eslint-plugin-secure-coding 2.3.2 → 2.3.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -0
- package/package.json +3 -10
- package/src/index.ts +605 -0
- package/src/rules/__tests__/integration-demo.test.ts +290 -0
- package/src/rules/__tests__/integration-llm.test.ts +89 -0
- package/src/rules/database-injection/database-injection.test.ts +456 -0
- package/src/rules/database-injection/index.ts +488 -0
- package/src/rules/detect-child-process/detect-child-process.test.ts +207 -0
- package/src/rules/detect-child-process/index.ts +634 -0
- package/src/rules/detect-eval-with-expression/detect-eval-with-expression.test.ts +416 -0
- package/src/rules/detect-eval-with-expression/index.ts +463 -0
- package/src/rules/detect-mixed-content/detect-mixed-content.test.ts +28 -0
- package/src/rules/detect-mixed-content/index.ts +52 -0
- package/src/rules/detect-non-literal-fs-filename/detect-non-literal-fs-filename.test.ts +269 -0
- package/src/rules/detect-non-literal-fs-filename/index.ts +551 -0
- package/src/rules/detect-non-literal-regexp/detect-non-literal-regexp.test.ts +189 -0
- package/src/rules/detect-non-literal-regexp/index.ts +490 -0
- package/src/rules/detect-object-injection/detect-object-injection.test.ts +440 -0
- package/src/rules/detect-object-injection/index.ts +674 -0
- package/src/rules/detect-suspicious-dependencies/detect-suspicious-dependencies.test.ts +32 -0
- package/src/rules/detect-suspicious-dependencies/index.ts +84 -0
- package/src/rules/detect-weak-password-validation/detect-weak-password-validation.test.ts +31 -0
- package/src/rules/detect-weak-password-validation/index.ts +68 -0
- package/src/rules/no-allow-arbitrary-loads/index.ts +54 -0
- package/src/rules/no-allow-arbitrary-loads/no-allow-arbitrary-loads.test.ts +28 -0
- package/src/rules/no-arbitrary-file-access/index.ts +238 -0
- package/src/rules/no-arbitrary-file-access/no-arbitrary-file-access.test.ts +119 -0
- package/src/rules/no-buffer-overread/index.ts +724 -0
- package/src/rules/no-buffer-overread/no-buffer-overread.test.ts +313 -0
- package/src/rules/no-clickjacking/index.ts +481 -0
- package/src/rules/no-clickjacking/no-clickjacking.test.ts +253 -0
- package/src/rules/no-client-side-auth-logic/index.ts +81 -0
- package/src/rules/no-client-side-auth-logic/no-client-side-auth-logic.test.ts +33 -0
- package/src/rules/no-credentials-in-query-params/index.ts +69 -0
- package/src/rules/no-credentials-in-query-params/no-credentials-in-query-params.test.ts +33 -0
- package/src/rules/no-credentials-in-storage-api/index.ts +64 -0
- package/src/rules/no-credentials-in-storage-api/no-credentials-in-storage-api.test.ts +31 -0
- package/src/rules/no-data-in-temp-storage/index.ts +75 -0
- package/src/rules/no-data-in-temp-storage/no-data-in-temp-storage.test.ts +33 -0
- package/src/rules/no-debug-code-in-production/index.ts +59 -0
- package/src/rules/no-debug-code-in-production/no-debug-code-in-production.test.ts +26 -0
- package/src/rules/no-directive-injection/index.ts +551 -0
- package/src/rules/no-directive-injection/no-directive-injection.test.ts +305 -0
- package/src/rules/no-disabled-certificate-validation/index.ts +72 -0
- package/src/rules/no-disabled-certificate-validation/no-disabled-certificate-validation.test.ts +33 -0
- package/src/rules/no-document-cookie/index.ts +113 -0
- package/src/rules/no-document-cookie/no-document-cookie.test.ts +382 -0
- package/src/rules/no-dynamic-dependency-loading/index.ts +60 -0
- package/src/rules/no-dynamic-dependency-loading/no-dynamic-dependency-loading.test.ts +27 -0
- package/src/rules/no-electron-security-issues/index.ts +504 -0
- package/src/rules/no-electron-security-issues/no-electron-security-issues.test.ts +324 -0
- package/src/rules/no-exposed-debug-endpoints/index.ts +73 -0
- package/src/rules/no-exposed-debug-endpoints/no-exposed-debug-endpoints.test.ts +40 -0
- package/src/rules/no-exposed-sensitive-data/index.ts +428 -0
- package/src/rules/no-exposed-sensitive-data/no-exposed-sensitive-data.test.ts +75 -0
- package/src/rules/no-format-string-injection/index.ts +801 -0
- package/src/rules/no-format-string-injection/no-format-string-injection.test.ts +437 -0
- package/src/rules/no-graphql-injection/index.ts +508 -0
- package/src/rules/no-graphql-injection/no-graphql-injection.test.ts +371 -0
- package/src/rules/no-hardcoded-credentials/index.ts +478 -0
- package/src/rules/no-hardcoded-credentials/no-hardcoded-credentials.test.ts +639 -0
- package/src/rules/no-hardcoded-session-tokens/index.ts +69 -0
- package/src/rules/no-hardcoded-session-tokens/no-hardcoded-session-tokens.test.ts +42 -0
- package/src/rules/no-http-urls/index.ts +131 -0
- package/src/rules/no-http-urls/no-http-urls.test.ts +60 -0
- package/src/rules/no-improper-sanitization/index.ts +502 -0
- package/src/rules/no-improper-sanitization/no-improper-sanitization.test.ts +156 -0
- package/src/rules/no-improper-type-validation/index.ts +572 -0
- package/src/rules/no-improper-type-validation/no-improper-type-validation.test.ts +372 -0
- package/src/rules/no-insecure-comparison/index.ts +232 -0
- package/src/rules/no-insecure-comparison/no-insecure-comparison.test.ts +218 -0
- package/src/rules/no-insecure-cookie-settings/index.ts +391 -0
- package/src/rules/no-insecure-cookie-settings/no-insecure-cookie-settings.test.ts +409 -0
- package/src/rules/no-insecure-jwt/index.ts +467 -0
- package/src/rules/no-insecure-jwt/no-insecure-jwt.test.ts +259 -0
- package/src/rules/no-insecure-redirects/index.ts +267 -0
