eslint-plugin-secure-coding 2.3.2 → 2.3.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -0
- package/package.json +3 -10
- package/src/index.ts +605 -0
- package/src/rules/__tests__/integration-demo.test.ts +290 -0
- package/src/rules/__tests__/integration-llm.test.ts +89 -0
- package/src/rules/database-injection/database-injection.test.ts +456 -0
- package/src/rules/database-injection/index.ts +488 -0
- package/src/rules/detect-child-process/detect-child-process.test.ts +207 -0
- package/src/rules/detect-child-process/index.ts +634 -0
- package/src/rules/detect-eval-with-expression/detect-eval-with-expression.test.ts +416 -0
- package/src/rules/detect-eval-with-expression/index.ts +463 -0
- package/src/rules/detect-mixed-content/detect-mixed-content.test.ts +28 -0
- package/src/rules/detect-mixed-content/index.ts +52 -0
- package/src/rules/detect-non-literal-fs-filename/detect-non-literal-fs-filename.test.ts +269 -0
- package/src/rules/detect-non-literal-fs-filename/index.ts +551 -0
- package/src/rules/detect-non-literal-regexp/detect-non-literal-regexp.test.ts +189 -0
- package/src/rules/detect-non-literal-regexp/index.ts +490 -0
- package/src/rules/detect-object-injection/detect-object-injection.test.ts +440 -0
- package/src/rules/detect-object-injection/index.ts +674 -0
- package/src/rules/detect-suspicious-dependencies/detect-suspicious-dependencies.test.ts +32 -0
- package/src/rules/detect-suspicious-dependencies/index.ts +84 -0
- package/src/rules/detect-weak-password-validation/detect-weak-password-validation.test.ts +31 -0
- package/src/rules/detect-weak-password-validation/index.ts +68 -0
- package/src/rules/no-allow-arbitrary-loads/index.ts +54 -0
- package/src/rules/no-allow-arbitrary-loads/no-allow-arbitrary-loads.test.ts +28 -0
- package/src/rules/no-arbitrary-file-access/index.ts +238 -0
- package/src/rules/no-arbitrary-file-access/no-arbitrary-file-access.test.ts +119 -0
- package/src/rules/no-buffer-overread/index.ts +724 -0
- package/src/rules/no-buffer-overread/no-buffer-overread.test.ts +313 -0
- package/src/rules/no-clickjacking/index.ts +481 -0
- package/src/rules/no-clickjacking/no-clickjacking.test.ts +253 -0
- package/src/rules/no-client-side-auth-logic/index.ts +81 -0
- package/src/rules/no-client-side-auth-logic/no-client-side-auth-logic.test.ts +33 -0
- package/src/rules/no-credentials-in-query-params/index.ts +69 -0
- package/src/rules/no-credentials-in-query-params/no-credentials-in-query-params.test.ts +33 -0
- package/src/rules/no-credentials-in-storage-api/index.ts +64 -0
- package/src/rules/no-credentials-in-storage-api/no-credentials-in-storage-api.test.ts +31 -0
- package/src/rules/no-data-in-temp-storage/index.ts +75 -0
- package/src/rules/no-data-in-temp-storage/no-data-in-temp-storage.test.ts +33 -0
- package/src/rules/no-debug-code-in-production/index.ts +59 -0
- package/src/rules/no-debug-code-in-production/no-debug-code-in-production.test.ts +26 -0
- package/src/rules/no-directive-injection/index.ts +551 -0
- package/src/rules/no-directive-injection/no-directive-injection.test.ts +305 -0
- package/src/rules/no-disabled-certificate-validation/index.ts +72 -0
- package/src/rules/no-disabled-certificate-validation/no-disabled-certificate-validation.test.ts +33 -0
- package/src/rules/no-document-cookie/index.ts +113 -0
- package/src/rules/no-document-cookie/no-document-cookie.test.ts +382 -0
- package/src/rules/no-dynamic-dependency-loading/index.ts +60 -0
- package/src/rules/no-dynamic-dependency-loading/no-dynamic-dependency-loading.test.ts +27 -0
- package/src/rules/no-electron-security-issues/index.ts +504 -0
- package/src/rules/no-electron-security-issues/no-electron-security-issues.test.ts +324 -0
- package/src/rules/no-exposed-debug-endpoints/index.ts +73 -0
- package/src/rules/no-exposed-debug-endpoints/no-exposed-debug-endpoints.test.ts +40 -0
- package/src/rules/no-exposed-sensitive-data/index.ts +428 -0
- package/src/rules/no-exposed-sensitive-data/no-exposed-sensitive-data.test.ts +75 -0
- package/src/rules/no-format-string-injection/index.ts +801 -0
- package/src/rules/no-format-string-injection/no-format-string-injection.test.ts +437 -0
- package/src/rules/no-graphql-injection/index.ts +508 -0
- package/src/rules/no-graphql-injection/no-graphql-injection.test.ts +371 -0
- package/src/rules/no-hardcoded-credentials/index.ts +478 -0
- package/src/rules/no-hardcoded-credentials/no-hardcoded-credentials.test.ts +639 -0
- package/src/rules/no-hardcoded-session-tokens/index.ts +69 -0
- package/src/rules/no-hardcoded-session-tokens/no-hardcoded-session-tokens.test.ts +42 -0
- package/src/rules/no-http-urls/index.ts +131 -0
- package/src/rules/no-http-urls/no-http-urls.test.ts +60 -0
- package/src/rules/no-improper-sanitization/index.ts +502 -0
- package/src/rules/no-improper-sanitization/no-improper-sanitization.test.ts +156 -0
- package/src/rules/no-improper-type-validation/index.ts +572 -0
- package/src/rules/no-improper-type-validation/no-improper-type-validation.test.ts +372 -0
- package/src/rules/no-insecure-comparison/index.ts +232 -0
- package/src/rules/no-insecure-comparison/no-insecure-comparison.test.ts +218 -0
- package/src/rules/no-insecure-cookie-settings/index.ts +391 -0
- package/src/rules/no-insecure-cookie-settings/no-insecure-cookie-settings.test.ts +409 -0
- package/src/rules/no-insecure-jwt/index.ts +467 -0
- package/src/rules/no-insecure-jwt/no-insecure-jwt.test.ts +259 -0
