eslint-plugin-secure-coding 2.3.2 → 2.3.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (361) hide show
  1. package/README.md +1 -0
  2. package/package.json +3 -10
  3. package/src/index.ts +605 -0
  4. package/src/rules/__tests__/integration-demo.test.ts +290 -0
  5. package/src/rules/__tests__/integration-llm.test.ts +89 -0
  6. package/src/rules/database-injection/database-injection.test.ts +456 -0
  7. package/src/rules/database-injection/index.ts +488 -0
  8. package/src/rules/detect-child-process/detect-child-process.test.ts +207 -0
  9. package/src/rules/detect-child-process/index.ts +634 -0
  10. package/src/rules/detect-eval-with-expression/detect-eval-with-expression.test.ts +416 -0
  11. package/src/rules/detect-eval-with-expression/index.ts +463 -0
  12. package/src/rules/detect-mixed-content/detect-mixed-content.test.ts +28 -0
  13. package/src/rules/detect-mixed-content/index.ts +52 -0
  14. package/src/rules/detect-non-literal-fs-filename/detect-non-literal-fs-filename.test.ts +269 -0
  15. package/src/rules/detect-non-literal-fs-filename/index.ts +551 -0
  16. package/src/rules/detect-non-literal-regexp/detect-non-literal-regexp.test.ts +189 -0
  17. package/src/rules/detect-non-literal-regexp/index.ts +490 -0
  18. package/src/rules/detect-object-injection/detect-object-injection.test.ts +440 -0
  19. package/src/rules/detect-object-injection/index.ts +674 -0
  20. package/src/rules/detect-suspicious-dependencies/detect-suspicious-dependencies.test.ts +32 -0
  21. package/src/rules/detect-suspicious-dependencies/index.ts +84 -0
  22. package/src/rules/detect-weak-password-validation/detect-weak-password-validation.test.ts +31 -0
  23. package/src/rules/detect-weak-password-validation/index.ts +68 -0
  24. package/src/rules/no-allow-arbitrary-loads/index.ts +54 -0
  25. package/src/rules/no-allow-arbitrary-loads/no-allow-arbitrary-loads.test.ts +28 -0
  26. package/src/rules/no-arbitrary-file-access/index.ts +238 -0
  27. package/src/rules/no-arbitrary-file-access/no-arbitrary-file-access.test.ts +119 -0
  28. package/src/rules/no-buffer-overread/index.ts +724 -0
  29. package/src/rules/no-buffer-overread/no-buffer-overread.test.ts +313 -0
  30. package/src/rules/no-clickjacking/index.ts +481 -0
  31. package/src/rules/no-clickjacking/no-clickjacking.test.ts +253 -0
  32. package/src/rules/no-client-side-auth-logic/index.ts +81 -0
  33. package/src/rules/no-client-side-auth-logic/no-client-side-auth-logic.test.ts +33 -0
  34. package/src/rules/no-credentials-in-query-params/index.ts +69 -0
  35. package/src/rules/no-credentials-in-query-params/no-credentials-in-query-params.test.ts +33 -0
  36. package/src/rules/no-credentials-in-storage-api/index.ts +64 -0
  37. package/src/rules/no-credentials-in-storage-api/no-credentials-in-storage-api.test.ts +31 -0
  38. package/src/rules/no-data-in-temp-storage/index.ts +75 -0
  39. package/src/rules/no-data-in-temp-storage/no-data-in-temp-storage.test.ts +33 -0
  40. package/src/rules/no-debug-code-in-production/index.ts +59 -0
  41. package/src/rules/no-debug-code-in-production/no-debug-code-in-production.test.ts +26 -0
  42. package/src/rules/no-directive-injection/index.ts +551 -0
  43. package/src/rules/no-directive-injection/no-directive-injection.test.ts +305 -0
  44. package/src/rules/no-disabled-certificate-validation/index.ts +72 -0
  45. package/src/rules/no-disabled-certificate-validation/no-disabled-certificate-validation.test.ts +33 -0
  46. package/src/rules/no-document-cookie/index.ts +113 -0
  47. package/src/rules/no-document-cookie/no-document-cookie.test.ts +382 -0
  48. package/src/rules/no-dynamic-dependency-loading/index.ts +60 -0
  49. package/src/rules/no-dynamic-dependency-loading/no-dynamic-dependency-loading.test.ts +27 -0
  50. package/src/rules/no-electron-security-issues/index.ts +504 -0
  51. package/src/rules/no-electron-security-issues/no-electron-security-issues.test.ts +324 -0
  52. package/src/rules/no-exposed-debug-endpoints/index.ts +73 -0
  53. package/src/rules/no-exposed-debug-endpoints/no-exposed-debug-endpoints.test.ts +40 -0
  54. package/src/rules/no-exposed-sensitive-data/index.ts +428 -0
  55. package/src/rules/no-exposed-sensitive-data/no-exposed-sensitive-data.test.ts +75 -0
  56. package/src/rules/no-format-string-injection/index.ts +801 -0
  57. package/src/rules/no-format-string-injection/no-format-string-injection.test.ts +437 -0
  58. package/src/rules/no-graphql-injection/index.ts +508 -0
  59. package/src/rules/no-graphql-injection/no-graphql-injection.test.ts +371 -0
  60. package/src/rules/no-hardcoded-credentials/index.ts +478 -0
  61. package/src/rules/no-hardcoded-credentials/no-hardcoded-credentials.test.ts +639 -0
  62. package/src/rules/no-hardcoded-session-tokens/index.ts +69 -0
  63. package/src/rules/no-hardcoded-session-tokens/no-hardcoded-session-tokens.test.ts +42 -0
  64. package/src/rules/no-http-urls/index.ts +131 -0
  65. package/src/rules/no-http-urls/no-http-urls.test.ts +60 -0
  66. package/src/rules/no-improper-sanitization/index.ts +502 -0
  67. package/src/rules/no-improper-sanitization/no-improper-sanitization.test.ts +156 -0
  68. package/src/rules/no-improper-type-validation/index.ts +572 -0
  69. package/src/rules/no-improper-type-validation/no-improper-type-validation.test.ts +372 -0
  70. package/src/rules/no-insecure-comparison/index.ts +232 -0
  71. package/src/rules/no-insecure-comparison/no-insecure-comparison.test.ts +218 -0
  72. package/src/rules/no-insecure-cookie-settings/index.ts +391 -0
  73. package/src/rules/no-insecure-cookie-settings/no-insecure-cookie-settings.test.ts +409 -0
  74. package/src/rules/no-insecure-jwt/index.ts +467 -0
