eslint-plugin-secure-coding 2.3.2 → 2.3.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -0
- package/package.json +3 -10
- package/src/index.ts +605 -0
- package/src/rules/__tests__/integration-demo.test.ts +290 -0
- package/src/rules/__tests__/integration-llm.test.ts +89 -0
- package/src/rules/database-injection/database-injection.test.ts +456 -0
- package/src/rules/database-injection/index.ts +488 -0
- package/src/rules/detect-child-process/detect-child-process.test.ts +207 -0
- package/src/rules/detect-child-process/index.ts +634 -0
- package/src/rules/detect-eval-with-expression/detect-eval-with-expression.test.ts +416 -0
- package/src/rules/detect-eval-with-expression/index.ts +463 -0
- package/src/rules/detect-mixed-content/detect-mixed-content.test.ts +28 -0
- package/src/rules/detect-mixed-content/index.ts +52 -0
- package/src/rules/detect-non-literal-fs-filename/detect-non-literal-fs-filename.test.ts +269 -0
- package/src/rules/detect-non-literal-fs-filename/index.ts +551 -0
- package/src/rules/detect-non-literal-regexp/detect-non-literal-regexp.test.ts +189 -0
- package/src/rules/detect-non-literal-regexp/index.ts +490 -0
- package/src/rules/detect-object-injection/detect-object-injection.test.ts +440 -0
- package/src/rules/detect-object-injection/index.ts +674 -0
- package/src/rules/detect-suspicious-dependencies/detect-suspicious-dependencies.test.ts +32 -0
- package/src/rules/detect-suspicious-dependencies/index.ts +84 -0
- package/src/rules/detect-weak-password-validation/detect-weak-password-validation.test.ts +31 -0
- package/src/rules/detect-weak-password-validation/index.ts +68 -0
- package/src/rules/no-allow-arbitrary-loads/index.ts +54 -0
- package/src/rules/no-allow-arbitrary-loads/no-allow-arbitrary-loads.test.ts +28 -0
- package/src/rules/no-arbitrary-file-access/index.ts +238 -0
- package/src/rules/no-arbitrary-file-access/no-arbitrary-file-access.test.ts +119 -0
- package/src/rules/no-buffer-overread/index.ts +724 -0
- package/src/rules/no-buffer-overread/no-buffer-overread.test.ts +313 -0
- package/src/rules/no-clickjacking/index.ts +481 -0
- package/src/rules/no-clickjacking/no-clickjacking.test.ts +253 -0
- package/src/rules/no-client-side-auth-logic/index.ts +81 -0
- package/src/rules/no-client-side-auth-logic/no-client-side-auth-logic.test.ts +33 -0
- package/src/rules/no-credentials-in-query-params/index.ts +69 -0
- package/src/rules/no-credentials-in-query-params/no-credentials-in-query-params.test.ts +33 -0
- package/src/rules/no-credentials-in-storage-api/index.ts +64 -0
- package/src/rules/no-credentials-in-storage-api/no-credentials-in-storage-api.test.ts +31 -0
- package/src/rules/no-data-in-temp-storage/index.ts +75 -0
- package/src/rules/no-data-in-temp-storage/no-data-in-temp-storage.test.ts +33 -0
- package/src/rules/no-debug-code-in-production/index.ts +59 -0
- package/src/rules/no-debug-code-in-production/no-debug-code-in-production.test.ts +26 -0
- package/src/rules/no-directive-injection/index.ts +551 -0
- package/src/rules/no-directive-injection/no-directive-injection.test.ts +305 -0
- package/src/rules/no-disabled-certificate-validation/index.ts +72 -0
- package/src/rules/no-disabled-certificate-validation/no-disabled-certificate-validation.test.ts +33 -0
- package/src/rules/no-document-cookie/index.ts +113 -0
- package/src/rules/no-document-cookie/no-document-cookie.test.ts +382 -0
- package/src/rules/no-dynamic-dependency-loading/index.ts +60 -0
- package/src/rules/no-dynamic-dependency-loading/no-dynamic-dependency-loading.test.ts +27 -0
- package/src/rules/no-electron-security-issues/index.ts +504 -0
- package/src/rules/no-electron-security-issues/no-electron-security-issues.test.ts +324 -0
- package/src/rules/no-exposed-debug-endpoints/index.ts +73 -0
- package/src/rules/no-exposed-debug-endpoints/no-exposed-debug-endpoints.test.ts +40 -0
- package/src/rules/no-exposed-sensitive-data/index.ts +428 -0
- package/src/rules/no-exposed-sensitive-data/no-exposed-sensitive-data.test.ts +75 -0
- package/src/rules/no-format-string-injection/index.ts +801 -0
- package/src/rules/no-format-string-injection/no-format-string-injection.test.ts +437 -0
- package/src/rules/no-graphql-injection/index.ts +508 -0
- package/src/rules/no-graphql-injection/no-graphql-injection.test.ts +371 -0
- package/src/rules/no-hardcoded-credentials/index.ts +478 -0
- package/src/rules/no-hardcoded-credentials/no-hardcoded-credentials.test.ts +639 -0
- package/src/rules/no-hardcoded-session-tokens/index.ts +69 -0
- package/src/rules/no-hardcoded-session-tokens/no-hardcoded-session-tokens.test.ts +42 -0
- package/src/rules/no-http-urls/index.ts +131 -0
- package/src/rules/no-http-urls/no-http-urls.test.ts +60 -0
- package/src/rules/no-improper-sanitization/index.ts +502 -0
- package/src/rules/no-improper-sanitization/no-improper-sanitization.test.ts +156 -0
- package/src/rules/no-improper-type-validation/index.ts +572 -0
- package/src/rules/no-improper-type-validation/no-improper-type-validation.test.ts +372 -0
- package/src/rules/no-insecure-comparison/index.ts +232 -0
- package/src/rules/no-insecure-comparison/no-insecure-comparison.test.ts +218 -0
- package/src/rules/no-insecure-cookie-settings/index.ts +391 -0
- package/src/rules/no-insecure-cookie-settings/no-insecure-cookie-settings.test.ts +409 -0
- package/src/rules/no-insecure-jwt/index.ts +467 -0
- package/src/rules/no-insecure-jwt/no-insecure-jwt.test.ts +259 -0
- package/src/rules/no-insecure-redirects/index.ts +267 -0
- package/src/rules/no-insecure-redirects/no-insecure-redirects.test.ts +108 -0
- package/src/rules/no-insecure-websocket/index.ts +72 -0
- package/src/rules/no-insecure-websocket/no-insecure-websocket.test.ts +42 -0
- package/src/rules/no-insufficient-postmessage-validation/index.ts +497 -0
- package/src/rules/no-insufficient-postmessage-validation/no-insufficient-postmessage-validation.test.ts +360 -0
- package/src/rules/no-insufficient-random/index.ts +288 -0
- package/src/rules/no-insufficient-random/no-insufficient-random.test.ts +246 -0
- package/src/rules/no-ldap-injection/index.ts +547 -0
- package/src/rules/no-ldap-injection/no-ldap-injection.test.ts +317 -0