- package/src/rules/no-insecure-redirects/index.ts +267 -0
- package/src/rules/no-insecure-redirects/no-insecure-redirects.test.ts +108 -0
- package/src/rules/no-insecure-websocket/index.ts +72 -0
- package/src/rules/no-insecure-websocket/no-insecure-websocket.test.ts +42 -0
- package/src/rules/no-insufficient-postmessage-validation/index.ts +497 -0
- package/src/rules/no-insufficient-postmessage-validation/no-insufficient-postmessage-validation.test.ts +360 -0
- package/src/rules/no-insufficient-random/index.ts +288 -0
- package/src/rules/no-insufficient-random/no-insufficient-random.test.ts +246 -0
- package/src/rules/no-ldap-injection/index.ts +547 -0
- package/src/rules/no-ldap-injection/no-ldap-injection.test.ts +317 -0
- package/src/rules/no-missing-authentication/index.ts +408 -0
- package/src/rules/no-missing-authentication/no-missing-authentication.test.ts +350 -0
- package/src/rules/no-missing-cors-check/index.ts +453 -0
- package/src/rules/no-missing-cors-check/no-missing-cors-check.test.ts +392 -0
- package/src/rules/no-missing-csrf-protection/index.ts +229 -0
- package/src/rules/no-missing-csrf-protection/no-missing-csrf-protection.test.ts +222 -0
- package/src/rules/no-missing-security-headers/index.ts +266 -0
- package/src/rules/no-missing-security-headers/no-missing-security-headers.test.ts +98 -0
- package/src/rules/no-password-in-url/index.ts +64 -0
- package/src/rules/no-password-in-url/no-password-in-url.test.ts +27 -0
- package/src/rules/no-permissive-cors/index.ts +78 -0
- package/src/rules/no-permissive-cors/no-permissive-cors.test.ts +28 -0
- package/src/rules/no-pii-in-logs/index.ts +83 -0
- package/src/rules/no-pii-in-logs/no-pii-in-logs.test.ts +26 -0
- package/src/rules/no-postmessage-origin-wildcard/index.ts +67 -0
- package/src/rules/no-postmessage-origin-wildcard/no-postmessage-origin-wildcard.test.ts +27 -0
- package/src/rules/no-privilege-escalation/index.ts +403 -0
- package/src/rules/no-privilege-escalation/no-privilege-escalation.test.ts +306 -0
- package/src/rules/no-redos-vulnerable-regex/index.ts +379 -0
- package/src/rules/no-redos-vulnerable-regex/no-redos-vulnerable-regex.test.ts +83 -0
- package/src/rules/no-sensitive-data-exposure/index.ts +294 -0
- package/src/rules/no-sensitive-data-exposure/no-sensitive-data-exposure.test.ts +262 -0
- package/src/rules/no-sensitive-data-in-analytics/index.ts +73 -0
- package/src/rules/no-sensitive-data-in-analytics/no-sensitive-data-in-analytics.test.ts +42 -0
- package/src/rules/no-sensitive-data-in-cache/index.ts +59 -0
- package/src/rules/no-sensitive-data-in-cache/no-sensitive-data-in-cache.test.ts +32 -0
- package/src/rules/no-sql-injection/index.ts +424 -0
- package/src/rules/no-sql-injection/no-sql-injection.test.ts +303 -0
- package/src/rules/no-timing-attack/index.ts +552 -0
- package/src/rules/no-timing-attack/no-timing-attack.test.ts +348 -0
- package/src/rules/no-toctou-vulnerability/index.ts +250 -0
- package/src/rules/no-toctou-vulnerability/no-toctou-vulnerability.test.ts +60 -0
- package/src/rules/no-tracking-without-consent/index.ts +78 -0
- package/src/rules/no-tracking-without-consent/no-tracking-without-consent.test.ts +34 -0
- package/src/rules/no-unchecked-loop-condition/index.ts +781 -0
- package/src/rules/no-unchecked-loop-condition/no-unchecked-loop-condition.test.ts +459 -0
- package/src/rules/no-unencrypted-local-storage/index.ts +73 -0
- package/src/rules/no-unencrypted-local-storage/no-unencrypted-local-storage.test.ts +41 -0
- package/src/rules/no-unencrypted-transmission/index.ts +296 -0
- package/src/rules/no-unencrypted-transmission/no-unencrypted-transmission.test.ts +287 -0
- package/src/rules/no-unescaped-url-parameter/index.ts +424 -0
- package/src/rules/no-unescaped-url-parameter/no-unescaped-url-parameter.test.ts +263 -0
- package/src/rules/no-unlimited-resource-allocation/index.ts +767 -0
- package/src/rules/no-unlimited-resource-allocation/no-unlimited-resource-allocation.test.ts +544 -0
- package/src/rules/no-unsafe-deserialization/index.ts +593 -0
- package/src/rules/no-unsafe-deserialization/no-unsafe-deserialization.test.ts +310 -0
- package/src/rules/no-unsafe-dynamic-require/index.ts +125 -0
- package/src/rules/no-unsafe-dynamic-require/no-unsafe-dynamic-require.test.ts +151 -0
- package/src/rules/no-unsafe-regex-construction/index.ts +370 -0
- package/src/rules/no-unsafe-regex-construction/no-unsafe-regex-construction.test.ts +181 -0
- package/src/rules/no-unsanitized-html/index.ts +400 -0
- package/src/rules/no-unsanitized-html/no-unsanitized-html.test.ts +488 -0
- package/src/rules/no-unvalidated-deeplinks/index.ts +73 -0
- package/src/rules/no-unvalidated-deeplinks/no-unvalidated-deeplinks.test.ts +29 -0
- package/src/rules/no-unvalidated-user-input/index.ts +498 -0
- package/src/rules/no-unvalidated-user-input/no-unvalidated-user-input.test.ts +463 -0
- package/src/rules/no-verbose-error-messages/index.ts +83 -0
- package/src/rules/no-verbose-error-messages/no-verbose-error-messages.test.ts +34 -0
- package/src/rules/no-weak-crypto/index.ts +447 -0
- package/src/rules/no-weak-crypto/no-weak-crypto.test.ts +297 -0
- package/src/rules/no-weak-password-recovery/index.ts +509 -0
- package/src/rules/no-weak-password-recovery/no-weak-password-recovery.test.ts +184 -0
- package/src/rules/no-xpath-injection/index.ts +596 -0
- package/src/rules/no-xpath-injection/no-xpath-injection.test.ts +405 -0
