eslint-plugin-secure-coding 2.3.2 → 2.3.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (361) hide show
  1. package/README.md +1 -0
  2. package/package.json +3 -10
  3. package/src/index.ts +605 -0
  4. package/src/rules/__tests__/integration-demo.test.ts +290 -0
  5. package/src/rules/__tests__/integration-llm.test.ts +89 -0
  6. package/src/rules/database-injection/database-injection.test.ts +456 -0
  7. package/src/rules/database-injection/index.ts +488 -0
  8. package/src/rules/detect-child-process/detect-child-process.test.ts +207 -0
  9. package/src/rules/detect-child-process/index.ts +634 -0
  10. package/src/rules/detect-eval-with-expression/detect-eval-with-expression.test.ts +416 -0
  11. package/src/rules/detect-eval-with-expression/index.ts +463 -0
  12. package/src/rules/detect-mixed-content/detect-mixed-content.test.ts +28 -0
  13. package/src/rules/detect-mixed-content/index.ts +52 -0
  14. package/src/rules/detect-non-literal-fs-filename/detect-non-literal-fs-filename.test.ts +269 -0
  15. package/src/rules/detect-non-literal-fs-filename/index.ts +551 -0
  16. package/src/rules/detect-non-literal-regexp/detect-non-literal-regexp.test.ts +189 -0
  17. package/src/rules/detect-non-literal-regexp/index.ts +490 -0
  18. package/src/rules/detect-object-injection/detect-object-injection.test.ts +440 -0
  19. package/src/rules/detect-object-injection/index.ts +674 -0
  20. package/src/rules/detect-suspicious-dependencies/detect-suspicious-dependencies.test.ts +32 -0
  21. package/src/rules/detect-suspicious-dependencies/index.ts +84 -0
  22. package/src/rules/detect-weak-password-validation/detect-weak-password-validation.test.ts +31 -0
  23. package/src/rules/detect-weak-password-validation/index.ts +68 -0
  24. package/src/rules/no-allow-arbitrary-loads/index.ts +54 -0
  25. package/src/rules/no-allow-arbitrary-loads/no-allow-arbitrary-loads.test.ts +28 -0
  26. package/src/rules/no-arbitrary-file-access/index.ts +238 -0
  27. package/src/rules/no-arbitrary-file-access/no-arbitrary-file-access.test.ts +119 -0
  28. package/src/rules/no-buffer-overread/index.ts +724 -0
  29. package/src/rules/no-buffer-overread/no-buffer-overread.test.ts +313 -0
  30. package/src/rules/no-clickjacking/index.ts +481 -0
  31. package/src/rules/no-clickjacking/no-clickjacking.test.ts +253 -0
  32. package/src/rules/no-client-side-auth-logic/index.ts +81 -0
  33. package/src/rules/no-client-side-auth-logic/no-client-side-auth-logic.test.ts +33 -0
  34. package/src/rules/no-credentials-in-query-params/index.ts +69 -0
  35. package/src/rules/no-credentials-in-query-params/no-credentials-in-query-params.test.ts +33 -0
  36. package/src/rules/no-credentials-in-storage-api/index.ts +64 -0
  37. package/src/rules/no-credentials-in-storage-api/no-credentials-in-storage-api.test.ts +31 -0
  38. package/src/rules/no-data-in-temp-storage/index.ts +75 -0
  39. package/src/rules/no-data-in-temp-storage/no-data-in-temp-storage.test.ts +33 -0
  40. package/src/rules/no-debug-code-in-production/index.ts +59 -0
  41. package/src/rules/no-debug-code-in-production/no-debug-code-in-production.test.ts +26 -0
  42. package/src/rules/no-directive-injection/index.ts +551 -0
  43. package/src/rules/no-directive-injection/no-directive-injection.test.ts +305 -0
  44. package/src/rules/no-disabled-certificate-validation/index.ts +72 -0
  45. package/src/rules/no-disabled-certificate-validation/no-disabled-certificate-validation.test.ts +33 -0
  46. package/src/rules/no-document-cookie/index.ts +113 -0
  47. package/src/rules/no-document-cookie/no-document-cookie.test.ts +382 -0
  48. package/src/rules/no-dynamic-dependency-loading/index.ts +60 -0
  49. package/src/rules/no-dynamic-dependency-loading/no-dynamic-dependency-loading.test.ts +27 -0
  50. package/src/rules/no-electron-security-issues/index.ts +504 -0
  51. package/src/rules/no-electron-security-issues/no-electron-security-issues.test.ts +324 -0
  52. package/src/rules/no-exposed-debug-endpoints/index.ts +73 -0
  53. package/src/rules/no-exposed-debug-endpoints/no-exposed-debug-endpoints.test.ts +40 -0
  54. package/src/rules/no-exposed-sensitive-data/index.ts +428 -0
  55. package/src/rules/no-exposed-sensitive-data/no-exposed-sensitive-data.test.ts +75 -0
  56. package/src/rules/no-format-string-injection/index.ts +801 -0
  57. package/src/rules/no-format-string-injection/no-format-string-injection.test.ts +437 -0
  58. package/src/rules/no-graphql-injection/index.ts +508 -0
  59. package/src/rules/no-graphql-injection/no-graphql-injection.test.ts +371 -0
  60. package/src/rules/no-hardcoded-credentials/index.ts +478 -0
  61. package/src/rules/no-hardcoded-credentials/no-hardcoded-credentials.test.ts +639 -0
  62. package/src/rules/no-hardcoded-session-tokens/index.ts +69 -0
  63. package/src/rules/no-hardcoded-session-tokens/no-hardcoded-session-tokens.test.ts +42 -0
  64. package/src/rules/no-http-urls/index.ts +131 -0
  65. package/src/rules/no-http-urls/no-http-urls.test.ts +60 -0
  66. package/src/rules/no-improper-sanitization/index.ts +502 -0
  67. package/src/rules/no-improper-sanitization/no-improper-sanitization.test.ts +156 -0
  68. package/src/rules/no-improper-type-validation/index.ts +572 -0