- package/src/rules/no-missing-authentication/index.ts +408 -0
- package/src/rules/no-missing-authentication/no-missing-authentication.test.ts +350 -0
- package/src/rules/no-missing-cors-check/index.ts +453 -0
- package/src/rules/no-missing-cors-check/no-missing-cors-check.test.ts +392 -0
- package/src/rules/no-missing-csrf-protection/index.ts +229 -0
- package/src/rules/no-missing-csrf-protection/no-missing-csrf-protection.test.ts +222 -0
- package/src/rules/no-missing-security-headers/index.ts +266 -0
- package/src/rules/no-missing-security-headers/no-missing-security-headers.test.ts +98 -0
- package/src/rules/no-password-in-url/index.ts +64 -0
- package/src/rules/no-password-in-url/no-password-in-url.test.ts +27 -0
- package/src/rules/no-permissive-cors/index.ts +78 -0
- package/src/rules/no-permissive-cors/no-permissive-cors.test.ts +28 -0
- package/src/rules/no-pii-in-logs/index.ts +83 -0
- package/src/rules/no-pii-in-logs/no-pii-in-logs.test.ts +26 -0
- package/src/rules/no-postmessage-origin-wildcard/index.ts +67 -0
- package/src/rules/no-postmessage-origin-wildcard/no-postmessage-origin-wildcard.test.ts +27 -0
- package/src/rules/no-privilege-escalation/index.ts +403 -0
- package/src/rules/no-privilege-escalation/no-privilege-escalation.test.ts +306 -0
- package/src/rules/no-redos-vulnerable-regex/index.ts +379 -0
- package/src/rules/no-redos-vulnerable-regex/no-redos-vulnerable-regex.test.ts +83 -0
- package/src/rules/no-sensitive-data-exposure/index.ts +294 -0
- package/src/rules/no-sensitive-data-exposure/no-sensitive-data-exposure.test.ts +262 -0
- package/src/rules/no-sensitive-data-in-analytics/index.ts +73 -0
- package/src/rules/no-sensitive-data-in-analytics/no-sensitive-data-in-analytics.test.ts +42 -0
- package/src/rules/no-sensitive-data-in-cache/index.ts +59 -0
- package/src/rules/no-sensitive-data-in-cache/no-sensitive-data-in-cache.test.ts +32 -0
- package/src/rules/no-sql-injection/index.ts +424 -0
- package/src/rules/no-sql-injection/no-sql-injection.test.ts +303 -0
- package/src/rules/no-timing-attack/index.ts +552 -0
- package/src/rules/no-timing-attack/no-timing-attack.test.ts +348 -0
- package/src/rules/no-toctou-vulnerability/index.ts +250 -0
- package/src/rules/no-toctou-vulnerability/no-toctou-vulnerability.test.ts +60 -0
- package/src/rules/no-tracking-without-consent/index.ts +78 -0
- package/src/rules/no-tracking-without-consent/no-tracking-without-consent.test.ts +34 -0
- package/src/rules/no-unchecked-loop-condition/index.ts +781 -0
- package/src/rules/no-unchecked-loop-condition/no-unchecked-loop-condition.test.ts +459 -0
- package/src/rules/no-unencrypted-local-storage/index.ts +73 -0
- package/src/rules/no-unencrypted-local-storage/no-unencrypted-local-storage.test.ts +41 -0
- package/src/rules/no-unencrypted-transmission/index.ts +296 -0
- package/src/rules/no-unencrypted-transmission/no-unencrypted-transmission.test.ts +287 -0
- package/src/rules/no-unescaped-url-parameter/index.ts +424 -0
- package/src/rules/no-unescaped-url-parameter/no-unescaped-url-parameter.test.ts +263 -0
- package/src/rules/no-unlimited-resource-allocation/index.ts +767 -0
- package/src/rules/no-unlimited-resource-allocation/no-unlimited-resource-allocation.test.ts +544 -0
- package/src/rules/no-unsafe-deserialization/index.ts +593 -0
- package/src/rules/no-unsafe-deserialization/no-unsafe-deserialization.test.ts +310 -0
- package/src/rules/no-unsafe-dynamic-require/index.ts +125 -0
- package/src/rules/no-unsafe-dynamic-require/no-unsafe-dynamic-require.test.ts +151 -0
- package/src/rules/no-unsafe-regex-construction/index.ts +370 -0
- package/src/rules/no-unsafe-regex-construction/no-unsafe-regex-construction.test.ts +181 -0
- package/src/rules/no-unsanitized-html/index.ts +400 -0
- package/src/rules/no-unsanitized-html/no-unsanitized-html.test.ts +488 -0
- package/src/rules/no-unvalidated-deeplinks/index.ts +73 -0
- package/src/rules/no-unvalidated-deeplinks/no-unvalidated-deeplinks.test.ts +29 -0
- package/src/rules/no-unvalidated-user-input/index.ts +498 -0
- package/src/rules/no-unvalidated-user-input/no-unvalidated-user-input.test.ts +463 -0
- package/src/rules/no-verbose-error-messages/index.ts +83 -0
- package/src/rules/no-verbose-error-messages/no-verbose-error-messages.test.ts +34 -0
- package/src/rules/no-weak-crypto/index.ts +447 -0
- package/src/rules/no-weak-crypto/no-weak-crypto.test.ts +297 -0
- package/src/rules/no-weak-password-recovery/index.ts +509 -0
- package/src/rules/no-weak-password-recovery/no-weak-password-recovery.test.ts +184 -0
- package/src/rules/no-xpath-injection/index.ts +596 -0
- package/src/rules/no-xpath-injection/no-xpath-injection.test.ts +405 -0
- package/src/rules/no-xxe-injection/index.ts +342 -0
- package/src/rules/no-xxe-injection/no-xxe-injection.test.ts +122 -0
- package/src/rules/no-zip-slip/index.ts +526 -0
- package/src/rules/no-zip-slip/no-zip-slip.test.ts +305 -0
- package/src/rules/require-backend-authorization/index.ts +71 -0
- package/src/rules/require-backend-authorization/require-backend-authorization.test.ts +31 -0
- package/src/rules/require-code-minification/index.ts +54 -0
- package/src/rules/require-code-minification/require-code-minification.test.ts +30 -0
- package/src/rules/require-csp-headers/index.ts +74 -0
- package/src/rules/require-csp-headers/require-csp-headers.test.ts +34 -0
- package/src/rules/require-data-minimization/index.ts +65 -0
- package/src/rules/require-data-minimization/require-data-minimization.test.ts +31 -0
- package/src/rules/require-dependency-integrity/index.ts +78 -0
- package/src/rules/require-dependency-integrity/require-dependency-integrity.test.ts +44 -0
- package/src/rules/require-https-only/index.ts +75 -0
- package/src/rules/require-https-only/require-https-only.test.ts +26 -0
- package/src/rules/require-mime-type-validation/index.ts +77 -0
- package/src/rules/require-mime-type-validation/require-mime-type-validation.test.ts +32 -0
- package/src/rules/require-network-timeout/index.ts +58 -0
- package/src/rules/require-network-timeout/require-network-timeout.test.ts +26 -0
- package/src/rules/require-package-lock/index.ts +75 -0
- package/src/rules/require-package-lock/require-package-lock.test.ts +27 -0