- package/src/rules/no-xxe-injection/index.ts +342 -0
- package/src/rules/no-xxe-injection/no-xxe-injection.test.ts +122 -0
- package/src/rules/no-zip-slip/index.ts +526 -0
- package/src/rules/no-zip-slip/no-zip-slip.test.ts +305 -0
- package/src/rules/require-backend-authorization/index.ts +71 -0
- package/src/rules/require-backend-authorization/require-backend-authorization.test.ts +31 -0
- package/src/rules/require-code-minification/index.ts +54 -0
- package/src/rules/require-code-minification/require-code-minification.test.ts +30 -0
- package/src/rules/require-csp-headers/index.ts +74 -0
- package/src/rules/require-csp-headers/require-csp-headers.test.ts +34 -0
- package/src/rules/require-data-minimization/index.ts +65 -0
- package/src/rules/require-data-minimization/require-data-minimization.test.ts +31 -0
- package/src/rules/require-dependency-integrity/index.ts +78 -0
- package/src/rules/require-dependency-integrity/require-dependency-integrity.test.ts +44 -0
- package/src/rules/require-https-only/index.ts +75 -0
- package/src/rules/require-https-only/require-https-only.test.ts +26 -0
- package/src/rules/require-mime-type-validation/index.ts +77 -0
- package/src/rules/require-mime-type-validation/require-mime-type-validation.test.ts +32 -0
- package/src/rules/require-network-timeout/index.ts +58 -0
- package/src/rules/require-network-timeout/require-network-timeout.test.ts +26 -0
- package/src/rules/require-package-lock/index.ts +75 -0
- package/src/rules/require-package-lock/require-package-lock.test.ts +27 -0
- package/src/rules/require-secure-credential-storage/index.ts +60 -0
- package/src/rules/require-secure-credential-storage/require-secure-credential-storage.test.ts +26 -0
- package/src/rules/require-secure-defaults/index.ts +54 -0
- package/src/rules/require-secure-defaults/require-secure-defaults.test.ts +26 -0
- package/src/rules/require-secure-deletion/index.ts +52 -0
- package/src/rules/require-secure-deletion/require-secure-deletion.test.ts +29 -0
- package/src/rules/require-storage-encryption/index.ts +60 -0
- package/src/rules/require-storage-encryption/require-storage-encryption.test.ts +26 -0
- package/src/rules/require-url-validation/index.ts +85 -0
- package/src/rules/require-url-validation/require-url-validation.test.ts +32 -0
- package/src/types/{index.d.ts → index.ts} +157 -53
- package/src/index.d.ts +0 -32
- package/src/index.js +0 -465
- package/src/rules/database-injection/index.d.ts +0 -13
- package/src/rules/database-injection/index.js +0 -406
- package/src/rules/detect-child-process/index.d.ts +0 -11
- package/src/rules/detect-child-process/index.js +0 -529
- package/src/rules/detect-eval-with-expression/index.d.ts +0 -9
- package/src/rules/detect-eval-with-expression/index.js +0 -392
- package/src/rules/detect-mixed-content/index.d.ts +0 -8
- package/src/rules/detect-mixed-content/index.js +0 -44
- package/src/rules/detect-non-literal-fs-filename/index.d.ts +0 -7
- package/src/rules/detect-non-literal-fs-filename/index.js +0 -454
- package/src/rules/detect-non-literal-regexp/index.d.ts +0 -9
- package/src/rules/detect-non-literal-regexp/index.js +0 -403
- package/src/rules/detect-object-injection/index.d.ts +0 -11
- package/src/rules/detect-object-injection/index.js +0 -560
- package/src/rules/detect-suspicious-dependencies/index.d.ts +0 -8
- package/src/rules/detect-suspicious-dependencies/index.js +0 -71
- package/src/rules/detect-weak-password-validation/index.d.ts +0 -6
- package/src/rules/detect-weak-password-validation/index.js +0 -58
- package/src/rules/no-allow-arbitrary-loads/index.d.ts +0 -8
- package/src/rules/no-allow-arbitrary-loads/index.js +0 -47
- package/src/rules/no-arbitrary-file-access/index.d.ts +0 -13
- package/src/rules/no-arbitrary-file-access/index.js +0 -195
- package/src/rules/no-buffer-overread/index.d.ts +0 -29
- package/src/rules/no-buffer-overread/index.js +0 -606
- package/src/rules/no-clickjacking/index.d.ts +0 -10
- package/src/rules/no-clickjacking/index.js +0 -396
- package/src/rules/no-client-side-auth-logic/index.d.ts +0 -6
- package/src/rules/no-client-side-auth-logic/index.js +0 -69
- package/src/rules/no-credentials-in-query-params/index.d.ts +0 -8
- package/src/rules/no-credentials-in-query-params/index.js +0 -57
- package/src/rules/no-credentials-in-storage-api/index.d.ts +0 -6
- package/src/rules/no-credentials-in-storage-api/index.js +0 -54
- package/src/rules/no-data-in-temp-storage/index.d.ts +0 -6
- package/src/rules/no-data-in-temp-storage/index.js +0 -64
- package/src/rules/no-debug-code-in-production/index.d.ts +0 -8
- package/src/rules/no-debug-code-in-production/index.js +0 -51
- package/src/rules/no-directive-injection/index.d.ts +0 -12
- package/src/rules/no-directive-injection/index.js +0 -457
- package/src/rules/no-disabled-certificate-validation/index.d.ts +0 -6
- package/src/rules/no-disabled-certificate-validation/index.js +0 -61
- package/src/rules/no-document-cookie/index.d.ts +0 -5
- package/src/rules/no-document-cookie/index.js +0 -89
- package/src/rules/no-dynamic-dependency-loading/index.d.ts +0 -8
- package/src/rules/no-dynamic-dependency-loading/index.js +0 -51
- package/src/rules/no-electron-security-issues/index.d.ts +0 -10
- package/src/rules/no-electron-security-issues/index.js +0 -423
- package/src/rules/no-exposed-debug-endpoints/index.d.ts +0 -6
- package/src/rules/no-exposed-debug-endpoints/index.js +0 -62