  69. package/src/rules/no-improper-type-validation/no-improper-type-validation.test.ts +372 -0
  70. package/src/rules/no-insecure-comparison/index.ts +232 -0
  71. package/src/rules/no-insecure-comparison/no-insecure-comparison.test.ts +218 -0
  72. package/src/rules/no-insecure-cookie-settings/index.ts +391 -0
  73. package/src/rules/no-insecure-cookie-settings/no-insecure-cookie-settings.test.ts +409 -0
  74. package/src/rules/no-insecure-jwt/index.ts +467 -0
  75. package/src/rules/no-insecure-jwt/no-insecure-jwt.test.ts +259 -0
  76. package/src/rules/no-insecure-redirects/index.ts +267 -0
  77. package/src/rules/no-insecure-redirects/no-insecure-redirects.test.ts +108 -0
  78. package/src/rules/no-insecure-websocket/index.ts +72 -0
  79. package/src/rules/no-insecure-websocket/no-insecure-websocket.test.ts +42 -0
  80. package/src/rules/no-insufficient-postmessage-validation/index.ts +497 -0
  81. package/src/rules/no-insufficient-postmessage-validation/no-insufficient-postmessage-validation.test.ts +360 -0
  82. package/src/rules/no-insufficient-random/index.ts +288 -0
  83. package/src/rules/no-insufficient-random/no-insufficient-random.test.ts +246 -0
  84. package/src/rules/no-ldap-injection/index.ts +547 -0
  85. package/src/rules/no-ldap-injection/no-ldap-injection.test.ts +317 -0
  86. package/src/rules/no-missing-authentication/index.ts +408 -0
  87. package/src/rules/no-missing-authentication/no-missing-authentication.test.ts +350 -0
  88. package/src/rules/no-missing-cors-check/index.ts +453 -0
  89. package/src/rules/no-missing-cors-check/no-missing-cors-check.test.ts +392 -0
  90. package/src/rules/no-missing-csrf-protection/index.ts +229 -0
  91. package/src/rules/no-missing-csrf-protection/no-missing-csrf-protection.test.ts +222 -0
  92. package/src/rules/no-missing-security-headers/index.ts +266 -0
  93. package/src/rules/no-missing-security-headers/no-missing-security-headers.test.ts +98 -0
  94. package/src/rules/no-password-in-url/index.ts +64 -0
  95. package/src/rules/no-password-in-url/no-password-in-url.test.ts +27 -0
  96. package/src/rules/no-permissive-cors/index.ts +78 -0
  97. package/src/rules/no-permissive-cors/no-permissive-cors.test.ts +28 -0
  98. package/src/rules/no-pii-in-logs/index.ts +83 -0
  99. package/src/rules/no-pii-in-logs/no-pii-in-logs.test.ts +26 -0
  100. package/src/rules/no-postmessage-origin-wildcard/index.ts +67 -0
  101. package/src/rules/no-postmessage-origin-wildcard/no-postmessage-origin-wildcard.test.ts +27 -0
  102. package/src/rules/no-privilege-escalation/index.ts +403 -0
  103. package/src/rules/no-privilege-escalation/no-privilege-escalation.test.ts +306 -0
  104. package/src/rules/no-redos-vulnerable-regex/index.ts +379 -0
  105. package/src/rules/no-redos-vulnerable-regex/no-redos-vulnerable-regex.test.ts +83 -0
  106. package/src/rules/no-sensitive-data-exposure/index.ts +294 -0
  107. package/src/rules/no-sensitive-data-exposure/no-sensitive-data-exposure.test.ts +262 -0
  108. package/src/rules/no-sensitive-data-in-analytics/index.ts +73 -0
  109. package/src/rules/no-sensitive-data-in-analytics/no-sensitive-data-in-analytics.test.ts +42 -0
  110. package/src/rules/no-sensitive-data-in-cache/index.ts +59 -0
  111. package/src/rules/no-sensitive-data-in-cache/no-sensitive-data-in-cache.test.ts +32 -0
  112. package/src/rules/no-sql-injection/index.ts +424 -0
  113. package/src/rules/no-sql-injection/no-sql-injection.test.ts +303 -0
  114. package/src/rules/no-timing-attack/index.ts +552 -0
  115. package/src/rules/no-timing-attack/no-timing-attack.test.ts +348 -0
  116. package/src/rules/no-toctou-vulnerability/index.ts +250 -0
  117. package/src/rules/no-toctou-vulnerability/no-toctou-vulnerability.test.ts +60 -0
  118. package/src/rules/no-tracking-without-consent/index.ts +78 -0
  119. package/src/rules/no-tracking-without-consent/no-tracking-without-consent.test.ts +34 -0
  120. package/src/rules/no-unchecked-loop-condition/index.ts +781 -0
  121. package/src/rules/no-unchecked-loop-condition/no-unchecked-loop-condition.test.ts +459 -0
  122. package/src/rules/no-unencrypted-local-storage/index.ts +73 -0
  123. package/src/rules/no-unencrypted-local-storage/no-unencrypted-local-storage.test.ts +41 -0
  124. package/src/rules/no-unencrypted-transmission/index.ts +296 -0
  125. package/src/rules/no-unencrypted-transmission/no-unencrypted-transmission.test.ts +287 -0
  126. package/src/rules/no-unescaped-url-parameter/index.ts +424 -0
  127. package/src/rules/no-unescaped-url-parameter/no-unescaped-url-parameter.test.ts +263 -0
  128. package/src/rules/no-unlimited-resource-allocation/index.ts +767 -0
  129. package/src/rules/no-unlimited-resource-allocation/no-unlimited-resource-allocation.test.ts +544 -0
  130. package/src/rules/no-unsafe-deserialization/index.ts +593 -0
  131. package/src/rules/no-unsafe-deserialization/no-unsafe-deserialization.test.ts +310 -0
  132. package/src/rules/no-unsafe-dynamic-require/index.ts +125 -0
  133. package/src/rules/no-unsafe-dynamic-require/no-unsafe-dynamic-require.test.ts +151 -0
  134. package/src/rules/no-unsafe-regex-construction/index.ts +370 -0