  75. package/src/rules/no-insecure-jwt/no-insecure-jwt.test.ts +259 -0
  76. package/src/rules/no-insecure-redirects/index.ts +267 -0
  77. package/src/rules/no-insecure-redirects/no-insecure-redirects.test.ts +108 -0
  78. package/src/rules/no-insecure-websocket/index.ts +72 -0
  79. package/src/rules/no-insecure-websocket/no-insecure-websocket.test.ts +42 -0
  80. package/src/rules/no-insufficient-postmessage-validation/index.ts +497 -0
  81. package/src/rules/no-insufficient-postmessage-validation/no-insufficient-postmessage-validation.test.ts +360 -0
  82. package/src/rules/no-insufficient-random/index.ts +288 -0
  83. package/src/rules/no-insufficient-random/no-insufficient-random.test.ts +246 -0
  84. package/src/rules/no-ldap-injection/index.ts +547 -0
  85. package/src/rules/no-ldap-injection/no-ldap-injection.test.ts +317 -0
  86. package/src/rules/no-missing-authentication/index.ts +408 -0
  87. package/src/rules/no-missing-authentication/no-missing-authentication.test.ts +350 -0
  88. package/src/rules/no-missing-cors-check/index.ts +453 -0
  89. package/src/rules/no-missing-cors-check/no-missing-cors-check.test.ts +392 -0
  90. package/src/rules/no-missing-csrf-protection/index.ts +229 -0
  91. package/src/rules/no-missing-csrf-protection/no-missing-csrf-protection.test.ts +222 -0
  92. package/src/rules/no-missing-security-headers/index.ts +266 -0
  93. package/src/rules/no-missing-security-headers/no-missing-security-headers.test.ts +98 -0
  94. package/src/rules/no-password-in-url/index.ts +64 -0
  95. package/src/rules/no-password-in-url/no-password-in-url.test.ts +27 -0
  96. package/src/rules/no-permissive-cors/index.ts +78 -0
  97. package/src/rules/no-permissive-cors/no-permissive-cors.test.ts +28 -0
  98. package/src/rules/no-pii-in-logs/index.ts +83 -0
  99. package/src/rules/no-pii-in-logs/no-pii-in-logs.test.ts +26 -0
  100. package/src/rules/no-postmessage-origin-wildcard/index.ts +67 -0
  101. package/src/rules/no-postmessage-origin-wildcard/no-postmessage-origin-wildcard.test.ts +27 -0
  102. package/src/rules/no-privilege-escalation/index.ts +403 -0
  103. package/src/rules/no-privilege-escalation/no-privilege-escalation.test.ts +306 -0
  104. package/src/rules/no-redos-vulnerable-regex/index.ts +379 -0
  105. package/src/rules/no-redos-vulnerable-regex/no-redos-vulnerable-regex.test.ts +83 -0
  106. package/src/rules/no-sensitive-data-exposure/index.ts +294 -0
  107. package/src/rules/no-sensitive-data-exposure/no-sensitive-data-exposure.test.ts +262 -0
  108. package/src/rules/no-sensitive-data-in-analytics/index.ts +73 -0
  109. package/src/rules/no-sensitive-data-in-analytics/no-sensitive-data-in-analytics.test.ts +42 -0
  110. package/src/rules/no-sensitive-data-in-cache/index.ts +59 -0
  111. package/src/rules/no-sensitive-data-in-cache/no-sensitive-data-in-cache.test.ts +32 -0
  112. package/src/rules/no-sql-injection/index.ts +424 -0
  113. package/src/rules/no-sql-injection/no-sql-injection.test.ts +303 -0
  114. package/src/rules/no-timing-attack/index.ts +552 -0
  115. package/src/rules/no-timing-attack/no-timing-attack.test.ts +348 -0
  116. package/src/rules/no-toctou-vulnerability/index.ts +250 -0
  117. package/src/rules/no-toctou-vulnerability/no-toctou-vulnerability.test.ts +60 -0
  118. package/src/rules/no-tracking-without-consent/index.ts +78 -0
  119. package/src/rules/no-tracking-without-consent/no-tracking-without-consent.test.ts +34 -0
  120. package/src/rules/no-unchecked-loop-condition/index.ts +781 -0
  121. package/src/rules/no-unchecked-loop-condition/no-unchecked-loop-condition.test.ts +459 -0
  122. package/src/rules/no-unencrypted-local-storage/index.ts +73 -0
  123. package/src/rules/no-unencrypted-local-storage/no-unencrypted-local-storage.test.ts +41 -0
  124. package/src/rules/no-unencrypted-transmission/index.ts +296 -0
  125. package/src/rules/no-unencrypted-transmission/no-unencrypted-transmission.test.ts +287 -0
  126. package/src/rules/no-unescaped-url-parameter/index.ts +424 -0
  127. package/src/rules/no-unescaped-url-parameter/no-unescaped-url-parameter.test.ts +263 -0
  128. package/src/rules/no-unlimited-resource-allocation/index.ts +767 -0
  129. package/src/rules/no-unlimited-resource-allocation/no-unlimited-resource-allocation.test.ts +544 -0
  130. package/src/rules/no-unsafe-deserialization/index.ts +593 -0
  131. package/src/rules/no-unsafe-deserialization/no-unsafe-deserialization.test.ts +310 -0
  132. package/src/rules/no-unsafe-dynamic-require/index.ts +125 -0
  133. package/src/rules/no-unsafe-dynamic-require/no-unsafe-dynamic-require.test.ts +151 -0
  134. package/src/rules/no-unsafe-regex-construction/index.ts +370 -0
  135. package/src/rules/no-unsafe-regex-construction/no-unsafe-regex-construction.test.ts +181 -0
  136. package/src/rules/no-unsanitized-html/index.ts +400 -0
  137. package/src/rules/no-unsanitized-html/no-unsanitized-html.test.ts +488 -0
  138. package/src/rules/no-unvalidated-deeplinks/index.ts +73 -0
  139. package/src/rules/no-unvalidated-deeplinks/no-unvalidated-deeplinks.test.ts +29 -0
  140. package/src/rules/no-unvalidated-user-input/index.ts +498 -0
  141. package/src/rules/no-unvalidated-user-input/no-unvalidated-user-input.test.ts +463 -0
  142. package/src/rules/no-verbose-error-messages/index.ts +83 -0
  143. package/src/rules/no-verbose-error-messages/no-verbose-error-messages.test.ts +34 -0
  144. package/src/rules/no-weak-crypto/index.ts +447 -0
  145. package/src/rules/no-weak-crypto/no-weak-crypto.test.ts +297 -0
  146. package/src/rules/no-weak-password-recovery/index.ts +509 -0
  147. package/src/rules/no-weak-password-recovery/no-weak-password-recovery.test.ts +184 -0
  148. package/src/rules/no-xpath-injection/index.ts +596 -0