- package/src/rules/no-exposed-sensitive-data/index.d.ts +0 -11
- package/src/rules/no-exposed-sensitive-data/index.js +0 -340
- package/src/rules/no-format-string-injection/index.d.ts +0 -17
- package/src/rules/no-format-string-injection/index.js +0 -660
- package/src/rules/no-graphql-injection/index.d.ts +0 -12
- package/src/rules/no-graphql-injection/index.js +0 -411
- package/src/rules/no-hardcoded-credentials/index.d.ts +0 -26
- package/src/rules/no-hardcoded-credentials/index.js +0 -376
- package/src/rules/no-hardcoded-session-tokens/index.d.ts +0 -6
- package/src/rules/no-hardcoded-session-tokens/index.js +0 -59
- package/src/rules/no-http-urls/index.d.ts +0 -12
- package/src/rules/no-http-urls/index.js +0 -114
- package/src/rules/no-improper-sanitization/index.d.ts +0 -12
- package/src/rules/no-improper-sanitization/index.js +0 -411
- package/src/rules/no-improper-type-validation/index.d.ts +0 -10
- package/src/rules/no-improper-type-validation/index.js +0 -475
- package/src/rules/no-insecure-comparison/index.d.ts +0 -7
- package/src/rules/no-insecure-comparison/index.js +0 -193
- package/src/rules/no-insecure-cookie-settings/index.d.ts +0 -9
- package/src/rules/no-insecure-cookie-settings/index.js +0 -306
- package/src/rules/no-insecure-jwt/index.d.ts +0 -10
- package/src/rules/no-insecure-jwt/index.js +0 -380
- package/src/rules/no-insecure-redirects/index.d.ts +0 -7
- package/src/rules/no-insecure-redirects/index.js +0 -216
- package/src/rules/no-insecure-websocket/index.d.ts +0 -6
- package/src/rules/no-insecure-websocket/index.js +0 -61
- package/src/rules/no-insufficient-postmessage-validation/index.d.ts +0 -14
- package/src/rules/no-insufficient-postmessage-validation/index.js +0 -392
- package/src/rules/no-insufficient-random/index.d.ts +0 -9
- package/src/rules/no-insufficient-random/index.js +0 -208
- package/src/rules/no-ldap-injection/index.d.ts +0 -10
- package/src/rules/no-ldap-injection/index.js +0 -455
- package/src/rules/no-missing-authentication/index.d.ts +0 -13
- package/src/rules/no-missing-authentication/index.js +0 -333
- package/src/rules/no-missing-cors-check/index.d.ts +0 -9
- package/src/rules/no-missing-cors-check/index.js +0 -399
- package/src/rules/no-missing-csrf-protection/index.d.ts +0 -11
- package/src/rules/no-missing-csrf-protection/index.js +0 -180
- package/src/rules/no-missing-security-headers/index.d.ts +0 -7
- package/src/rules/no-missing-security-headers/index.js +0 -218
- package/src/rules/no-password-in-url/index.d.ts +0 -8
- package/src/rules/no-password-in-url/index.js +0 -54
- package/src/rules/no-permissive-cors/index.d.ts +0 -8
- package/src/rules/no-permissive-cors/index.js +0 -65
- package/src/rules/no-pii-in-logs/index.d.ts +0 -8
- package/src/rules/no-pii-in-logs/index.js +0 -70
- package/src/rules/no-postmessage-origin-wildcard/index.d.ts +0 -8
- package/src/rules/no-postmessage-origin-wildcard/index.js +0 -56
- package/src/rules/no-privilege-escalation/index.d.ts +0 -13
- package/src/rules/no-privilege-escalation/index.js +0 -321
- package/src/rules/no-redos-vulnerable-regex/index.d.ts +0 -7
- package/src/rules/no-redos-vulnerable-regex/index.js +0 -306
- package/src/rules/no-sensitive-data-exposure/index.d.ts +0 -11
- package/src/rules/no-sensitive-data-exposure/index.js +0 -250
- package/src/rules/no-sensitive-data-in-analytics/index.d.ts +0 -8
- package/src/rules/no-sensitive-data-in-analytics/index.js +0 -62
- package/src/rules/no-sensitive-data-in-cache/index.d.ts +0 -8
- package/src/rules/no-sensitive-data-in-cache/index.js +0 -52
- package/src/rules/no-sql-injection/index.d.ts +0 -10
- package/src/rules/no-sql-injection/index.js +0 -335
- package/src/rules/no-timing-attack/index.d.ts +0 -10
- package/src/rules/no-timing-attack/index.js +0 -447
- package/src/rules/no-toctou-vulnerability/index.d.ts +0 -7
- package/src/rules/no-toctou-vulnerability/index.js +0 -208
- package/src/rules/no-tracking-without-consent/index.d.ts +0 -6
- package/src/rules/no-tracking-without-consent/index.js +0 -67
- package/src/rules/no-unchecked-loop-condition/index.d.ts +0 -12
- package/src/rules/no-unchecked-loop-condition/index.js +0 -646
- package/src/rules/no-unencrypted-local-storage/index.d.ts +0 -8
- package/src/rules/no-unencrypted-local-storage/index.js +0 -61
- package/src/rules/no-unencrypted-transmission/index.d.ts +0 -11
- package/src/rules/no-unencrypted-transmission/index.js +0 -236
- package/src/rules/no-unescaped-url-parameter/index.d.ts +0 -9
- package/src/rules/no-unescaped-url-parameter/index.js +0 -355
- package/src/rules/no-unlimited-resource-allocation/index.d.ts +0 -12
- package/src/rules/no-unlimited-resource-allocation/index.js +0 -643
- package/src/rules/no-unsafe-deserialization/index.d.ts +0 -10
- package/src/rules/no-unsafe-deserialization/index.js +0 -491
- package/src/rules/no-unsafe-dynamic-require/index.d.ts +0 -5
- package/src/rules/no-unsafe-dynamic-require/index.js +0 -106
- package/src/rules/no-unsafe-regex-construction/index.d.ts +0 -9
- package/src/rules/no-unsafe-regex-construction/index.js +0 -291
- package/src/rules/no-unsanitized-html/index.d.ts +0 -9
- package/src/rules/no-unsanitized-html/index.js +0 -335
- package/src/rules/no-unvalidated-deeplinks/index.d.ts +0 -6
- package/src/rules/no-unvalidated-deeplinks/index.js +0 -62
- package/src/rules/no-unvalidated-user-input/index.d.ts +0 -9