  135. package/src/rules/no-unsafe-regex-construction/no-unsafe-regex-construction.test.ts +181 -0
  136. package/src/rules/no-unsanitized-html/index.ts +400 -0
  137. package/src/rules/no-unsanitized-html/no-unsanitized-html.test.ts +488 -0
  138. package/src/rules/no-unvalidated-deeplinks/index.ts +73 -0
  139. package/src/rules/no-unvalidated-deeplinks/no-unvalidated-deeplinks.test.ts +29 -0
  140. package/src/rules/no-unvalidated-user-input/index.ts +498 -0
  141. package/src/rules/no-unvalidated-user-input/no-unvalidated-user-input.test.ts +463 -0
  142. package/src/rules/no-verbose-error-messages/index.ts +83 -0
  143. package/src/rules/no-verbose-error-messages/no-verbose-error-messages.test.ts +34 -0
  144. package/src/rules/no-weak-crypto/index.ts +447 -0
  145. package/src/rules/no-weak-crypto/no-weak-crypto.test.ts +297 -0
  146. package/src/rules/no-weak-password-recovery/index.ts +509 -0
  147. package/src/rules/no-weak-password-recovery/no-weak-password-recovery.test.ts +184 -0
  148. package/src/rules/no-xpath-injection/index.ts +596 -0
  149. package/src/rules/no-xpath-injection/no-xpath-injection.test.ts +405 -0
  150. package/src/rules/no-xxe-injection/index.ts +342 -0
  151. package/src/rules/no-xxe-injection/no-xxe-injection.test.ts +122 -0
  152. package/src/rules/no-zip-slip/index.ts +526 -0
  153. package/src/rules/no-zip-slip/no-zip-slip.test.ts +305 -0
  154. package/src/rules/require-backend-authorization/index.ts +71 -0
  155. package/src/rules/require-backend-authorization/require-backend-authorization.test.ts +31 -0
  156. package/src/rules/require-code-minification/index.ts +54 -0
  157. package/src/rules/require-code-minification/require-code-minification.test.ts +30 -0
  158. package/src/rules/require-csp-headers/index.ts +74 -0
  159. package/src/rules/require-csp-headers/require-csp-headers.test.ts +34 -0
  160. package/src/rules/require-data-minimization/index.ts +65 -0
  161. package/src/rules/require-data-minimization/require-data-minimization.test.ts +31 -0
  162. package/src/rules/require-dependency-integrity/index.ts +78 -0
  163. package/src/rules/require-dependency-integrity/require-dependency-integrity.test.ts +44 -0
  164. package/src/rules/require-https-only/index.ts +75 -0
  165. package/src/rules/require-https-only/require-https-only.test.ts +26 -0
  166. package/src/rules/require-mime-type-validation/index.ts +77 -0
  167. package/src/rules/require-mime-type-validation/require-mime-type-validation.test.ts +32 -0
  168. package/src/rules/require-network-timeout/index.ts +58 -0
  169. package/src/rules/require-network-timeout/require-network-timeout.test.ts +26 -0
  170. package/src/rules/require-package-lock/index.ts +75 -0
  171. package/src/rules/require-package-lock/require-package-lock.test.ts +27 -0
  172. package/src/rules/require-secure-credential-storage/index.ts +60 -0
  173. package/src/rules/require-secure-credential-storage/require-secure-credential-storage.test.ts +26 -0
  174. package/src/rules/require-secure-defaults/index.ts +54 -0
  175. package/src/rules/require-secure-defaults/require-secure-defaults.test.ts +26 -0
  176. package/src/rules/require-secure-deletion/index.ts +52 -0
  177. package/src/rules/require-secure-deletion/require-secure-deletion.test.ts +29 -0
  178. package/src/rules/require-storage-encryption/index.ts +60 -0
  179. package/src/rules/require-storage-encryption/require-storage-encryption.test.ts +26 -0
  180. package/src/rules/require-url-validation/index.ts +85 -0
  181. package/src/rules/require-url-validation/require-url-validation.test.ts +32 -0
  182. package/src/types/{index.d.ts → index.ts} +157 -53
  183. package/src/index.d.ts +0 -32
  184. package/src/index.js +0 -465
  185. package/src/rules/database-injection/index.d.ts +0 -13
  186. package/src/rules/database-injection/index.js +0 -406
  187. package/src/rules/detect-child-process/index.d.ts +0 -11
  188. package/src/rules/detect-child-process/index.js +0 -529
  189. package/src/rules/detect-eval-with-expression/index.d.ts +0 -9
  190. package/src/rules/detect-eval-with-expression/index.js +0 -392
  191. package/src/rules/detect-mixed-content/index.d.ts +0 -8
  192. package/src/rules/detect-mixed-content/index.js +0 -44
  193. package/src/rules/detect-non-literal-fs-filename/index.d.ts +0 -7
  194. package/src/rules/detect-non-literal-fs-filename/index.js +0 -454
  195. package/src/rules/detect-non-literal-regexp/index.d.ts +0 -9
  196. package/src/rules/detect-non-literal-regexp/index.js +0 -403
  197. package/src/rules/detect-object-injection/index.d.ts +0 -11
  198. package/src/rules/detect-object-injection/index.js +0 -560
  199. package/src/rules/detect-suspicious-dependencies/index.d.ts +0 -8
  200. package/src/rules/detect-suspicious-dependencies/index.js +0 -71
  201. package/src/rules/detect-weak-password-validation/index.d.ts +0 -6
  202. package/src/rules/detect-weak-password-validation/index.js +0 -58
  203. package/src/rules/no-allow-arbitrary-loads/index.d.ts +0 -8
  204. package/src/rules/no-allow-arbitrary-loads/index.js +0 -47
  205. package/src/rules/no-arbitrary-file-access/index.d.ts +0 -13
  206. package/src/rules/no-arbitrary-file-access/index.js +0 -195
  207. package/src/rules/no-buffer-overread/index.d.ts +0 -29
