eslint-plugin-secure-coding 2.3.2 → 2.3.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (361) hide show
  1. package/README.md +1 -0
  2. package/package.json +3 -10
  3. package/src/index.ts +605 -0
  4. package/src/rules/__tests__/integration-demo.test.ts +290 -0
  5. package/src/rules/__tests__/integration-llm.test.ts +89 -0
  6. package/src/rules/database-injection/database-injection.test.ts +456 -0
  7. package/src/rules/database-injection/index.ts +488 -0
  8. package/src/rules/detect-child-process/detect-child-process.test.ts +207 -0
  9. package/src/rules/detect-child-process/index.ts +634 -0
  10. package/src/rules/detect-eval-with-expression/detect-eval-with-expression.test.ts +416 -0
  11. package/src/rules/detect-eval-with-expression/index.ts +463 -0
  12. package/src/rules/detect-mixed-content/detect-mixed-content.test.ts +28 -0
  13. package/src/rules/detect-mixed-content/index.ts +52 -0
  14. package/src/rules/detect-non-literal-fs-filename/detect-non-literal-fs-filename.test.ts +269 -0
  15. package/src/rules/detect-non-literal-fs-filename/index.ts +551 -0
  16. package/src/rules/detect-non-literal-regexp/detect-non-literal-regexp.test.ts +189 -0
  17. package/src/rules/detect-non-literal-regexp/index.ts +490 -0
  18. package/src/rules/detect-object-injection/detect-object-injection.test.ts +440 -0
  19. package/src/rules/detect-object-injection/index.ts +674 -0
  20. package/src/rules/detect-suspicious-dependencies/detect-suspicious-dependencies.test.ts +32 -0
  21. package/src/rules/detect-suspicious-dependencies/index.ts +84 -0
  22. package/src/rules/detect-weak-password-validation/detect-weak-password-validation.test.ts +31 -0
  23. package/src/rules/detect-weak-password-validation/index.ts +68 -0
  24. package/src/rules/no-allow-arbitrary-loads/index.ts +54 -0
  25. package/src/rules/no-allow-arbitrary-loads/no-allow-arbitrary-loads.test.ts +28 -0
  26. package/src/rules/no-arbitrary-file-access/index.ts +238 -0
  27. package/src/rules/no-arbitrary-file-access/no-arbitrary-file-access.test.ts +119 -0
  28. package/src/rules/no-buffer-overread/index.ts +724 -0
  29. package/src/rules/no-buffer-overread/no-buffer-overread.test.ts +313 -0
  30. package/src/rules/no-clickjacking/index.ts +481 -0
  31. package/src/rules/no-clickjacking/no-clickjacking.test.ts +253 -0
  32. package/src/rules/no-client-side-auth-logic/index.ts +81 -0
  33. package/src/rules/no-client-side-auth-logic/no-client-side-auth-logic.test.ts +33 -0
  34. package/src/rules/no-credentials-in-query-params/index.ts +69 -0
  35. package/src/rules/no-credentials-in-query-params/no-credentials-in-query-params.test.ts +33 -0
  36. package/src/rules/no-credentials-in-storage-api/index.ts +64 -0
  37. package/src/rules/no-credentials-in-storage-api/no-credentials-in-storage-api.test.ts +31 -0
  38. package/src/rules/no-data-in-temp-storage/index.ts +75 -0
  39. package/src/rules/no-data-in-temp-storage/no-data-in-temp-storage.test.ts +33 -0
  40. package/src/rules/no-debug-code-in-production/index.ts +59 -0
  41. package/src/rules/no-debug-code-in-production/no-debug-code-in-production.test.ts +26 -0
  42. package/src/rules/no-directive-injection/index.ts +551 -0
  43. package/src/rules/no-directive-injection/no-directive-injection.test.ts +305 -0
  44. package/src/rules/no-disabled-certificate-validation/index.ts +72 -0
  45. package/src/rules/no-disabled-certificate-validation/no-disabled-certificate-validation.test.ts +33 -0
  46. package/src/rules/no-document-cookie/index.ts +113 -0
  47. package/src/rules/no-document-cookie/no-document-cookie.test.ts +382 -0
  48. package/src/rules/no-dynamic-dependency-loading/index.ts +60 -0
  49. package/src/rules/no-dynamic-dependency-loading/no-dynamic-dependency-loading.test.ts +27 -0
  50. package/src/rules/no-electron-security-issues/index.ts +504 -0
  51. package/src/rules/no-electron-security-issues/no-electron-security-issues.test.ts +324 -0
  52. package/src/rules/no-exposed-debug-endpoints/index.ts +73 -0
  53. package/src/rules/no-exposed-debug-endpoints/no-exposed-debug-endpoints.test.ts +40 -0
  54. package/src/rules/no-exposed-sensitive-data/index.ts +428 -0
  55. package/src/rules/no-exposed-sensitive-data/no-exposed-sensitive-data.test.ts +75 -0
  56. package/src/rules/no-format-string-injection/index.ts +801 -0
  57. package/src/rules/no-format-string-injection/no-format-string-injection.test.ts +437 -0
  58. package/src/rules/no-graphql-injection/index.ts +508 -0
  59. package/src/rules/no-graphql-injection/no-graphql-injection.test.ts +371 -0
  60. package/src/rules/no-hardcoded-credentials/index.ts +478 -0
  61. package/src/rules/no-hardcoded-credentials/no-hardcoded-credentials.test.ts +639 -0
  62. package/src/rules/no-hardcoded-session-tokens/index.ts +69 -0
  63. package/src/rules/no-hardcoded-session-tokens/no-hardcoded-session-tokens.test.ts +42 -0
  64. package/src/rules/no-http-urls/index.ts +131 -0
  65. package/src/rules/no-http-urls/no-http-urls.test.ts +60 -0
  66. package/src/rules/no-improper-sanitization/index.ts +502 -0
  67. package/src/rules/no-improper-sanitization/no-improper-sanitization.test.ts +156 -0
  68. package/src/rules/no-improper-type-validation/index.ts +572 -0
  69. package/src/rules/no-improper-type-validation/no-improper-type-validation.test.ts +372 -0
  70. package/src/rules/no-insecure-comparison/index.ts +232 -0
  71. package/src/rules/no-insecure-comparison/no-insecure-comparison.test.ts +218 -0
  72. package/src/rules/no-insecure-cookie-settings/index.ts +391 -0
  73. package/src/rules/no-insecure-cookie-settings/no-insecure-cookie-settings.test.ts +409 -0
  74. package/src/rules/no-insecure-jwt/index.ts +467 -0
  75. package/src/rules/no-insecure-jwt/no-insecure-jwt.test.ts +259 -0
  76. package/src/rules/no-insecure-redirects/index.ts +267 -0
  77. package/src/rules/no-insecure-redirects/no-insecure-redirects.test.ts +108 -0
  78. package/src/rules/no-insecure-websocket/index.ts +72 -0