- package/src/rules/no-unvalidated-user-input/index.js +0 -420
- package/src/rules/no-verbose-error-messages/index.d.ts +0 -8
- package/src/rules/no-verbose-error-messages/index.js +0 -68
- package/src/rules/no-weak-crypto/index.d.ts +0 -11
- package/src/rules/no-weak-crypto/index.js +0 -351
- package/src/rules/no-weak-password-recovery/index.d.ts +0 -12
- package/src/rules/no-weak-password-recovery/index.js +0 -424
- package/src/rules/no-xpath-injection/index.d.ts +0 -10
- package/src/rules/no-xpath-injection/index.js +0 -487
- package/src/rules/no-xxe-injection/index.d.ts +0 -7
- package/src/rules/no-xxe-injection/index.js +0 -266
- package/src/rules/no-zip-slip/index.d.ts +0 -9
- package/src/rules/no-zip-slip/index.js +0 -445
- package/src/rules/require-backend-authorization/index.d.ts +0 -6
- package/src/rules/require-backend-authorization/index.js +0 -60
- package/src/rules/require-code-minification/index.d.ts +0 -8
- package/src/rules/require-code-minification/index.js +0 -47
- package/src/rules/require-csp-headers/index.d.ts +0 -6
- package/src/rules/require-csp-headers/index.js +0 -64
- package/src/rules/require-data-minimization/index.d.ts +0 -8
- package/src/rules/require-data-minimization/index.js +0 -53
- package/src/rules/require-dependency-integrity/index.d.ts +0 -6
- package/src/rules/require-dependency-integrity/index.js +0 -64
- package/src/rules/require-https-only/index.d.ts +0 -8
- package/src/rules/require-https-only/index.js +0 -62
- package/src/rules/require-mime-type-validation/index.d.ts +0 -6
- package/src/rules/require-mime-type-validation/index.js +0 -66
- package/src/rules/require-network-timeout/index.d.ts +0 -8
- package/src/rules/require-network-timeout/index.js +0 -50
- package/src/rules/require-package-lock/index.d.ts +0 -8
- package/src/rules/require-package-lock/index.js +0 -63
- package/src/rules/require-secure-credential-storage/index.d.ts +0 -8
- package/src/rules/require-secure-credential-storage/index.js +0 -50
- package/src/rules/require-secure-defaults/index.d.ts +0 -8
- package/src/rules/require-secure-defaults/index.js +0 -47
- package/src/rules/require-secure-deletion/index.d.ts +0 -8
- package/src/rules/require-secure-deletion/index.js +0 -44
- package/src/rules/require-storage-encryption/index.d.ts +0 -8
- package/src/rules/require-storage-encryption/index.js +0 -50
- package/src/rules/require-url-validation/index.d.ts +0 -6
- package/src/rules/require-url-validation/index.js +0 -72
- package/src/types/index.js +0 -17
|
@@ -0,0 +1,508 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* ESLint Rule: no-graphql-injection
|
|
3
|
+
* Detects GraphQL injection vulnerabilities and DoS attacks (CWE-89, CWE-400)
|
|
4
|
+
*
|
|
5
|
+
* GraphQL injection occurs when user input is improperly inserted into GraphQL
|
|
6
|
+
* queries, allowing attackers to:
|
|
7
|
+
* - Read/modify unauthorized data
|
|
8
|
+
* - Perform DoS attacks with complex queries
|
|
9
|
+
* - Extract schema information via introspection
|
|
10
|
+
*
|
|
11
|
+
* False Positive Reduction:
|
|
12
|
+
* This rule uses security utilities to reduce false positives by detecting:
|
|
13
|
+
* - Safe GraphQL libraries (apollo-server, graphql-tools)
|
|
14
|
+
* - Proper query builders and sanitizers
|
|
15
|
+
* - JSDoc annotations (@safe, @validated)
|
|
16
|
+
* - Input validation functions
|
|
17
|
+
*/
|
|
18
|
+
import type { TSESLint, TSESTree } from '@interlace/eslint-devkit';
|
|
19
|
+
import { createRule } from '@interlace/eslint-devkit';
|
|
20
|
+
import { formatLLMMessage, MessageIcons } from '@interlace/eslint-devkit';
|
|
21
|
+
import {
|
|
22
|
+
createSafetyChecker,
|
|
23
|
+
type SecurityRuleOptions,
|
|
24
|
+
} from '@interlace/eslint-devkit';
|
|
25
|
+
|
|
26
|
+
type MessageIds =
|
|
27
|
+
| 'graphqlInjection'
|
|
28
|
+
| 'introspectionQuery'
|
|
29
|
+
| 'complexQueryDos'
|
|
30
|
+
| 'unsafeVariableInterpolation'
|
|
31
|
+
| 'missingInputValidation'
|
|
32
|
+
| 'useQueryBuilder'
|
|
33
|
+
| 'disableIntrospection'
|
|
34
|
+
| 'limitQueryDepth'
|
|
35
|
+
| 'strategyQueryBuilder'
|
|
36
|
+
| 'strategyInputValidation'
|
|
37
|
+
| 'strategyIntrospection';
|
|
38
|
+
|
|
39
|
+
export interface Options extends SecurityRuleOptions {
|
|
40
|
+
/** Allow introspection queries. Default: false (security-first) */
|
|
41
|
+
allowIntrospection?: boolean;
|
|
42
|
+
|
|
43
|
+
/** Maximum allowed query depth. Default: 10 */
|
|
44
|
+
maxQueryDepth?: number;
|
|
45
|
+
|
|
46
|
+
/** GraphQL libraries to consider safe */
|
|
47
|
+
trustedGraphqlLibraries?: string[];
|
|
48
|
+
|
|
49
|
+
/** Functions that validate GraphQL input */
|
|
50
|
+
validationFunctions?: string[];
|
|
51
|
+
}
|
|
52
|
+
|
|
53
|
+
type RuleOptions = [Options?];
|
|
54
|
+
|
|
55
|
+
export const noGraphqlInjection = createRule<RuleOptions, MessageIds>({
|
|
56
|
+
name: 'no-graphql-injection',
|
|
57
|
+
meta: {
|
|
58
|
+
type: 'problem',
|
|
59
|
+
docs: {
|
|
60
|
+
description: 'Detects GraphQL injection vulnerabilities and DoS attacks',
|
|
61
|
+
},
|
|
62
|
+
fixable: 'code',
|
|
63
|
+
hasSuggestions: true,
|
|
64
|
+
messages: {
|
|
65
|
+
graphqlInjection: formatLLMMessage({
|
|
66
|
+
icon: MessageIcons.SECURITY,
|
|
67
|
+
issueName: 'GraphQL Injection',
|
|
68
|
+
cwe: 'CWE-89',
|
|
69
|
+
description: 'GraphQL injection vulnerability detected',
|
|
70
|
+
severity: '{{severity}}',
|
|
71
|
+
fix: '{{safeAlternative}}',
