|
|
93
|
+
// Check for SSN pattern
|
|
94
|
+
if (SENSITIVE_DATA_PATTERNS.ssn.test(value)) {
|
|
95
|
+
return { isSensitive: true, type: 'SSN pattern detected' };
|
|
96
|
+
}
|
|
97
|
+
|
|
98
|
+
// Check for credit card pattern
|
|
99
|
+
if (SENSITIVE_DATA_PATTERNS.creditCard.test(value)) {
|
|
100
|
+
return { isSensitive: true, type: 'Credit card pattern detected' };
|
|
101
|
+
}
|
|
102
|
+
|
|
103
|
+
// Check for sensitive keywords in variable names or values
|
|
104
|
+
const lowerValue = value.toLowerCase();
|
|
105
|
+
for (const pattern of sensitivePatterns) {
|
|
106
|
+
if (lowerValue.includes(pattern.toLowerCase())) {
|
|
107
|
+
// Check if it's in a sensitive context (not just a comment or documentation)
|
|
108
|
+
if (
|
|
109
|
+
/\b(?:log|console|print|debug|error|warn|info|trace|response|res\.|req\.|body|query|params)\b/i.test(value) ||
|
|
110
|
+
/\b(?:password|secret|token|key|credential)\s*[:=]/i.test(value)
|
|
111
|
+
) {
|
|
112
|
+
return { isSensitive: true, type: `Sensitive data keyword: ${pattern}` };
|
|
113
|
+
}
|
|
114
|
+
}
|
|
115
|
+
}
|
|
116
|
+
|
|
117
|
+
return { isSensitive: false, type: '' };
|
|
118
|
+
}
|
|
119
|
+
|
|
120
|
+
/**
|
|
121
|
+
* Check if a string matches any ignore pattern
|
|
122
|
+
*/
|
|
123
|
+
function matchesIgnorePattern(text: string, patterns: string[]): boolean {
|
|
124
|
+
return patterns.some(pattern => {
|
|
125
|
+
try {
|
|
126
|
+
const regex = new RegExp(pattern, 'i');
|
|
127
|
+
return regex.test(text);
|
|
128
|
+
} catch {
|
|
129
|
+
return false;
|
|
130
|
+
}
|
|
131
|
+
});
|
|
132
|
+
}
|
|
133
|
+
|
|
134
|
+
/**
|
|
135
|
+
* Check if a node is in a logging or output context
|
|
136
|
+
*/
|
|
137
|
+
function isInLoggingContext(
|
|
138
|
+
node: TSESTree.Node,
|
|
139
|
+
sourceCode: TSESLint.SourceCode,
|
|
140
|
+
loggingPatterns: string[]
|
|
141
|
+
): boolean {
|
|
142
|
+
// Build regex pattern from logging patterns
|
|
143
|
+
const patternRegex = new RegExp(
|
|
144
|
+
`\\b(?:${loggingPatterns.map(p => p.replace(/[.*+?^${}()|[\]\\]/g, '\\$&')).join('|')})\\b`,
|
|
145
|
+
'i'
|
|
146
|
+
);
|
|
147
|
+
|
|
148
|
+
let current: TSESTree.Node | null = node;
|
|
149
|
+
|
|
150
|
+
// Check parent chain for logging calls
|
|
151
|
+
while (current && 'parent' in current && current.parent) {
|
|
152
|
+
current = current.parent as TSESTree.Node;
|
|
153
|
+
|
|
154
|
+
if (current.type === 'CallExpression') {
|
|
155
|
+
const callExpr = current as TSESTree.CallExpression;
|
|
156
|
+
const callText = sourceCode.getText(current);
|
|
157
|
+
|
|
158
|
+
// Check if it's a logging method call
|
|
159
|
+
if (callExpr.callee.type === 'MemberExpression') {
|
|
160
|
+
const memberExpr = callExpr.callee;
|
|
161
|
+
if (memberExpr.object.type === 'Identifier' && memberExpr.property.type === 'Identifier') {
|
|
162
|
+
const objName = memberExpr.object.name.toLowerCase();
|
|
163
|
+
const propName = memberExpr.property.name.toLowerCase();
|
|
164
|
+
|
|
165
|
+
// Check against logging patterns
|
|
166
|
+