- package/src/rules/require-secure-credential-storage/index.ts +60 -0
- package/src/rules/require-secure-credential-storage/require-secure-credential-storage.test.ts +26 -0
- package/src/rules/require-secure-defaults/index.ts +54 -0
- package/src/rules/require-secure-defaults/require-secure-defaults.test.ts +26 -0
- package/src/rules/require-secure-deletion/index.ts +52 -0
- package/src/rules/require-secure-deletion/require-secure-deletion.test.ts +29 -0
- package/src/rules/require-storage-encryption/index.ts +60 -0
- package/src/rules/require-storage-encryption/require-storage-encryption.test.ts +26 -0
- package/src/rules/require-url-validation/index.ts +85 -0
- package/src/rules/require-url-validation/require-url-validation.test.ts +32 -0
- package/src/types/{index.d.ts → index.ts} +157 -53
- package/src/index.d.ts +0 -32
- package/src/index.js +0 -465
- package/src/rules/database-injection/index.d.ts +0 -13
- package/src/rules/database-injection/index.js +0 -406
- package/src/rules/detect-child-process/index.d.ts +0 -11
- package/src/rules/detect-child-process/index.js +0 -529
- package/src/rules/detect-eval-with-expression/index.d.ts +0 -9
- package/src/rules/detect-eval-with-expression/index.js +0 -392
- package/src/rules/detect-mixed-content/index.d.ts +0 -8
- package/src/rules/detect-mixed-content/index.js +0 -44
- package/src/rules/detect-non-literal-fs-filename/index.d.ts +0 -7
- package/src/rules/detect-non-literal-fs-filename/index.js +0 -454
- package/src/rules/detect-non-literal-regexp/index.d.ts +0 -9
- package/src/rules/detect-non-literal-regexp/index.js +0 -403
- package/src/rules/detect-object-injection/index.d.ts +0 -11
- package/src/rules/detect-object-injection/index.js +0 -560
- package/src/rules/detect-suspicious-dependencies/index.d.ts +0 -8
- package/src/rules/detect-suspicious-dependencies/index.js +0 -71
- package/src/rules/detect-weak-password-validation/index.d.ts +0 -6
- package/src/rules/detect-weak-password-validation/index.js +0 -58
- package/src/rules/no-allow-arbitrary-loads/index.d.ts +0 -8
- package/src/rules/no-allow-arbitrary-loads/index.js +0 -47
- package/src/rules/no-arbitrary-file-access/index.d.ts +0 -13
- package/src/rules/no-arbitrary-file-access/index.js +0 -195
- package/src/rules/no-buffer-overread/index.d.ts +0 -29
- package/src/rules/no-buffer-overread/index.js +0 -606
- package/src/rules/no-clickjacking/index.d.ts +0 -10
- package/src/rules/no-clickjacking/index.js +0 -396
- package/src/rules/no-client-side-auth-logic/index.d.ts +0 -6
- package/src/rules/no-client-side-auth-logic/index.js +0 -69
- package/src/rules/no-credentials-in-query-params/index.d.ts +0 -8
- package/src/rules/no-credentials-in-query-params/index.js +0 -57
- package/src/rules/no-credentials-in-storage-api/index.d.ts +0 -6
- package/src/rules/no-credentials-in-storage-api/index.js +0 -54
- package/src/rules/no-data-in-temp-storage/index.d.ts +0 -6
- package/src/rules/no-data-in-temp-storage/index.js +0 -64
- package/src/rules/no-debug-code-in-production/index.d.ts +0 -8
- package/src/rules/no-debug-code-in-production/index.js +0 -51
- package/src/rules/no-directive-injection/index.d.ts +0 -12
- package/src/rules/no-directive-injection/index.js +0 -457
- package/src/rules/no-disabled-certificate-validation/index.d.ts +0 -6
- package/src/rules/no-disabled-certificate-validation/index.js +0 -61
- package/src/rules/no-document-cookie/index.d.ts +0 -5
- package/src/rules/no-document-cookie/index.js +0 -89
- package/src/rules/no-dynamic-dependency-loading/index.d.ts +0 -8
- package/src/rules/no-dynamic-dependency-loading/index.js +0 -51
- package/src/rules/no-electron-security-issues/index.d.ts +0 -10
- package/src/rules/no-electron-security-issues/index.js +0 -423
- package/src/rules/no-exposed-debug-endpoints/index.d.ts +0 -6
- package/src/rules/no-exposed-debug-endpoints/index.js +0 -62
- package/src/rules/no-exposed-sensitive-data/index.d.ts +0 -11
- package/src/rules/no-exposed-sensitive-data/index.js +0 -340
- package/src/rules/no-format-string-injection/index.d.ts +0 -17
- package/src/rules/no-format-string-injection/index.js +0 -660
- package/src/rules/no-graphql-injection/index.d.ts +0 -12
- package/src/rules/no-graphql-injection/index.js +0 -411
- package/src/rules/no-hardcoded-credentials/index.d.ts +0 -26
- package/src/rules/no-hardcoded-credentials/index.js +0 -376
- package/src/rules/no-hardcoded-session-tokens/index.d.ts +0 -6
- package/src/rules/no-hardcoded-session-tokens/index.js +0 -59
- package/src/rules/no-http-urls/index.d.ts +0 -12
- package/src/rules/no-http-urls/index.js +0 -114
- package/src/rules/no-improper-sanitization/index.d.ts +0 -12
- package/src/rules/no-improper-sanitization/index.js +0 -411
- package/src/rules/no-improper-type-validation/index.d.ts +0 -10
- package/src/rules/no-improper-type-validation/index.js +0 -475
- package/src/rules/no-insecure-comparison/index.d.ts +0 -7
- package/src/rules/no-insecure-comparison/index.js +0 -193
- package/src/rules/no-insecure-cookie-settings/index.d.ts +0 -9
- package/src/rules/no-insecure-cookie-settings/index.js +0 -306
- package/src/rules/no-insecure-jwt/index.d.ts +0 -10
- package/src/rules/no-insecure-jwt/index.js +0 -380
- package/src/rules/no-insecure-redirects/index.d.ts +0 -7
- package/src/rules/no-insecure-redirects/index.js +0 -216
- package/src/rules/no-insecure-websocket/index.d.ts +0 -6
- package/src/rules/no-insecure-websocket/index.js +0 -61
- package/src/rules/no-insufficient-postmessage-validation/index.d.ts +0 -14
- package/src/rules/no-insufficient-postmessage-validation/index.js +0 -392
- package/src/rules/no-insufficient-random/index.d.ts +0 -9
- package/src/rules/no-insufficient-random/index.js +0 -208
- package/src/rules/no-ldap-injection/index.d.ts +0 -10
- package/src/rules/no-ldap-injection/index.js +0 -455
- package/src/rules/no-missing-authentication/index.d.ts +0 -13
- package/src/rules/no-missing-authentication/index.js +0 -333
- package/src/rules/no-missing-cors-check/index.d.ts +0 -9
- package/src/rules/no-missing-cors-check/index.js +0 -399
- package/src/rules/no-missing-csrf-protection/index.d.ts +0 -11