- package/src/rules/no-insecure-redirects/no-insecure-redirects.test.ts +108 -0
- package/src/rules/no-insecure-websocket/index.ts +72 -0
- package/src/rules/no-insecure-websocket/no-insecure-websocket.test.ts +42 -0
- package/src/rules/no-insufficient-postmessage-validation/index.ts +497 -0
- package/src/rules/no-insufficient-postmessage-validation/no-insufficient-postmessage-validation.test.ts +360 -0
- package/src/rules/no-insufficient-random/index.ts +288 -0
- package/src/rules/no-insufficient-random/no-insufficient-random.test.ts +246 -0
- package/src/rules/no-ldap-injection/index.ts +547 -0
- package/src/rules/no-ldap-injection/no-ldap-injection.test.ts +317 -0
- package/src/rules/no-missing-authentication/index.ts +408 -0
- package/src/rules/no-missing-authentication/no-missing-authentication.test.ts +350 -0
- package/src/rules/no-missing-cors-check/index.ts +453 -0
- package/src/rules/no-missing-cors-check/no-missing-cors-check.test.ts +392 -0
- package/src/rules/no-missing-csrf-protection/index.ts +229 -0
- package/src/rules/no-missing-csrf-protection/no-missing-csrf-protection.test.ts +222 -0
- package/src/rules/no-missing-security-headers/index.ts +266 -0
- package/src/rules/no-missing-security-headers/no-missing-security-headers.test.ts +98 -0
- package/src/rules/no-password-in-url/index.ts +64 -0
- package/src/rules/no-password-in-url/no-password-in-url.test.ts +27 -0
- package/src/rules/no-permissive-cors/index.ts +78 -0
- package/src/rules/no-permissive-cors/no-permissive-cors.test.ts +28 -0
- package/src/rules/no-pii-in-logs/index.ts +83 -0
- package/src/rules/no-pii-in-logs/no-pii-in-logs.test.ts +26 -0
- package/src/rules/no-postmessage-origin-wildcard/index.ts +67 -0
- package/src/rules/no-postmessage-origin-wildcard/no-postmessage-origin-wildcard.test.ts +27 -0
- package/src/rules/no-privilege-escalation/index.ts +403 -0
- package/src/rules/no-privilege-escalation/no-privilege-escalation.test.ts +306 -0
- package/src/rules/no-redos-vulnerable-regex/index.ts +379 -0
- package/src/rules/no-redos-vulnerable-regex/no-redos-vulnerable-regex.test.ts +83 -0
- package/src/rules/no-sensitive-data-exposure/index.ts +294 -0
- package/src/rules/no-sensitive-data-exposure/no-sensitive-data-exposure.test.ts +262 -0
- package/src/rules/no-sensitive-data-in-analytics/index.ts +73 -0
- package/src/rules/no-sensitive-data-in-analytics/no-sensitive-data-in-analytics.test.ts +42 -0
- package/src/rules/no-sensitive-data-in-cache/index.ts +59 -0
- package/src/rules/no-sensitive-data-in-cache/no-sensitive-data-in-cache.test.ts +32 -0
- package/src/rules/no-sql-injection/index.ts +424 -0
- package/src/rules/no-sql-injection/no-sql-injection.test.ts +303 -0
- package/src/rules/no-timing-attack/index.ts +552 -0
- package/src/rules/no-timing-attack/no-timing-attack.test.ts +348 -0
- package/src/rules/no-toctou-vulnerability/index.ts +250 -0
- package/src/rules/no-toctou-vulnerability/no-toctou-vulnerability.test.ts +60 -0
- package/src/rules/no-tracking-without-consent/index.ts +78 -0
- package/src/rules/no-tracking-without-consent/no-tracking-without-consent.test.ts +34 -0
- package/src/rules/no-unchecked-loop-condition/index.ts +781 -0
- package/src/rules/no-unchecked-loop-condition/no-unchecked-loop-condition.test.ts +459 -0
- package/src/rules/no-unencrypted-local-storage/index.ts +73 -0
- package/src/rules/no-unencrypted-local-storage/no-unencrypted-local-storage.test.ts +41 -0
- package/src/rules/no-unencrypted-transmission/index.ts +296 -0
- package/src/rules/no-unencrypted-transmission/no-unencrypted-transmission.test.ts +287 -0
- package/src/rules/no-unescaped-url-parameter/index.ts +424 -0
- package/src/rules/no-unescaped-url-parameter/no-unescaped-url-parameter.test.ts +263 -0
- package/src/rules/no-unlimited-resource-allocation/index.ts +767 -0
- package/src/rules/no-unlimited-resource-allocation/no-unlimited-resource-allocation.test.ts +544 -0
- package/src/rules/no-unsafe-deserialization/index.ts +593 -0
- package/src/rules/no-unsafe-deserialization/no-unsafe-deserialization.test.ts +310 -0
- package/src/rules/no-unsafe-dynamic-require/index.ts +125 -0
- package/src/rules/no-unsafe-dynamic-require/no-unsafe-dynamic-require.test.ts +151 -0
- package/src/rules/no-unsafe-regex-construction/index.ts +370 -0
- package/src/rules/no-unsafe-regex-construction/no-unsafe-regex-construction.test.ts +181 -0
- package/src/rules/no-unsanitized-html/index.ts +400 -0
- package/src/rules/no-unsanitized-html/no-unsanitized-html.test.ts +488 -0
- package/src/rules/no-unvalidated-deeplinks/index.ts +73 -0
- package/src/rules/no-unvalidated-deeplinks/no-unvalidated-deeplinks.test.ts +29 -0
- package/src/rules/no-unvalidated-user-input/index.ts +498 -0
- package/src/rules/no-unvalidated-user-input/no-unvalidated-user-input.test.ts +463 -0
- package/src/rules/no-verbose-error-messages/index.ts +83 -0
- package/src/rules/no-verbose-error-messages/no-verbose-error-messages.test.ts +34 -0
- package/src/rules/no-weak-crypto/index.ts +447 -0
- package/src/rules/no-weak-crypto/no-weak-crypto.test.ts +297 -0
- package/src/rules/no-weak-password-recovery/index.ts +509 -0
- package/src/rules/no-weak-password-recovery/no-weak-password-recovery.test.ts +184 -0
- package/src/rules/no-xpath-injection/index.ts +596 -0
- package/src/rules/no-xpath-injection/no-xpath-injection.test.ts +405 -0
- package/src/rules/no-xxe-injection/index.ts +342 -0
- package/src/rules/no-xxe-injection/no-xxe-injection.test.ts +122 -0
- package/src/rules/no-zip-slip/index.ts +526 -0
- package/src/rules/no-zip-slip/no-zip-slip.test.ts +305 -0