  149. package/src/rules/no-xpath-injection/no-xpath-injection.test.ts +405 -0
  150. package/src/rules/no-xxe-injection/index.ts +342 -0
  151. package/src/rules/no-xxe-injection/no-xxe-injection.test.ts +122 -0
  152. package/src/rules/no-zip-slip/index.ts +526 -0
  153. package/src/rules/no-zip-slip/no-zip-slip.test.ts +305 -0
  154. package/src/rules/require-backend-authorization/index.ts +71 -0
  155. package/src/rules/require-backend-authorization/require-backend-authorization.test.ts +31 -0
  156. package/src/rules/require-code-minification/index.ts +54 -0
  157. package/src/rules/require-code-minification/require-code-minification.test.ts +30 -0
  158. package/src/rules/require-csp-headers/index.ts +74 -0
  159. package/src/rules/require-csp-headers/require-csp-headers.test.ts +34 -0
  160. package/src/rules/require-data-minimization/index.ts +65 -0
  161. package/src/rules/require-data-minimization/require-data-minimization.test.ts +31 -0
  162. package/src/rules/require-dependency-integrity/index.ts +78 -0
  163. package/src/rules/require-dependency-integrity/require-dependency-integrity.test.ts +44 -0
  164. package/src/rules/require-https-only/index.ts +75 -0
  165. package/src/rules/require-https-only/require-https-only.test.ts +26 -0
  166. package/src/rules/require-mime-type-validation/index.ts +77 -0
  167. package/src/rules/require-mime-type-validation/require-mime-type-validation.test.ts +32 -0
  168. package/src/rules/require-network-timeout/index.ts +58 -0
  169. package/src/rules/require-network-timeout/require-network-timeout.test.ts +26 -0
  170. package/src/rules/require-package-lock/index.ts +75 -0
  171. package/src/rules/require-package-lock/require-package-lock.test.ts +27 -0
  172. package/src/rules/require-secure-credential-storage/index.ts +60 -0
  173. package/src/rules/require-secure-credential-storage/require-secure-credential-storage.test.ts +26 -0
  174. package/src/rules/require-secure-defaults/index.ts +54 -0
  175. package/src/rules/require-secure-defaults/require-secure-defaults.test.ts +26 -0
  176. package/src/rules/require-secure-deletion/index.ts +52 -0
  177. package/src/rules/require-secure-deletion/require-secure-deletion.test.ts +29 -0
  178. package/src/rules/require-storage-encryption/index.ts +60 -0
  179. package/src/rules/require-storage-encryption/require-storage-encryption.test.ts +26 -0
  180. package/src/rules/require-url-validation/index.ts +85 -0
  181. package/src/rules/require-url-validation/require-url-validation.test.ts +32 -0
  182. package/src/types/{index.d.ts → index.ts} +157 -53
  183. package/src/index.d.ts +0 -32
  184. package/src/index.js +0 -465
  185. package/src/rules/database-injection/index.d.ts +0 -13
  186. package/src/rules/database-injection/index.js +0 -406
  187. package/src/rules/detect-child-process/index.d.ts +0 -11
  188. package/src/rules/detect-child-process/index.js +0 -529
  189. package/src/rules/detect-eval-with-expression/index.d.ts +0 -9
  190. package/src/rules/detect-eval-with-expression/index.js +0 -392
  191. package/src/rules/detect-mixed-content/index.d.ts +0 -8
  192. package/src/rules/detect-mixed-content/index.js +0 -44
  193. package/src/rules/detect-non-literal-fs-filename/index.d.ts +0 -7
  194. package/src/rules/detect-non-literal-fs-filename/index.js +0 -454
  195. package/src/rules/detect-non-literal-regexp/index.d.ts +0 -9
  196. package/src/rules/detect-non-literal-regexp/index.js +0 -403
  197. package/src/rules/detect-object-injection/index.d.ts +0 -11
  198. package/src/rules/detect-object-injection/index.js +0 -560
  199. package/src/rules/detect-suspicious-dependencies/index.d.ts +0 -8
  200. package/src/rules/detect-suspicious-dependencies/index.js +0 -71
  201. package/src/rules/detect-weak-password-validation/index.d.ts +0 -6
  202. package/src/rules/detect-weak-password-validation/index.js +0 -58
  203. package/src/rules/no-allow-arbitrary-loads/index.d.ts +0 -8
  204. package/src/rules/no-allow-arbitrary-loads/index.js +0 -47
  205. package/src/rules/no-arbitrary-file-access/index.d.ts +0 -13
  206. package/src/rules/no-arbitrary-file-access/index.js +0 -195
  207. package/src/rules/no-buffer-overread/index.d.ts +0 -29
  208. package/src/rules/no-buffer-overread/index.js +0 -606
  209. package/src/rules/no-clickjacking/index.d.ts +0 -10
  210. package/src/rules/no-clickjacking/index.js +0 -396
  211. package/src/rules/no-client-side-auth-logic/index.d.ts +0 -6
  212. package/src/rules/no-client-side-auth-logic/index.js +0 -69
  213. package/src/rules/no-credentials-in-query-params/index.d.ts +0 -8
  214. package/src/rules/no-credentials-in-query-params/index.js +0 -57
  215. package/src/rules/no-credentials-in-storage-api/index.d.ts +0 -6
  216. package/src/rules/no-credentials-in-storage-api/index.js +0 -54
  217. package/src/rules/no-data-in-temp-storage/index.d.ts +0 -6
  218. package/src/rules/no-data-in-temp-storage/index.js +0 -64
  219. package/src/rules/no-debug-code-in-production/index.d.ts +0 -8
  220. package/src/rules/no-debug-code-in-production/index.js +0 -51
  221. package/src/rules/no-directive-injection/index.d.ts +0 -12
  222. package/src/rules/no-directive-injection/index.js +0 -457
  223. package/src/rules/no-disabled-certificate-validation/index.d.ts +0 -6
  224. package/src/rules/no-disabled-certificate-validation/index.js +0 -61
  225. package/src/rules/no-document-cookie/index.d.ts +0 -5
  226. package/src/rules/no-document-cookie/index.js +0 -89
  227. package/src/rules/no-dynamic-dependency-loading/index.d.ts +0 -8
  228. package/src/rules/no-dynamic-dependency-loading/index.js +0 -51
  229. package/src/rules/no-electron-security-issues/index.d.ts +0 -10
  230. package/src/rules/no-electron-security-issues/index.js +0 -423