- package/src/rules/no-missing-csrf-protection/index.js +0 -180
- package/src/rules/no-missing-security-headers/index.d.ts +0 -7
- package/src/rules/no-missing-security-headers/index.js +0 -218
- package/src/rules/no-password-in-url/index.d.ts +0 -8
- package/src/rules/no-password-in-url/index.js +0 -54
- package/src/rules/no-permissive-cors/index.d.ts +0 -8
- package/src/rules/no-permissive-cors/index.js +0 -65
- package/src/rules/no-pii-in-logs/index.d.ts +0 -8
- package/src/rules/no-pii-in-logs/index.js +0 -70
- package/src/rules/no-postmessage-origin-wildcard/index.d.ts +0 -8
- package/src/rules/no-postmessage-origin-wildcard/index.js +0 -56
- package/src/rules/no-privilege-escalation/index.d.ts +0 -13
- package/src/rules/no-privilege-escalation/index.js +0 -321
- package/src/rules/no-redos-vulnerable-regex/index.d.ts +0 -7
- package/src/rules/no-redos-vulnerable-regex/index.js +0 -306
- package/src/rules/no-sensitive-data-exposure/index.d.ts +0 -11
- package/src/rules/no-sensitive-data-exposure/index.js +0 -250
- package/src/rules/no-sensitive-data-in-analytics/index.d.ts +0 -8
- package/src/rules/no-sensitive-data-in-analytics/index.js +0 -62
- package/src/rules/no-sensitive-data-in-cache/index.d.ts +0 -8
- package/src/rules/no-sensitive-data-in-cache/index.js +0 -52
- package/src/rules/no-sql-injection/index.d.ts +0 -10
- package/src/rules/no-sql-injection/index.js +0 -335
- package/src/rules/no-timing-attack/index.d.ts +0 -10
- package/src/rules/no-timing-attack/index.js +0 -447
- package/src/rules/no-toctou-vulnerability/index.d.ts +0 -7
- package/src/rules/no-toctou-vulnerability/index.js +0 -208
- package/src/rules/no-tracking-without-consent/index.d.ts +0 -6
- package/src/rules/no-tracking-without-consent/index.js +0 -67
- package/src/rules/no-unchecked-loop-condition/index.d.ts +0 -12
- package/src/rules/no-unchecked-loop-condition/index.js +0 -646
- package/src/rules/no-unencrypted-local-storage/index.d.ts +0 -8
- package/src/rules/no-unencrypted-local-storage/index.js +0 -61
- package/src/rules/no-unencrypted-transmission/index.d.ts +0 -11
- package/src/rules/no-unencrypted-transmission/index.js +0 -236
- package/src/rules/no-unescaped-url-parameter/index.d.ts +0 -9
- package/src/rules/no-unescaped-url-parameter/index.js +0 -355
- package/src/rules/no-unlimited-resource-allocation/index.d.ts +0 -12
- package/src/rules/no-unlimited-resource-allocation/index.js +0 -643
- package/src/rules/no-unsafe-deserialization/index.d.ts +0 -10
- package/src/rules/no-unsafe-deserialization/index.js +0 -491
- package/src/rules/no-unsafe-dynamic-require/index.d.ts +0 -5
- package/src/rules/no-unsafe-dynamic-require/index.js +0 -106
- package/src/rules/no-unsafe-regex-construction/index.d.ts +0 -9
- package/src/rules/no-unsafe-regex-construction/index.js +0 -291
- package/src/rules/no-unsanitized-html/index.d.ts +0 -9
- package/src/rules/no-unsanitized-html/index.js +0 -335
- package/src/rules/no-unvalidated-deeplinks/index.d.ts +0 -6
- package/src/rules/no-unvalidated-deeplinks/index.js +0 -62
- package/src/rules/no-unvalidated-user-input/index.d.ts +0 -9
- package/src/rules/no-unvalidated-user-input/index.js +0 -420
- package/src/rules/no-verbose-error-messages/index.d.ts +0 -8
- package/src/rules/no-verbose-error-messages/index.js +0 -68
- package/src/rules/no-weak-crypto/index.d.ts +0 -11
- package/src/rules/no-weak-crypto/index.js +0 -351
- package/src/rules/no-weak-password-recovery/index.d.ts +0 -12
- package/src/rules/no-weak-password-recovery/index.js +0 -424
- package/src/rules/no-xpath-injection/index.d.ts +0 -10
- package/src/rules/no-xpath-injection/index.js +0 -487
- package/src/rules/no-xxe-injection/index.d.ts +0 -7
- package/src/rules/no-xxe-injection/index.js +0 -266
- package/src/rules/no-zip-slip/index.d.ts +0 -9
- package/src/rules/no-zip-slip/index.js +0 -445
- package/src/rules/require-backend-authorization/index.d.ts +0 -6
- package/src/rules/require-backend-authorization/index.js +0 -60
- package/src/rules/require-code-minification/index.d.ts +0 -8
- package/src/rules/require-code-minification/index.js +0 -47
- package/src/rules/require-csp-headers/index.d.ts +0 -6
- package/src/rules/require-csp-headers/index.js +0 -64
- package/src/rules/require-data-minimization/index.d.ts +0 -8
- package/src/rules/require-data-minimization/index.js +0 -53
- package/src/rules/require-dependency-integrity/index.d.ts +0 -6
- package/src/rules/require-dependency-integrity/index.js +0 -64
- package/src/rules/require-https-only/index.d.ts +0 -8
- package/src/rules/require-https-only/index.js +0 -62
- package/src/rules/require-mime-type-validation/index.d.ts +0 -6
- package/src/rules/require-mime-type-validation/index.js +0 -66
- package/src/rules/require-network-timeout/index.d.ts +0 -8
- package/src/rules/require-network-timeout/index.js +0 -50
- package/src/rules/require-package-lock/index.d.ts +0 -8
- package/src/rules/require-package-lock/index.js +0 -63
- package/src/rules/require-secure-credential-storage/index.d.ts +0 -8
- package/src/rules/require-secure-credential-storage/index.js +0 -50
- package/src/rules/require-secure-defaults/index.d.ts +0 -8
- package/src/rules/require-secure-defaults/index.js +0 -47
- package/src/rules/require-secure-deletion/index.d.ts +0 -8
- package/src/rules/require-secure-deletion/index.js +0 -44
- package/src/rules/require-storage-encryption/index.d.ts +0 -8
- package/src/rules/require-storage-encryption/index.js +0 -50
- package/src/rules/require-url-validation/index.d.ts +0 -6
- package/src/rules/require-url-validation/index.js +0 -72
- package/src/types/index.js +0 -17
|
@@ -0,0 +1,259 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Comprehensive tests for no-insecure-jwt rule
|
|
3
|
+
* Security: CWE-347 (JWT Security Vulnerabilities)
|
|
4
|
+
*/
|
|
5
|
+
import { RuleTester } from '@typescript-eslint/rule-tester';
|
|
6
|
+
import { describe, it, afterAll } from 'vitest';
|
|
7
|
+
import parser from '@typescript-eslint/parser';
|
|
8
|
+
import { noInsecureJwt } from './index';
|
|
9
|
+
|
|
10
|
+
// Configure RuleTester for Vitest
|
|
11
|
+
RuleTester.afterAll = afterAll;
|
|
12
|
+
RuleTester.it = it;
|
|
13
|
+