- package/src/rules/require-backend-authorization/index.ts +71 -0
- package/src/rules/require-backend-authorization/require-backend-authorization.test.ts +31 -0
- package/src/rules/require-code-minification/index.ts +54 -0
- package/src/rules/require-code-minification/require-code-minification.test.ts +30 -0
- package/src/rules/require-csp-headers/index.ts +74 -0
- package/src/rules/require-csp-headers/require-csp-headers.test.ts +34 -0
- package/src/rules/require-data-minimization/index.ts +65 -0
- package/src/rules/require-data-minimization/require-data-minimization.test.ts +31 -0
- package/src/rules/require-dependency-integrity/index.ts +78 -0
- package/src/rules/require-dependency-integrity/require-dependency-integrity.test.ts +44 -0
- package/src/rules/require-https-only/index.ts +75 -0
- package/src/rules/require-https-only/require-https-only.test.ts +26 -0
- package/src/rules/require-mime-type-validation/index.ts +77 -0
- package/src/rules/require-mime-type-validation/require-mime-type-validation.test.ts +32 -0
- package/src/rules/require-network-timeout/index.ts +58 -0
- package/src/rules/require-network-timeout/require-network-timeout.test.ts +26 -0
- package/src/rules/require-package-lock/index.ts +75 -0
- package/src/rules/require-package-lock/require-package-lock.test.ts +27 -0
- package/src/rules/require-secure-credential-storage/index.ts +60 -0
- package/src/rules/require-secure-credential-storage/require-secure-credential-storage.test.ts +26 -0
- package/src/rules/require-secure-defaults/index.ts +54 -0
- package/src/rules/require-secure-defaults/require-secure-defaults.test.ts +26 -0
- package/src/rules/require-secure-deletion/index.ts +52 -0
- package/src/rules/require-secure-deletion/require-secure-deletion.test.ts +29 -0
- package/src/rules/require-storage-encryption/index.ts +60 -0
- package/src/rules/require-storage-encryption/require-storage-encryption.test.ts +26 -0
- package/src/rules/require-url-validation/index.ts +85 -0
- package/src/rules/require-url-validation/require-url-validation.test.ts +32 -0
- package/src/types/{index.d.ts → index.ts} +157 -53
- package/src/index.d.ts +0 -32
- package/src/index.js +0 -465
- package/src/rules/database-injection/index.d.ts +0 -13
- package/src/rules/database-injection/index.js +0 -406
- package/src/rules/detect-child-process/index.d.ts +0 -11
- package/src/rules/detect-child-process/index.js +0 -529
- package/src/rules/detect-eval-with-expression/index.d.ts +0 -9
- package/src/rules/detect-eval-with-expression/index.js +0 -392
- package/src/rules/detect-mixed-content/index.d.ts +0 -8
- package/src/rules/detect-mixed-content/index.js +0 -44
- package/src/rules/detect-non-literal-fs-filename/index.d.ts +0 -7
- package/src/rules/detect-non-literal-fs-filename/index.js +0 -454
- package/src/rules/detect-non-literal-regexp/index.d.ts +0 -9
- package/src/rules/detect-non-literal-regexp/index.js +0 -403
- package/src/rules/detect-object-injection/index.d.ts +0 -11
- package/src/rules/detect-object-injection/index.js +0 -560
- package/src/rules/detect-suspicious-dependencies/index.d.ts +0 -8
- package/src/rules/detect-suspicious-dependencies/index.js +0 -71
- package/src/rules/detect-weak-password-validation/index.d.ts +0 -6
- package/src/rules/detect-weak-password-validation/index.js +0 -58
- package/src/rules/no-allow-arbitrary-loads/index.d.ts +0 -8
- package/src/rules/no-allow-arbitrary-loads/index.js +0 -47
- package/src/rules/no-arbitrary-file-access/index.d.ts +0 -13
- package/src/rules/no-arbitrary-file-access/index.js +0 -195
- package/src/rules/no-buffer-overread/index.d.ts +0 -29
- package/src/rules/no-buffer-overread/index.js +0 -606
- package/src/rules/no-clickjacking/index.d.ts +0 -10
- package/src/rules/no-clickjacking/index.js +0 -396
- package/src/rules/no-client-side-auth-logic/index.d.ts +0 -6
- package/src/rules/no-client-side-auth-logic/index.js +0 -69
- package/src/rules/no-credentials-in-query-params/index.d.ts +0 -8
- package/src/rules/no-credentials-in-query-params/index.js +0 -57
- package/src/rules/no-credentials-in-storage-api/index.d.ts +0 -6
- package/src/rules/no-credentials-in-storage-api/index.js +0 -54
- package/src/rules/no-data-in-temp-storage/index.d.ts +0 -6
- package/src/rules/no-data-in-temp-storage/index.js +0 -64
- package/src/rules/no-debug-code-in-production/index.d.ts +0 -8
- package/src/rules/no-debug-code-in-production/index.js +0 -51
- package/src/rules/no-directive-injection/index.d.ts +0 -12
- package/src/rules/no-directive-injection/index.js +0 -457
- package/src/rules/no-disabled-certificate-validation/index.d.ts +0 -6
- package/src/rules/no-disabled-certificate-validation/index.js +0 -61
- package/src/rules/no-document-cookie/index.d.ts +0 -5
- package/src/rules/no-document-cookie/index.js +0 -89
- package/src/rules/no-dynamic-dependency-loading/index.d.ts +0 -8
- package/src/rules/no-dynamic-dependency-loading/index.js +0 -51
- package/src/rules/no-electron-security-issues/index.d.ts +0 -10
- package/src/rules/no-electron-security-issues/index.js +0 -423
- package/src/rules/no-exposed-debug-endpoints/index.d.ts +0 -6
- package/src/rules/no-exposed-debug-endpoints/index.js +0 -62
- package/src/rules/no-exposed-sensitive-data/index.d.ts +0 -11
- package/src/rules/no-exposed-sensitive-data/index.js +0 -340
- package/src/rules/no-format-string-injection/index.d.ts +0 -17
- package/src/rules/no-format-string-injection/index.js +0 -660
- package/src/rules/no-graphql-injection/index.d.ts +0 -12