|
|
72
|
+
documentationLink: 'https://owasp.org/Top10/2025/A05_2025-Injection/',
|
|
73
|
+
}),
|
|
74
|
+
introspectionQuery: formatLLMMessage({
|
|
75
|
+
icon: MessageIcons.SECURITY,
|
|
76
|
+
issueName: 'Dangerous Introspection Query',
|
|
77
|
+
cwe: 'CWE-200',
|
|
78
|
+
description: 'Introspection query may leak schema information',
|
|
79
|
+
severity: 'HIGH',
|
|
80
|
+
fix: 'Disable introspection in production',
|
|
81
|
+
documentationLink: 'https://graphql.org/learn/introspection/',
|
|
82
|
+
}),
|
|
83
|
+
complexQueryDos: formatLLMMessage({
|
|
84
|
+
icon: MessageIcons.SECURITY,
|
|
85
|
+
issueName: 'Complex Query DoS Risk',
|
|
86
|
+
cwe: 'CWE-400',
|
|
87
|
+
description: 'Complex query may cause DoS',
|
|
88
|
+
severity: 'MEDIUM',
|
|
89
|
+
fix: 'Limit query depth and complexity',
|
|
90
|
+
documentationLink: 'https://graphql.org/learn/queries/',
|
|
91
|
+
}),
|
|
92
|
+
unsafeVariableInterpolation: formatLLMMessage({
|
|
93
|
+
icon: MessageIcons.SECURITY,
|
|
94
|
+
issueName: 'Unsafe Variable Interpolation',
|
|
95
|
+
cwe: 'CWE-89',
|
|
96
|
+
description: 'Unsafe interpolation in GraphQL query',
|
|
97
|
+
severity: 'HIGH',
|
|
98
|
+
fix: 'Use GraphQL variables instead of string interpolation',
|
|
99
|
+
documentationLink: 'https://graphql.org/learn/queries/#variables',
|
|
100
|
+
}),
|
|
101
|
+
missingInputValidation: formatLLMMessage({
|
|
102
|
+
icon: MessageIcons.SECURITY,
|
|
103
|
+
issueName: 'Missing Input Validation',
|
|
104
|
+
cwe: 'CWE-20',
|
|
105
|
+
description: 'GraphQL input not validated',
|
|
106
|
+
severity: 'MEDIUM',
|
|
107
|
+
fix: 'Validate all user inputs before GraphQL execution',
|
|
108
|
+
documentationLink: 'https://graphql.org/learn/validation/',
|
|
109
|
+
}),
|
|
110
|
+
useQueryBuilder: formatLLMMessage({
|
|
111
|
+
icon: MessageIcons.INFO,
|
|
112
|
+
issueName: 'Use Query Builder',
|
|
113
|
+
description: 'Use GraphQL query builders for safe construction',
|
|
114
|
+
severity: 'LOW',
|
|
115
|
+
fix: 'Use graphql-tag or similar libraries',
|
|
116
|
+
documentationLink: 'https://www.npmjs.com/package/graphql-tag',
|
|
117
|
+
}),
|
|
118
|
+
disableIntrospection: formatLLMMessage({
|
|
119
|
+
icon: MessageIcons.INFO,
|
|
120
|
+
issueName: 'Disable Introspection',
|
|
121
|
+
description: 'Disable GraphQL introspection in production',
|
|
122
|
+
severity: 'LOW',
|
|
123
|
+
fix: 'Set introspection: false in GraphQL config',
|
|
124
|
+
documentationLink: 'https://www.apollographql.com/docs/apollo-server/security/introspection/',
|
|
125
|
+
}),
|
|
126
|
+
limitQueryDepth: formatLLMMessage({
|
|
127
|
+
icon: MessageIcons.INFO,
|
|
128
|
+
issueName: 'Limit Query Depth',
|
|
129
|
+
description: 'Limit maximum query depth',
|
|
130
|
+
severity: 'LOW',
|
|
131
|
+
fix: 'Use depth limiting plugins or custom validation',
|
|
132
|
+
documentationLink: 'https://www.npmjs.com/package/graphql-depth-limit',
|
|
133
|
+
}),
|
|
134
|
+
strategyQueryBuilder: formatLLMMessage({
|
|
135
|
+
icon: MessageIcons.STRATEGY,
|
|
136
|
+
issueName: 'Query Builder Strategy',
|
|
137
|
+
description: 'Use typed query builders for compile-time safety',
|
|
138
|
+
severity: 'LOW',
|
|
139
|
+
fix: 'Use GraphQL code generation tools',
|
|
140
|
+
documentationLink: 'https://graphql-code-generator.com/',
|
|
141
|
+
}),
|
|
142
|
+
strategyInputValidation: formatLLMMessage({
|
|
143
|
+
icon: MessageIcons.STRATEGY,
|
|
144
|
+
issueName: 'Input Validation Strategy',
|
|
145
|
+
description: 'Validate all inputs at GraphQL resolver level',
|
|
146
|
+
severity: 'LOW',
|
|
147
|
+
fix: 'Implement custom scalars and input validation',
|
|
148
|
+
documentationLink: 'https://graphql.org/learn/schema/#scalar-types',
|
|
149
|
+
}),
|
|
150
|
+
strategyIntrospection: formatLLMMessage({
|
|
151
|
+
icon: MessageIcons.STRATEGY,
|
|
152
|
+
issueName: 'Introspection Strategy',
|
|
153
|
+
description: 'Control introspection access based on environment',
|
|
154
|
+
severity: 'LOW',
|
|
155
|
+
fix: 'Enable introspection only for development/admin users',
|
|
156
|
+
documentationLink: 'https://www.apollographql.com/docs/apollo-server/security/introspection/',
|
|
157
|
+
})
|
|
158
|
+
},
|
|
159
|
+
schema: [
|
|
160
|
+
{
|
|
161
|
+
type: 'object',
|
|
162
|
+
properties: {
|
|
163
|
+
allowIntrospection: {
|
|
164
|
+
type: 'boolean',
|
|
165
|
+
default: false,
|
|
166
|
+
},
|
|
167
|
+
maxQueryDepth: {
|
|
168
|
+
type: 'number',
|
|
169
|
+
minimum: 1,
|
|
170
|
+
default: 10,
|
|
171
|
+
},
|
|
172
|
+
trustedGraphqlLibraries: {
|
|
173
|
+
type: 'array',
|
|
174
|
+
items: { type: 'string' },
|
|
175
|
+
default: ['graphql', 'apollo-server', 'graphql-tools', 'graphql-tag'],
|
|
176
|
+
},
|
|
177
|
+
validationFunctions: {
|
|
178
|
+
type: 'array',
|
|
179
|
+
items: { type: 'string' },
|
|
180
|
+
default: ['validate', 'sanitize', 'isValid', 'assertValid'],
|
|
181
|
+
},
|
|
182
|
+
trustedSanitizers: {
|
|
183
|
+
type: 'array',
|
|
184
|
+
items: { type: 'string' },
|
|
185
|
+
default: [],
|
|
186
|
+
description: 'Additional function names to consider as GraphQL sanitizers',
|
|
187
|
+
},
|
|
188
|
+
trustedAnnotations: {
|
|
189
|
+
type: 'array',
|
|
190
|
+
items: { type: 'string' },
|
|
191
|
+
default: [],
|
|
192
|
+
description: 'Additional JSDoc annotations to consider as safe markers',
|
|
193
|
+
},
|
|
194
|
+
strictMode: {
|
|
195
|
+