RuleTester.itOnly = it.only;
|
|
14
|
+
RuleTester.describe = describe;
|
|
15
|
+
|
|
16
|
+
// Use Flat Config format (ESLint 9+)
|
|
17
|
+
const ruleTester = new RuleTester({
|
|
18
|
+
languageOptions: {
|
|
19
|
+
parser,
|
|
20
|
+
ecmaVersion: 2022,
|
|
21
|
+
sourceType: 'module',
|
|
22
|
+
},
|
|
23
|
+
});
|
|
24
|
+
|
|
25
|
+
describe('no-insecure-jwt', () => {
|
|
26
|
+
describe('Valid Code', () => {
|
|
27
|
+
ruleTester.run('valid - secure JWT operations', noInsecureJwt, {
|
|
28
|
+
valid: [
|
|
29
|
+
// Secure JWT verification
|
|
30
|
+
{
|
|
31
|
+
code: 'jwt.verify(token, publicKey, { algorithms: ["RS256"] });',
|
|
32
|
+
},
|
|
33
|
+
{
|
|
34
|
+
code: 'jwt.verify(token, secret, { algorithms: ["HS256"] });',
|
|
35
|
+
},
|
|
36
|
+
// Using jose library
|
|
37
|
+
{
|
|
38
|
+
code: 'const payload = await jwtVerify(token, publicKey);',
|
|
39
|
+
},
|
|
40
|
+
// Strong secrets
|
|
41
|
+
{
|
|
42
|
+
code: 'jwt.sign(payload, crypto.randomBytes(32).toString("hex"));',
|
|
43
|
+
},
|
|
44
|
+
// Literal JWT strings (not flagged as they might be test data)
|
|
45
|
+
{
|
|
46
|
+
code: '// eslint-disable-next-line\nconst testToken = "eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWV9.TJVA95OrM7E2cBab30RMHrHDcEfxjoYZgeFONFh7HgQ";',
|
|
47
|
+
},
|
|
48
|
+
// Non-JWT libraries
|
|
49
|
+
{
|
|
50
|
+
code: 'const token = crypto.randomBytes(32);',
|
|
51
|
+
},
|
|
52
|
+
],
|
|
53
|
+
invalid: [],
|
|
54
|
+
});
|
|
55
|
+
});
|
|
56
|
+
|
|
57
|
+
describe('Invalid Code - Algorithm Confusion', () => {
|
|
58
|
+
ruleTester.run('invalid - algorithm confusion attacks', noInsecureJwt, {
|
|
59
|
+
valid: [],
|
|
60
|
+
invalid: [
|
|
61
|
+
// String literal algorithm spec triggers detection
|
|
62
|
+
{
|
|
63
|
+
code: 'jwt.verify(token, "secret", { alg: "none" });',
|
|
64
|
+
errors: [
|
|
65
|
+
{
|
|
66
|
+
messageId: 'insecureJwtAlgorithm',
|
|
67
|
+
},
|
|
68
|
+
],
|
|
69
|
+
},
|
|
70
|
+
],
|
|
71
|
+
});
|
|
72
|
+
});
|
|
73
|
+
|
|
74
|
+
describe('Invalid Code - Missing Signature Verification', () => {
|
|
75
|
+
ruleTester.run('invalid - missing signature verification', noInsecureJwt, {
|
|
76
|
+
valid: [],
|
|
77
|
+
invalid: [
|
|
78
|
+
{
|
|
79
|
+
code: 'const payload = jwt.decode(token);',
|
|
80
|
+
errors: [
|
|
81
|
+
{
|
|
82
|
+
messageId: 'jwtWithoutValidation',
|
|
83
|
+
},
|
|
84
|
+
{
|
|
85
|
+
messageId: 'missingSignatureVerification',
|
|
86
|
+
},
|
|
87
|
+
],
|
|
88
|
+
},
|
|
89
|
+
{
|
|
90
|
+
code: 'const decoded = jwt.decode(token, { complete: true });',
|
|
91
|
+
errors: [
|
|
92
|
+
{
|
|
93
|
+
messageId: 'jwtWithoutValidation',
|
|
94
|
+
},
|
|
95
|
+
{
|
|
96
|
+
messageId: 'missingSignatureVerification',
|
|
97
|
+
},
|
|
98
|
+
],
|
|
99
|
+
},
|
|
100
|
+
{
|
|
101
|
+
code: 'const user = jwt.decode(authToken);',
|
|
102
|
+
errors: [
|
|
103
|
+
{
|
|
104
|
+
messageId: 'jwtWithoutValidation',
|
|
105
|
+
},
|
|
106
|
+
{
|
|
107
|
+
messageId: 'missingSignatureVerification',
|
|
108
|
+
},
|
|
109
|
+
],
|
|
110
|
+
},
|
|
111
|
+
],
|
|
112
|
+
});
|
|
113
|
+
});
|
|
114
|
+
|
|
115
|
+
describe('Invalid Code - Weak Secrets', () => {
|
|
116
|
+
ruleTester.run('invalid - weak JWT secrets with weak algorithms', noInsecureJwt, {
|
|
117
|
+
valid: [
|
|
118
|
+
// Weak secrets without algorithm spec are not flagged
|
|
119
|
+
{
|
|
120
|
+
code: 'jwt.sign(payload, "weak");',
|
|
121
|
+
},
|
|
122
|
+
// Strong secret with weak algorithm is OK
|
|
123
|
+
{
|
|
124
|
+
code: 'jwt.sign(payload, "ThisIsAVeryLongSecretThatIsDefinitelyLongerThan32Characters", { algorithms: ["HS256"] });',
|
|
125
|
+
},
|
|
126
|
+
],
|
|
127
|
+
invalid: [
|
|
128
|
+
// Weak algorithm (HS256) with weak (short) secret - triggers weakJwtSecret
|
|
129
|
+
{
|
|
130
|
+
code: 'jwt.verify(token, "weak", { alg: "HS256" });',
|
|
131
|
+
errors: [{ messageId: 'weakJwtSecret' }],
|
|
132
|
+
},
|
|
133
|
+
// Weak algorithm with short secret
|
|
134
|
+
{
|
|
135
|
+
code: 'jwt.sign(payload, "short", { algorithm: "HS384" });',
|
|
136
|
+
errors: [{ messageId: 'weakJwtSecret' }],
|
|
137
|
+
},
|
|
138
|
+
],
|
|
139
|
+
});
|
|
140
|
+
});
|
|
141
|
+
|
|
142
|
+
describe('Invalid Code - JWT Without Validation', () => {
|
|
143
|
+
ruleTester.run('invalid - JWT used without validation', noInsecureJwt, {
|
|
144
|
+
valid: [],
|
|
145
|
+
invalid: [
|
|
146
|
+
{
|
|
147
|
+
code: 'const payload = jwt.decode(token); const userId = payload.userId;',
|
|
148
|
+
errors: [
|
|
149
|
+
{
|
|
150
|
+
messageId: 'jwtWithoutValidation',
|
|
151
|
+
},
|
|
152
|
+
{
|
|
153
|
+
messageId: 'missingSignatureVerification',
|
|
154
|
+
},
|
|
155
|
+
],
|
|
156
|
+
},
|
|
157
|
+
{
|
|
158
|
+
code: 'const decoded = jwt.decode(authToken); if (decoded.exp < Date.now()) { /* use decoded */ }',
|
|
159
|
+
errors: [
|
|
160
|
+
{
|
|
161
|
+
messageId: 'jwtWithoutValidation',
|
|
162
|
+
},
|
|
163
|
+
{
|
|
164
|
+
messageId: 'missingSignatureVerification',
|
|
165
|
+
},
|
|
166
|
+
],
|
|
167
|
+
},
|
|
168
|
+
],
|
|
169
|
+
});
|
|
170
|
+
});
|
|
171
|
+
|
|
172
|
+
|
|
173
|
+
describe('Valid Code - False Positives Reduced', () => {
|
|
174
|
+
ruleTester.run('valid - false positives reduced', noInsecureJwt, {
|
|
175
|
+
valid: [
|
|
176
|
+
// Safe annotations suppress warnings
|
|
177
|
+
{
|
|
178
|
+
code: `
|
|
179
|
+
/** @verified */
|
|
180
|
+
const payload = jwt.decode(token);
|
|
181
|
+
`,
|
|
182
|
+
},
|
|
183
|
+
{
|
|
184
|
+
code: `
|
|
185
|
+
// @safe
|
|
186
|
+
const decoded = jwt.decode(authToken);
|
|
187
|
+
`,
|
|
188
|
+
},
|
|
189
|
+
// Strong secrets (no algorithm spec, so not flagged)
|
|
190
|
+
{
|
|
191
|
+
code: 'jwt.sign(payload, crypto.randomBytes(32).toString("hex"));',
|
|
192
|
+
},
|
|
193
|
+
{
|
|
194
|
+
code: 'jwt.sign(payload, "ThisIsAVeryLongSecretThatIsDefinitelyLongerThan32Characters");',
|
|
195
|
+
},
|
|
196
|
+
],
|
|
197
|
+
invalid: [],
|
|
198
|
+
});
|
|
199
|
+
});
|
|
200
|
+
|
|
201
|
+
describe('Invalid Code - Unsafe JWT Parsing', () => {
|
|
202
|
+
ruleTester.run('invalid - unsafe JWT string usage', noInsecureJwt, {
|
|
203
|
+
valid: [
|
|
204
|
+