- package/src/rules/no-graphql-injection/index.js +0 -411
- package/src/rules/no-hardcoded-credentials/index.d.ts +0 -26
- package/src/rules/no-hardcoded-credentials/index.js +0 -376
- package/src/rules/no-hardcoded-session-tokens/index.d.ts +0 -6
- package/src/rules/no-hardcoded-session-tokens/index.js +0 -59
- package/src/rules/no-http-urls/index.d.ts +0 -12
- package/src/rules/no-http-urls/index.js +0 -114
- package/src/rules/no-improper-sanitization/index.d.ts +0 -12
- package/src/rules/no-improper-sanitization/index.js +0 -411
- package/src/rules/no-improper-type-validation/index.d.ts +0 -10
- package/src/rules/no-improper-type-validation/index.js +0 -475
- package/src/rules/no-insecure-comparison/index.d.ts +0 -7
- package/src/rules/no-insecure-comparison/index.js +0 -193
- package/src/rules/no-insecure-cookie-settings/index.d.ts +0 -9
- package/src/rules/no-insecure-cookie-settings/index.js +0 -306
- package/src/rules/no-insecure-jwt/index.d.ts +0 -10
- package/src/rules/no-insecure-jwt/index.js +0 -380
- package/src/rules/no-insecure-redirects/index.d.ts +0 -7
- package/src/rules/no-insecure-redirects/index.js +0 -216
- package/src/rules/no-insecure-websocket/index.d.ts +0 -6
- package/src/rules/no-insecure-websocket/index.js +0 -61
- package/src/rules/no-insufficient-postmessage-validation/index.d.ts +0 -14
- package/src/rules/no-insufficient-postmessage-validation/index.js +0 -392
- package/src/rules/no-insufficient-random/index.d.ts +0 -9
- package/src/rules/no-insufficient-random/index.js +0 -208
- package/src/rules/no-ldap-injection/index.d.ts +0 -10
- package/src/rules/no-ldap-injection/index.js +0 -455
- package/src/rules/no-missing-authentication/index.d.ts +0 -13
- package/src/rules/no-missing-authentication/index.js +0 -333
- package/src/rules/no-missing-cors-check/index.d.ts +0 -9
- package/src/rules/no-missing-cors-check/index.js +0 -399
- package/src/rules/no-missing-csrf-protection/index.d.ts +0 -11
- package/src/rules/no-missing-csrf-protection/index.js +0 -180
- package/src/rules/no-missing-security-headers/index.d.ts +0 -7
- package/src/rules/no-missing-security-headers/index.js +0 -218
- package/src/rules/no-password-in-url/index.d.ts +0 -8
- package/src/rules/no-password-in-url/index.js +0 -54
- package/src/rules/no-permissive-cors/index.d.ts +0 -8
- package/src/rules/no-permissive-cors/index.js +0 -65
- package/src/rules/no-pii-in-logs/index.d.ts +0 -8
- package/src/rules/no-pii-in-logs/index.js +0 -70
- package/src/rules/no-postmessage-origin-wildcard/index.d.ts +0 -8
- package/src/rules/no-postmessage-origin-wildcard/index.js +0 -56
- package/src/rules/no-privilege-escalation/index.d.ts +0 -13
- package/src/rules/no-privilege-escalation/index.js +0 -321
- package/src/rules/no-redos-vulnerable-regex/index.d.ts +0 -7
- package/src/rules/no-redos-vulnerable-regex/index.js +0 -306
- package/src/rules/no-sensitive-data-exposure/index.d.ts +0 -11
- package/src/rules/no-sensitive-data-exposure/index.js +0 -250
- package/src/rules/no-sensitive-data-in-analytics/index.d.ts +0 -8
- package/src/rules/no-sensitive-data-in-analytics/index.js +0 -62
- package/src/rules/no-sensitive-data-in-cache/index.d.ts +0 -8
- package/src/rules/no-sensitive-data-in-cache/index.js +0 -52
- package/src/rules/no-sql-injection/index.d.ts +0 -10
- package/src/rules/no-sql-injection/index.js +0 -335
- package/src/rules/no-timing-attack/index.d.ts +0 -10
- package/src/rules/no-timing-attack/index.js +0 -447
- package/src/rules/no-toctou-vulnerability/index.d.ts +0 -7
- package/src/rules/no-toctou-vulnerability/index.js +0 -208
- package/src/rules/no-tracking-without-consent/index.d.ts +0 -6
- package/src/rules/no-tracking-without-consent/index.js +0 -67
- package/src/rules/no-unchecked-loop-condition/index.d.ts +0 -12
- package/src/rules/no-unchecked-loop-condition/index.js +0 -646
- package/src/rules/no-unencrypted-local-storage/index.d.ts +0 -8
- package/src/rules/no-unencrypted-local-storage/index.js +0 -61
- package/src/rules/no-unencrypted-transmission/index.d.ts +0 -11
- package/src/rules/no-unencrypted-transmission/index.js +0 -236
- package/src/rules/no-unescaped-url-parameter/index.d.ts +0 -9
- package/src/rules/no-unescaped-url-parameter/index.js +0 -355
- package/src/rules/no-unlimited-resource-allocation/index.d.ts +0 -12
- package/src/rules/no-unlimited-resource-allocation/index.js +0 -643
- package/src/rules/no-unsafe-deserialization/index.d.ts +0 -10
- package/src/rules/no-unsafe-deserialization/index.js +0 -491
- package/src/rules/no-unsafe-dynamic-require/index.d.ts +0 -5
- package/src/rules/no-unsafe-dynamic-require/index.js +0 -106
- package/src/rules/no-unsafe-regex-construction/index.d.ts +0 -9
- package/src/rules/no-unsafe-regex-construction/index.js +0 -291
- package/src/rules/no-unsanitized-html/index.d.ts +0 -9
- package/src/rules/no-unsanitized-html/index.js +0 -335
- package/src/rules/no-unvalidated-deeplinks/index.d.ts +0 -6
- package/src/rules/no-unvalidated-deeplinks/index.js +0 -62
- package/src/rules/no-unvalidated-user-input/index.d.ts +0 -9
- package/src/rules/no-unvalidated-user-input/index.js +0 -420
- package/src/rules/no-verbose-error-messages/index.d.ts +0 -8
- package/src/rules/no-verbose-error-messages/index.js +0 -68
- package/src/rules/no-weak-crypto/index.d.ts +0 -11
- package/src/rules/no-weak-crypto/index.js +0 -351
- package/src/rules/no-weak-password-recovery/index.d.ts +0 -12
- package/src/rules/no-weak-password-recovery/index.js +0 -424
- package/src/rules/no-xpath-injection/index.d.ts +0 -10