  79. package/src/rules/no-insecure-websocket/no-insecure-websocket.test.ts +42 -0
  80. package/src/rules/no-insufficient-postmessage-validation/index.ts +497 -0
  81. package/src/rules/no-insufficient-postmessage-validation/no-insufficient-postmessage-validation.test.ts +360 -0
  82. package/src/rules/no-insufficient-random/index.ts +288 -0
  83. package/src/rules/no-insufficient-random/no-insufficient-random.test.ts +246 -0
  84. package/src/rules/no-ldap-injection/index.ts +547 -0
  85. package/src/rules/no-ldap-injection/no-ldap-injection.test.ts +317 -0
  86. package/src/rules/no-missing-authentication/index.ts +408 -0
  87. package/src/rules/no-missing-authentication/no-missing-authentication.test.ts +350 -0
  88. package/src/rules/no-missing-cors-check/index.ts +453 -0
  89. package/src/rules/no-missing-cors-check/no-missing-cors-check.test.ts +392 -0
  90. package/src/rules/no-missing-csrf-protection/index.ts +229 -0
  91. package/src/rules/no-missing-csrf-protection/no-missing-csrf-protection.test.ts +222 -0
  92. package/src/rules/no-missing-security-headers/index.ts +266 -0
  93. package/src/rules/no-missing-security-headers/no-missing-security-headers.test.ts +98 -0
  94. package/src/rules/no-password-in-url/index.ts +64 -0
  95. package/src/rules/no-password-in-url/no-password-in-url.test.ts +27 -0
  96. package/src/rules/no-permissive-cors/index.ts +78 -0
  97. package/src/rules/no-permissive-cors/no-permissive-cors.test.ts +28 -0
  98. package/src/rules/no-pii-in-logs/index.ts +83 -0
  99. package/src/rules/no-pii-in-logs/no-pii-in-logs.test.ts +26 -0
  100. package/src/rules/no-postmessage-origin-wildcard/index.ts +67 -0
  101. package/src/rules/no-postmessage-origin-wildcard/no-postmessage-origin-wildcard.test.ts +27 -0
  102. package/src/rules/no-privilege-escalation/index.ts +403 -0
  103. package/src/rules/no-privilege-escalation/no-privilege-escalation.test.ts +306 -0
  104. package/src/rules/no-redos-vulnerable-regex/index.ts +379 -0
  105. package/src/rules/no-redos-vulnerable-regex/no-redos-vulnerable-regex.test.ts +83 -0
  106. package/src/rules/no-sensitive-data-exposure/index.ts +294 -0
  107. package/src/rules/no-sensitive-data-exposure/no-sensitive-data-exposure.test.ts +262 -0
  108. package/src/rules/no-sensitive-data-in-analytics/index.ts +73 -0
  109. package/src/rules/no-sensitive-data-in-analytics/no-sensitive-data-in-analytics.test.ts +42 -0
  110. package/src/rules/no-sensitive-data-in-cache/index.ts +59 -0
  111. package/src/rules/no-sensitive-data-in-cache/no-sensitive-data-in-cache.test.ts +32 -0
  112. package/src/rules/no-sql-injection/index.ts +424 -0
  113. package/src/rules/no-sql-injection/no-sql-injection.test.ts +303 -0
  114. package/src/rules/no-timing-attack/index.ts +552 -0
  115. package/src/rules/no-timing-attack/no-timing-attack.test.ts +348 -0
  116. package/src/rules/no-toctou-vulnerability/index.ts +250 -0
  117. package/src/rules/no-toctou-vulnerability/no-toctou-vulnerability.test.ts +60 -0
  118. package/src/rules/no-tracking-without-consent/index.ts +78 -0
  119. package/src/rules/no-tracking-without-consent/no-tracking-without-consent.test.ts +34 -0
  120. package/src/rules/no-unchecked-loop-condition/index.ts +781 -0
  121. package/src/rules/no-unchecked-loop-condition/no-unchecked-loop-condition.test.ts +459 -0
  122. package/src/rules/no-unencrypted-local-storage/index.ts +73 -0
  123. package/src/rules/no-unencrypted-local-storage/no-unencrypted-local-storage.test.ts +41 -0
  124. package/src/rules/no-unencrypted-transmission/index.ts +296 -0
  125. package/src/rules/no-unencrypted-transmission/no-unencrypted-transmission.test.ts +287 -0
  126. package/src/rules/no-unescaped-url-parameter/index.ts +424 -0
  127. package/src/rules/no-unescaped-url-parameter/no-unescaped-url-parameter.test.ts +263 -0
  128. package/src/rules/no-unlimited-resource-allocation/index.ts +767 -0
  129. package/src/rules/no-unlimited-resource-allocation/no-unlimited-resource-allocation.test.ts +544 -0
  130. package/src/rules/no-unsafe-deserialization/index.ts +593 -0
  131. package/src/rules/no-unsafe-deserialization/no-unsafe-deserialization.test.ts +310 -0
  132. package/src/rules/no-unsafe-dynamic-require/index.ts +125 -0
  133. package/src/rules/no-unsafe-dynamic-require/no-unsafe-dynamic-require.test.ts +151 -0
  134. package/src/rules/no-unsafe-regex-construction/index.ts +370 -0
  135. package/src/rules/no-unsafe-regex-construction/no-unsafe-regex-construction.test.ts +181 -0
  136. package/src/rules/no-unsanitized-html/index.ts +400 -0
  137. package/src/rules/no-unsanitized-html/no-unsanitized-html.test.ts +488 -0
  138. package/src/rules/no-unvalidated-deeplinks/index.ts +73 -0
  139. package/src/rules/no-unvalidated-deeplinks/no-unvalidated-deeplinks.test.ts +29 -0
  140. package/src/rules/no-unvalidated-user-input/index.ts +498 -0
  141. package/src/rules/no-unvalidated-user-input/no-unvalidated-user-input.test.ts +463 -0
  142. package/src/rules/no-verbose-error-messages/index.ts +83 -0
  143. package/src/rules/no-verbose-error-messages/no-verbose-error-messages.test.ts +34 -0
  144. package/src/rules/no-weak-crypto/index.ts +447 -0
  145. package/src/rules/no-weak-crypto/no-weak-crypto.test.ts +297 -0
  146. package/src/rules/no-weak-password-recovery/index.ts +509 -0
  147. package/src/rules/no-weak-password-recovery/no-weak-password-recovery.test.ts +184 -0
  148. package/src/rules/no-xpath-injection/index.ts +596 -0
  149. package/src/rules/no-xpath-injection/no-xpath-injection.test.ts +405 -0
  150. package/src/rules/no-xxe-injection/index.ts +342 -0
  151. package/src/rules/no-xxe-injection/no-xxe-injection.test.ts +122 -0
  152. package/src/rules/no-zip-slip/index.ts +526 -0
  153. package/src/rules/no-zip-slip/no-zip-slip.test.ts +305 -0
  154. package/src/rules/require-backend-authorization/index.ts +71 -0
  155. package/src/rules/require-backend-authorization/require-backend-authorization.test.ts +31 -0
  156. package/src/rules/require-code-minification/index.ts +54 -0