if (loggingPatterns.some(p => objName.includes(p.toLowerCase()) || propName.includes(p.toLowerCase()))) {
|
|
167
|
+
return true;
|
|
168
|
+
}
|
|
169
|
+
}
|
|
170
|
+
}
|
|
171
|
+
|
|
172
|
+
// Also check for patterns in the call text
|
|
173
|
+
if (patternRegex.test(callText)) {
|
|
174
|
+
return true;
|
|
175
|
+
}
|
|
176
|
+
}
|
|
177
|
+
|
|
178
|
+
// Check if it's in an object expression that's being logged
|
|
179
|
+
if (current.type === 'ObjectExpression') {
|
|
180
|
+
// Check if parent is a CallExpression with logging
|
|
181
|
+
if (current.parent && current.parent.type === 'CallExpression') {
|
|
182
|
+
const parentCall = current.parent as TSESTree.CallExpression;
|
|
183
|
+
const callText = sourceCode.getText(parentCall);
|
|
184
|
+
if (patternRegex.test(callText)) {
|
|
185
|
+
return true;
|
|
186
|
+
}
|
|
187
|
+
}
|
|
188
|
+
}
|
|
189
|
+
}
|
|
190
|
+
|
|
191
|
+
return false;
|
|
192
|
+
}
|
|
193
|
+
|
|
194
|
+
export const noExposedSensitiveData = createRule<RuleOptions, MessageIds>({
|
|
195
|
+
name: 'no-exposed-sensitive-data',
|
|
196
|
+
meta: {
|
|
197
|
+
type: 'problem',
|
|
198
|
+
docs: {
|
|
199
|
+
description: 'Detects exposure of PII/sensitive data (SSN, credit card numbers in logs, etc.)',
|
|
200
|
+
},
|
|
201
|
+
hasSuggestions: true,
|
|
202
|
+
messages: {
|
|
203
|
+
exposedSensitiveData: formatLLMMessage({
|
|
204
|
+
icon: MessageIcons.SECURITY,
|
|
205
|
+
issueName: 'Exposed Sensitive Data',
|
|
206
|
+
cwe: 'CWE-200',
|
|
207
|
+
description: 'Sensitive data exposure detected: {{issue}}',
|
|
208
|
+
severity: 'CRITICAL',
|
|
209
|
+
fix: '{{safeAlternative}}',
|
|
210
|
+
documentationLink: 'https://cwe.mitre.org/data/definitions/200.html',
|
|
211
|
+
}),
|
|
212
|
+
sanitizeData: formatLLMMessage({
|
|
213
|
+
icon: MessageIcons.INFO,
|
|
214
|
+
issueName: 'Sanitize Data',
|
|
215
|
+
description: 'Remove or mask sensitive information',
|
|
216
|
+
severity: 'LOW',
|
|
217
|
+
fix: 'Mask or remove sensitive data before logging/transmitting',
|
|
218
|
+
documentationLink: 'https://cwe.mitre.org/data/definitions/200.html',
|
|
219
|
+
}),
|
|
220
|
+
},
|
|
221
|
+
schema: [
|
|
222
|
+
{
|
|
223
|
+
type: 'object',
|
|
224
|
+
properties: {
|
|
225
|
+
allowInTests: {
|
|
226
|
+
type: 'boolean',
|
|
227
|
+
default: false,
|
|
228
|
+
description: 'Allow sensitive data in test files',
|
|
229
|
+
},
|
|
230
|
+
sensitivePatterns: {
|
|
231
|
+
type: 'array',
|
|
232
|
+
items: { type: 'string' },
|
|
233
|
+
default: [],
|
|
234
|
+
description: 'Patterns to detect sensitive data',
|
|
235
|
+
},
|
|
236
|
+
loggingPatterns: {
|
|
237
|
+
type: 'array',
|
|
238
|
+
items: { type: 'string' },
|
|
239
|
+
default: [],
|
|
240
|
+
description: 'Logging/output patterns to detect',
|
|
241
|
+
},
|
|
242
|
+
ignorePatterns: {
|
|
243
|
+
type: 'array',
|
|
244
|
+
items: { type: 'string' },
|
|
245
|
+
default: [],
|
|
246
|
+
description: 'Additional safe patterns to ignore',
|
|
247
|
+
},
|
|
248
|
+
},
|
|
249
|
+
additionalProperties: false,
|
|
250
|
+
},
|
|
251
|