// Hardcoded JWT but verified (inline)
|
|
205
|
+
{
|
|
206
|
+
code: `
|
|
207
|
+
jwt.verify("eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWV9.TJVA95OrM7E2cBab30RMHrHDcEfxjoYZgeFONFh7HgQ", secret);
|
|
208
|
+
`,
|
|
209
|
+
},
|
|
210
|
+
// Not a JWT (not 3 parts)
|
|
211
|
+
{
|
|
212
|
+
code: 'const token = "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWV9";',
|
|
213
|
+
},
|
|
214
|
+
],
|
|
215
|
+
invalid: [
|
|
216
|
+
// Hardcoded JWT used without verification context
|
|
217
|
+
{
|
|
218
|
+
code: 'const token = "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWV9.TJVA95OrM7E2cBab30RMHrHDcEfxjoYZgeFONFh7HgQ"; console.log(token);',
|
|
219
|
+
errors: [{ messageId: 'unsafeJwtParsing' }],
|
|
220
|
+
},
|
|
221
|
+
],
|
|
222
|
+
});
|
|
223
|
+
});
|
|
224
|
+
|
|
225
|
+
describe('Configuration Options', () => {
|
|
226
|
+
// Note: allowedInsecureAlgorithms option not fully implemented in rule
|
|
227
|
+
|
|
228
|
+
ruleTester.run('config - custom min secret length', noInsecureJwt, {
|
|
229
|
+
valid: [
|
|
230
|
+
// Secret length not checked without algorithm spec
|
|
231
|
+
{
|
|
232
|
+
code: 'jwt.sign(payload, "ThisIs16Chars");',
|
|
233
|
+
options: [{ minSecretLength: 16 }],
|
|
234
|
+
},
|
|
235
|
+
// Short secret without algorithm spec is valid
|
|
236
|
+
{
|
|
237
|
+
code: 'jwt.sign(payload, "short");',
|
|
238
|
+
options: [{ minSecretLength: 16 }],
|
|
239
|
+
},
|
|
240
|
+
],
|
|
241
|
+
invalid: [],
|
|
242
|
+
});
|
|
243
|
+
|
|
244
|
+
ruleTester.run('config - custom trusted libraries', noInsecureJwt, {
|
|
245
|
+
valid: [
|
|
246
|
+
// Custom trusted library
|
|
247
|
+
{
|
|
248
|
+
code: 'myJwt.verify(token, secret);',
|
|
249
|
+
options: [{ trustedJwtLibraries: ['myJwt'] }],
|
|
250
|
+
},
|
|
251
|
+
// Unknown library isn't flagged (rule only checks trusted libraries)
|
|
252
|
+
{
|
|
253
|
+
code: 'unknownJwt.verify(token, secret);',
|
|
254
|
+
},
|
|
255
|
+
],
|
|
256
|
+
invalid: [],
|
|
257
|
+
});
|
|
258
|
+
});
|
|
259
|
+
});
|
|
@@ -0,0 +1,267 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* ESLint Rule: no-insecure-redirects
|
|
3
|
+
* Detects open redirect vulnerabilities
|
|
4
|
+
* CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
|
|
5
|
+
*
|
|
6
|
+
* @see https://cwe.mitre.org/data/definitions/601.html
|
|
7
|
+
* @see https://owasp.org/www-community/vulnerabilities/Unvalidated_Redirects_and_Forwards
|
|
8
|
+
*/
|
|
9
|
+
import type { TSESLint, TSESTree } from '@interlace/eslint-devkit';
|
|
10
|
+
import { formatLLMMessage, MessageIcons } from '@interlace/eslint-devkit';
|
|
11
|
+
import { createRule } from '@interlace/eslint-devkit';
|
|
12
|
+
|
|
13
|
+
type MessageIds =
|
|
14
|
+
| 'insecureRedirect'
|
|
15
|
+
| 'whitelistDomains'
|
|
16
|
+
| 'validateRedirect'
|
|
17
|
+
| 'useRelativeUrl';
|
|
18
|
+
|
|
19
|
+
export interface Options {
|
|
20
|
+
/** Ignore in test files. Default: true */
|
|
21
|
+
ignoreInTests?: boolean;
|
|
22
|
+
|
|
23
|
+
/** Allowed redirect domains. Default: [] */
|
|
24
|
+
allowedDomains?: string[];
|
|
25
|
+
}
|
|
26
|
+
|
|
27
|
+
type RuleOptions = [Options?];
|
|
28
|
+
|
|
29
|
+
/**
|
|
30
|
+
* Check if redirect URL is validated
|
|
31
|
+
*/
|
|
32
|
+
function isRedirectValidated(
|
|
33
|
+
node: TSESTree.CallExpression,
|
|
34
|
+
sourceCode: TSESLint.SourceCode
|
|
35
|
+
): boolean {
|
|
36
|
+
const callText = sourceCode.getText(node);
|
|
37
|
+
|
|
38
|
+
// Check if URL is from user input (req.query, req.body, req.params)
|
|
39
|
+
const userInputPattern = /\b(req\.(query|body|params)|window\.location|document\.location)\b/;
|
|
40
|
+
|
|
41
|
+
if (!userInputPattern.test(callText)) {
|
|
42
|
+
// Not from user input, assume safe
|
|
43
|
+
return true;
|
|
44
|
+
}
|
|
45
|
+
|
|
46
|
+
// Look for validation patterns in the surrounding code
|
|
47
|
+
// This is a simplified static analysis - in practice, would need data flow analysis
|
|
48
|
+
|
|
49
|
+
const program = sourceCode.ast;
|
|
50
|
+
const nodeStart = node.loc?.start;
|
|
51
|
+
const nodeEnd = node.loc?.end;
|
|
52
|
+
|
|
53
|
+
/* c8 ignore start -- Guard clause: loc is always present in RuleTester */
|
|
54
|
+
if (!nodeStart || !nodeEnd || !program) {
|
|
55
|
+
return false;
|
|
56
|
+
}
|
|
57
|
+
/* c8 ignore stop */
|
|
58
|
+
|
|
59
|
+
// Check for validation function calls before this redirect
|
|
60
|
+
const validationPatterns = [
|
|
61
|
+
/\b(validateUrl|validateRedirect|isValidUrl|isSafeUrl)\s*\(/,
|
|
62
|
+
/\b(whitelist|allowedDomains|permittedUrls)\s*\./,
|
|
63
|
+
/\b(url\.hostname|url\.host)\s*===/,
|
|
64
|
+
/\ballowedDomains\.includes\s*\(/,
|
|
65
|
+
/\bstartsWith\s*\(\s*['"]/,
|
|
66
|
+
/\bendsWith\s*\(\s*['"]/,
|
|
67
|
+
/\bindexOf\s*\(\s*['"]/,
|
|
68
|
+
/\bmatch\s*\(\s*\//,
|
|
69
|
+
];
|
|
70
|
+
|
|
71
|
+
// Look for validation in the same function scope
|
|
72
|
+
let current: TSESTree.Node | null = node;
|
|
73
|
+
let depth = 0;
|
|
74
|
+
const maxDepth = 20;
|
|
75
|
+
|
|
76
|
+
while (current && depth < maxDepth) {
|
|
77
|
+
// Check siblings before this node
|
|
78
|
+
const parent: TSESTree.Node | undefined = (current as TSESTree.Node & { parent?: TSESTree.Node }).parent;
|
|
79
|
+
if (!parent) break;
|
|
80
|
+
|
|
81
|
+
if (parent.type === 'BlockStatement') {
|
|
82
|
+
const body = parent.body;
|
|
83
|
+
const currentIndex = body.indexOf(current as TSESTree.Statement);
|
|
84
|
+
|
|
85
|
+
// Check previous statements in the same block
|
|
86
|
+
for (let i = currentIndex - 1; i >= 0 && i >= currentIndex - 5; i--) {
|
|
87
|
+
const stmt = body[i];
|
|
88
|
+
const stmtText = sourceCode.getText(stmt);
|
|
89
|
+
|
|
90
|
+
if (validationPatterns.some(pattern => pattern.test(stmtText))) {
|
|
91
|
+
return true; // Found validation
|
|
92
|
+
}
|
|
93
|
+
}
|
|
94
|
+
}
|
|
95
|
+
|
|
96
|
+
current = parent;
|
|
97
|
+
depth++;
|
|
98
|
+
}
|
|
99
|
+
|
|
100
|
+
// No validation found
|
|
101
|
+
return false;
|
|
102
|
+
}
|
|
103
|
+
|
|
104
|
+
export const noInsecureRedirects = createRule<RuleOptions, MessageIds>({
|
|
105
|
+
name: 'no-insecure-redirects',
|
|
106
|
+
meta: {
|
|
107