  157. package/src/rules/require-code-minification/require-code-minification.test.ts +30 -0
  158. package/src/rules/require-csp-headers/index.ts +74 -0
  159. package/src/rules/require-csp-headers/require-csp-headers.test.ts +34 -0
  160. package/src/rules/require-data-minimization/index.ts +65 -0
  161. package/src/rules/require-data-minimization/require-data-minimization.test.ts +31 -0
  162. package/src/rules/require-dependency-integrity/index.ts +78 -0
  163. package/src/rules/require-dependency-integrity/require-dependency-integrity.test.ts +44 -0
  164. package/src/rules/require-https-only/index.ts +75 -0
  165. package/src/rules/require-https-only/require-https-only.test.ts +26 -0
  166. package/src/rules/require-mime-type-validation/index.ts +77 -0
  167. package/src/rules/require-mime-type-validation/require-mime-type-validation.test.ts +32 -0
  168. package/src/rules/require-network-timeout/index.ts +58 -0
  169. package/src/rules/require-network-timeout/require-network-timeout.test.ts +26 -0
  170. package/src/rules/require-package-lock/index.ts +75 -0
  171. package/src/rules/require-package-lock/require-package-lock.test.ts +27 -0
  172. package/src/rules/require-secure-credential-storage/index.ts +60 -0
  173. package/src/rules/require-secure-credential-storage/require-secure-credential-storage.test.ts +26 -0
  174. package/src/rules/require-secure-defaults/index.ts +54 -0
  175. package/src/rules/require-secure-defaults/require-secure-defaults.test.ts +26 -0
  176. package/src/rules/require-secure-deletion/index.ts +52 -0
  177. package/src/rules/require-secure-deletion/require-secure-deletion.test.ts +29 -0
  178. package/src/rules/require-storage-encryption/index.ts +60 -0
  179. package/src/rules/require-storage-encryption/require-storage-encryption.test.ts +26 -0
  180. package/src/rules/require-url-validation/index.ts +85 -0
  181. package/src/rules/require-url-validation/require-url-validation.test.ts +32 -0
  182. package/src/types/{index.d.ts → index.ts} +157 -53
  183. package/src/index.d.ts +0 -32
  184. package/src/index.js +0 -465
  185. package/src/rules/database-injection/index.d.ts +0 -13
  186. package/src/rules/database-injection/index.js +0 -406
  187. package/src/rules/detect-child-process/index.d.ts +0 -11
  188. package/src/rules/detect-child-process/index.js +0 -529
  189. package/src/rules/detect-eval-with-expression/index.d.ts +0 -9
  190. package/src/rules/detect-eval-with-expression/index.js +0 -392
  191. package/src/rules/detect-mixed-content/index.d.ts +0 -8
  192. package/src/rules/detect-mixed-content/index.js +0 -44
  193. package/src/rules/detect-non-literal-fs-filename/index.d.ts +0 -7
  194. package/src/rules/detect-non-literal-fs-filename/index.js +0 -454
  195. package/src/rules/detect-non-literal-regexp/index.d.ts +0 -9
  196. package/src/rules/detect-non-literal-regexp/index.js +0 -403
  197. package/src/rules/detect-object-injection/index.d.ts +0 -11
  198. package/src/rules/detect-object-injection/index.js +0 -560
  199. package/src/rules/detect-suspicious-dependencies/index.d.ts +0 -8
  200. package/src/rules/detect-suspicious-dependencies/index.js +0 -71
  201. package/src/rules/detect-weak-password-validation/index.d.ts +0 -6
  202. package/src/rules/detect-weak-password-validation/index.js +0 -58
  203. package/src/rules/no-allow-arbitrary-loads/index.d.ts +0 -8
  204. package/src/rules/no-allow-arbitrary-loads/index.js +0 -47
  205. package/src/rules/no-arbitrary-file-access/index.d.ts +0 -13
  206. package/src/rules/no-arbitrary-file-access/index.js +0 -195
  207. package/src/rules/no-buffer-overread/index.d.ts +0 -29
  208. package/src/rules/no-buffer-overread/index.js +0 -606
  209. package/src/rules/no-clickjacking/index.d.ts +0 -10
  210. package/src/rules/no-clickjacking/index.js +0 -396
  211. package/src/rules/no-client-side-auth-logic/index.d.ts +0 -6
  212. package/src/rules/no-client-side-auth-logic/index.js +0 -69
  213. package/src/rules/no-credentials-in-query-params/index.d.ts +0 -8
  214. package/src/rules/no-credentials-in-query-params/index.js +0 -57
  215. package/src/rules/no-credentials-in-storage-api/index.d.ts +0 -6
  216. package/src/rules/no-credentials-in-storage-api/index.js +0 -54
  217. package/src/rules/no-data-in-temp-storage/index.d.ts +0 -6
  218. package/src/rules/no-data-in-temp-storage/index.js +0 -64
  219. package/src/rules/no-debug-code-in-production/index.d.ts +0 -8
  220. package/src/rules/no-debug-code-in-production/index.js +0 -51
  221. package/src/rules/no-directive-injection/index.d.ts +0 -12
  222. package/src/rules/no-directive-injection/index.js +0 -457
  223. package/src/rules/no-disabled-certificate-validation/index.d.ts +0 -6
  224. package/src/rules/no-disabled-certificate-validation/index.js +0 -61
  225. package/src/rules/no-document-cookie/index.d.ts +0 -5
  226. package/src/rules/no-document-cookie/index.js +0 -89
  227. package/src/rules/no-dynamic-dependency-loading/index.d.ts +0 -8
  228. package/src/rules/no-dynamic-dependency-loading/index.js +0 -51
  229. package/src/rules/no-electron-security-issues/index.d.ts +0 -10
  230. package/src/rules/no-electron-security-issues/index.js +0 -423
  231. package/src/rules/no-exposed-debug-endpoints/index.d.ts +0 -6
  232. package/src/rules/no-exposed-debug-endpoints/index.js +0 -62
  233. package/src/rules/no-exposed-sensitive-data/index.d.ts +0 -11
  234. package/src/rules/no-exposed-sensitive-data/index.js +0 -340
  235. package/src/rules/no-format-string-injection/index.d.ts +0 -17
  236. package/src/rules/no-format-string-injection/index.js +0 -660
  237. package/src/rules/no-graphql-injection/index.d.ts +0 -12
  238. package/src/rules/no-graphql-injection/index.js +0 -411
  239. package/src/rules/no-hardcoded-credentials/index.d.ts +0 -26
  240. package/src/rules/no-hardcoded-credentials/index.js +0 -376
  241. package/src/rules/no-hardcoded-session-tokens/index.d.ts +0 -6
  242. package/src/rules/no-hardcoded-session-tokens/index.js +0 -59