+
],
|
|
252
|
+
},
|
|
253
|
+
defaultOptions: [
|
|
254
|
+
{
|
|
255
|
+
allowInTests: false,
|
|
256
|
+
sensitivePatterns: [],
|
|
257
|
+
loggingPatterns: [],
|
|
258
|
+
ignorePatterns: [],
|
|
259
|
+
},
|
|
260
|
+
],
|
|
261
|
+
create(
|
|
262
|
+
context: TSESLint.RuleContext<MessageIds, RuleOptions>,
|
|
263
|
+
[options = {}]
|
|
264
|
+
) {
|
|
265
|
+
const {
|
|
266
|
+
allowInTests = false,
|
|
267
|
+
sensitivePatterns,
|
|
268
|
+
loggingPatterns,
|
|
269
|
+
ignorePatterns = [],
|
|
270
|
+
} = options as Options;
|
|
271
|
+
|
|
272
|
+
const patternsToCheck = sensitivePatterns && sensitivePatterns.length > 0
|
|
273
|
+
? sensitivePatterns
|
|
274
|
+
: DEFAULT_SENSITIVE_PATTERNS;
|
|
275
|
+
|
|
276
|
+
const loggingPatternsToCheck = loggingPatterns && loggingPatterns.length > 0
|
|
277
|
+
? loggingPatterns
|
|
278
|
+
: DEFAULT_LOGGING_PATTERNS;
|
|
279
|
+
|
|
280
|
+
const filename = context.getFilename();
|
|
281
|
+
const isTestFile = allowInTests && /\.(test|spec)\.(ts|tsx|js|jsx)$/.test(filename);
|
|
282
|
+
const sourceCode = context.sourceCode || context.sourceCode;
|
|
283
|
+
|
|
284
|
+
function checkLiteral(node: TSESTree.Literal) {
|
|
285
|
+
if (isTestFile) {
|
|
286
|
+
return;
|
|
287
|
+
}
|
|
288
|
+
|
|
289
|
+
if (typeof node.value !== 'string') {
|
|
290
|
+
return;
|
|
291
|
+
}
|
|
292
|
+
|
|
293
|
+
const value = node.value;
|
|
294
|
+
const text = sourceCode.getText(node);
|
|
295
|
+
|
|
296
|
+
// Check if it matches any ignore pattern
|
|
297
|
+
if (matchesIgnorePattern(text, ignorePatterns)) {
|
|
298
|
+
return;
|
|
299
|
+
}
|
|
300
|
+
|
|
301
|
+
// Only check if in logging/output context
|
|
302
|
+
if (!isInLoggingContext(node, sourceCode, loggingPatternsToCheck)) {
|
|
303
|
+
return;
|
|
304
|
+
}
|
|
305
|
+
|
|
306
|
+
const { isSensitive, type } = containsSensitiveData(value, patternsToCheck);
|
|
307
|
+
|
|
308
|
+
if (isSensitive) {
|
|
309
|
+
// For SSN and credit card patterns, don't provide auto-fix suggestions
|
|
310
|
+
// as they require manual review
|
|
311
|
+
const isPatternMatch = type.includes('pattern detected');
|
|
312
|
+
context.report({
|
|
313
|
+
node,
|
|
314
|
+
messageId: 'exposedSensitiveData',
|
|
315
|
+
data: {
|
|
316
|
+
issue: `${type} in logging/output context`,
|
|
317
|
+
safeAlternative: 'Remove or mask sensitive data before logging: logger.info({ userId: user.id }) instead of logger.info({ password: user.password })',
|
|
318
|
+
},
|
|
319
|
+
...(isPatternMatch ? {} : {
|
|
320
|
+
suggest: [
|
|
321
|
+
{
|
|
322
|
+
messageId: 'sanitizeData',
|
|
323
|
+
fix(fixer: TSESLint.RuleFixer) {
|
|
324
|
+
// Suggest removing or masking the sensitive data
|
|
325
|
+
return fixer.replaceText(node, '"***REDACTED***"');
|
|
326
|
+
},
|
|
327
|
+
},
|
|
328
|
+
],
|
|
329
|
+
}),
|
|
330
|
+
});
|
|
331
|
+
}
|
|
332
|
+
}
|
|
333
|
+
|
|
334
|
+
function checkIdentifier(node: TSESTree.Identifier) {
|
|
335
|
+
if (isTestFile) {
|
|
336
|
+
return;
|
|
337
|
+
}
|
|
338
|
+
|
|
339
|
+
const name = node.name;
|
|
340