  231. package/src/rules/no-exposed-debug-endpoints/index.d.ts +0 -6
  232. package/src/rules/no-exposed-debug-endpoints/index.js +0 -62
  233. package/src/rules/no-exposed-sensitive-data/index.d.ts +0 -11
  234. package/src/rules/no-exposed-sensitive-data/index.js +0 -340
  235. package/src/rules/no-format-string-injection/index.d.ts +0 -17
  236. package/src/rules/no-format-string-injection/index.js +0 -660
  237. package/src/rules/no-graphql-injection/index.d.ts +0 -12
  238. package/src/rules/no-graphql-injection/index.js +0 -411
  239. package/src/rules/no-hardcoded-credentials/index.d.ts +0 -26
  240. package/src/rules/no-hardcoded-credentials/index.js +0 -376
  241. package/src/rules/no-hardcoded-session-tokens/index.d.ts +0 -6
  242. package/src/rules/no-hardcoded-session-tokens/index.js +0 -59
  243. package/src/rules/no-http-urls/index.d.ts +0 -12
  244. package/src/rules/no-http-urls/index.js +0 -114
  245. package/src/rules/no-improper-sanitization/index.d.ts +0 -12
  246. package/src/rules/no-improper-sanitization/index.js +0 -411
  247. package/src/rules/no-improper-type-validation/index.d.ts +0 -10
  248. package/src/rules/no-improper-type-validation/index.js +0 -475
  249. package/src/rules/no-insecure-comparison/index.d.ts +0 -7
  250. package/src/rules/no-insecure-comparison/index.js +0 -193
  251. package/src/rules/no-insecure-cookie-settings/index.d.ts +0 -9
  252. package/src/rules/no-insecure-cookie-settings/index.js +0 -306
  253. package/src/rules/no-insecure-jwt/index.d.ts +0 -10
  254. package/src/rules/no-insecure-jwt/index.js +0 -380
  255. package/src/rules/no-insecure-redirects/index.d.ts +0 -7
  256. package/src/rules/no-insecure-redirects/index.js +0 -216
  257. package/src/rules/no-insecure-websocket/index.d.ts +0 -6
  258. package/src/rules/no-insecure-websocket/index.js +0 -61
  259. package/src/rules/no-insufficient-postmessage-validation/index.d.ts +0 -14
  260. package/src/rules/no-insufficient-postmessage-validation/index.js +0 -392
  261. package/src/rules/no-insufficient-random/index.d.ts +0 -9
  262. package/src/rules/no-insufficient-random/index.js +0 -208
  263. package/src/rules/no-ldap-injection/index.d.ts +0 -10
  264. package/src/rules/no-ldap-injection/index.js +0 -455
  265. package/src/rules/no-missing-authentication/index.d.ts +0 -13
  266. package/src/rules/no-missing-authentication/index.js +0 -333
  267. package/src/rules/no-missing-cors-check/index.d.ts +0 -9
  268. package/src/rules/no-missing-cors-check/index.js +0 -399
  269. package/src/rules/no-missing-csrf-protection/index.d.ts +0 -11
  270. package/src/rules/no-missing-csrf-protection/index.js +0 -180
  271. package/src/rules/no-missing-security-headers/index.d.ts +0 -7
  272. package/src/rules/no-missing-security-headers/index.js +0 -218
  273. package/src/rules/no-password-in-url/index.d.ts +0 -8
  274. package/src/rules/no-password-in-url/index.js +0 -54
  275. package/src/rules/no-permissive-cors/index.d.ts +0 -8
  276. package/src/rules/no-permissive-cors/index.js +0 -65
  277. package/src/rules/no-pii-in-logs/index.d.ts +0 -8
  278. package/src/rules/no-pii-in-logs/index.js +0 -70
  279. package/src/rules/no-postmessage-origin-wildcard/index.d.ts +0 -8
  280. package/src/rules/no-postmessage-origin-wildcard/index.js +0 -56
  281. package/src/rules/no-privilege-escalation/index.d.ts +0 -13
  282. package/src/rules/no-privilege-escalation/index.js +0 -321
  283. package/src/rules/no-redos-vulnerable-regex/index.d.ts +0 -7
  284. package/src/rules/no-redos-vulnerable-regex/index.js +0 -306
  285. package/src/rules/no-sensitive-data-exposure/index.d.ts +0 -11
  286. package/src/rules/no-sensitive-data-exposure/index.js +0 -250
  287. package/src/rules/no-sensitive-data-in-analytics/index.d.ts +0 -8
  288. package/src/rules/no-sensitive-data-in-analytics/index.js +0 -62
  289. package/src/rules/no-sensitive-data-in-cache/index.d.ts +0 -8
  290. package/src/rules/no-sensitive-data-in-cache/index.js +0 -52
  291. package/src/rules/no-sql-injection/index.d.ts +0 -10
  292. package/src/rules/no-sql-injection/index.js +0 -335
  293. package/src/rules/no-timing-attack/index.d.ts +0 -10
  294. package/src/rules/no-timing-attack/index.js +0 -447
  295. package/src/rules/no-toctou-vulnerability/index.d.ts +0 -7
  296. package/src/rules/no-toctou-vulnerability/index.js +0 -208
  297. package/src/rules/no-tracking-without-consent/index.d.ts +0 -6
  298. package/src/rules/no-tracking-without-consent/index.js +0 -67
  299. package/src/rules/no-unchecked-loop-condition/index.d.ts +0 -12
  300. package/src/rules/no-unchecked-loop-condition/index.js +0 -646
  301. package/src/rules/no-unencrypted-local-storage/index.d.ts +0 -8
  302. package/src/rules/no-unencrypted-local-storage/index.js +0 -61
  303. package/src/rules/no-unencrypted-transmission/index.d.ts +0 -11
  304. package/src/rules/no-unencrypted-transmission/index.js +0 -236
  305. package/src/rules/no-unescaped-url-parameter/index.d.ts +0 -9
  306. package/src/rules/no-unescaped-url-parameter/index.js +0 -355
  307. package/src/rules/no-unlimited-resource-allocation/index.d.ts +0 -12
  308. package/src/rules/no-unlimited-resource-allocation/index.js +0 -643
  309. package/src/rules/no-unsafe-deserialization/index.d.ts +0 -10
  310. package/src/rules/no-unsafe-deserialization/index.js +0 -491
  311. package/src/rules/no-unsafe-dynamic-require/index.d.ts +0 -5
  312. package/src/rules/no-unsafe-dynamic-require/index.js +0 -106
  313. package/src/rules/no-unsafe-regex-construction/index.d.ts +0 -9
  314. package/src/rules/no-unsafe-regex-construction/index.js +0 -291
  315. package/src/rules/no-unsanitized-html/index.d.ts +0 -9