  208. package/src/rules/no-buffer-overread/index.js +0 -606
  209. package/src/rules/no-clickjacking/index.d.ts +0 -10
  210. package/src/rules/no-clickjacking/index.js +0 -396
  211. package/src/rules/no-client-side-auth-logic/index.d.ts +0 -6
  212. package/src/rules/no-client-side-auth-logic/index.js +0 -69
  213. package/src/rules/no-credentials-in-query-params/index.d.ts +0 -8
  214. package/src/rules/no-credentials-in-query-params/index.js +0 -57
  215. package/src/rules/no-credentials-in-storage-api/index.d.ts +0 -6
  216. package/src/rules/no-credentials-in-storage-api/index.js +0 -54
  217. package/src/rules/no-data-in-temp-storage/index.d.ts +0 -6
  218. package/src/rules/no-data-in-temp-storage/index.js +0 -64
  219. package/src/rules/no-debug-code-in-production/index.d.ts +0 -8
  220. package/src/rules/no-debug-code-in-production/index.js +0 -51
  221. package/src/rules/no-directive-injection/index.d.ts +0 -12
  222. package/src/rules/no-directive-injection/index.js +0 -457
  223. package/src/rules/no-disabled-certificate-validation/index.d.ts +0 -6
  224. package/src/rules/no-disabled-certificate-validation/index.js +0 -61
  225. package/src/rules/no-document-cookie/index.d.ts +0 -5
  226. package/src/rules/no-document-cookie/index.js +0 -89
  227. package/src/rules/no-dynamic-dependency-loading/index.d.ts +0 -8
  228. package/src/rules/no-dynamic-dependency-loading/index.js +0 -51
  229. package/src/rules/no-electron-security-issues/index.d.ts +0 -10
  230. package/src/rules/no-electron-security-issues/index.js +0 -423
  231. package/src/rules/no-exposed-debug-endpoints/index.d.ts +0 -6
  232. package/src/rules/no-exposed-debug-endpoints/index.js +0 -62
  233. package/src/rules/no-exposed-sensitive-data/index.d.ts +0 -11
  234. package/src/rules/no-exposed-sensitive-data/index.js +0 -340
  235. package/src/rules/no-format-string-injection/index.d.ts +0 -17
  236. package/src/rules/no-format-string-injection/index.js +0 -660
  237. package/src/rules/no-graphql-injection/index.d.ts +0 -12
  238. package/src/rules/no-graphql-injection/index.js +0 -411
  239. package/src/rules/no-hardcoded-credentials/index.d.ts +0 -26
  240. package/src/rules/no-hardcoded-credentials/index.js +0 -376
  241. package/src/rules/no-hardcoded-session-tokens/index.d.ts +0 -6
  242. package/src/rules/no-hardcoded-session-tokens/index.js +0 -59
  243. package/src/rules/no-http-urls/index.d.ts +0 -12
  244. package/src/rules/no-http-urls/index.js +0 -114
  245. package/src/rules/no-improper-sanitization/index.d.ts +0 -12
  246. package/src/rules/no-improper-sanitization/index.js +0 -411
  247. package/src/rules/no-improper-type-validation/index.d.ts +0 -10
  248. package/src/rules/no-improper-type-validation/index.js +0 -475
  249. package/src/rules/no-insecure-comparison/index.d.ts +0 -7
  250. package/src/rules/no-insecure-comparison/index.js +0 -193
  251. package/src/rules/no-insecure-cookie-settings/index.d.ts +0 -9
  252. package/src/rules/no-insecure-cookie-settings/index.js +0 -306
  253. package/src/rules/no-insecure-jwt/index.d.ts +0 -10
  254. package/src/rules/no-insecure-jwt/index.js +0 -380
  255. package/src/rules/no-insecure-redirects/index.d.ts +0 -7
  256. package/src/rules/no-insecure-redirects/index.js +0 -216
  257. package/src/rules/no-insecure-websocket/index.d.ts +0 -6
  258. package/src/rules/no-insecure-websocket/index.js +0 -61
  259. package/src/rules/no-insufficient-postmessage-validation/index.d.ts +0 -14
  260. package/src/rules/no-insufficient-postmessage-validation/index.js +0 -392
  261. package/src/rules/no-insufficient-random/index.d.ts +0 -9
  262. package/src/rules/no-insufficient-random/index.js +0 -208
  263. package/src/rules/no-ldap-injection/index.d.ts +0 -10
  264. package/src/rules/no-ldap-injection/index.js +0 -455
  265. package/src/rules/no-missing-authentication/index.d.ts +0 -13
  266. package/src/rules/no-missing-authentication/index.js +0 -333
  267. package/src/rules/no-missing-cors-check/index.d.ts +0 -9
  268. package/src/rules/no-missing-cors-check/index.js +0 -399
  269. package/src/rules/no-missing-csrf-protection/index.d.ts +0 -11
  270. package/src/rules/no-missing-csrf-protection/index.js +0 -180
  271. package/src/rules/no-missing-security-headers/index.d.ts +0 -7
  272. package/src/rules/no-missing-security-headers/index.js +0 -218
  273. package/src/rules/no-password-in-url/index.d.ts +0 -8
  274. package/src/rules/no-password-in-url/index.js +0 -54
  275. package/src/rules/no-permissive-cors/index.d.ts +0 -8
  276. package/src/rules/no-permissive-cors/index.js +0 -65
  277. package/src/rules/no-pii-in-logs/index.d.ts +0 -8
  278. package/src/rules/no-pii-in-logs/index.js +0 -70
  279. package/src/rules/no-postmessage-origin-wildcard/index.d.ts +0 -8
  280. package/src/rules/no-postmessage-origin-wildcard/index.js +0 -56
  281. package/src/rules/no-privilege-escalation/index.d.ts +0 -13
  282. package/src/rules/no-privilege-escalation/index.js +0 -321
  283. package/src/rules/no-redos-vulnerable-regex/index.d.ts +0 -7
  284. package/src/rules/no-redos-vulnerable-regex/index.js +0 -306
  285. package/src/rules/no-sensitive-data-exposure/index.d.ts +0 -11