- package/src/rules/no-xpath-injection/index.js +0 -487
- package/src/rules/no-xxe-injection/index.d.ts +0 -7
- package/src/rules/no-xxe-injection/index.js +0 -266
- package/src/rules/no-zip-slip/index.d.ts +0 -9
- package/src/rules/no-zip-slip/index.js +0 -445
- package/src/rules/require-backend-authorization/index.d.ts +0 -6
- package/src/rules/require-backend-authorization/index.js +0 -60
- package/src/rules/require-code-minification/index.d.ts +0 -8
- package/src/rules/require-code-minification/index.js +0 -47
- package/src/rules/require-csp-headers/index.d.ts +0 -6
- package/src/rules/require-csp-headers/index.js +0 -64
- package/src/rules/require-data-minimization/index.d.ts +0 -8
- package/src/rules/require-data-minimization/index.js +0 -53
- package/src/rules/require-dependency-integrity/index.d.ts +0 -6
- package/src/rules/require-dependency-integrity/index.js +0 -64
- package/src/rules/require-https-only/index.d.ts +0 -8
- package/src/rules/require-https-only/index.js +0 -62
- package/src/rules/require-mime-type-validation/index.d.ts +0 -6
- package/src/rules/require-mime-type-validation/index.js +0 -66
- package/src/rules/require-network-timeout/index.d.ts +0 -8
- package/src/rules/require-network-timeout/index.js +0 -50
- package/src/rules/require-package-lock/index.d.ts +0 -8
- package/src/rules/require-package-lock/index.js +0 -63
- package/src/rules/require-secure-credential-storage/index.d.ts +0 -8
- package/src/rules/require-secure-credential-storage/index.js +0 -50
- package/src/rules/require-secure-defaults/index.d.ts +0 -8
- package/src/rules/require-secure-defaults/index.js +0 -47
- package/src/rules/require-secure-deletion/index.d.ts +0 -8
- package/src/rules/require-secure-deletion/index.js +0 -44
- package/src/rules/require-storage-encryption/index.d.ts +0 -8
- package/src/rules/require-storage-encryption/index.js +0 -50
- package/src/rules/require-url-validation/index.d.ts +0 -6
- package/src/rules/require-url-validation/index.js +0 -72
- package/src/types/index.js +0 -17
|
@@ -1,454 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.detectNonLiteralFsFilename = void 0;
|
|
4
|
-
const eslint_devkit_1 = require("@interlace/eslint-devkit");
|
|
5
|
-
const eslint_devkit_2 = require("@interlace/eslint-devkit");
|
|
6
|
-
const FS_OPERATIONS = [
|
|
7
|
-
{
|
|
8
|
-
method: 'readFile',
|
|
9
|
-
dangerous: true,
|
|
10
|
-
vulnerability: 'file-access',
|
|
11
|
-
safePattern: 'path.resolve(SAFE_DIR, path.basename(userInput))',
|
|
12
|
-
example: {
|
|
13
|
-
bad: 'fs.readFile(userPath, callback)',
|
|
14
|
-
good: 'const safePath = path.join(SAFE_UPLOADS_DIR, path.basename(userPath)); fs.readFile(safePath, callback)'
|
|
15
|
-
},
|
|
16
|
-
effort: '10-15 minutes'
|
|
17
|
-
},
|
|
18
|
-
{
|
|
19
|
-
method: 'writeFile',
|
|
20
|
-
dangerous: true,
|
|
21
|
-
vulnerability: 'file-access',
|
|
22
|
-
safePattern: 'path.resolve(SAFE_DIR, path.basename(userInput))',
|
|
23
|
-
example: {
|
|
24
|
-
bad: 'fs.writeFile(userPath, data, callback)',
|
|
25
|
-
good: 'const safePath = path.join(SAFE_WRITES_DIR, path.basename(userPath)); fs.writeFile(safePath, data, callback)'
|
|
26
|
-
},
|
|
27
|
-
effort: '10-15 minutes'
|
|
28
|
-
},
|
|
29
|
-
{
|
|
30
|
-
method: 'stat',
|
|
31
|
-
dangerous: true,
|
|
32
|
-
vulnerability: 'path-traversal',
|
|
33
|
-
safePattern: 'path.resolve(baseDir, userInput) with validation',
|
|
34
|
-
example: {
|
|
35
|
-
bad: 'fs.stat(userPath, callback)',
|
|
36
|
-
good: 'const resolvedPath = path.resolve(SAFE_DIR, userPath);\nif (!resolvedPath.startsWith(SAFE_DIR)) return;\nfs.stat(resolvedPath, callback)'
|
|
37
|
-
},
|
|
38
|
-
effort: '15-20 minutes'
|
|
39
|
-
},
|
|
40
|
-
{
|
|
41
|
-
method: 'readdir',
|
|
42
|
-
dangerous: true,
|
|
43
|
-
vulnerability: 'directory-traversal',
|
|
44
|
-
safePattern: 'Validate directory is within allowed paths',
|
|
45
|
-
example: {
|
|
46
|
-
bad: 'fs.readdir(userDir, callback)',
|
|
47
|
-
good: 'const resolvedDir = path.resolve(ALLOWED_DIRS, userDir);\nif (!resolvedDir.startsWith(ALLOWED_DIRS)) return;\nfs.readdir(resolvedDir, callback)'
|
|
48
|
-
},
|
|
49
|
-
effort: '15-20 minutes'
|
|
50
|
-
}
|
|
51
|
-
];
|
|
52
|
-
exports.detectNonLiteralFsFilename = (0, eslint_devkit_2.createRule)({
|
|
53
|
-
name: 'detect-non-literal-fs-filename',
|
|
54
|
-
meta: {
|
|
55
|
-
type: 'problem',
|
|
56
|
-
docs: {
|
|
57
|
-
description: 'Detects variable in filename argument of fs calls, which might allow an attacker to access anything on your system',
|
|
58
|
-
},
|
|
59
|
-
messages: {
|
|
60
|
-
// 🎯 Token optimization: 39% reduction (49→30 tokens) - template variables still work
|
|
61
|
-
fsPathTraversal: (0, eslint_devkit_1.formatLLMMessage)({
|
|
62
|
-
icon: '🔑',
|
|
63
|
-
issueName: 'Path traversal',
|
|
64
|
-
cwe: 'CWE-22',
|
|
65
|
-
description: 'Path traversal vulnerability',
|
|
66
|
-
severity: '{{riskLevel}}',
|
|
67
|
-
fix: '{{safePattern}}',
|
|
68
|
-
documentationLink: 'https://owasp.org/www-community/attacks/Path_Traversal',
|
|
69
|
-
}),
|
|
70
|
-
usePathResolve: (0, eslint_devkit_1.formatLLMMessage)({
|
|
71
|
-
icon: eslint_devkit_1.MessageIcons.INFO,
|
|
72
|
-
issueName: 'Use path.resolve',
|
|
73
|
-
description: 'Use path.resolve() to normalize paths',
|
|
74
|
-
severity: 'LOW',
|
|
75
|
-
fix: 'path.resolve(SAFE_DIR, userInput)',
|
|
76
|
-
documentationLink: 'https://nodejs.org/api/path.html#pathresolvepaths',
|
|
77
|
-
}),
|
|
78
|
-
validatePath: (0, eslint_devkit_1.formatLLMMessage)({
|
|
79
|
-