  316. package/src/rules/no-unsanitized-html/index.js +0 -335
  317. package/src/rules/no-unvalidated-deeplinks/index.d.ts +0 -6
  318. package/src/rules/no-unvalidated-deeplinks/index.js +0 -62
  319. package/src/rules/no-unvalidated-user-input/index.d.ts +0 -9
  320. package/src/rules/no-unvalidated-user-input/index.js +0 -420
  321. package/src/rules/no-verbose-error-messages/index.d.ts +0 -8
  322. package/src/rules/no-verbose-error-messages/index.js +0 -68
  323. package/src/rules/no-weak-crypto/index.d.ts +0 -11
  324. package/src/rules/no-weak-crypto/index.js +0 -351
  325. package/src/rules/no-weak-password-recovery/index.d.ts +0 -12
  326. package/src/rules/no-weak-password-recovery/index.js +0 -424
  327. package/src/rules/no-xpath-injection/index.d.ts +0 -10
  328. package/src/rules/no-xpath-injection/index.js +0 -487
  329. package/src/rules/no-xxe-injection/index.d.ts +0 -7
  330. package/src/rules/no-xxe-injection/index.js +0 -266
  331. package/src/rules/no-zip-slip/index.d.ts +0 -9
  332. package/src/rules/no-zip-slip/index.js +0 -445
  333. package/src/rules/require-backend-authorization/index.d.ts +0 -6
  334. package/src/rules/require-backend-authorization/index.js +0 -60
  335. package/src/rules/require-code-minification/index.d.ts +0 -8
  336. package/src/rules/require-code-minification/index.js +0 -47
  337. package/src/rules/require-csp-headers/index.d.ts +0 -6
  338. package/src/rules/require-csp-headers/index.js +0 -64
  339. package/src/rules/require-data-minimization/index.d.ts +0 -8
  340. package/src/rules/require-data-minimization/index.js +0 -53
  341. package/src/rules/require-dependency-integrity/index.d.ts +0 -6
  342. package/src/rules/require-dependency-integrity/index.js +0 -64
  343. package/src/rules/require-https-only/index.d.ts +0 -8
  344. package/src/rules/require-https-only/index.js +0 -62
  345. package/src/rules/require-mime-type-validation/index.d.ts +0 -6
  346. package/src/rules/require-mime-type-validation/index.js +0 -66
  347. package/src/rules/require-network-timeout/index.d.ts +0 -8
  348. package/src/rules/require-network-timeout/index.js +0 -50
  349. package/src/rules/require-package-lock/index.d.ts +0 -8
  350. package/src/rules/require-package-lock/index.js +0 -63
  351. package/src/rules/require-secure-credential-storage/index.d.ts +0 -8
  352. package/src/rules/require-secure-credential-storage/index.js +0 -50
  353. package/src/rules/require-secure-defaults/index.d.ts +0 -8
  354. package/src/rules/require-secure-defaults/index.js +0 -47
  355. package/src/rules/require-secure-deletion/index.d.ts +0 -8
  356. package/src/rules/require-secure-deletion/index.js +0 -44
  357. package/src/rules/require-storage-encryption/index.d.ts +0 -8
  358. package/src/rules/require-storage-encryption/index.js +0 -50
  359. package/src/rules/require-url-validation/index.d.ts +0 -6
  360. package/src/rules/require-url-validation/index.js +0 -72
  361. package/src/types/index.js +0 -17
@@ -0,0 +1,259 @@
1
+ /**
2
+ * Comprehensive tests for no-insecure-jwt rule
3
+ * Security: CWE-347 (JWT Security Vulnerabilities)
4
+ */
5
+ import { RuleTester } from '@typescript-eslint/rule-tester';
6
+ import { describe, it, afterAll } from 'vitest';
7
+ import parser from '@typescript-eslint/parser';
8
+ import { noInsecureJwt } from './index';
9
+
10
+ // Configure RuleTester for Vitest
11
+ RuleTester.afterAll = afterAll;
12
+ RuleTester.it = it;
13
+ RuleTester.itOnly = it.only;
14
+ RuleTester.describe = describe;
15
+
16
+ // Use Flat Config format (ESLint 9+)
17
+ const ruleTester = new RuleTester({
18
+ languageOptions: {
19
+ parser,
20
+ ecmaVersion: 2022,
21
+ sourceType: 'module',
22
+ },
23
+ });
24
+
25
+ describe('no-insecure-jwt', () => {
26
+ describe('Valid Code', () => {
27
+ ruleTester.run('valid - secure JWT operations', noInsecureJwt, {
28
+ valid: [
29
+ // Secure JWT verification
30
+ {
31
+ code: 'jwt.verify(token, publicKey, { algorithms: ["RS256"] });',
32
+ },
33
+ {
34
+ code: 'jwt.verify(token, secret, { algorithms: ["HS256"] });',
35
+ },
36
+ // Using jose library
37
+ {
38
+ code: 'const payload = await jwtVerify(token, publicKey);',
39
+ },
40
+ // Strong secrets
41
+ {
42
+ code: 'jwt.sign(payload, crypto.randomBytes(32).toString("hex"));',
43
+ },
44
+ // Literal JWT strings (not flagged as they might be test data)
45
+ {
46
+ code: '// eslint-disable-next-line\nconst testToken = "eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWV9.TJVA95OrM7E2cBab30RMHrHDcEfxjoYZgeFONFh7HgQ";',
47
+ },
48
+ // Non-JWT libraries
49
+ {
50
+ code: 'const token = crypto.randomBytes(32);',
51
+ },
52
+ ],
53
+ invalid: [],
54
+ });
55
+ });
56
+
57
+ describe('Invalid Code - Algorithm Confusion', () => {
58
+ ruleTester.run('invalid - algorithm confusion attacks', noInsecureJwt, {
59
+ valid: [],
60
+ invalid: [
61
+ // String literal algorithm spec triggers detection
62
+ {
63
+ code: 'jwt.verify(token, "secret", { alg: "none" });',
64
+ errors: [
65
+ {
66
+ messageId: 'insecureJwtAlgorithm',
67
+ },
68
+ ],
69
+ },
70
+ ],
71
+ });
72
+ });
73
+
74
+ describe('Invalid Code - Missing Signature Verification', () => {
75
+ ruleTester.run('invalid - missing signature verification', noInsecureJwt, {
76
+ valid: [],
77
+ invalid: [
78
+ {
79
+ code: 'const payload = jwt.decode(token);',
80
+ errors: [
81
+ {
82
+ messageId: 'jwtWithoutValidation',
83
+ },
84
+ {
85
+ messageId: 'missingSignatureVerification',
86
+ },
87
+ ],
88
+ },
89
+ {
90
+ code: 'const decoded = jwt.decode(token, { complete: true });',
91
+ errors: [
92
+ {
93
+ messageId: 'jwtWithoutValidation',
94
+ },
95
+ {
96
+ messageId: 'missingSignatureVerification',
97
+ },
98
+ ],
99
+ },
100
+ {
101
+ code: 'const user = jwt.decode(authToken);',