  243. package/src/rules/no-http-urls/index.d.ts +0 -12
  244. package/src/rules/no-http-urls/index.js +0 -114
  245. package/src/rules/no-improper-sanitization/index.d.ts +0 -12
  246. package/src/rules/no-improper-sanitization/index.js +0 -411
  247. package/src/rules/no-improper-type-validation/index.d.ts +0 -10
  248. package/src/rules/no-improper-type-validation/index.js +0 -475
  249. package/src/rules/no-insecure-comparison/index.d.ts +0 -7
  250. package/src/rules/no-insecure-comparison/index.js +0 -193
  251. package/src/rules/no-insecure-cookie-settings/index.d.ts +0 -9
  252. package/src/rules/no-insecure-cookie-settings/index.js +0 -306
  253. package/src/rules/no-insecure-jwt/index.d.ts +0 -10
  254. package/src/rules/no-insecure-jwt/index.js +0 -380
  255. package/src/rules/no-insecure-redirects/index.d.ts +0 -7
  256. package/src/rules/no-insecure-redirects/index.js +0 -216
  257. package/src/rules/no-insecure-websocket/index.d.ts +0 -6
  258. package/src/rules/no-insecure-websocket/index.js +0 -61
  259. package/src/rules/no-insufficient-postmessage-validation/index.d.ts +0 -14
  260. package/src/rules/no-insufficient-postmessage-validation/index.js +0 -392
  261. package/src/rules/no-insufficient-random/index.d.ts +0 -9
  262. package/src/rules/no-insufficient-random/index.js +0 -208
  263. package/src/rules/no-ldap-injection/index.d.ts +0 -10
  264. package/src/rules/no-ldap-injection/index.js +0 -455
  265. package/src/rules/no-missing-authentication/index.d.ts +0 -13
  266. package/src/rules/no-missing-authentication/index.js +0 -333
  267. package/src/rules/no-missing-cors-check/index.d.ts +0 -9
  268. package/src/rules/no-missing-cors-check/index.js +0 -399
  269. package/src/rules/no-missing-csrf-protection/index.d.ts +0 -11
  270. package/src/rules/no-missing-csrf-protection/index.js +0 -180
  271. package/src/rules/no-missing-security-headers/index.d.ts +0 -7
  272. package/src/rules/no-missing-security-headers/index.js +0 -218
  273. package/src/rules/no-password-in-url/index.d.ts +0 -8
  274. package/src/rules/no-password-in-url/index.js +0 -54
  275. package/src/rules/no-permissive-cors/index.d.ts +0 -8
  276. package/src/rules/no-permissive-cors/index.js +0 -65
  277. package/src/rules/no-pii-in-logs/index.d.ts +0 -8
  278. package/src/rules/no-pii-in-logs/index.js +0 -70
  279. package/src/rules/no-postmessage-origin-wildcard/index.d.ts +0 -8
  280. package/src/rules/no-postmessage-origin-wildcard/index.js +0 -56
  281. package/src/rules/no-privilege-escalation/index.d.ts +0 -13
  282. package/src/rules/no-privilege-escalation/index.js +0 -321
  283. package/src/rules/no-redos-vulnerable-regex/index.d.ts +0 -7
  284. package/src/rules/no-redos-vulnerable-regex/index.js +0 -306
  285. package/src/rules/no-sensitive-data-exposure/index.d.ts +0 -11
  286. package/src/rules/no-sensitive-data-exposure/index.js +0 -250
  287. package/src/rules/no-sensitive-data-in-analytics/index.d.ts +0 -8
  288. package/src/rules/no-sensitive-data-in-analytics/index.js +0 -62
  289. package/src/rules/no-sensitive-data-in-cache/index.d.ts +0 -8
  290. package/src/rules/no-sensitive-data-in-cache/index.js +0 -52
  291. package/src/rules/no-sql-injection/index.d.ts +0 -10
  292. package/src/rules/no-sql-injection/index.js +0 -335
  293. package/src/rules/no-timing-attack/index.d.ts +0 -10
  294. package/src/rules/no-timing-attack/index.js +0 -447
  295. package/src/rules/no-toctou-vulnerability/index.d.ts +0 -7
  296. package/src/rules/no-toctou-vulnerability/index.js +0 -208
  297. package/src/rules/no-tracking-without-consent/index.d.ts +0 -6
  298. package/src/rules/no-tracking-without-consent/index.js +0 -67
  299. package/src/rules/no-unchecked-loop-condition/index.d.ts +0 -12
  300. package/src/rules/no-unchecked-loop-condition/index.js +0 -646
  301. package/src/rules/no-unencrypted-local-storage/index.d.ts +0 -8
  302. package/src/rules/no-unencrypted-local-storage/index.js +0 -61
  303. package/src/rules/no-unencrypted-transmission/index.d.ts +0 -11
  304. package/src/rules/no-unencrypted-transmission/index.js +0 -236
  305. package/src/rules/no-unescaped-url-parameter/index.d.ts +0 -9
  306. package/src/rules/no-unescaped-url-parameter/index.js +0 -355
  307. package/src/rules/no-unlimited-resource-allocation/index.d.ts +0 -12
  308. package/src/rules/no-unlimited-resource-allocation/index.js +0 -643
  309. package/src/rules/no-unsafe-deserialization/index.d.ts +0 -10
  310. package/src/rules/no-unsafe-deserialization/index.js +0 -491
  311. package/src/rules/no-unsafe-dynamic-require/index.d.ts +0 -5
  312. package/src/rules/no-unsafe-dynamic-require/index.js +0 -106
  313. package/src/rules/no-unsafe-regex-construction/index.d.ts +0 -9
  314. package/src/rules/no-unsafe-regex-construction/index.js +0 -291
  315. package/src/rules/no-unsanitized-html/index.d.ts +0 -9
  316. package/src/rules/no-unsanitized-html/index.js +0 -335
  317. package/src/rules/no-unvalidated-deeplinks/index.d.ts +0 -6
  318. package/src/rules/no-unvalidated-deeplinks/index.js +0 -62
  319. package/src/rules/no-unvalidated-user-input/index.d.ts +0 -9
  320. package/src/rules/no-unvalidated-user-input/index.js +0 -420
  321. package/src/rules/no-verbose-error-messages/index.d.ts +0 -8
  322. package/src/rules/no-verbose-error-messages/index.js +0 -68
  323. package/src/rules/no-weak-crypto/index.d.ts +0 -11
  324. package/src/rules/no-weak-crypto/index.js +0 -351
  325. package/src/rules/no-weak-password-recovery/index.d.ts +0 -12
  326. package/src/rules/no-weak-password-recovery/index.js +0 -424
  327. package/src/rules/no-xpath-injection/index.d.ts +0 -10
  328. package/src/rules/no-xpath-injection/index.js +0 -487
  329. package/src/rules/no-xxe-injection/index.d.ts +0 -7
  330. package/src/rules/no-xxe-injection/index.js +0 -266
  331. package/src/rules/no-zip-slip/index.d.ts +0 -9
  332. package/src/rules/no-zip-slip/index.js +0 -445
  333. package/src/rules/require-backend-authorization/index.d.ts +0 -6