  286. package/src/rules/no-sensitive-data-exposure/index.js +0 -250
  287. package/src/rules/no-sensitive-data-in-analytics/index.d.ts +0 -8
  288. package/src/rules/no-sensitive-data-in-analytics/index.js +0 -62
  289. package/src/rules/no-sensitive-data-in-cache/index.d.ts +0 -8
  290. package/src/rules/no-sensitive-data-in-cache/index.js +0 -52
  291. package/src/rules/no-sql-injection/index.d.ts +0 -10
  292. package/src/rules/no-sql-injection/index.js +0 -335
  293. package/src/rules/no-timing-attack/index.d.ts +0 -10
  294. package/src/rules/no-timing-attack/index.js +0 -447
  295. package/src/rules/no-toctou-vulnerability/index.d.ts +0 -7
  296. package/src/rules/no-toctou-vulnerability/index.js +0 -208
  297. package/src/rules/no-tracking-without-consent/index.d.ts +0 -6
  298. package/src/rules/no-tracking-without-consent/index.js +0 -67
  299. package/src/rules/no-unchecked-loop-condition/index.d.ts +0 -12
  300. package/src/rules/no-unchecked-loop-condition/index.js +0 -646
  301. package/src/rules/no-unencrypted-local-storage/index.d.ts +0 -8
  302. package/src/rules/no-unencrypted-local-storage/index.js +0 -61
  303. package/src/rules/no-unencrypted-transmission/index.d.ts +0 -11
  304. package/src/rules/no-unencrypted-transmission/index.js +0 -236
  305. package/src/rules/no-unescaped-url-parameter/index.d.ts +0 -9
  306. package/src/rules/no-unescaped-url-parameter/index.js +0 -355
  307. package/src/rules/no-unlimited-resource-allocation/index.d.ts +0 -12
  308. package/src/rules/no-unlimited-resource-allocation/index.js +0 -643
  309. package/src/rules/no-unsafe-deserialization/index.d.ts +0 -10
  310. package/src/rules/no-unsafe-deserialization/index.js +0 -491
  311. package/src/rules/no-unsafe-dynamic-require/index.d.ts +0 -5
  312. package/src/rules/no-unsafe-dynamic-require/index.js +0 -106
  313. package/src/rules/no-unsafe-regex-construction/index.d.ts +0 -9
  314. package/src/rules/no-unsafe-regex-construction/index.js +0 -291
  315. package/src/rules/no-unsanitized-html/index.d.ts +0 -9
  316. package/src/rules/no-unsanitized-html/index.js +0 -335
  317. package/src/rules/no-unvalidated-deeplinks/index.d.ts +0 -6
  318. package/src/rules/no-unvalidated-deeplinks/index.js +0 -62
  319. package/src/rules/no-unvalidated-user-input/index.d.ts +0 -9
  320. package/src/rules/no-unvalidated-user-input/index.js +0 -420
  321. package/src/rules/no-verbose-error-messages/index.d.ts +0 -8
  322. package/src/rules/no-verbose-error-messages/index.js +0 -68
  323. package/src/rules/no-weak-crypto/index.d.ts +0 -11
  324. package/src/rules/no-weak-crypto/index.js +0 -351
  325. package/src/rules/no-weak-password-recovery/index.d.ts +0 -12
  326. package/src/rules/no-weak-password-recovery/index.js +0 -424
  327. package/src/rules/no-xpath-injection/index.d.ts +0 -10
  328. package/src/rules/no-xpath-injection/index.js +0 -487
  329. package/src/rules/no-xxe-injection/index.d.ts +0 -7
  330. package/src/rules/no-xxe-injection/index.js +0 -266
  331. package/src/rules/no-zip-slip/index.d.ts +0 -9
  332. package/src/rules/no-zip-slip/index.js +0 -445
  333. package/src/rules/require-backend-authorization/index.d.ts +0 -6
  334. package/src/rules/require-backend-authorization/index.js +0 -60
  335. package/src/rules/require-code-minification/index.d.ts +0 -8
  336. package/src/rules/require-code-minification/index.js +0 -47
  337. package/src/rules/require-csp-headers/index.d.ts +0 -6
  338. package/src/rules/require-csp-headers/index.js +0 -64
  339. package/src/rules/require-data-minimization/index.d.ts +0 -8
  340. package/src/rules/require-data-minimization/index.js +0 -53
  341. package/src/rules/require-dependency-integrity/index.d.ts +0 -6
  342. package/src/rules/require-dependency-integrity/index.js +0 -64
  343. package/src/rules/require-https-only/index.d.ts +0 -8
  344. package/src/rules/require-https-only/index.js +0 -62
  345. package/src/rules/require-mime-type-validation/index.d.ts +0 -6
  346. package/src/rules/require-mime-type-validation/index.js +0 -66
  347. package/src/rules/require-network-timeout/index.d.ts +0 -8
  348. package/src/rules/require-network-timeout/index.js +0 -50
  349. package/src/rules/require-package-lock/index.d.ts +0 -8
  350. package/src/rules/require-package-lock/index.js +0 -63
  351. package/src/rules/require-secure-credential-storage/index.d.ts +0 -8
  352. package/src/rules/require-secure-credential-storage/index.js +0 -50
  353. package/src/rules/require-secure-defaults/index.d.ts +0 -8
  354. package/src/rules/require-secure-defaults/index.js +0 -47
  355. package/src/rules/require-secure-deletion/index.d.ts +0 -8
  356. package/src/rules/require-secure-deletion/index.js +0 -44
  357. package/src/rules/require-storage-encryption/index.d.ts +0 -8
  358. package/src/rules/require-storage-encryption/index.js +0 -50
  359. package/src/rules/require-url-validation/index.d.ts +0 -6
  360. package/src/rules/require-url-validation/index.js +0 -72
  361. package/src/types/index.js +0 -17
@@ -0,0 +1,488 @@
1
+ /**
2
+ * Comprehensive tests for no-unsanitized-html rule
3
+ * CWE-79: Cross-site Scripting (XSS)
4
+ */
5
+ import { RuleTester } from '@typescript-eslint/rule-tester';
6