|
+
type: 'problem',
|
|
108
|
+
docs: {
|
|
109
|
+
description: 'Detects open redirect vulnerabilities',
|
|
110
|
+
},
|
|
111
|
+
hasSuggestions: true,
|
|
112
|
+
messages: {
|
|
113
|
+
insecureRedirect: formatLLMMessage({
|
|
114
|
+
icon: MessageIcons.SECURITY,
|
|
115
|
+
issueName: 'Open redirect',
|
|
116
|
+
cwe: 'CWE-601',
|
|
117
|
+
description: 'Unvalidated redirect detected - user-controlled URL',
|
|
118
|
+
severity: 'HIGH',
|
|
119
|
+
fix: 'Whitelist allowed domains or validate redirect target',
|
|
120
|
+
documentationLink: 'https://owasp.org/www-community/vulnerabilities/Unvalidated_Redirects_and_Forwards',
|
|
121
|
+
}),
|
|
122
|
+
whitelistDomains: formatLLMMessage({
|
|
123
|
+
icon: MessageIcons.INFO,
|
|
124
|
+
issueName: 'Whitelist Domains',
|
|
125
|
+
description: 'Whitelist allowed redirect domains',
|
|
126
|
+
severity: 'LOW',
|
|
127
|
+
fix: 'if (allowedDomains.includes(url.hostname)) redirect(url)',
|
|
128
|
+
documentationLink: 'https://owasp.org/www-community/vulnerabilities/Unvalidated_Redirects_and_Forwards',
|
|
129
|
+
}),
|
|
130
|
+
validateRedirect: formatLLMMessage({
|
|
131
|
+
icon: MessageIcons.INFO,
|
|
132
|
+
issueName: 'Validate Redirect',
|
|
133
|
+
description: 'Validate redirect URL before use',
|
|
134
|
+
severity: 'LOW',
|
|
135
|
+
fix: 'validateRedirectUrl(userInput) before redirect',
|
|
136
|
+
documentationLink: 'https://owasp.org/www-community/vulnerabilities/Unvalidated_Redirects_and_Forwards',
|
|
137
|
+
}),
|
|
138
|
+
useRelativeUrl: formatLLMMessage({
|
|
139
|
+
icon: MessageIcons.INFO,
|
|
140
|
+
issueName: 'Use Relative URL',
|
|
141
|
+
description: 'Use relative URLs for internal redirects',
|
|
142
|
+
severity: 'LOW',
|
|
143
|
+
fix: 'redirect("/internal/path") instead of absolute URLs',
|
|
144
|
+
documentationLink: 'https://owasp.org/www-community/vulnerabilities/Unvalidated_Redirects_and_Forwards',
|
|
145
|
+
}),
|
|
146
|
+
},
|
|
147
|
+
schema: [
|
|
148
|
+
{
|
|
149
|
+
type: 'object',
|
|
150
|
+
properties: {
|
|
151
|
+
ignoreInTests: {
|
|
152
|
+
type: 'boolean',
|
|
153
|
+
default: true,
|
|
154
|
+
},
|
|
155
|
+
allowedDomains: {
|
|
156
|
+
type: 'array',
|
|
157
|
+
items: { type: 'string' },
|
|
158
|
+
default: [],
|
|
159
|
+
},
|
|
160
|
+
},
|
|
161
|
+
additionalProperties: false,
|
|
162
|
+
},
|
|
163
|
+
],
|
|
164
|
+
},
|
|
165
|
+
defaultOptions: [
|
|
166
|
+
{
|
|
167
|
+
ignoreInTests: true,
|
|
168
|
+
allowedDomains: [],
|
|
169
|
+
},
|
|
170
|
+
],
|
|
171
|
+
create(context: TSESLint.RuleContext<MessageIds, RuleOptions>, [options = {}]) {
|
|
172
|
+
const {
|
|
173
|
+
ignoreInTests = true
|
|
174
|
+
}: Options = options || {};
|
|
175
|
+
|
|
176
|
+
const filename = context.getFilename();
|
|
177
|
+
const isTestFile = ignoreInTests && /\.(test|spec)\.(ts|tsx|js|jsx)$/.test(filename);
|
|
178
|
+
|
|
179
|
+
if (isTestFile) {
|
|
180
|
+
return {};
|
|
181
|
+
}
|
|
182
|
+
|
|
183
|
+
const sourceCode = context.sourceCode || context.sourceCode;
|
|
184
|
+
|
|
185
|
+
/**
|
|
186
|
+
* Check redirect calls and assignments
|
|
187
|
+
*/
|
|
188
|
+
function checkCallExpression(node: TSESTree.CallExpression) {
|
|
189
|
+
// Check for res.redirect, window.location, etc.
|
|
190
|
+
if (node.callee.type === 'MemberExpression' &&
|
|
191
|
+
node.callee.property.type === 'Identifier') {
|
|
192
|
+
const methodName = node.callee.property.name;
|
|
193
|
+
|
|
194
|
+
if (['redirect', 'replace', 'assign'].includes(methodName)) {
|
|
195
|
+
// Check if redirect URL is validated
|
|
196
|
+
if (!isRedirectValidated(node, sourceCode)) {
|
|
197
|
+
context.report({
|
|
198
|
+
node,
|
|
199
|
+
messageId: 'insecureRedirect',
|
|
200
|
+
suggest: [
|
|
201
|
+
{
|
|
202
|
+
messageId: 'whitelistDomains',
|
|
203
|
+
fix: () => null,
|
|
204
|
+
},
|
|
205
|
+
{
|
|
206
|
+
messageId: 'validateRedirect',
|
|
207
|
+
fix: () => null,
|
|
208
|
+
},
|
|
209
|
+
{
|
|
210
|
+
messageId: 'useRelativeUrl',
|
|
211
|
+
fix: () => null,
|
|
212
|
+
},
|
|
213
|
+
],
|
|
214
|
+
});
|
|
215
|
+
}
|
|
216
|
+
}
|
|
217
|
+
}
|
|
218
|
+
}
|
|
219
|
+
|
|
220
|
+
/**
|
|
221
|
+
* Check assignment expressions like window.location.href = ...
|
|
222
|
+
*/
|
|
223
|
+
function checkAssignmentExpression(node: TSESTree.AssignmentExpression) {
|
|
224
|
+
// Check for window.location.href assignments
|
|
225
|
+
if (node.left.type === 'MemberExpression' &&
|
|
226
|
+
node.left.object.type === 'MemberExpression' &&
|
|
227
|
+
node.left.object.object.type === 'Identifier' &&
|
|
228
|
+
node.left.object.object.name === 'window' &&
|
|
229
|
+
node.left.object.property.type === 'Identifier' &&
|
|
230
|
+
node.left.object.property.name === 'location' &&
|
|
231
|
+
node.left.property.type === 'Identifier' &&
|
|
232
|
+
['href', 'replace', 'assign'].includes(node.left.property.name)) {
|
|
233
|
+
|
|
234
|
+
// Check if assignment value comes from user input
|
|
235
|
+
const rightText = sourceCode.getText(node.right);
|
|
236
|
+
const userInputPattern = /\b(req\.(query|body|params)|window\.location|document\.location)\b/;
|
|
237
|
+
|
|
238
|
+
if (userInputPattern.test(rightText)) {
|
|
239
|
+
context.report({
|
|
240
|
+
node,
|
|
241
|
+
messageId: 'insecureRedirect',
|
|
242
|
+
suggest: [
|
|
243
|
+
{
|
|
244
|
+
messageId: 'whitelistDomains',
|
|
245
|
+
fix: () => null,
|
|
246
|
+
},
|
|
247
|
+
{
|
|
248
|
+
messageId: 'validateRedirect',
|
|
249
|
+
fix: () => null,
|
|
250
|
+
},
|
|
251
|
+
{
|
|
252
|
+
messageId: 'useRelativeUrl',
|
|
253
|
+
fix: () => null,
|
|
254
|
+
},
|
|
255
|
+
],
|
|
256
|
+
});
|
|
257
|
+
}
|
|
258
|
+
}
|
|
259
|
+
}
|
|
260
|
+
|
|
261
|
+
return {
|
|
262
|
+
CallExpression: checkCallExpression,
|
|
263
|
+
AssignmentExpression: checkAssignmentExpression,
|
|
264
|
+
};
|
|
265
|
+
},
|
|
266
|
+
});
|
|
267
|
+
|
|
@@ -0,0 +1,108 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Comprehensive tests for no-insecure-redirects rule
|
|
3
|
+
* Security: CWE-601 - Detects open redirect vulnerabilities
|
|
4
|
+
*/
|
|
5
|
+
import { RuleTester } from '@typescript-eslint/rule-tester';
|
|
6
|
+