  334. package/src/rules/require-backend-authorization/index.js +0 -60
  335. package/src/rules/require-code-minification/index.d.ts +0 -8
  336. package/src/rules/require-code-minification/index.js +0 -47
  337. package/src/rules/require-csp-headers/index.d.ts +0 -6
  338. package/src/rules/require-csp-headers/index.js +0 -64
  339. package/src/rules/require-data-minimization/index.d.ts +0 -8
  340. package/src/rules/require-data-minimization/index.js +0 -53
  341. package/src/rules/require-dependency-integrity/index.d.ts +0 -6
  342. package/src/rules/require-dependency-integrity/index.js +0 -64
  343. package/src/rules/require-https-only/index.d.ts +0 -8
  344. package/src/rules/require-https-only/index.js +0 -62
  345. package/src/rules/require-mime-type-validation/index.d.ts +0 -6
  346. package/src/rules/require-mime-type-validation/index.js +0 -66
  347. package/src/rules/require-network-timeout/index.d.ts +0 -8
  348. package/src/rules/require-network-timeout/index.js +0 -50
  349. package/src/rules/require-package-lock/index.d.ts +0 -8
  350. package/src/rules/require-package-lock/index.js +0 -63
  351. package/src/rules/require-secure-credential-storage/index.d.ts +0 -8
  352. package/src/rules/require-secure-credential-storage/index.js +0 -50
  353. package/src/rules/require-secure-defaults/index.d.ts +0 -8
  354. package/src/rules/require-secure-defaults/index.js +0 -47
  355. package/src/rules/require-secure-deletion/index.d.ts +0 -8
  356. package/src/rules/require-secure-deletion/index.js +0 -44
  357. package/src/rules/require-storage-encryption/index.d.ts +0 -8
  358. package/src/rules/require-storage-encryption/index.js +0 -50
  359. package/src/rules/require-url-validation/index.d.ts +0 -6
  360. package/src/rules/require-url-validation/index.js +0 -72
  361. package/src/types/index.js +0 -17
@@ -1,5 +0,0 @@
1
- export interface Options {
2
- /** Allow reading document.cookie for parsing */
3
- allowReading?: boolean;
4
- }
5
- export declare const noDocumentCookie: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
@@ -1,89 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.noDocumentCookie = void 0;
4
- const eslint_devkit_1 = require("@interlace/eslint-devkit");
5
- const eslint_devkit_2 = require("@interlace/eslint-devkit");
6
- exports.noDocumentCookie = (0, eslint_devkit_1.createRule)({
7
- name: 'no-document-cookie',
8
- meta: {
9
- type: 'problem',
10
- docs: {
11
- description: 'Prevent direct usage of document.cookie - use Cookie Store API or cookie libraries instead',
12
- },
13
- hasSuggestions: false,
14
- messages: {
15
- noDocumentCookie: (0, eslint_devkit_2.formatLLMMessage)({
16
- icon: eslint_devkit_2.MessageIcons.WARNING,
17
- issueName: 'Document Cookie',
18
- description: 'Avoid direct document.cookie usage',
19
- severity: 'MEDIUM',
20
- fix: 'Use Cookie Store API or cookie library instead',
21
- documentationLink: 'https://github.com/sindresorhus/eslint-plugin-unicorn/blob/main/docs/rules/no-document-cookie.md',
22
- }),
23
- },
24
- schema: [
25
- {
26
- type: 'object',
27
- properties: {
28
- allowReading: {
29
- type: 'boolean',
30
- default: true,
31
- },
32
- },
33
- additionalProperties: false,
34
- },
35
- ],
36
- },
37
- defaultOptions: [{ allowReading: true }],
38
- create(context) {
39
- const [options] = context.options;
40
- const { allowReading = true } = options || {};
41
- function isDocumentCookieAccess(node) {
42
- // Check if this is accessing document.cookie
43
- return (node.object.type === 'Identifier' &&
44
- node.object.name === 'document' &&
45
- ((node.property.type === 'Identifier' && node.property.name === 'cookie') ||
46
- (node.computed && node.property.type === 'Literal' && node.property.value === 'cookie')));
47
- }
48
- function isAssignmentToCookie(node) {
49
- // Check if this is an assignment to document.cookie
50
- const parent = node.parent;
51
- // Check direct assignment
52
- if (parent?.type === 'AssignmentExpression' && parent.left === node) {
53
- return true;
54
- }
55
- // Check compound assignment (+=, -=, etc.)
56
- if (parent?.type === 'AssignmentExpression' &&
57
- parent.operator &&
58
- parent.operator.includes('=') &&
59
- parent.left === node) {
60
- return true;
61
- }
62
- // Variable declarator (const/let/var x = document.cookie) - this is reading, not assigning
63
- if (parent?.type === 'VariableDeclarator' && parent.init === node) {
64
- return false;
65
- }
66
- return false;
67
- }
68
- return {
69
- MemberExpression(node) {
70
- if (isDocumentCookieAccess(node)) {
71
- const isAssigning = isAssignmentToCookie(node);
72
- // If allowReading is true, only flag assignments
73
- // If allowReading is false, flag everything
74
- if (allowReading && !isAssigning) {
75
- return; // Allow reading when option is enabled
76
- }
77
- // Flag document.cookie usage
78
- context.report({
79
- node,
80
- messageId: 'noDocumentCookie',
81
- data: {
82
- operation: isAssigning ? 'assignment to' : 'reading from',
83
- },
84
- });
85
- }
86
- },
87
- };
88
- },
89
- });
@@ -1,8 +0,0 @@
1
- /**
2
- * @fileoverview Prevent dynamic dependency injection
3
- * @see https://owasp.org/www-project-mobile-top-10/
4
- * @see https://cwe.mitre.org/data/definitions/494.html
5
- */
6
- export interface Options {
7
- }
8
- export declare const noDynamicDependencyLoading: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
@@ -1,51 +0,0 @@
1
- "use strict";
2
- /**
3
- * @fileoverview Prevent dynamic dependency injection
4
- * @see https://owasp.org/www-project-mobile-top-10/
5
- * @see https://cwe.mitre.org/data/definitions/494.html
6
- */
7
- Object.defineProperty(exports, "__esModule", { value: true });
8
- exports.noDynamicDependencyLoading = void 0;
9
- const eslint_devkit_1 = require("@interlace/eslint-devkit");
10
- exports.noDynamicDependencyLoading = (0, eslint_devkit_1.createRule)({
11
- name: 'no-dynamic-dependency-loading',
12
- meta: {
13
- type: 'problem',
14
- docs: {
15