icon: eslint_devkit_1.MessageIcons.INFO,
|
|
80
|
-
issueName: 'Validate Path',
|
|
81
|
-
description: 'Validate resolved path starts with allowed base',
|
|
82
|
-
severity: 'LOW',
|
|
83
|
-
fix: 'if (!resolved.startsWith(SAFE_DIR)) throw new Error()',
|
|
84
|
-
documentationLink: 'https://owasp.org/www-community/attacks/Path_Traversal',
|
|
85
|
-
}),
|
|
86
|
-
useBasename: (0, eslint_devkit_1.formatLLMMessage)({
|
|
87
|
-
icon: eslint_devkit_1.MessageIcons.INFO,
|
|
88
|
-
issueName: 'Use path.basename',
|
|
89
|
-
description: 'Use path.basename() to strip directory components',
|
|
90
|
-
severity: 'LOW',
|
|
91
|
-
fix: 'path.basename(userInput)',
|
|
92
|
-
documentationLink: 'https://nodejs.org/api/path.html#pathbasenamepath-suffix',
|
|
93
|
-
}),
|
|
94
|
-
createSafeDir: (0, eslint_devkit_1.formatLLMMessage)({
|
|
95
|
-
icon: eslint_devkit_1.MessageIcons.INFO,
|
|
96
|
-
issueName: 'Define Safe Directory',
|
|
97
|
-
description: 'Define SAFE_DIR constant',
|
|
98
|
-
severity: 'LOW',
|
|
99
|
-
fix: 'const SAFE_DIR = path.resolve(__dirname, "uploads")',
|
|
100
|
-
documentationLink: 'https://owasp.org/www-community/attacks/Path_Traversal',
|
|
101
|
-
}),
|
|
102
|
-
whitelistExtensions: (0, eslint_devkit_1.formatLLMMessage)({
|
|
103
|
-
icon: eslint_devkit_1.MessageIcons.INFO,
|
|
104
|
-
issueName: 'Whitelist Extensions',
|
|
105
|
-
description: 'Whitelist allowed file extensions',
|
|
106
|
-
severity: 'LOW',
|
|
107
|
-
fix: 'const ALLOWED_EXT = [".txt", ".pdf"]; if (!ALLOWED_EXT.includes(ext)) throw',
|
|
108
|
-
documentationLink: 'https://owasp.org/www-community/attacks/Path_Traversal',
|
|
109
|
-
})
|
|
110
|
-
},
|
|
111
|
-
schema: [
|
|
112
|
-
{
|
|
113
|
-
type: 'object',
|
|
114
|
-
properties: {
|
|
115
|
-
allowLiterals: {
|
|
116
|
-
type: 'boolean',
|
|
117
|
-
default: false,
|
|
118
|
-
description: 'Allow literal string paths'
|
|
119
|
-
},
|
|
120
|
-
additionalMethods: {
|
|
121
|
-
type: 'array',
|
|
122
|
-
items: { type: 'string' },
|
|
123
|
-
default: [],
|
|
124
|
-
description: 'Additional fs methods to check'
|
|
125
|
-
},
|
|
126
|
-
allowedExtensions: {
|
|
127
|
-
type: 'array',
|
|
128
|
-
items: { type: 'string' },
|
|
129
|
-
default: [],
|
|
130
|
-
description: 'Allowed file extensions (e.g., [".txt", ".json"])'
|
|
131
|
-
}
|
|
132
|
-
},
|
|
133
|
-
additionalProperties: false,
|
|
134
|
-
},
|
|
135
|
-
],
|
|
136
|
-
},
|
|
137
|
-
defaultOptions: [
|
|
138
|
-
{
|
|
139
|
-
allowLiterals: false,
|
|
140
|
-
additionalMethods: []
|
|
141
|
-
},
|
|
142
|
-
],
|
|
143
|
-
create(context) {
|
|
144
|
-
const options = context.options[0] || {};
|
|
145
|
-
const { allowLiterals = false, additionalMethods = [] } = options || {};
|
|
146
|
-
/**
|
|
147
|
-
* File system methods that can be dangerous with user input
|
|
148
|
-
*/
|
|
149
|
-
const dangerousMethods = [
|
|
150
|
-
'readFile', 'readFileSync',
|
|
151
|
-
'writeFile', 'writeFileSync',
|
|
152
|
-
'appendFile', 'appendFileSync',
|
|
153
|
-
'stat', 'statSync',
|
|
154
|
-
'lstat', 'lstatSync',
|
|
155
|
-
'readdir', 'readdirSync',
|
|
156
|
-
'unlink', 'unlinkSync',
|
|
157
|
-
'mkdir', 'mkdirSync',
|
|
158
|
-
'rmdir', 'rmdirSync',
|
|
159
|
-
'access', 'accessSync',
|
|
160
|
-
'createReadStream', 'createWriteStream',
|
|
161
|
-
...additionalMethods
|
|
162
|
-
];
|
|
163
|
-
/**
|
|
164
|
-
* Check if a node is a literal string (safe)
|
|
165
|
-
*/
|
|
166
|
-
const isLiteralString = (node) => {
|
|
167
|
-
return node.type === 'Literal' && typeof node.value === 'string';
|
|
168
|
-
};
|
|
169
|
-
/**
|
|
170
|
-
* Check if path has dangerous patterns like ../ or ..\
|
|
171
|
-
*/
|
|
172
|
-
const hasTraversalPatterns = (pathStr) => {
|
|
173
|
-
return /\.\.[/\\]/.test(pathStr) || /^\.\.[/\\]/.test(pathStr);
|
|
174
|
-
};
|
|
175
|
-
/**
|
|
176
|
-
* Extract path argument from fs call
|
|
177
|
-
*/
|
|
178
|
-
const extractPathArgument = (node) => {
|
|
179
|
-
const method = node.callee.type === eslint_devkit_1.AST_NODE_TYPES.MemberExpression &&
|
|
180
|
-
node.callee.property.type === eslint_devkit_1.AST_NODE_TYPES.Identifier
|
|
181
|
-
? node.callee.property.name
|
|
182
|
-
: 'unknown';
|
|
183
|
-
const operation = FS_OPERATIONS.find(op => op.method === method) || null;
|
|
184
|
-
// First argument is usually the path
|
|
185
|
-
const pathNode = node.arguments.length > 0 ? node.arguments[0] : null;
|
|
186
|
-
const sourceCode = context.sourceCode || context.sourceCode;
|
|
187
|
-
const path = pathNode ? sourceCode.getText(pathNode) : '';
|
|
188
|
-
return { path, pathNode, method, operation };
|
|
189
|
-
};
|
|
190
|
-
/**
|
|
191
|
-
* Determine if the path argument is potentially dangerous
|
|
192
|
-
*/
|
|
193
|
-
const isDangerousPath = (pathNode, pathStr) => {
|
|
194
|
-
// Allow literals if configured
|
|
195
|
-
if (allowLiterals && pathNode && isLiteralString(pathNode)) {
|
|
196
|
-
return false;
|
|
197
|
-
}
|
|
198
|
-
// Check for obvious traversal patterns in literals
|
|
199
|
-
if (pathNode && isLiteralString(pathNode) && hasTraversalPatterns(pathStr)) {
|
|
200
|
-
return true;
|
|
201
|
-
}
|
|
202
|
-
// SAFE: path.join(__dirname, 'literal', 'path') with all literal args
|
|
203
|
-
if (pathNode && isSafePathConstruction(pathNode)) {
|
|
204
|
-
return false;
|
|
205
|
-
}
|
|
206
|
-
// SAFE: Path variable inside validated if-block with startsWith check
|
|
207
|
-
if (pathNode && hasPathValidation(pathNode)) {
|
|
208
|
-
return false;
|
|
209
|
-
}
|
|
210
|
-