102
+ errors: [
103
+ {
104
+ messageId: 'jwtWithoutValidation',
105
+ },
106
+ {
107
+ messageId: 'missingSignatureVerification',
108
+ },
109
+ ],
110
+ },
111
+ ],
112
+ });
113
+ });
114
+
115
+ describe('Invalid Code - Weak Secrets', () => {
116
+ ruleTester.run('invalid - weak JWT secrets with weak algorithms', noInsecureJwt, {
117
+ valid: [
118
+ // Weak secrets without algorithm spec are not flagged
119
+ {
120
+ code: 'jwt.sign(payload, "weak");',
121
+ },
122
+ // Strong secret with weak algorithm is OK
123
+ {
124
+ code: 'jwt.sign(payload, "ThisIsAVeryLongSecretThatIsDefinitelyLongerThan32Characters", { algorithms: ["HS256"] });',
125
+ },
126
+ ],
127
+ invalid: [
128
+ // Weak algorithm (HS256) with weak (short) secret - triggers weakJwtSecret
129
+ {
130
+ code: 'jwt.verify(token, "weak", { alg: "HS256" });',
131
+ errors: [{ messageId: 'weakJwtSecret' }],
132
+ },
133
+ // Weak algorithm with short secret
134
+ {
135
+ code: 'jwt.sign(payload, "short", { algorithm: "HS384" });',
136
+ errors: [{ messageId: 'weakJwtSecret' }],
137
+ },
138
+ ],
139
+ });
140
+ });
141
+
142
+ describe('Invalid Code - JWT Without Validation', () => {
143
+ ruleTester.run('invalid - JWT used without validation', noInsecureJwt, {
144
+ valid: [],
145
+ invalid: [
146
+ {
147
+ code: 'const payload = jwt.decode(token); const userId = payload.userId;',
148
+ errors: [
149
+ {
150
+ messageId: 'jwtWithoutValidation',
151
+ },
152
+ {
153
+ messageId: 'missingSignatureVerification',
154
+ },
155
+ ],
156
+ },
157
+ {
158
+ code: 'const decoded = jwt.decode(authToken); if (decoded.exp < Date.now()) { /* use decoded */ }',
159
+ errors: [
160
+ {
161
+ messageId: 'jwtWithoutValidation',
162
+ },
163
+ {
164
+ messageId: 'missingSignatureVerification',
165
+ },
166
+ ],
167
+ },
168
+ ],
169
+ });
170
+ });
171
+
172
+
173
+ describe('Valid Code - False Positives Reduced', () => {
174
+ ruleTester.run('valid - false positives reduced', noInsecureJwt, {
175
+ valid: [
176
+ // Safe annotations suppress warnings
177
+ {
178
+ code: `
179
+ /** @verified */
180
+ const payload = jwt.decode(token);
181
+ `,
182
+ },
183
+ {
184
+ code: `
185
+ // @safe
186
+ const decoded = jwt.decode(authToken);
187
+ `,
188
+ },
189
+ // Strong secrets (no algorithm spec, so not flagged)
190
+ {
191
+ code: 'jwt.sign(payload, crypto.randomBytes(32).toString("hex"));',
192
+ },
193
+ {
194
+ code: 'jwt.sign(payload, "ThisIsAVeryLongSecretThatIsDefinitelyLongerThan32Characters");',
195
+ },
196
+ ],
197
+ invalid: [],
198
+ });
199
+ });
200
+
201
+ describe('Invalid Code - Unsafe JWT Parsing', () => {
202
+ ruleTester.run('invalid - unsafe JWT string usage', noInsecureJwt, {
203
+ valid: [
204
+ // Hardcoded JWT but verified (inline)
205
+ {
206
+ code: `
207
+ jwt.verify("eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWV9.TJVA95OrM7E2cBab30RMHrHDcEfxjoYZgeFONFh7HgQ", secret);
208
+ `,
209
+ },
210
+ // Not a JWT (not 3 parts)
211
+ {
212
+ code: 'const token = "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWV9";',
213
+ },
214
+ ],
215
+ invalid: [
216
+ // Hardcoded JWT used without verification context
217
+ {
218
+ code: 'const token = "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWV9.TJVA95OrM7E2cBab30RMHrHDcEfxjoYZgeFONFh7HgQ"; console.log(token);',
219
+ errors: [{ messageId: 'unsafeJwtParsing' }],
220
+ },
221
+ ],
222
+ });
223
+ });
224
+
225
+ describe('Configuration Options', () => {
226
+ // Note: allowedInsecureAlgorithms option not fully implemented in rule
227
+
228
+ ruleTester.run('config - custom min secret length', noInsecureJwt, {
229
+ valid: [
230
+ // Secret length not checked without algorithm spec
231
+ {
232
+ code: 'jwt.sign(payload, "ThisIs16Chars");',
233
+ options: [{ minSecretLength: 16 }],
234
+ },
235
+ // Short secret without algorithm spec is valid
236
+ {
237
+ code: 'jwt.sign(payload, "short");',
238
+ options: [{ minSecretLength: 16 }],
239
+ },
240
+ ],
241
+ invalid: [],
242
+ });
243
+
244
+ ruleTester.run('config - custom trusted libraries', noInsecureJwt, {
245
+ valid: [
246
+ // Custom trusted library
247
+ {
248
+ code: 'myJwt.verify(token, secret);',
249
+ options: [{ trustedJwtLibraries: ['myJwt'] }],
250
+ },
251
+ // Unknown library isn't flagged (rule only checks trusted libraries)
252
+ {
253
+ code: 'unknownJwt.verify(token, secret);',
254
+ },
255
+ ],
256
+ invalid: [],
257
+ });
258
+ });
259
+ });
@@ -0,0 +1,267 @@
1
+ /**
2
+ * ESLint Rule: no-insecure-redirects
3
+ * Detects open redirect vulnerabilities
4
+ * CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
5
+ *
6
+ * @see https://cwe.mitre.org/data/definitions/601.html
7
+ * @see https://owasp.org/www-community/vulnerabilities/Unvalidated_Redirects_and_Forwards
8
+ */
9
+ import type { TSESLint, TSESTree } from '@interlace/eslint-devkit';
10
+ import { formatLLMMessage, MessageIcons } from '@interlace/eslint-devkit';
11
+ import { createRule } from '@interlace/eslint-devkit';
12
+
13
+ type MessageIds =
14
+ | 'insecureRedirect'
15
+ | 'whitelistDomains'
16
+ | 'validateRedirect'
17
+ | 'useRelativeUrl';
18
+
19
+ export interface Options {
20
+ /** Ignore in test files. Default: true */
21
+ ignoreInTests?: boolean;
22
+
23
+ /** Allowed redirect domains. Default: [] */
24
+ allowedDomains?: string[];
25
+ }
26
+
27
+ type RuleOptions = [Options?];
28
+
29
+ /**
30
+ * Check if redirect URL is validated
31
+ */
32
+ function isRedirectValidated(
33
+ node: TSESTree.CallExpression,
34
+ sourceCode: TSESLint.SourceCode
35
+ ): boolean {
36
+ const callText = sourceCode.getText(node);
37
+
38
+ // Check if URL is from user input (req.query, req.body, req.params)
39