- description: 'Prevent runtime dependency injection with dynamic paths',
16
- category: 'Security',
17
- recommended: true,
18
- owaspMobile: ['M2'],
19
- cweIds: ['CWE-494'],
20
- },
21
- messages: {
22
- violationDetected: (0, eslint_devkit_1.formatLLMMessage)({
23
- icon: eslint_devkit_1.MessageIcons.SECURITY,
24
- issueName: 'violation Detected',
25
- cwe: 'CWE-1104',
26
- description: 'Dynamic import/require detected - use static imports for security',
27
- severity: 'HIGH',
28
- fix: 'Review and apply secure practices',
29
- documentationLink: 'https://cwe.mitre.org/data/definitions/1104.html',
30
- })
31
- },
32
- schema: [],
33
- },
34
- defaultOptions: [],
35
- create(context) {
36
- return {
37
- CallExpression(node) {
38
- // Dynamic require
39
- if (node.callee.name === 'require' && node.arguments[0]?.type !== 'Literal') {
40
- context.report({ node, messageId: 'violationDetected' });
41
- }
42
- },
43
- ImportExpression(node) {
44
- // Dynamic import()
45
- if (node.source.type !== 'Literal') {
46
- context.report({ node, messageId: 'violationDetected' });
47
- }
48
- },
49
- };
50
- },
51
- });
@@ -1,10 +0,0 @@
1
- import { type SecurityRuleOptions } from '@interlace/eslint-devkit';
2
- export interface Options extends SecurityRuleOptions {
3
- /** Allow insecure settings in development */
4
- allowInDev?: boolean;
5
- /** Safe preload script patterns */
6
- safePreloadPatterns?: string[];
7
- /** Allowed IPC channels */
8
- allowedIpcChannels?: string[];
9
- }
10
- export declare const noElectronSecurityIssues: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
@@ -1,423 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.noElectronSecurityIssues = void 0;
4
- const eslint_devkit_1 = require("@interlace/eslint-devkit");
5
- const eslint_devkit_2 = require("@interlace/eslint-devkit");
6
- const eslint_devkit_3 = require("@interlace/eslint-devkit");
7
- exports.noElectronSecurityIssues = (0, eslint_devkit_1.createRule)({
8
- name: 'no-electron-security-issues',
9
- meta: {
10
- type: 'problem',
11
- docs: {
12
- description: 'Detects Electron security vulnerabilities and insecure configurations',
13
- },
14
- fixable: 'code',
15
- hasSuggestions: true,
16
- messages: {
17
- electronSecurityIssue: (0, eslint_devkit_2.formatLLMMessage)({
18
- icon: eslint_devkit_2.MessageIcons.SECURITY,
19
- issueName: 'Electron Security Issue',
20
- cwe: 'CWE-16',
21
- description: 'Electron security vulnerability detected',
22
- severity: '{{severity}}',
23
- fix: '{{safeAlternative}}',
24
- documentationLink: 'https://electronjs.org/docs/tutorial/security',
25
- }),
26
- nodeIntegrationEnabled: (0, eslint_devkit_2.formatLLMMessage)({
27
- icon: eslint_devkit_2.MessageIcons.SECURITY,
28
- issueName: 'Node Integration Enabled',
29
- cwe: 'CWE-16',
30
- description: 'nodeIntegration enabled allows Node.js access in renderer',
31
- severity: 'CRITICAL',
32
- fix: 'Set nodeIntegration: false and use secure preload scripts',
33
- documentationLink: 'https://electronjs.org/docs/tutorial/security#2-do-not-enable-nodejs-integration-for-remote-content',
34
- }),
35
- contextIsolationDisabled: (0, eslint_devkit_2.formatLLMMessage)({
36
- icon: eslint_devkit_2.MessageIcons.SECURITY,
37
- issueName: 'Context Isolation Disabled',
38
- cwe: 'CWE-16',
39
- description: 'contextIsolation disabled removes security boundary',
40
- severity: 'CRITICAL',
41
- fix: 'Enable contextIsolation and use preload scripts',
42
- documentationLink: 'https://electronjs.org/docs/tutorial/context-isolation',
43
- }),
44
- webSecurityDisabled: (0, eslint_devkit_2.formatLLMMessage)({
45
- icon: eslint_devkit_2.MessageIcons.SECURITY,
46
- issueName: 'Web Security Disabled',
47
- cwe: 'CWE-16',
48
- description: 'webSecurity disabled removes CORS and security protections',
49
- severity: 'HIGH',
50
- fix: 'Keep webSecurity enabled',
51
- documentationLink: 'https://electronjs.org/docs/tutorial/security#6-define-a-content-security-policy',
52
- }),
53
- insecureContentEnabled: (0, eslint_devkit_2.formatLLMMessage)({
54
- icon: eslint_devkit_2.MessageIcons.SECURITY,
55
- issueName: 'Insecure Content Enabled',
56
- cwe: 'CWE-16',
57
- description: 'allowRunningInsecureContent allows mixed content',
58
- severity: 'MEDIUM',
59
- fix: 'Set allowRunningInsecureContent: false',
60
- documentationLink: 'https://electronjs.org/docs/tutorial/security#5-do-not-disable-websecurity',
61
- }),
62
- unsafePreloadScript: (0, eslint_devkit_2.formatLLMMessage)({
63
- icon: eslint_devkit_2.MessageIcons.SECURITY,
64
- issueName: 'Unsafe Preload Script',
65
- cwe: 'CWE-16',
66
- description: 'Preload script may expose sensitive APIs',
67
- severity: 'HIGH',
68
- fix: 'Use minimal, secure preload scripts',
69
- documentationLink: 'https://electronjs.org/docs/tutorial/security#3-enable-context-isolation-for-remote-content',
70
- }),
71
- directNodeAccess: (0, eslint_devkit_2.formatLLMMessage)({
72
- icon: eslint_devkit_2.MessageIcons.SECURITY,
73
- issueName: 'Direct Node Access',
74
- cwe: 'CWE-16',
75
- description: 'Direct access to Node.js APIs in renderer process',
76
- severity: 'HIGH',
77
- fix: 'Access Node.js APIs only through secure IPC channels',
78
- documentationLink: 'https://electronjs.org/docs/tutorial/security#3-enable-context-isolation-for-remote-content',
79
- }),
80
- insecureIpcPattern: (0, eslint_devkit_2.formatLLMMessage)({
81
- icon: eslint_devkit_2.MessageIcons.SECURITY,
82
- issueName: 'Insecure IPC Pattern',
83
- cwe: 'CWE-16',
84
- description: 'IPC communication lacks proper validation',
85
- severity: 'MEDIUM',
86
- fix: 'Validate IPC messages and restrict channels',
87
- documentationLink: 'https://electronjs.org/docs/tutorial/security#7-do-not-use-the-ipc-transport-for-sensitive-data',
88
- }),
89
- missingSandbox: (0, eslint_devkit_2.formatLLMMessage)({
90
- icon: eslint_devkit_2.MessageIcons.SECURITY,
91
- issueName: 'Missing Sandbox',
92
- cwe: 'CWE-16',
93
- description: 'BrowserWindow not sandboxed',
94
- severity: 'MEDIUM',
95
- fix: 'Enable sandbox for untrusted content',