+ import { describe, it, afterAll } from 'vitest';
7
+ import parser from '@typescript-eslint/parser';
8
+ import { noUnsanitizedHtml } from './index';
9
+
10
+ // Configure RuleTester for Vitest
11
+ RuleTester.afterAll = afterAll;
12
+ RuleTester.it = it;
13
+ RuleTester.itOnly = it.only;
14
+ RuleTester.describe = describe;
15
+
16
+ // Use Flat Config format (ESLint 9+)
17
+ const ruleTester = new RuleTester({
18
+ languageOptions: {
19
+ parser,
20
+ ecmaVersion: 2022,
21
+ sourceType: 'module',
22
+ parserOptions: {
23
+ ecmaFeatures: {
24
+ jsx: true,
25
+ },
26
+ },
27
+ },
28
+ });
29
+
30
+ describe('no-unsanitized-html', () => {
31
+ describe('Valid Code', () => {
32
+ ruleTester.run('valid - sanitized HTML', noUnsanitizedHtml, {
33
+ valid: [
34
+ // Using textContent
35
+ {
36
+ code: 'element.textContent = userInput;',
37
+ },
38
+ // Sanitized with DOMPurify
39
+ {
40
+ code: 'element.innerHTML = DOMPurify.sanitize(html);',
41
+ },
42
+ {
43
+ code: '<div dangerouslySetInnerHTML={{ __html: DOMPurify.sanitize(html) }} />',
44
+ },
45
+ // Sanitized with sanitize-html
46
+ {
47
+ code: 'element.innerHTML = sanitizeHtml(userInput);',
48
+ },
49
+ // Test files (when allowInTests is true)
50
+ {
51
+ code: 'element.innerHTML = userInput;',
52
+ filename: 'test.spec.ts',
53
+ options: [{ allowInTests: true }],
54
+ },
55
+ // Ignored patterns
56
+ {
57
+ code: 'safeElement.innerHTML = safeHtml;',
58
+ options: [{ ignorePatterns: ['safeElement'] }],
59
+ },
60
+ ],
61
+ invalid: [],
62
+ });
63
+ });
64
+
65
+ describe('Invalid Code - innerHTML', () => {
66
+ ruleTester.run('invalid - unsanitized innerHTML', noUnsanitizedHtml, {
67
+ valid: [],
68
+ invalid: [
69
+ {
70
+ code: 'element.innerHTML = userInput;',
71
+ errors: [
72
+ {
73
+ messageId: 'unsanitizedHtml',
74
+ suggestions: [
75
+ {
76
+ messageId: 'useTextContent',
77
+ output: 'element.textContent = userInput;',
78
+ },
79
+ // Note: useSanitizeLibrary suggestion is provided but not recognized by test framework
80
+ // because fix returns null (suggestions are not auto-fixable)
81
+ ],
82
+ },
83
+ ],
84
+ },
85
+ {
86
+ code: 'document.getElementById("container").innerHTML = html;',
87
+ errors: [
88
+ {
89
+ messageId: 'unsanitizedHtml',
90
+ suggestions: [
91
+ {
92
+ messageId: 'useTextContent',
93
+ output: 'document.getElementById("container").textContent = html;',
94
+ },
95
+ // Note: useSanitizeLibrary suggestion is provided but not recognized by test framework
96
+ ],
97
+ },
98
+ ],
99
+ },
100
+ {
101
+ code: 'const div = document.createElement("div"); div.innerHTML = userData;',
102
+ errors: [
103
+ {
104
+ messageId: 'unsanitizedHtml',
105
+ suggestions: [
106
+ {
107
+ messageId: 'useTextContent',
108
+ output: 'const div = document.createElement("div"); div.textContent = userData;',
109
+ },
110
+ // Note: useSanitizeLibrary suggestion is provided but not recognized by test framework
111
+ ],
112
+ },
113
+ ],
114
+ },
115
+ ],
116
+ });
117
+ });
118
+
119
+ describe('Invalid Code - dangerouslySetInnerHTML', () => {
120
+ ruleTester.run('invalid - unsanitized dangerouslySetInnerHTML', noUnsanitizedHtml, {
121
+ valid: [],
122
+ invalid: [
123
+ {
124
+ code: '<div dangerouslySetInnerHTML={{ __html: userInput }} />',
125
+ errors: [
126
+ {
127
+ messageId: 'unsanitizedHtml',
128
+ // Note: Suggestions are provided by the rule but not recognized by test framework
129
+ // because fix returns null (suggestions are not auto-fixable)
130
+ },
131
+ ],
132
+ },
133
+ {
134
+ code: '<span dangerouslySetInnerHTML={{ __html: html }} />',
135
+ errors: [
136
+ {
137
+ messageId: 'unsanitizedHtml',
138
+ },
139
+ ],
140
+ },
141
+ ],
142
+ });
143
+ });
144
+
145
+ describe('Options', () => {
146
+ ruleTester.run('options - allowInTests', noUnsanitizedHtml, {
147
+ valid: [
148
+ {
149
+ code: 'element.innerHTML = userInput;',
150
+ filename: 'component.test.tsx',
151
+ options: [{ allowInTests: true }],
152
+ },
153
+ ],
154
+ invalid: [
155
+ {
156
+ code: 'element.innerHTML = userInput;',
157
+ filename: 'component.tsx',
158
+ options: [{ allowInTests: true }],
159
+ errors: [
160
+ {
161
+ messageId: 'unsanitizedHtml',
162
+ },
163
+ ],
164
+ },
165
+ ],
166
+ });
167
+
168
+ ruleTester.run('options - test file without allowInTests', noUnsanitizedHtml, {
169
+ valid: [],
170
+ invalid: [
171
+ {
172
+ code: 'element.innerHTML = userInput;',
173
+ filename: 'component.spec.tsx',
174
+ errors: [
175
+ {
176
+ messageId: 'unsanitizedHtml',
177
+ suggestions: [
178
+ {
179
+ messageId: 'useTextContent',
180
+ output: 'element.textContent = userInput;',
181
+ },
182
+ ],
183
+ },
184
+ ],
185
+ },
186
+ ],
187
+ });
188
+
189
+ ruleTester.run('options - trustedLibraries', noUnsanitizedHtml, {
190
+ valid: [
191
+ {
192
+ code: 'element.innerHTML = mySanitizer.clean(html);',
193
+ options: [{ trustedLibraries: ['mySanitizer'] }],
194
+ },
195
+ {
196
+ code: 'element.innerHTML = sanitize(userInput);',
197
+ options: [{ trustedLibraries: ['sanitize'] }],
198
+ },
199
+ {
200
+ code: 'element.innerHTML = purify(html);',
201
+ },
202
+ {
203
+ code: 'element.innerHTML = escape(userInput);',
204
+ },
205
+ ],
206
+ invalid: [],
207
+ });
208
+
209