type: 'boolean',
|
|
196
|
+
default: false,
|
|
197
|
+
description: 'Disable all false positive detection (strict mode)',
|
|
198
|
+
},
|
|
199
|
+
},
|
|
200
|
+
additionalProperties: false,
|
|
201
|
+
},
|
|
202
|
+
],
|
|
203
|
+
},
|
|
204
|
+
defaultOptions: [
|
|
205
|
+
{
|
|
206
|
+
allowIntrospection: false,
|
|
207
|
+
maxQueryDepth: 10,
|
|
208
|
+
trustedGraphqlLibraries: ['graphql', 'apollo-server', 'graphql-tools', 'graphql-tag'],
|
|
209
|
+
validationFunctions: ['validate', 'sanitize', 'isValid', 'assertValid'],
|
|
210
|
+
trustedSanitizers: [],
|
|
211
|
+
trustedAnnotations: [],
|
|
212
|
+
strictMode: false,
|
|
213
|
+
},
|
|
214
|
+
],
|
|
215
|
+
create(context: TSESLint.RuleContext<MessageIds, RuleOptions>) {
|
|
216
|
+
const options = context.options[0] || {};
|
|
217
|
+
const {
|
|
218
|
+
allowIntrospection = false,
|
|
219
|
+
maxQueryDepth = 10,
|
|
220
|
+
trustedGraphqlLibraries = ['graphql', 'apollo-server', 'graphql-tools', 'graphql-tag'],
|
|
221
|
+
validationFunctions = ['validate', 'sanitize', 'isValid', 'assertValid'],
|
|
222
|
+
trustedSanitizers = [],
|
|
223
|
+
trustedAnnotations = [],
|
|
224
|
+
strictMode = false,
|
|
225
|
+
}: Options = options;
|
|
226
|
+
|
|
227
|
+
const sourceCode = context.sourceCode || context.sourceCode;
|
|
228
|
+
const filename = context.filename || context.getFilename();
|
|
229
|
+
|
|
230
|
+
// Create safety checker for false positive detection
|
|
231
|
+
const safetyChecker = createSafetyChecker({
|
|
232
|
+
trustedSanitizers,
|
|
233
|
+
trustedAnnotations,
|
|
234
|
+
trustedOrmPatterns: [],
|
|
235
|
+
strictMode,
|
|
236
|
+
});
|
|
237
|
+
|
|
238
|
+
/**
|
|
239
|
+
* Check if this is a GraphQL-related operation
|
|
240
|
+
*/
|
|
241
|
+
const isGraphqlRelated = (node: TSESTree.CallExpression): boolean => {
|
|
242
|
+
const callee = node.callee;
|
|
243
|
+
|
|
244
|
+
// Check for GraphQL library calls
|
|
245
|
+
if (callee.type === 'Identifier') {
|
|
246
|
+
return trustedGraphqlLibraries.some(lib => callee.name.toLowerCase().includes(lib.toLowerCase()));
|
|
247
|
+
}
|
|
248
|
+
|
|
249
|
+
// Check for member expressions like graphql.parse, apollo.executeQuery
|
|
250
|
+
if (callee.type === 'MemberExpression' && callee.object.type === 'Identifier') {
|
|
251
|
+
const objectName = callee.object.name;
|
|
252
|
+
return trustedGraphqlLibraries.some(lib =>
|
|
253
|
+
objectName.toLowerCase().includes(lib.toLowerCase())
|
|
254
|
+
);
|
|
255
|
+
}
|
|
256
|
+
|
|
257
|
+
return false;
|
|
258
|
+
};
|
|
259
|
+
|
|
260
|
+
/**
|
|
261
|
+
* Check if string contains GraphQL query patterns
|
|
262
|
+
*/
|
|
263
|
+
const containsGraphqlQuery = (text: string): boolean => {
|
|
264
|
+
const lowerText = text.toLowerCase();
|
|
265
|
+
return /\b(query|mutation|subscription|fragment)\b/.test(lowerText) ||
|
|
266
|
+
/{\s*\w+/.test(lowerText) || // GraphQL selection sets
|
|
267
|
+
/\btype\b|\binterface\b|\benum\b|\bscalar\b/.test(lowerText); // Schema definitions
|
|
268
|
+
};
|
|
269
|
+
|
|
270
|
+
/**
|
|
271
|
+
* Check if string contains dangerous introspection
|
|
272
|
+
*/
|
|
273
|
+
const containsIntrospection = (text: string): boolean => {
|
|
274
|
+
return /__schema|__type/i.test(text);
|
|
275
|
+
};
|
|
276
|
+
|
|
277
|
+
/**
|
|
278
|
+
* Calculate query depth (rough estimate)
|
|
279
|
+
*/
|
|
280
|
+
const calculateQueryDepth = (queryText: string): number => {
|
|
281
|
+
let depth = 0;
|
|
282
|
+
let braceCount = 0;
|
|
283
|
+
|
|
284
|
+
for (const char of queryText) {
|
|
285
|
+
if (char === '{') {
|
|
286
|
+
braceCount++;
|
|
287
|
+
depth = Math.max(depth, braceCount);
|
|
288
|
+
} else if (char === '}') {
|
|
289
|
+
braceCount--;
|
|
290
|
+
}
|
|
291
|
+
}
|
|
292
|
+
|
|
293
|
+
return depth;
|
|
294
|
+
};
|
|
295
|
+
|
|
296
|
+
/**
|
|
297
|
+
* Check if string contains unsafe interpolation
|
|
298
|
+
*/
|
|
299
|
+
const containsUnsafeInterpolation = (text: string): boolean => {
|
|
300
|
+
// Check for template literal interpolation
|
|
301
|
+
return /\$\{[^}]+\}/.test(text) ||
|
|
302
|
+
// Check for string concatenation patterns
|
|
303
|
+
/\w+\s*\+\s*[^+]+\s*\+\s*\w+/.test(text);
|
|
304
|
+
};
|
|
305
|
+
|
|
306
|
+
/**
|
|
307
|
+
* Check if input is validated before use
|
|
308
|
+
*/
|
|
309
|
+
const isInputValidated = (inputNode: TSESTree.Node): boolean => {
|
|
310
|
+
// Check if input comes from a validation function
|
|
311
|
+
let current: TSESTree.Node | undefined = inputNode;
|
|
312
|
+
|
|
313
|
+
// Walk up the AST to find validation calls
|
|
314
|
+
while (current) {
|
|
315
|
+
if (current.type === 'CallExpression' &&
|
|
316
|
+
current.callee.type === 'Identifier' &&
|
|
317
|
+
validationFunctions.includes(current.callee.name)) {
|
|
318
|
+
return true;
|
|
319
|
+
}
|
|
320
|
+
current = current.parent as TSESTree.Node;
|
|
321
|
+
}
|
|
322
|
+
|
|
323
|
+
return false;
|
|
324
|
+
};
|
|
325
|
+
|
|
326
|
+
return {
|
|
327
|
+
// Check template literals for GraphQL queries
|
|
328
|
+
TemplateLiteral(node: TSESTree.TemplateLiteral) {
|
|
329
|
+
const queryText = sourceCode.getText(node);
|
|
330
|
+
|
|
331
|
+
if (!containsGraphqlQuery(queryText)) {
|
|
332
|
+
return;
|
|
333
|
+
}
|
|
334
|
+
|
|
335
|
+
// Check for introspection queries
|
|
336
|
+
if (!allowIntrospection && containsIntrospection(queryText)) {
|
|
337
|
+