96
- documentationLink: 'https://electronjs.org/docs/tutorial/sandbox',
97
- }),
98
- enableSecurityFeatures: (0, eslint_devkit_2.formatLLMMessage)({
99
- icon: eslint_devkit_2.MessageIcons.INFO,
100
- issueName: 'Enable Security Features',
101
- description: 'Enable Electron security features',
102
- severity: 'LOW',
103
- fix: 'Set contextIsolation: true, nodeIntegration: false',
104
- documentationLink: 'https://electronjs.org/docs/tutorial/security',
105
- }),
106
- useContextIsolation: (0, eslint_devkit_2.formatLLMMessage)({
107
- icon: eslint_devkit_2.MessageIcons.INFO,
108
- issueName: 'Use Context Isolation',
109
- description: 'Use context isolation for security',
110
- severity: 'LOW',
111
- fix: 'Enable contextIsolation in BrowserWindow options',
112
- documentationLink: 'https://electronjs.org/docs/tutorial/context-isolation',
113
- }),
114
- securePreloadScripts: (0, eslint_devkit_2.formatLLMMessage)({
115
- icon: eslint_devkit_2.MessageIcons.INFO,
116
- issueName: 'Secure Preload Scripts',
117
- description: 'Use secure preload scripts',
118
- severity: 'LOW',
119
- fix: 'Limit APIs exposed in preload scripts',
120
- documentationLink: 'https://electronjs.org/docs/tutorial/security#3-enable-context-isolation-for-remote-content',
121
- }),
122
- strategySecureDefaults: (0, eslint_devkit_2.formatLLMMessage)({
123
- icon: eslint_devkit_2.MessageIcons.STRATEGY,
124
- issueName: 'Secure Defaults Strategy',
125
- description: 'Use secure defaults for Electron applications',
126
- severity: 'LOW',
127
- fix: 'Start with secure configuration and relax only when necessary',
128
- documentationLink: 'https://electronjs.org/docs/tutorial/security',
129
- }),
130
- strategyProcessSeparation: (0, eslint_devkit_2.formatLLMMessage)({
131
- icon: eslint_devkit_2.MessageIcons.STRATEGY,
132
- issueName: 'Process Separation Strategy',
133
- description: 'Separate main and renderer processes properly',
134
- severity: 'LOW',
135
- fix: 'Keep Node.js APIs in main process, use IPC for communication',
136
- documentationLink: 'https://electronjs.org/docs/tutorial/application-architecture',
137
- }),
138
- strategyInputValidation: (0, eslint_devkit_2.formatLLMMessage)({
139
- icon: eslint_devkit_2.MessageIcons.STRATEGY,
140
- issueName: 'Input Validation Strategy',
141
- description: 'Validate all inputs in Electron applications',
142
- severity: 'LOW',
143
- fix: 'Validate IPC messages and user inputs',
144
- documentationLink: 'https://electronjs.org/docs/tutorial/security#7-do-not-use-the-ipc-transport-for-sensitive-data',
145
- })
146
- },
147
- schema: [
148
- {
149
- type: 'object',
150
- properties: {
151
- allowInDev: {
152
- type: 'boolean',
153
- default: false,
154
- description: 'Allow insecure settings in development'
155
- },
156
- safePreloadPatterns: {
157
- type: 'array',
158
- items: { type: 'string' },
159
- default: ['contextBridge', 'ipcRenderer'],
160
- },
161
- allowedIpcChannels: {
162
- type: 'array',
163
- items: { type: 'string' },
164
- default: [],
165
- },
166
- trustedSanitizers: {
167
- type: 'array',
168
- items: { type: 'string' },
169
- default: [],
170
- description: 'Additional function names to consider as safe',
171
- },
172
- trustedAnnotations: {
173
- type: 'array',
174
- items: { type: 'string' },
175
- default: [],
176
- description: 'Additional JSDoc annotations to consider as safe markers',
177
- },
178
- strictMode: {
179
- type: 'boolean',
180
- default: false,
181
- description: 'Disable all false positive detection (strict mode)',
182
- },
183
- },
184
- additionalProperties: false,
185
- },
186
- ],
187
- },
188
- defaultOptions: [
189
- {
190
- allowInDev: false,
191
- safePreloadPatterns: ['contextBridge', 'ipcRenderer'],
192
- allowedIpcChannels: [],
193
- trustedSanitizers: [],
194
- trustedAnnotations: [],
195
- strictMode: false,
196
- },
197
- ],
198
- create(context) {
199
- const options = context.options[0] || {};
200
- const { allowedIpcChannels = [], trustedSanitizers = [], trustedAnnotations = [], strictMode = false, } = options;
201
- const filename = context.filename || context.getFilename();
202
- // Create safety checker for false positive detection
203
- const safetyChecker = (0, eslint_devkit_3.createSafetyChecker)({
204
- trustedSanitizers,
205
- trustedAnnotations,
206
- trustedOrmPatterns: [],
207
- strictMode,
208
- });
209
- /**
210
- * Check if this is an Electron BrowserWindow creation
211
- */
212
- const isBrowserWindowCreation = (node) => {
213
- return node.callee.type === 'Identifier' &&
214
- node.callee.name === 'BrowserWindow';
215
- };
216
- /**
217
- * Check if BrowserWindow options contain insecure settings
218
- */
219
- const checkBrowserWindowOptions = (optionsNode) => {
220
- for (const prop of optionsNode.properties) {
221
- if (prop.type === 'Property' &&
222
- prop.key.type === 'Identifier') {
223
- const key = prop.key.name;
224
- const value = prop.value;
225
- // Check for insecure boolean options
226
- if (['nodeIntegration', 'contextIsolation', 'webSecurity', 'allowRunningInsecureContent', 'sandbox'].includes(key)) {
227
- if (value.type === 'Literal') {
228
- const isInsecure = ((key === 'nodeIntegration' && value.value === true) ||
229
- (key === 'contextIsolation' && value.value === false) ||
230
- (key === 'webSecurity' && value.value === false) ||
231
- (key === 'allowRunningInsecureContent' && value.value === true) ||
232
- (key === 'sandbox' && value.value === false));
233
- if (isInsecure) {
234
- // FALSE POSITIVE REDUCTION
235
- if (safetyChecker.isSafe(prop, context)) {
236
- continue;
237
- }
238
- const messageId = (key === 'nodeIntegration' ? 'nodeIntegrationEnabled' :
239
- key === 'contextIsolation' ? 'contextIsolationDisabled' :
240
- key === 'webSecurity' ? 'webSecurityDisabled' :
241
- key === 'allowRunningInsecureContent' ? 'insecureContentEnabled' :
242
- 'missingSandbox');
243
- context.report({
244
- node: prop,
245
- messageId,
246
- data: {
247
- filePath: filename,