+ const userInputPattern = /\b(req\.(query|body|params)|window\.location|document\.location)\b/;
40
+
41
+ if (!userInputPattern.test(callText)) {
42
+ // Not from user input, assume safe
43
+ return true;
44
+ }
45
+
46
+ // Look for validation patterns in the surrounding code
47
+ // This is a simplified static analysis - in practice, would need data flow analysis
48
+
49
+ const program = sourceCode.ast;
50
+ const nodeStart = node.loc?.start;
51
+ const nodeEnd = node.loc?.end;
52
+
53
+ /* c8 ignore start -- Guard clause: loc is always present in RuleTester */
54
+ if (!nodeStart || !nodeEnd || !program) {
55
+ return false;
56
+ }
57
+ /* c8 ignore stop */
58
+
59
+ // Check for validation function calls before this redirect
60
+ const validationPatterns = [
61
+ /\b(validateUrl|validateRedirect|isValidUrl|isSafeUrl)\s*\(/,
62
+ /\b(whitelist|allowedDomains|permittedUrls)\s*\./,
63
+ /\b(url\.hostname|url\.host)\s*===/,
64
+ /\ballowedDomains\.includes\s*\(/,
65
+ /\bstartsWith\s*\(\s*['"]/,
66
+ /\bendsWith\s*\(\s*['"]/,
67
+ /\bindexOf\s*\(\s*['"]/,
68
+ /\bmatch\s*\(\s*\//,
69
+ ];
70
+
71
+ // Look for validation in the same function scope
72
+ let current: TSESTree.Node | null = node;
73
+ let depth = 0;
74
+ const maxDepth = 20;
75
+
76
+ while (current && depth < maxDepth) {
77
+ // Check siblings before this node
78
+ const parent: TSESTree.Node | undefined = (current as TSESTree.Node & { parent?: TSESTree.Node }).parent;
79
+ if (!parent) break;
80
+
81
+ if (parent.type === 'BlockStatement') {
82
+ const body = parent.body;
83
+ const currentIndex = body.indexOf(current as TSESTree.Statement);
84
+
85
+ // Check previous statements in the same block
86
+ for (let i = currentIndex - 1; i >= 0 && i >= currentIndex - 5; i--) {
87
+ const stmt = body[i];
88
+ const stmtText = sourceCode.getText(stmt);
89
+
90
+ if (validationPatterns.some(pattern => pattern.test(stmtText))) {
91
+ return true; // Found validation
92
+ }
93
+ }
94
+ }
95
+
96
+ current = parent;
97
+ depth++;
98
+ }
99
+
100
+ // No validation found
101
+ return false;
102
+ }
103
+
104
+ export const noInsecureRedirects = createRule<RuleOptions, MessageIds>({
105
+ name: 'no-insecure-redirects',
106
+ meta: {
107
+ type: 'problem',
108
+ docs: {
109
+ description: 'Detects open redirect vulnerabilities',
110
+ },
111
+ hasSuggestions: true,
112
+ messages: {
113
+ insecureRedirect: formatLLMMessage({
114
+ icon: MessageIcons.SECURITY,
115
+ issueName: 'Open redirect',
116
+ cwe: 'CWE-601',
117
+ description: 'Unvalidated redirect detected - user-controlled URL',
118
+ severity: 'HIGH',
119
+ fix: 'Whitelist allowed domains or validate redirect target',
120
+ documentationLink: 'https://owasp.org/www-community/vulnerabilities/Unvalidated_Redirects_and_Forwards',
121
+ }),
122
+ whitelistDomains: formatLLMMessage({
123
+ icon: MessageIcons.INFO,
124
+ issueName: 'Whitelist Domains',
125
+ description: 'Whitelist allowed redirect domains',
126
+ severity: 'LOW',
127
+ fix: 'if (allowedDomains.includes(url.hostname)) redirect(url)',
128
+ documentationLink: 'https://owasp.org/www-community/vulnerabilities/Unvalidated_Redirects_and_Forwards',
129
+ }),
130
+ validateRedirect: formatLLMMessage({
131
+ icon: MessageIcons.INFO,
132
+ issueName: 'Validate Redirect',
133
+ description: 'Validate redirect URL before use',
134
+ severity: 'LOW',
135
+ fix: 'validateRedirectUrl(userInput) before redirect',
136
+ documentationLink: 'https://owasp.org/www-community/vulnerabilities/Unvalidated_Redirects_and_Forwards',
137
+ }),
138
+ useRelativeUrl: formatLLMMessage({
139
+ icon: MessageIcons.INFO,
140
+ issueName: 'Use Relative URL',
141
+ description: 'Use relative URLs for internal redirects',
142
+ severity: 'LOW',
143
+ fix: 'redirect("/internal/path") instead of absolute URLs',
144
+ documentationLink: 'https://owasp.org/www-community/vulnerabilities/Unvalidated_Redirects_and_Forwards',
145
+ }),
146
+ },
147
+ schema: [
148
+ {
149
+ type: 'object',
150
+ properties: {
151
+ ignoreInTests: {
152
+ type: 'boolean',
153
+ default: true,
154
+ },
155
+ allowedDomains: {
156
+ type: 'array',
157
+ items: { type: 'string' },
158
+ default: [],
159
+ },
160
+ },
161
+ additionalProperties: false,
162
+ },
163
+ ],
164
+ },
165
+ defaultOptions: [
166
+ {
167
+ ignoreInTests: true,
168
+ allowedDomains: [],
169
+ },
170
+ ],
171
+ create(context: TSESLint.RuleContext<MessageIds, RuleOptions>, [options = {}]) {
172
+ const {
173
+ ignoreInTests = true
174
+ }: Options = options || {};
175
+
176
+ const filename = context.getFilename();
177
+ const isTestFile = ignoreInTests && /\.(test|spec)\.(ts|tsx|js|jsx)$/.test(filename);
178
+
179
+ if (isTestFile) {
180
+ return {};
181
+ }
182
+
183
+ const sourceCode = context.sourceCode || context.sourceCode;
184
+
185
+ /**
186
+ * Check redirect calls and assignments
187
+ */
188
+ function checkCallExpression(node: TSESTree.CallExpression) {
189
+ // Check for res.redirect, window.location, etc.
190
+ if (node.callee.type === 'MemberExpression' &&
191
+ node.callee.property.type === 'Identifier') {
192
+ const methodName = node.callee.property.name;
193
+
194
+ if (['redirect', 'replace', 'assign'].includes(methodName)) {
195
+ // Check if redirect URL is validated
196
+ if (!isRedirectValidated(node, sourceCode)) {
197
+ context.report({
198
+ node,
199
+ messageId: 'insecureRedirect',
200
+ suggest: [
201
+ {
202
+ messageId: 'whitelistDomains',
203
+ fix: () => null,
204
+ },
205
+ {
206
+ messageId: 'validateRedirect',
207
+ fix: () => null,
208
+ },
209
+ {
210
+ messageId: 'useRelativeUrl',
211
+ fix: () => null,
212
+ },
213
+ ],
214
+ });
215
+ }
216
+ }
217
+ }
218
+ }
219
+
220
+ /**
221
+ * Check assignment expressions like window.location.href = ...