// Any non-literal is dangerous
|
|
211
|
-
return !pathNode || !isLiteralString(pathNode);
|
|
212
|
-
};
|
|
213
|
-
/**
|
|
214
|
-
* Check if path is constructed safely using path.join/__dirname with literal args
|
|
215
|
-
*
|
|
216
|
-
* Safe patterns:
|
|
217
|
-
* - path.join(__dirname, 'data', 'file.json')
|
|
218
|
-
* - path.resolve(__dirname, 'uploads')
|
|
219
|
-
*/
|
|
220
|
-
const isSafePathConstruction = (pathNode) => {
|
|
221
|
-
if (pathNode.type !== eslint_devkit_1.AST_NODE_TYPES.CallExpression) {
|
|
222
|
-
return false;
|
|
223
|
-
}
|
|
224
|
-
const callee = pathNode.callee;
|
|
225
|
-
if (callee.type !== eslint_devkit_1.AST_NODE_TYPES.MemberExpression ||
|
|
226
|
-
callee.object.type !== eslint_devkit_1.AST_NODE_TYPES.Identifier ||
|
|
227
|
-
callee.object.name !== 'path' ||
|
|
228
|
-
callee.property.type !== eslint_devkit_1.AST_NODE_TYPES.Identifier) {
|
|
229
|
-
return false;
|
|
230
|
-
}
|
|
231
|
-
const method = callee.property.name;
|
|
232
|
-
if (!['join', 'resolve'].includes(method)) {
|
|
233
|
-
return false;
|
|
234
|
-
}
|
|
235
|
-
const args = pathNode.arguments;
|
|
236
|
-
if (args.length === 0) {
|
|
237
|
-
return false;
|
|
238
|
-
}
|
|
239
|
-
// First arg should be __dirname or a literal
|
|
240
|
-
const firstArg = args[0];
|
|
241
|
-
const isFirstArgSafe = (firstArg.type === eslint_devkit_1.AST_NODE_TYPES.Identifier && firstArg.name === '__dirname') ||
|
|
242
|
-
(firstArg.type === eslint_devkit_1.AST_NODE_TYPES.Literal && typeof firstArg.value === 'string');
|
|
243
|
-
if (!isFirstArgSafe) {
|
|
244
|
-
return false;
|
|
245
|
-
}
|
|
246
|
-
// All remaining args should be literals
|
|
247
|
-
for (let i = 1; i < args.length; i++) {
|
|
248
|
-
const arg = args[i];
|
|
249
|
-
if (arg.type !== eslint_devkit_1.AST_NODE_TYPES.Literal || typeof arg.value !== 'string') {
|
|
250
|
-
return false;
|
|
251
|
-
}
|
|
252
|
-
// Also check for traversal patterns in literals
|
|
253
|
-
if (hasTraversalPatterns(String(arg.value))) {
|
|
254
|
-
return false;
|
|
255
|
-
}
|
|
256
|
-
}
|
|
257
|
-
return true;
|
|
258
|
-
};
|
|
259
|
-
/**
|
|
260
|
-
* Check if the path variable has been validated with startsWith()
|
|
261
|
-
*
|
|
262
|
-
* Safe patterns:
|
|
263
|
-
* 1. Inside if-block: if (safePath.startsWith(SAFE_DIR)) { fs.readFileSync(safePath); }
|
|
264
|
-
* 2. After guard clause: if (!safePath.startsWith(SAFE_DIR)) { throw }; fs.readFileSync(safePath);
|
|
265
|
-
*/
|
|
266
|
-
const hasPathValidation = (pathNode) => {
|
|
267
|
-
if (pathNode.type !== eslint_devkit_1.AST_NODE_TYPES.Identifier) {
|
|
268
|
-
return false;
|
|
269
|
-
}
|
|
270
|
-
const varName = pathNode.name;
|
|
271
|
-
// AST-based validation detection (faster than getText + regex)
|
|
272
|
-
const isStartsWithOrIncludesCall = (testNode) => {
|
|
273
|
-
// Handle negation: !path.startsWith(...)
|
|
274
|
-
if (testNode.type === eslint_devkit_1.AST_NODE_TYPES.UnaryExpression &&
|
|
275
|
-
testNode.operator === '!' &&
|
|
276
|
-
testNode.argument.type === eslint_devkit_1.AST_NODE_TYPES.CallExpression) {
|
|
277
|
-
testNode = testNode.argument;
|
|
278
|
-
}
|
|
279
|
-
// Pattern: varName.startsWith(...) or varName.includes(...)
|
|
280
|
-
if (testNode.type === eslint_devkit_1.AST_NODE_TYPES.CallExpression &&
|
|
281
|
-
testNode.callee.type === eslint_devkit_1.AST_NODE_TYPES.MemberExpression &&
|
|
282
|
-
testNode.callee.object.type === eslint_devkit_1.AST_NODE_TYPES.Identifier &&
|
|
283
|
-
testNode.callee.object.name === varName &&
|
|
284
|
-
testNode.callee.property.type === eslint_devkit_1.AST_NODE_TYPES.Identifier &&
|
|
285
|
-
(testNode.callee.property.name === 'startsWith' ||
|
|
286
|
-
testNode.callee.property.name === 'includes')) {
|
|
287
|
-
return true;
|
|
288
|
-
}
|
|
289
|
-
return false;
|
|
290
|
-
};
|
|
291
|
-
const hasEarlyExit = (consequent) => {
|
|
292
|
-
if (consequent.type === eslint_devkit_1.AST_NODE_TYPES.BlockStatement) {
|
|
293
|
-
return consequent.body.some(stmt => stmt.type === eslint_devkit_1.AST_NODE_TYPES.ThrowStatement ||
|
|
294
|
-
stmt.type === eslint_devkit_1.AST_NODE_TYPES.ReturnStatement);
|
|
295
|
-
}
|
|
296
|
-
return consequent.type === eslint_devkit_1.AST_NODE_TYPES.ThrowStatement ||
|
|
297
|
-
consequent.type === eslint_devkit_1.AST_NODE_TYPES.ReturnStatement;
|
|
298
|
-
};
|
|
299
|
-
// Walk up to find enclosing IfStatement or BlockStatement
|
|
300
|
-
let current = pathNode.parent;
|
|
301
|
-
let foundFunctionBody = false;
|
|
302
|
-
while (current && !foundFunctionBody) {
|
|
303
|
-
// Check 1: Inside an if-block with validation
|
|
304
|
-
if (current.type === eslint_devkit_1.AST_NODE_TYPES.IfStatement) {
|
|
305
|
-
if (isStartsWithOrIncludesCall(current.test)) {
|
|
306
|
-
return true;
|
|
307
|
-
}
|
|
308
|
-
}
|
|
309
|
-
// Check 2: In a function body, look for preceding sibling if-statements with guard clause
|
|
310
|
-
if (current.type === eslint_devkit_1.AST_NODE_TYPES.BlockStatement && current.parent && (current.parent.type === eslint_devkit_1.AST_NODE_TYPES.FunctionDeclaration ||
|
|
311
|
-
current.parent.type === eslint_devkit_1.AST_NODE_TYPES.FunctionExpression ||
|
|
312
|
-
current.parent.type === eslint_devkit_1.AST_NODE_TYPES.ArrowFunctionExpression)) {
|
|
313
|
-
foundFunctionBody = true;
|
|
314
|
-
const blockBody = current.body;
|
|
315
|
-
const nodeIndex = blockBody.findIndex((stmt) => {
|
|
316
|
-
let check = pathNode;
|
|
317
|
-
while (check) {
|
|
318
|
-
if (check === stmt)
|
|
319
|