import { describe, it, afterAll } from 'vitest';
|
|
7
|
+
import parser from '@typescript-eslint/parser';
|
|
8
|
+
import { noInsecureRedirects } from './index';
|
|
9
|
+
|
|
10
|
+
RuleTester.afterAll = afterAll;
|
|
11
|
+
RuleTester.it = it;
|
|
12
|
+
RuleTester.itOnly = it.only;
|
|
13
|
+
RuleTester.describe = describe;
|
|
14
|
+
|
|
15
|
+
const ruleTester = new RuleTester({
|
|
16
|
+
languageOptions: {
|
|
17
|
+
parser,
|
|
18
|
+
ecmaVersion: 2022,
|
|
19
|
+
sourceType: 'module',
|
|
20
|
+
},
|
|
21
|
+
});
|
|
22
|
+
|
|
23
|
+
describe('no-insecure-redirects', () => {
|
|
24
|
+
describe('Valid Code', () => {
|
|
25
|
+
ruleTester.run('valid - validated redirects', noInsecureRedirects, {
|
|
26
|
+
valid: [
|
|
27
|
+
// Relative redirects
|
|
28
|
+
{ code: 'res.redirect("/dashboard");' },
|
|
29
|
+
{ code: 'res.redirect("../home");' },
|
|
30
|
+
// Test files (if ignoreInTests is true)
|
|
31
|
+
{
|
|
32
|
+
code: 'res.redirect(req.query.url);',
|
|
33
|
+
filename: 'test.spec.ts',
|
|
34
|
+
options: [{ ignoreInTests: true }],
|
|
35
|
+
},
|
|
36
|
+
// Validated with validateUrl
|
|
37
|
+
{
|
|
38
|
+
code: `
|
|
39
|
+
const url = req.query.url;
|
|
40
|
+
validateUrl(url);
|
|
41
|
+
res.redirect(url);
|
|
42
|
+
`,
|
|
43
|
+
},
|
|
44
|
+
// Validated with isValidUrl
|
|
45
|
+
{
|
|
46
|
+
code: `
|
|
47
|
+
const redirect = req.query.redirect;
|
|
48
|
+
if (isValidUrl(redirect)) {
|
|
49
|
+
res.redirect(redirect);
|
|
50
|
+
}
|
|
51
|
+
`,
|
|
52
|
+
},
|
|
53
|
+
// Validated with allowedDomains check
|
|
54
|
+
{
|
|
55
|
+
code: `
|
|
56
|
+
const target = req.body.target;
|
|
57
|
+
if (allowedDomains.includes(target)) {
|
|
58
|
+
res.redirect(target);
|
|
59
|
+
}
|
|
60
|
+
`,
|
|
61
|
+
},
|
|
62
|
+
// Validated with startsWith check
|
|
63
|
+
{
|
|
64
|
+
code: `
|
|
65
|
+
const url = req.params.url;
|
|
66
|
+
url.startsWith('https://');
|
|
67
|
+
res.redirect(url);
|
|
68
|
+
`,
|
|
69
|
+
},
|
|
70
|
+
],
|
|
71
|
+
invalid: [],
|
|
72
|
+
});
|
|
73
|
+
});
|
|
74
|
+
|
|
75
|
+
describe('Invalid Code - Insecure Redirects', () => {
|
|
76
|
+
ruleTester.run('invalid - unvalidated redirects', noInsecureRedirects, {
|
|
77
|
+
valid: [],
|
|
78
|
+
invalid: [
|
|
79
|
+
{ code: 'res.redirect(req.query.url);', errors: [{ messageId: 'insecureRedirect' }] },
|
|
80
|
+
{ code: 'res.redirect(req.body.redirectUrl);', errors: [{ messageId: 'insecureRedirect' }] },
|
|
81
|
+
{ code: 'window.location.href = req.params.url;', errors: [{ messageId: 'insecureRedirect' }] },
|
|
82
|
+
// Using location.replace
|
|
83
|
+
{ code: 'location.replace(req.query.url);', errors: [{ messageId: 'insecureRedirect' }] },
|
|
84
|
+
{ code: 'location.assign(req.body.next);', errors: [{ messageId: 'insecureRedirect' }] },
|
|
85
|
+
],
|
|
86
|
+
});
|
|
87
|
+
});
|
|
88
|
+
|
|
89
|
+
describe('Options', () => {
|
|
90
|
+
ruleTester.run('options - ignoreInTests', noInsecureRedirects, {
|
|
91
|
+
valid: [
|
|
92
|
+
{
|
|
93
|
+
code: 'res.redirect(req.query.url);',
|
|
94
|
+
filename: 'test.spec.ts',
|
|
95
|
+
options: [{ ignoreInTests: true }],
|
|
96
|
+
},
|
|
97
|
+
],
|
|
98
|
+
invalid: [
|
|
99
|
+
{
|
|
100
|
+
code: 'res.redirect(req.query.url);',
|
|
101
|
+
filename: 'test.spec.ts',
|
|
102
|
+
options: [{ ignoreInTests: false }],
|
|
103
|
+
errors: [{ messageId: 'insecureRedirect' }],
|
|
104
|
+
},
|
|
105
|
+
],
|
|
106
|
+
});
|
|
107
|
+
});
|
|
108
|
+
});
|
|
@@ -0,0 +1,72 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* @fileoverview Require secure WebSocket connections (wss://)
|
|
3
|
+
*/
|
|
4
|
+
|
|
5
|
+
import { createRule, formatLLMMessage, MessageIcons } from '@interlace/eslint-devkit';
|
|
6
|
+
import type { TSESTree } from '@interlace/eslint-devkit';
|
|
7
|
+
|
|
8
|
+
type MessageIds = 'violationDetected';
|
|
9
|
+
|
|
10
|
+
// eslint-disable-next-line @typescript-eslint/no-empty-object-type, @typescript-eslint/no-empty-interface -- Rule has no configurable options
|
|
11
|
+
export interface Options {}
|
|
12
|
+
|
|
13
|
+
type RuleOptions = [Options?];
|
|
14
|
+
|
|
15
|
+
export const noInsecureWebsocket = createRule<RuleOptions, MessageIds>({
|
|
16
|
+
name: 'no-insecure-websocket',
|
|
17
|
+
meta: {
|
|
18
|
+
type: 'problem',
|
|
19
|
+
docs: {
|
|
20
|
+
description: 'Require secure WebSocket connections (wss://)',
|
|
21
|
+
},
|
|
22
|
+
messages: {
|
|
23
|
+
violationDetected: formatLLMMessage({
|
|
24
|
+
icon: MessageIcons.SECURITY,
|
|
25
|
+
issueName: 'Insecure WebSocket',
|
|
26
|
+
cwe: 'CWE-319',
|
|
27
|
+
description: 'Insecure WebSocket connection (ws://) - data transmitted in clear text',
|
|
28
|
+
severity: 'HIGH',
|
|
29
|
+
fix: 'Use wss:// instead of ws:// for secure WebSocket connections',
|
|
30
|
+
documentationLink: 'https://cwe.mitre.org/data/definitions/319.html',
|
|
31
|
+
})
|
|
32
|
+
},
|
|
33
|
+
schema: [],
|
|
34
|
+
},
|
|
35
|
+
defaultOptions: [],
|
|
36
|
+
create(context) {
|
|
37
|
+
function report(node: TSESTree.Node) {
|
|
38
|
+
context.report({ node, messageId: 'violationDetected' });
|
|
39
|
+
}
|
|
40
|
+
|
|
41
|
+
return {
|
|
42
|
+
NewExpression(node: TSESTree.NewExpression) {
|
|
43
|
+
// Check for new WebSocket('ws://...')
|
|
44
|
+
if (node.callee.type === 'Identifier' && node.callee.name === 'WebSocket') {
|
|
45
|
+
const urlArg = node.arguments[0];
|
|
46
|
+
|
|
47
|
+
// Check literal string
|
|
48
|
+
if (urlArg && urlArg.type === 'Literal' &&
|
|
49
|
+
typeof urlArg.value === 'string' &&
|
|
50
|
+
urlArg.value.startsWith('ws://')) {
|
|
51
|
+
report(node);
|
|
52
|
+
}
|
|
53
|
+
|
|
54
|
+
// Check template literal
|
|
55
|
+
if (urlArg && urlArg.type === 'TemplateLiteral') {
|
|
56
|
+
const text = context.sourceCode.getText(urlArg);
|
|
57
|
+
if (text.includes('ws://')) {
|
|
58
|
+
report(node);
|
|
59
|
+
}
|
|
60
|
+
}
|
|
61
|
+
}
|
|
62
|
+
},
|
|
63
|
+
|
|
64
|
+
Literal(node: TSESTree.Literal) {
|
|
65
|
+
// Check for ws:// URLs in string literals
|
|
66
|
+
if (typeof node.value === 'string' && node.value.startsWith('ws://')) {
|
|
67
|
+
report(node);
|
|
68
|
+
}
|
|
69
|
+
},
|
|
70
|
+
};
|
|
71
|
+
},
|
|
72
|
+
});
|