222
+ */
223
+ function checkAssignmentExpression(node: TSESTree.AssignmentExpression) {
224
+ // Check for window.location.href assignments
225
+ if (node.left.type === 'MemberExpression' &&
226
+ node.left.object.type === 'MemberExpression' &&
227
+ node.left.object.object.type === 'Identifier' &&
228
+ node.left.object.object.name === 'window' &&
229
+ node.left.object.property.type === 'Identifier' &&
230
+ node.left.object.property.name === 'location' &&
231
+ node.left.property.type === 'Identifier' &&
232
+ ['href', 'replace', 'assign'].includes(node.left.property.name)) {
233
+
234
+ // Check if assignment value comes from user input
235
+ const rightText = sourceCode.getText(node.right);
236
+ const userInputPattern = /\b(req\.(query|body|params)|window\.location|document\.location)\b/;
237
+
238
+ if (userInputPattern.test(rightText)) {
239
+ context.report({
240
+ node,
241
+ messageId: 'insecureRedirect',
242
+ suggest: [
243
+ {
244
+ messageId: 'whitelistDomains',
245
+ fix: () => null,
246
+ },
247
+ {
248
+ messageId: 'validateRedirect',
249
+ fix: () => null,
250
+ },
251
+ {
252
+ messageId: 'useRelativeUrl',
253
+ fix: () => null,
254
+ },
255
+ ],
256
+ });
257
+ }
258
+ }
259
+ }
260
+
261
+ return {
262
+ CallExpression: checkCallExpression,
263
+ AssignmentExpression: checkAssignmentExpression,
264
+ };
265
+ },
266
+ });
267
+
@@ -0,0 +1,108 @@
1
+ /**
2
+ * Comprehensive tests for no-insecure-redirects rule
3
+ * Security: CWE-601 - Detects open redirect vulnerabilities
4
+ */
5
+ import { RuleTester } from '@typescript-eslint/rule-tester';
6
+ import { describe, it, afterAll } from 'vitest';
7
+ import parser from '@typescript-eslint/parser';
8
+ import { noInsecureRedirects } from './index';
9
+
10
+ RuleTester.afterAll = afterAll;
11
+ RuleTester.it = it;
12
+ RuleTester.itOnly = it.only;
13
+ RuleTester.describe = describe;
14
+
15
+ const ruleTester = new RuleTester({
16
+ languageOptions: {
17
+ parser,
18
+ ecmaVersion: 2022,
19
+ sourceType: 'module',
20
+ },
21
+ });
22
+
23
+ describe('no-insecure-redirects', () => {
24
+ describe('Valid Code', () => {
25
+ ruleTester.run('valid - validated redirects', noInsecureRedirects, {
26
+ valid: [
27
+ // Relative redirects
28
+ { code: 'res.redirect("/dashboard");' },
29
+ { code: 'res.redirect("../home");' },
30
+ // Test files (if ignoreInTests is true)
31
+ {
32
+ code: 'res.redirect(req.query.url);',
33
+ filename: 'test.spec.ts',
34
+ options: [{ ignoreInTests: true }],
35
+ },
36
+ // Validated with validateUrl
37
+ {
38
+ code: `
39
+ const url = req.query.url;
40
+ validateUrl(url);
41
+ res.redirect(url);
42
+ `,
43
+ },
44
+ // Validated with isValidUrl
45
+ {
46
+ code: `
47
+ const redirect = req.query.redirect;
48
+ if (isValidUrl(redirect)) {
49
+ res.redirect(redirect);
50
+ }
51
+ `,
52
+ },
53
+ // Validated with allowedDomains check
54
+ {
55
+ code: `
56
+ const target = req.body.target;
57
+ if (allowedDomains.includes(target)) {
58
+ res.redirect(target);
59
+ }
60
+ `,
61
+ },
62
+ // Validated with startsWith check
63
+ {
64
+ code: `
65
+ const url = req.params.url;
66
+ url.startsWith('https://');
67
+ res.redirect(url);
68
+ `,
69
+ },
70
+ ],
71
+ invalid: [],
72
+ });
73
+ });
74
+
75
+ describe('Invalid Code - Insecure Redirects', () => {
76
+ ruleTester.run('invalid - unvalidated redirects', noInsecureRedirects, {
77
+ valid: [],
78
+ invalid: [
79
+ { code: 'res.redirect(req.query.url);', errors: [{ messageId: 'insecureRedirect' }] },
80
+ { code: 'res.redirect(req.body.redirectUrl);', errors: [{ messageId: 'insecureRedirect' }] },
81
+ { code: 'window.location.href = req.params.url;', errors: [{ messageId: 'insecureRedirect' }] },
82
+ // Using location.replace
83
+ { code: 'location.replace(req.query.url);', errors: [{ messageId: 'insecureRedirect' }] },
84
+ { code: 'location.assign(req.body.next);', errors: [{ messageId: 'insecureRedirect' }] },
85
+ ],
86
+ });
87
+ });
88
+
89
+ describe('Options', () => {
90
+ ruleTester.run('options - ignoreInTests', noInsecureRedirects, {
91
+ valid: [
92
+ {
93
+ code: 'res.redirect(req.query.url);',
94
+ filename: 'test.spec.ts',
95
+ options: [{ ignoreInTests: true }],
96
+ },
97
+ ],
98
+ invalid: [
99
+ {
100
+ code: 'res.redirect(req.query.url);',
101
+ filename: 'test.spec.ts',
102
+ options: [{ ignoreInTests: false }],
103
+ errors: [{ messageId: 'insecureRedirect' }],
104
+ },
105
+ ],
106
+ });
107
+ });
108
+ });
@@ -0,0 +1,72 @@
1
+ /**
2
+ * @fileoverview Require secure WebSocket connections (wss://)
3
+ */
4
+
5
+ import { createRule, formatLLMMessage, MessageIcons } from '@interlace/eslint-devkit';
6
+ import type { TSESTree } from '@interlace/eslint-devkit';
7
+
8
+ type MessageIds = 'violationDetected';
9
+
10
+ // eslint-disable-next-line @typescript-eslint/no-empty-object-type, @typescript-eslint/no-empty-interface -- Rule has no configurable options
11
+ export interface Options {}
12
+
13
+ type RuleOptions = [Options?];
14
+
15
+ export const noInsecureWebsocket = createRule<RuleOptions, MessageIds>({
16
+ name: 'no-insecure-websocket',
17
+ meta: {
18
+ type: 'problem',
19
+ docs: {
20
+ description: 'Require secure WebSocket connections (wss://)',
21
+ },
22
+ messages: {
23
+ violationDetected: formatLLMMessage({
24
+ icon: MessageIcons.SECURITY,
25
+ issueName: 'Insecure WebSocket',
26
+ cwe: 'CWE-319',
27
+ description: 'Insecure WebSocket connection (ws://) - data transmitted in clear text',
28
+ severity: 'HIGH',
29
+ fix: 'Use wss:// instead of ws:// for secure WebSocket connections',
30
+ documentationLink: 'https://cwe.mitre.org/data/definitions/319.html',
31
+ })
32
+ },
33
+ schema: [],
34
+ },
35
+ defaultOptions: [],
36
+ create(context) {
37
+ function report(node: TSESTree.Node) {
38
+ context.report({ node, messageId: 'violationDetected' });
39
+ }
40
+
41
+ return {
42
+ NewExpression(node: TSESTree.NewExpression) {
43
+ // Check for new WebSocket('ws://...')
44
+ if (node.callee.type === 'Identifier' && node.callee.name === 'WebSocket') {
45
+ const urlArg = node.arguments[0];
46
+
47
+ // Check literal string
48
+ if (urlArg && urlArg.type === 'Literal' &&
49
+ typeof urlArg.value === 'string' &&
50
+ urlArg.value.startsWith('ws://')) {
51
+ report(node);
52
+ }
53
+
54
+ // Check template literal
55
+ if (urlArg && urlArg.type === 'TemplateLiteral') {
56
+ const text = context.sourceCode.getText(urlArg);
57
+ if (text.includes('ws://')) {
58
+ report(node);
59
+ }
60
+ }
61
+ }
62
+ },
63
+
64
+ Literal(node: TSESTree.Literal) {
65
+ // Check for ws:// URLs in string literals
66
+ if (typeof node.value === 'string' && node.value.startsWith('ws://')) {
67
+ report(node);
68
+ }
69
+ },
70
+ };
71
+ },
72
+ });