-
return true;
|
|
320
|
-
check = check.parent;
|
|
321
|
-
}
|
|
322
|
-
return false;
|
|
323
|
-
});
|
|
324
|
-
// Look at preceding statements for validation patterns with early exit
|
|
325
|
-
for (let i = 0; i < nodeIndex; i++) {
|
|
326
|
-
const stmt = blockBody[i];
|
|
327
|
-
if (stmt.type === eslint_devkit_1.AST_NODE_TYPES.IfStatement &&
|
|
328
|
-
isStartsWithOrIncludesCall(stmt.test) &&
|
|
329
|
-
hasEarlyExit(stmt.consequent)) {
|
|
330
|
-
return true;
|
|
331
|
-
}
|
|
332
|
-
}
|
|
333
|
-
}
|
|
334
|
-
current = current.parent;
|
|
335
|
-
}
|
|
336
|
-
return false;
|
|
337
|
-
};
|
|
338
|
-
/**
|
|
339
|
-
* Generate refactoring steps based on the operation
|
|
340
|
-
*/
|
|
341
|
-
const generateRefactoringSteps = (operation) => {
|
|
342
|
-
switch (operation.method) {
|
|
343
|
-
case 'readFile':
|
|
344
|
-
case 'writeFile':
|
|
345
|
-
return [
|
|
346
|
-
' 1. Define a SAFE_DIR constant for allowed operations',
|
|
347
|
-
' 2. Use path.basename() to strip directory components',
|
|
348
|
-
' 3. Combine with SAFE_DIR: path.join(SAFE_DIR, path.basename(userPath))',
|
|
349
|
-
' 4. Optionally validate file extensions',
|
|
350
|
-
' 5. Add error handling for invalid paths'
|
|
351
|
-
].join('\n');
|
|
352
|
-
case 'stat':
|
|
353
|
-
return [
|
|
354
|
-
' 1. Use path.resolve() to normalize the path',
|
|
355
|
-
' 2. Check if resolved path starts with allowed base directory',
|
|
356
|
-
' 3. Reject requests that escape the allowed directory',
|
|
357
|
-
' 4. Use path.relative() for additional validation',
|
|
358
|
-
' 5. Log security events for monitoring'
|
|
359
|
-
].join('\n');
|
|
360
|
-
case 'readdir':
|
|
361
|
-
return [
|
|
362
|
-
' 1. Resolve the directory path: path.resolve(ALLOWED_DIRS, userDir)',
|
|
363
|
-
' 2. Validate resolved path starts with ALLOWED_DIRS',
|
|
364
|
-
' 3. Check directory exists and is readable',
|
|
365
|
-
' 4. Consider whitelisting allowed directories',
|
|
366
|
-
' 5. Add rate limiting to prevent enumeration attacks'
|
|
367
|
-
].join('\n');
|
|
368
|
-
default:
|
|
369
|
-
return [
|
|
370
|
-
' 1. Identify the specific file operation needed',
|
|
371
|
-
' 2. Define safe base directories for operations',
|
|
372
|
-
' 3. Use path.resolve() and validate containment',
|
|
373
|
-
' 4. Sanitize user input (basename, extension validation)',
|
|
374
|
-
' 5. Add comprehensive error handling'
|
|
375
|
-
].join('\n');
|
|
376
|
-
}
|
|
377
|
-
};
|
|
378
|
-
/**
|
|
379
|
-
* Determine risk level based on the operation and path
|
|
380
|
-
*/
|
|
381
|
-
const determineRiskLevel = (operation, pathStr) => {
|
|
382
|
-
if (hasTraversalPatterns(pathStr)) {
|
|
383
|
-
return 'CRITICAL';
|
|
384
|
-
}
|
|
385
|
-
if (operation.dangerous) {
|
|
386
|
-
return 'HIGH';
|
|
387
|
-
}
|
|
388
|
-
return 'MEDIUM';
|
|
389
|
-
};
|
|
390
|
-
/**
|
|
391
|
-
* Check fs method calls for path traversal vulnerabilities
|
|
392
|
-
*/
|
|
393
|
-
const checkFsCall = (node) => {
|
|
394
|
-
// Check if it's an fs method call
|
|
395
|
-
if (node.callee.type !== 'MemberExpression' ||
|
|
396
|
-
node.callee.object.type !== 'Identifier' ||
|
|
397
|
-
node.callee.object.name !== 'fs' ||
|
|
398
|
-
node.callee.property.type !== 'Identifier') {
|
|
399
|
-
return;
|
|
400
|
-
}
|
|
401
|
-
const methodName = node.callee.property.name;
|
|
402
|
-
// Skip if not a dangerous method
|
|
403
|
-
if (!dangerousMethods.includes(methodName)) {
|
|
404
|
-
return;
|
|
405
|
-
}
|
|
406
|
-
const { path, pathNode, method, operation } = extractPathArgument(node);
|
|
407
|
-
// Check if the path argument is dangerous
|
|
408
|
-
if (!isDangerousPath(pathNode, path)) {
|
|
409
|
-
return;
|
|
410
|
-
}
|
|
411
|
-
const riskLevel = determineRiskLevel(operation || FS_OPERATIONS[0], path);
|
|
412
|
-
const steps = operation ? generateRefactoringSteps(operation) : 'Review file system access patterns';
|
|
413
|
-
const safePattern = operation?.safePattern || 'Use path.resolve() with validation';
|
|
414
|
-
context.report({
|
|
415
|
-
node,
|
|
416
|
-
messageId: 'fsPathTraversal',
|
|
417
|
-
data: {
|
|
418
|
-
method,
|
|
419
|
-
path,
|
|
420
|
-
riskLevel,
|
|
421
|
-
vulnerability: operation?.vulnerability || 'path traversal',
|
|
422
|
-
safePattern,
|
|
423
|
-
steps,
|
|
424
|
-
effort: operation?.effort || '15-20 minutes'
|
|
425
|
-
},
|
|
426
|
-
suggest: [
|
|
427
|
-
{
|
|
428
|
-
messageId: 'usePathResolve',
|
|
429
|
-
fix: () => null
|
|
430
|
-
},
|
|
431
|
-
{
|
|
432
|
-
messageId: 'validatePath',
|
|
433
|
-
fix: () => null
|
|
434
|
-
},
|
|
435
|
-
{
|
|
436
|
-
messageId: 'useBasename',
|
|
437
|
-
fix: () => null
|
|
438
|
-
},
|
|
439
|
-
{
|
|
440
|
-
messageId: 'createSafeDir',
|
|
441
|
-
fix: () => null
|
|
442
|
-
},
|
|
443
|
-
{
|
|
444
|
-
messageId: 'whitelistExtensions',
|
|
445
|
-
fix: () => null
|
|
446
|
-
}
|
|
447
|
-
]
|
|
448
|
-
});
|
|
449
|
-
};
|
|
450
|
-
return {
|
|
451
|
-
CallExpression: checkFsCall
|
|
452
|
-
};
|
|
453
|
-
},
|
|
454
|
-
});
|
|
@@ -1,9 +0,0 @@
|
|
|
1
|
-
export interface Options {
|
|
2
|
-
/** Allow literal string regex patterns. Default: false (stricter) */
|
|
3
|
-
allowLiterals?: boolean;
|
|
4
|
-
/** Additional RegExp creation patterns to check */
|
|
5
|
-
additionalPatterns?: string[];
|
|
6
|
-
/** Maximum allowed pattern length for dynamic regex */
|
|
7
|
-
maxPatternLength?: number;
|
|
8
|
-
}
|
|
9
|
-
export declare const detectNonLiteralRegexp: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
|