+ ruleTester.run('options - ignorePatterns with invalid regex', noUnsanitizedHtml, {
210
+ valid: [],
211
+ invalid: [
212
+ {
213
+ code: 'testElement.innerHTML = html;',
214
+ options: [{ ignorePatterns: ['['] }], // Invalid regex should be caught and treated as literal, but '[' doesn't match 'testElement'
215
+ errors: [
216
+ {
217
+ messageId: 'unsanitizedHtml',
218
+ suggestions: [
219
+ {
220
+ messageId: 'useTextContent',
221
+ output: 'testElement.textContent = html;',
222
+ },
223
+ // Note: useSanitizeLibrary suggestion is provided but not recognized by test framework
224
+ ],
225
+ },
226
+ ],
227
+ },
228
+ ],
229
+ });
230
+ });
231
+
232
+ describe('Edge Cases', () => {
233
+ ruleTester.run('edge cases - sanitization function names', noUnsanitizedHtml, {
234
+ valid: [
235
+ {
236
+ code: 'element.innerHTML = sanitize(userInput);',
237
+ },
238
+ {
239
+ code: 'element.innerHTML = sanitizeHtml(html);',
240
+ },
241
+ {
242
+ code: 'element.innerHTML = purify(content);',
243
+ },
244
+ {
245
+ code: 'element.innerHTML = escape(text);',
246
+ },
247
+ ],
248
+ invalid: [],
249
+ });
250
+
251
+ ruleTester.run('edge cases - JSX with non-object expression', noUnsanitizedHtml, {
252
+ valid: [],
253
+ invalid: [
254
+ {
255
+ code: '<div dangerouslySetInnerHTML={userInput} />',
256
+ errors: [
257
+ {
258
+ messageId: 'unsanitizedHtml',
259
+ },
260
+ ],
261
+ },
262
+ ],
263
+ });
264
+
265
+ ruleTester.run('edge cases - JSX with object but no __html', noUnsanitizedHtml, {
266
+ valid: [],
267
+ invalid: [
268
+ {
269
+ code: '<div dangerouslySetInnerHTML={{ html: userInput }} />',
270
+ errors: [
271
+ {
272
+ messageId: 'unsanitizedHtml',
273
+ },
274
+ ],
275
+ },
276
+ ],
277
+ });
278
+
279
+ ruleTester.run('edge cases - assignment to non-innerHTML property', noUnsanitizedHtml, {
280
+ valid: [
281
+ {
282
+ code: 'element.textContent = userInput;',
283
+ },
284
+ {
285
+ code: 'element.className = "test";',
286
+ },
287
+ ],
288
+ invalid: [],
289
+ });
290
+
291
+ ruleTester.run('edge cases - trusted libraries with MemberExpression', noUnsanitizedHtml, {
292
+ valid: [
293
+ {
294
+ code: 'element.innerHTML = mySanitizer.clean(html);',
295
+ options: [{ trustedLibraries: ['mySanitizer'] }],
296
+ },
297
+ {
298
+ code: 'element.innerHTML = customLib.sanitize(userInput);',
299
+ options: [{ trustedLibraries: ['customLib'] }],
300
+ },
301
+ ],
302
+ invalid: [],
303
+ });
304
+
305
+ ruleTester.run('edge cases - non-Identifier right side that is safe', noUnsanitizedHtml, {
306
+ valid: [
307
+ {
308
+ code: 'element.innerHTML = "safe string";',
309
+ },
310
+ {
311
+ code: 'element.innerHTML = 123;',
312
+ },
313
+ {
314
+ code: 'element.innerHTML = true;',
315
+ },
316
+ ],
317
+ invalid: [],
318
+ });
319
+
320
+ ruleTester.run('edge cases - Identifier with suspicious patterns', noUnsanitizedHtml, {
321
+ valid: [],
322
+ invalid: [
323
+ {
324
+ code: 'element.innerHTML = data;',
325
+ errors: [
326
+ {
327
+ messageId: 'unsanitizedHtml',
328
+ suggestions: [
329
+ {
330
+ messageId: 'useTextContent',
331
+ output: 'element.textContent = data;',
332
+ },
333
+ // Note: useSanitizeLibrary suggestion is provided but not recognized by test framework
334
+ ],
335
+ },
336
+ ],
337
+ },
338
+ {
339
+ code: 'element.innerHTML = input;',
340
+ errors: [
341
+ {
342
+ messageId: 'unsanitizedHtml',
343
+ suggestions: [
344
+ {
345
+ messageId: 'useTextContent',
346
+ output: 'element.textContent = input;',
347
+ },
348
+ // Note: useSanitizeLibrary suggestion is provided but not recognized by test framework
349
+ ],
350
+ },
351
+ ],
352
+ },
353
+ {
354
+ code: 'element.innerHTML = value;',
355
+ errors: [
356
+ {
357
+ messageId: 'unsanitizedHtml',
358
+ suggestions: [
359
+ {
360
+ messageId: 'useTextContent',
361
+ output: 'element.textContent = value;',
362
+ },
363
+ // Note: useSanitizeLibrary suggestion is provided but not recognized by test framework
364
+ ],
365
+ },
366
+ ],
367
+ },
368
+ {
369
+ code: 'element.innerHTML = param;',
370
+ errors: [
371
+ {
372
+ messageId: 'unsanitizedHtml',
373
+ suggestions: [
374
+ {
375
+ messageId: 'useTextContent',
376
+ output: 'element.textContent = param;',
377
+ },
378
+ // Note: useSanitizeLibrary suggestion is provided but not recognized by test framework
379
+ ],
380
+ },
381
+ ],
382
+ },
383
+ {
384
+ code: 'element.innerHTML = arg;',
385
+ errors: [
386
+ {
387
+ messageId: 'unsanitizedHtml',
388
+ suggestions: [
389
+ {
390
+ messageId: 'useTextContent',
391
+ output: 'element.textContent = arg;',
392
+ },
393
+ // Note: useSanitizeLibrary suggestion is provided but not recognized by test framework
394
+ ],
395
+ },
396
+ ],
397
+ },
398
+ ],
399
+ });
400
+
401
+ ruleTester.run('edge cases - CallExpression sanitization with MemberExpression', noUnsanitizedHtml, {
402
+ valid: [
403
+ {
404
+ code: 'element.innerHTML = DOMPurify.sanitize(html);',
405
+ },
406
+ {
407
+ code: 'element.innerHTML = myLib.sanitize(userInput);',
408
+ options: [{ trustedLibraries: ['myLib'] }],
409
+ },
410
+ ],
411
+ invalid: [],
412
+ });
413
+
414
+ ruleTester.run('edge cases - allowInTests option behavior', noUnsanitizedHtml, {
415
+ valid: [
416
+ {
417
+ code: 'element.innerHTML = userInput;',