|
+
const text = sourceCode.getText(node);
|
|
341
|
+
|
|
342
|
+
// Check if it matches any ignore pattern
|
|
343
|
+
if (matchesIgnorePattern(text, ignorePatterns)) {
|
|
344
|
+
return;
|
|
345
|
+
}
|
|
346
|
+
|
|
347
|
+
// Only check if in logging/output context
|
|
348
|
+
if (!isInLoggingContext(node, sourceCode, loggingPatternsToCheck)) {
|
|
349
|
+
return;
|
|
350
|
+
}
|
|
351
|
+
|
|
352
|
+
// Check if identifier name contains sensitive patterns
|
|
353
|
+
const lowerName = name.toLowerCase();
|
|
354
|
+
for (const pattern of patternsToCheck) {
|
|
355
|
+
if (lowerName.includes(pattern.toLowerCase())) {
|
|
356
|
+
// Check if it's being accessed in a sensitive way
|
|
357
|
+
if (node.parent) {
|
|
358
|
+
const parentText = sourceCode.getText(node.parent);
|
|
359
|
+
// Build regex pattern from logging patterns
|
|
360
|
+
const loggingPatternRegex = new RegExp(
|
|
361
|
+
`\\b(?:${loggingPatternsToCheck.map(p => p.replace(/[.*+?^${}()|[\]\\]/g, '\\$&')).join('|')})\\b`,
|
|
362
|
+
'i'
|
|
363
|
+
);
|
|
364
|
+
if (loggingPatternRegex.test(parentText)) {
|
|
365
|
+
// Get the actual property name from context
|
|
366
|
+
const actualPropertyName = name;
|
|
367
|
+
context.report({
|
|
368
|
+
node,
|
|
369
|
+
messageId: 'exposedSensitiveData',
|
|
370
|
+
data: {
|
|
371
|
+
issue: `Sensitive variable "${name}" exposed in logging/output`,
|
|
372
|
+
safeAlternative: `Remove or mask sensitive data: logger.info({ userId: user.id }) instead of logger.info({ ${actualPropertyName}: user.${actualPropertyName} })`,
|
|
373
|
+
},
|
|
374
|
+
// Don't provide auto-fix suggestions for identifiers (too risky)
|
|
375
|
+
});
|
|
376
|
+
break;
|
|
377
|
+
}
|
|
378
|
+
}
|
|
379
|
+
}
|
|
380
|
+
}
|
|
381
|
+
}
|
|
382
|
+
|
|
383
|
+
function checkMemberExpression(node: TSESTree.MemberExpression) {
|
|
384
|
+
if (isTestFile) {
|
|
385
|
+
return;
|
|
386
|
+
}
|
|
387
|
+
|
|
388
|
+
const text = sourceCode.getText(node);
|
|
389
|
+
|
|
390
|
+
// Check if it matches any ignore pattern
|
|
391
|
+
if (matchesIgnorePattern(text, ignorePatterns)) {
|
|
392
|
+
return;
|
|
393
|
+
}
|
|
394
|
+
|
|
395
|
+
// Only check if in logging/output context
|
|
396
|
+
if (!isInLoggingContext(node, sourceCode, loggingPatternsToCheck)) {
|
|
397
|
+
return;
|
|
398
|
+
}
|
|
399
|
+
|
|
400
|
+
// Check if property name contains sensitive patterns
|
|
401
|
+
if (node.property.type === 'Identifier') {
|
|
402
|
+
const propertyName = node.property.name.toLowerCase();
|
|
403
|
+
for (const pattern of patternsToCheck) {
|
|
404
|
+
if (propertyName.includes(pattern.toLowerCase())) {
|
|
405
|
+
const objectName = node.object.type === 'Identifier' ? node.object.name : 'object';
|
|
406
|
+
context.report({
|
|
407
|
+
node,
|
|
408
|
+
messageId: 'exposedSensitiveData',
|
|
409
|
+
data: {
|
|
410
|
+
issue: `Sensitive property "${node.property.name}" exposed in logging/output`,
|
|
411
|
+
safeAlternative: `Remove or mask sensitive data: logger.info({ userId: user.id }) instead of logger.info({ ${node.property.name}: ${objectName}.${node.property.name} })`,