// FALSE POSITIVE REDUCTION: Skip if annotated as safe
|
|
338
|
+
if (safetyChecker.isSafe(node, context)) {
|
|
339
|
+
return;
|
|
340
|
+
}
|
|
341
|
+
|
|
342
|
+
context.report({
|
|
343
|
+
node,
|
|
344
|
+
messageId: 'introspectionQuery',
|
|
345
|
+
data: {
|
|
346
|
+
filePath: filename,
|
|
347
|
+
line: String(node.loc?.start.line ?? 0),
|
|
348
|
+
},
|
|
349
|
+
});
|
|
350
|
+
return;
|
|
351
|
+
}
|
|
352
|
+
|
|
353
|
+
// Check for unsafe interpolation
|
|
354
|
+
if (containsUnsafeInterpolation(queryText)) {
|
|
355
|
+
// FALSE POSITIVE REDUCTION: Skip if all expressions are validated
|
|
356
|
+
const allExpressionsSafe = node.expressions.every((expr: TSESTree.Expression) =>
|
|
357
|
+
isInputValidated(expr) || safetyChecker.isSafe(expr, context)
|
|
358
|
+
);
|
|
359
|
+
|
|
360
|
+
if (!allExpressionsSafe) {
|
|
361
|
+
context.report({
|
|
362
|
+
node,
|
|
363
|
+
messageId: 'unsafeVariableInterpolation',
|
|
364
|
+
data: {
|
|
365
|
+
filePath: filename,
|
|
366
|
+
line: String(node.loc?.start.line ?? 0),
|
|
367
|
+
},
|
|
368
|
+
suggest: [
|
|
369
|
+
{
|
|
370
|
+
messageId: 'useQueryBuilder',
|
|
371
|
+
fix: () => null // Complex to auto-fix
|
|
372
|
+
},
|
|
373
|
+
],
|
|
374
|
+
});
|
|
375
|
+
}
|
|
376
|
+
}
|
|
377
|
+
|
|
378
|
+
// Check query depth for DoS protection
|
|
379
|
+
const depth = calculateQueryDepth(queryText);
|
|
380
|
+
if (depth > maxQueryDepth) {
|
|
381
|
+
context.report({
|
|
382
|
+
node,
|
|
383
|
+
messageId: 'complexQueryDos',
|
|
384
|
+
data: {
|
|
385
|
+
filePath: filename,
|
|
386
|
+
line: String(node.loc?.start.line ?? 0),
|
|
387
|
+
},
|
|
388
|
+
suggest: [
|
|
389
|
+
{
|
|
390
|
+
messageId: 'limitQueryDepth',
|
|
391
|
+
fix: () => null
|
|
392
|
+
},
|
|
393
|
+
],
|
|
394
|
+
});
|
|
395
|
+
}
|
|
396
|
+
},
|
|
397
|
+
|
|
398
|
+
// Check string literals for GraphQL queries
|
|
399
|
+
Literal(node: TSESTree.Literal) {
|
|
400
|
+
if (typeof node.value !== 'string') {
|
|
401
|
+
return;
|
|
402
|
+
}
|
|
403
|
+
|
|
404
|
+
const queryText = node.value;
|
|
405
|
+
|
|
406
|
+
if (!containsGraphqlQuery(queryText)) {
|
|
407
|
+
return;
|
|
408
|
+
}
|
|
409
|
+
|
|
410
|
+
// Check for introspection queries
|
|
411
|
+
if (!allowIntrospection && containsIntrospection(queryText)) {
|
|
412
|
+
/* c8 ignore start -- safetyChecker requires JSDoc annotations not testable via RuleTester */
|
|
413
|
+
if (safetyChecker.isSafe(node, context)) {
|
|
414
|
+
return;
|
|
415
|
+
}
|
|
416
|
+
/* c8 ignore stop */
|
|
417
|
+
|
|
418
|
+
context.report({
|
|
419
|
+
node,
|
|
420
|
+
messageId: 'introspectionQuery',
|
|
421
|
+
data: {
|
|
422
|
+
filePath: filename,
|
|
423
|
+
line: String(node.loc?.start.line ?? 0),
|
|
424
|
+
},
|
|
425
|
+
});
|
|
426
|
+
}
|
|
427
|
+
|
|
428
|
+
// Check query depth
|
|
429
|
+
const depth = calculateQueryDepth(queryText);
|
|
430
|
+
if (depth > maxQueryDepth) {
|
|
431
|
+
context.report({
|
|
432
|
+
node,
|
|
433
|
+
messageId: 'complexQueryDos',
|
|
434
|
+
data: {
|
|
435
|
+
filePath: filename,
|
|
436
|
+
line: String(node.loc?.start.line ?? 0),
|
|
437
|
+
},
|
|
438
|
+
});
|
|
439
|
+
}
|
|
440
|
+
},
|
|
441
|
+
|
|
442
|
+
// Check binary expressions (string concatenation)
|
|
443
|
+
BinaryExpression(node: TSESTree.BinaryExpression) {
|
|
444
|
+
if (node.operator !== '+') {
|
|
445
|
+
return;
|
|
446
|
+
}
|
|
447
|
+
|
|
448
|
+
const fullText = sourceCode.getText(node);
|
|
449
|
+
|
|
450
|
+
if (!containsGraphqlQuery(fullText)) {
|
|
451
|
+
return;
|
|
452
|
+
}
|
|
453
|
+
|
|
454
|
+
// String concatenation in GraphQL queries is dangerous
|
|
455
|
+
/* c8 ignore start -- safetyChecker requires JSDoc annotations not testable via RuleTester */
|
|
456
|
+
if (safetyChecker.isSafe(node, context)) {
|
|
457
|
+
return;
|
|
458
|
+
}
|
|
459
|
+
/* c8 ignore stop */
|
|
460
|
+
|
|
461
|
+
context.report({
|
|
462
|
+
node,
|
|
463
|
+
messageId: 'graphqlInjection',
|
|
464
|
+
data: {
|
|
465
|
+
filePath: filename,
|
|
466
|
+
line: String(node.loc?.start.line ?? 0),
|
|
467
|
+
severity: 'HIGH',
|
|
468
|
+
safeAlternative: 'Use GraphQL variables or query builders instead of string concatenation',
|
|
469
|
+
},
|
|
470
|
+
});
|
|
471
|
+
},
|
|
472
|
+
|
|
473
|
+
// Check GraphQL execution calls
|
|
474
|
+
CallExpression(node: TSESTree.CallExpression) {
|
|
475
|
+
if (!isGraphqlRelated(node)) {
|
|
476
|
+
return;
|
|
477
|
+
}
|
|
478
|
+
|
|
479
|
+
const callee = node.callee;
|
|
480
|
+
|
|
481
|
+
// Check for execute/query methods
|
|
482
|
+
if (callee.type === 'MemberExpression' &&
|
|
483
|
+
callee.property.type === 'Identifier' &&
|
|
484
|
+
['execute', 'executeQuery', 'query', 'mutate', 'subscribe'].includes(callee.property.name)) {
|
|
485
|
+
|
|
486
|
+
// Check arguments for unvalidated inputs
|
|
487
|
+
for (const arg of node.arguments) {
|
|
488
|
+
if (arg.type === 'Identifier' && !isInputValidated(arg)) {
|
|
489
|
+
// FALSE POSITIVE REDUCTION
|
|
490
|
+
if (safetyChecker.isSafe(arg, context)) {
|
|
491
|
+
continue;
|
|
492
|
+
}
|
|
493
|
+
|
|
494
|
+
context.report({
|
|
495
|
+
node: arg,
|
|
496
|
+
messageId: 'missingInputValidation',
|
|
497
|
+
data: {
|
|
498
|
+
filePath: filename,
|
|
499
|
+
line: String(node.loc?.start.line ?? 0),
|
|
500
|
+
},
|
|
501
|
+
});
|
|
502
|
+
}
|
|
503
|
+
}
|
|
504
|
+
}
|
|
505
|
+
}
|
|
506
|
+
};
|
|
507
|
+
},
|
|
508
|
+
});
|