418
+ filename: 'test.spec.ts',
419
+ options: [{ allowInTests: true }],
420
+ },
421
+ ],
422
+ invalid: [
423
+ {
424
+ code: 'element.innerHTML = userInput;',
425
+ filename: 'server.ts',
426
+ options: [{ allowInTests: true }],
427
+ errors: [
428
+ {
429
+ messageId: 'unsanitizedHtml',
430
+ // No suggestions when allowInTests is true but file is not a test file
431
+ },
432
+ ],
433
+ },
434
+ ],
435
+ });
436
+
437
+ ruleTester.run('edge cases - JSX with CallExpression sanitization', noUnsanitizedHtml, {
438
+ valid: [
439
+ {
440
+ code: '<div dangerouslySetInnerHTML={{ __html: sanitize(html) }} />',
441
+ },
442
+ {
443
+ code: '<div dangerouslySetInnerHTML={{ __html: sanitizeHtml(userInput) }} />',
444
+ },
445
+ {
446
+ code: '<div dangerouslySetInnerHTML={{ __html: purify(content) }} />',
447
+ },
448
+ {
449
+ code: '<div dangerouslySetInnerHTML={{ __html: escape(text) }} />',
450
+ },
451
+ ],
452
+ invalid: [],
453
+ });
454
+
455
+ ruleTester.run('edge cases - JSX with ignorePatterns', noUnsanitizedHtml, {
456
+ valid: [
457
+ {
458
+ code: '<div dangerouslySetInnerHTML={{ __html: safeHtml }} />',
459
+ options: [{ ignorePatterns: ['safeHtml'] }],
460
+ },
461
+ ],
462
+ invalid: [
463
+ {
464
+ code: '<div dangerouslySetInnerHTML={{ __html: userInput }} />',
465
+ options: [{ ignorePatterns: ['safeHtml'] }],
466
+ errors: [
467
+ {
468
+ messageId: 'unsanitizedHtml',
469
+ },
470
+ ],
471
+ },
472
+ ],
473
+ });
474
+
475
+ ruleTester.run('edge cases - JSX with non-user-input identifiers', noUnsanitizedHtml, {
476
+ valid: [
477
+ {
478
+ code: '<div dangerouslySetInnerHTML={{ __html: staticContent }} />',
479
+ },
480
+ {
481
+ code: '<div dangerouslySetInnerHTML={{ __html: template }} />',
482
+ },
483
+ ],
484
+ invalid: [],
485
+ });
486
+ });
487
+ });
488
+
@@ -0,0 +1,73 @@
1
+ /**
2
+ * @fileoverview Require validation of deep link URLs
3
+ */
4
+
5
+ import { createRule, formatLLMMessage, MessageIcons } from '@interlace/eslint-devkit';
6
+ import type { TSESTree } from '@interlace/eslint-devkit';
7
+
8
+ type MessageIds = 'violationDetected';
9
+
10
+ // eslint-disable-next-line @typescript-eslint/no-empty-object-type, @typescript-eslint/no-empty-interface -- Rule has no configurable options
11
+ export interface Options {}
12
+
13
+ type RuleOptions = [Options?];
14
+
15
+ export const noUnvalidatedDeeplinks = createRule<RuleOptions, MessageIds>({
16
+ name: 'no-unvalidated-deeplinks',
17
+ meta: {
18
+ type: 'problem',
19
+ docs: {
20
+ description: 'Require validation of deep link URLs',
21
+ },
22
+ messages: {
23
+ violationDetected: formatLLMMessage({
24
+ icon: MessageIcons.SECURITY,
25
+ issueName: 'Unvalidated Deeplink',
26
+ cwe: 'CWE-939',
27
+ description: 'Deep link URL used without validation - potential open redirect',
28
+ severity: 'HIGH',
29
+ fix: 'Validate deep link URLs against a whitelist before navigation',
30
+ documentationLink: 'https://cwe.mitre.org/data/definitions/939.html',
31
+ })
32
+ },
33
+ schema: [],
34
+ },
35
+ defaultOptions: [],
36
+ create(context) {
37
+ function report(node: TSESTree.Node) {
38
+ context.report({ node, messageId: 'violationDetected' });
39
+ }
40
+
41
+ return {
42
+ CallExpression(node: TSESTree.CallExpression) {
43
+ // Detect Linking.openURL() with variable argument (React Native)
44
+ if (node.callee.type === 'MemberExpression' &&
45
+ node.callee.object.type === 'Identifier' &&
46
+ node.callee.object.name === 'Linking' &&
47
+ node.callee.property.type === 'Identifier' &&
48
+ node.callee.property.name === 'openURL') {
49
+
50
+ const urlArg = node.arguments[0];
51
+ // Flag if URL is a variable/expression, not a literal
52
+ if (urlArg && urlArg.type === 'Identifier') {
53
+ report(node);
54
+ }
55
+ if (urlArg && urlArg.type === 'MemberExpression') {
56
+ report(node);
57
+ }
58
+ }
59
+
60
+ // Detect navigation.navigate with external URLs
61
+ if (node.callee.type === 'MemberExpression' &&
62
+ node.callee.property.type === 'Identifier' &&
63
+ node.callee.property.name === 'navigate') {
64
+
65
+ const urlArg = node.arguments[0];
66
+ if (urlArg && urlArg.type === 'Identifier') {
67
+ report(node);
68
+ }
69
+ }
70
+ },
71
+ };
72
+ },
73
+ });
@@ -0,0 +1,29 @@
1
+ /**
2
+ * @fileoverview Tests for no-unvalidated-deeplinks
3
+ */
4
+
5
+ import { RuleTester } from '@typescript-eslint/rule-tester';
6
+ import { noUnvalidatedDeeplinks } from './index';
7
+
8
+ const ruleTester = new RuleTester({
9
+ languageOptions: {
10
+ ecmaVersion: 2022,
11
+ sourceType: 'module',
12
+ },
13
+ });
14
+
15
+ ruleTester.run('no-unvalidated-deeplinks', noUnvalidatedDeeplinks, {
16
+ valid: [
17
+ // Static URLs are safe
18
+ { code: "Linking.openURL('https://example.com')" },
19
+ { code: "navigation.navigate('Home')" },
20
+ { code: "const url = 'myapp://page'" },
21
+ ],
22
+
23
+ invalid: [
24
+ // Variable URLs without validation
25
+ { code: "Linking.openURL(deeplinkUrl)", errors: [{ messageId: 'violationDetected' }] },
26
+ { code: "Linking.openURL(params.url)", errors: [{ messageId: 'violationDetected' }] },
27
+ { code: "navigation.navigate(targetScreen)", errors: [{ messageId: 'violationDetected' }] },
28
+ ],
29
+ });