|
|
412
|
+
},
|
|
413
|
+
// Don't provide auto-fix suggestions for property access (too risky)
|
|
414
|
+
});
|
|
415
|
+
break;
|
|
416
|
+
}
|
|
417
|
+
}
|
|
418
|
+
}
|
|
419
|
+
}
|
|
420
|
+
|
|
421
|
+
return {
|
|
422
|
+
Literal: checkLiteral,
|
|
423
|
+
Identifier: checkIdentifier,
|
|
424
|
+
MemberExpression: checkMemberExpression,
|
|
425
|
+
};
|
|
426
|
+
},
|
|
427
|
+
});
|
|
428
|
+
|
|
@@ -0,0 +1,75 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Tests for no-exposed-sensitive-data rule
|
|
3
|
+
* Security: CWE-200 (Information Exposure)
|
|
4
|
+
*/
|
|
5
|
+
import { RuleTester } from '@typescript-eslint/rule-tester';
|
|
6
|
+
import { describe, it, afterAll } from 'vitest';
|
|
7
|
+
import parser from '@typescript-eslint/parser';
|
|
8
|
+
import { noExposedSensitiveData } from './index';
|
|
9
|
+
|
|
10
|
+
// Configure RuleTester for Vitest
|
|
11
|
+
RuleTester.afterAll = afterAll;
|
|
12
|
+
RuleTester.it = it;
|
|
13
|
+
RuleTester.itOnly = it.only;
|
|
14
|
+
RuleTester.describe = describe;
|
|
15
|
+
|
|
16
|
+
const ruleTester = new RuleTester({
|
|
17
|
+
languageOptions: {
|
|
18
|
+
parser,
|
|
19
|
+
ecmaVersion: 2022,
|
|
20
|
+
sourceType: 'module',
|
|
21
|
+
},
|
|
22
|
+
});
|
|
23
|
+
|
|
24
|
+
describe('no-exposed-sensitive-data', () => {
|
|
25
|
+
describe('Valid Code', () => {
|
|
26
|
+
ruleTester.run('valid - safe data handling', noExposedSensitiveData, {
|
|
27
|
+
valid: [
|
|
28
|
+
'console.log("Debug info");',
|
|
29
|
+
'const data = getUserData();',
|
|
30
|
+
'res.json({ message: "Success" });',
|
|
31
|
+
],
|
|
32
|
+
invalid: [],
|
|
33
|
+
});
|
|
34
|
+
});
|
|
35
|
+
|
|
36
|
+
describe('Invalid Code - Sensitive Data Exposure', () => {
|
|
37
|
+
ruleTester.run('invalid - sensitive data logging', noExposedSensitiveData, {
|
|
38
|
+
valid: [],
|
|
39
|
+
invalid: [
|
|
40
|
+
// 2 errors: 1) "Password:" contains sensitive keyword (with suggestions), 2) password is sensitive variable (no suggestions)
|
|
41
|
+
{
|
|
42
|
+
code: 'console.log("Password:", password);',
|
|
43
|
+
errors: [
|
|
44
|
+
{
|
|
45
|
+
messageId: 'exposedSensitiveData',
|
|
46
|
+
suggestions: [
|
|
47
|
+
{
|
|
48
|
+
messageId: 'sanitizeData',
|
|
49
|
+
output: 'console.log("***REDACTED***", password);',
|
|
50
|
+
},
|
|
51
|
+
],
|
|
52
|
+
},
|
|
53
|
+
{ messageId: 'exposedSensitiveData' },
|
|
54
|
+
],
|
|
55
|
+
},
|
|
56
|
+
// 2 errors: 1) "User token:" contains sensitive keyword (with suggestions), 2) userToken is sensitive variable (no suggestions)
|
|
57
|
+
{
|
|
58
|
+
code: 'logger.info("User token:", userToken);',
|
|
59
|
+
errors: [
|
|
60
|
+
{
|
|
61
|
+
messageId: 'exposedSensitiveData',
|
|
62
|
+
suggestions: [
|
|
63
|
+
{
|
|
64
|
+
messageId: 'sanitizeData',
|
|
65
|
+
output: 'logger.info("***REDACTED***", userToken);',
|
|
66
|
+
},
|
|
67
|
+
],
|
|
68
|
+
},
|
|
69
|
+
{ messageId: 'exposedSensitiveData' },
|
|
70
|
+
],
|
|
71
|
+
},
|
|
72
|
+
],
|
|
73
|
+
});
|
|
74
|
+
});
|
|
75
|
+
});
|