248
- line: String(prop.loc?.start.line ?? 0),
249
- },
250
- });
251
- }
252
- }
253
- }
254
- }
255
- }
256
- };
257
- /**
258
- * Check if this is an IPC call
259
- */
260
- const isIpcCall = (node) => {
261
- const callee = node.callee;
262
- if (callee.type === 'MemberExpression' &&
263
- callee.object.type === 'Identifier' &&
264
- ['ipcMain', 'ipcRenderer'].includes(callee.object.name) &&
265
- callee.property.type === 'Identifier') {
266
- return ['send', 'invoke', 'handle', 'on', 'once'].includes(callee.property.name);
267
- }
268
- return false;
269
- };
270
- /**
271
- * Check for unsafe IPC patterns
272
- */
273
- const checkIpcCall = (node) => {
274
- const args = node.arguments;
275
- if (args.length === 0) {
276
- return;
277
- }
278
- // Check channel name (first argument)
279
- const channelArg = args[0];
280
- if (channelArg.type === 'Literal' && typeof channelArg.value === 'string') {
281
- const channel = channelArg.value;
282
- // Check if channel is allowed
283
- if (allowedIpcChannels.length > 0 && !allowedIpcChannels.includes(channel)) {
284
- /* c8 ignore start -- safetyChecker requires JSDoc annotations not testable via RuleTester */
285
- if (safetyChecker.isSafe(node, context)) {
286
- return;
287
- }
288
- /* c8 ignore stop */
289
- context.report({
290
- node: channelArg,
291
- messageId: 'insecureIpcPattern',
292
- data: {
293
- filePath: filename,
294
- line: String(node.loc?.start.line ?? 0),
295
- },
296
- });
297
- }
298
- }
299
- };
300
- /**
301
- * Check for direct Node.js API access in renderer-like files
302
- */
303
- const isRendererFile = () => {
304
- const fileName = filename.toLowerCase();
305
- return fileName.includes('renderer') ||
306
- fileName.includes('preload') ||
307
- fileName.includes('ui') ||
308
- fileName.includes('view');
309
- };
310
- /**
311
- * Check for Node.js API usage
312
- */
313
- const isNodeApiCall = (node) => {
314
- const callee = node.callee;
315
- // Check for require('fs'), require('child_process'), etc.
316
- if (callee.type === 'Identifier' && callee.name === 'require') {
317
- const arg = node.arguments[0];
318
- if (arg?.type === 'Literal' && typeof arg.value === 'string') {
319
- const moduleName = arg.value;
320
- return ['fs', 'child_process', 'os', 'path', 'crypto', 'http', 'https'].includes(moduleName);
321
- }
322
- }
323
- // Check for global Node.js objects
324
- if (callee.type === 'MemberExpression' &&
325
- callee.object.type === 'Identifier' &&
326
- ['process', 'global', '__dirname', '__filename'].includes(callee.object.name)) {
327
- return true;
328
- }
329
- return false;
330
- };
331
- return {
332
- // Check BrowserWindow creation
333
- NewExpression(node) {
334
- try {
335
- if (isBrowserWindowCreation(node)) {
336
- const args = node.arguments;
337
- if (args.length > 0 && args[0]?.type === 'ObjectExpression') {
338
- checkBrowserWindowOptions(args[0]);
339
- }
340
- }
341
- }
342
- catch {
343
- return;
344
- }
345
- },
346
- // Check IPC calls
347
- CallExpression(node) {
348
- try {
349
- if (isIpcCall(node)) {
350
- checkIpcCall(node);
351
- }
352
- // Check for Node.js API usage in renderer files
353
- if (isRendererFile() && isNodeApiCall(node)) {
354
- /* c8 ignore start -- safetyChecker requires JSDoc annotations not testable via RuleTester */
355
- if (safetyChecker.isSafe(node, context)) {
356
- return;
357
- }
358
- /* c8 ignore stop */
359
- context.report({
360
- node,
361
- messageId: 'directNodeAccess',
362
- data: {
363
- filePath: filename,
364
- line: String(node.loc?.start.line ?? 0),
365
- },
366
- });
367
- }
368
- }
369
- catch {
370
- // Skip problematic nodes to avoid rule crashes
371
- return;
372
- }
373
- },
374
- // Check for preload script issues
375
- AssignmentExpression(node) {
376
- try {
377
- // Look for preload script assignments
378
- if (node.left.type === 'MemberExpression' &&
379
- node.left.property.type === 'Identifier' &&
380
- node.left.property.name === 'preload') {
381
- if (node.right.type === 'Literal' && typeof node.right.value === 'string') {
382
- const preloadPath = node.right.value;
383
- // Check for potentially unsafe preload patterns
384
- if (preloadPath.includes('node_modules') ||
385
- preloadPath.includes('http') ||
386
- preloadPath.includes('remote')) {
387
- /* c8 ignore start -- safetyChecker requires JSDoc annotations not testable via RuleTester */
388
- if (safetyChecker.isSafe(node, context)) {
389
- return;
390
- }
391
- /* c8 ignore stop */
392
- context.report({
393
- node: node.right,
394
- messageId: 'unsafePreloadScript',
395
- data: {
396
- filePath: filename,
397
- line: String(node.loc?.start.line ?? 0),
398
- },
399
- });
400
- }
401
- }
402
- }
403
- }
404
- catch {
405
- return;
406
- }
407
- },
408
- // Check for insecure webPreferences patterns
409
- Property(node) {
410
- try {
411
- if (node.key.type === 'Identifier' && node.key.name === 'webPreferences') {
412
- if (node.value.type === 'ObjectExpression') {
413
- checkBrowserWindowOptions(node.value);
414
- }
415
- }
416
- }
417
- catch {
418
- return;
419
- }
420
- }
421
- };
422
- },
423
- });
@@ -1,6 +0,0 @@
1
- /**
2
- * @fileoverview Detect debug endpoints without auth
3
- */
4
- export interface Options {
5
- }
6
- export declare const noExposedDebugEndpoints: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
@@ -1,62 +0,0 @@
1
- "use strict";
2
- /**
3
- * @fileoverview Detect debug endpoints without auth
4
- */
5
- Object.defineProperty(exports, "__esModule", { value: true });
6
- exports.noExposedDebugEndpoints = void 0;
7
- const eslint_devkit_1 = require("@interlace/eslint-devkit");
8
- exports.noExposedDebugEndpoints = (0, eslint_devkit_1.createRule)({
9
- name: 'no-exposed-debug-endpoints',
10
- meta: {
11
- type: 'problem',
12
- docs: {
13
- description: 'Detect debug endpoints without auth',
14
- },
15
- messages: {
16
- violationDetected: (0, eslint_devkit_1.formatLLMMessage)({
17
- icon: eslint_devkit_1.MessageIcons.SECURITY,
18
- issueName: 'Exposed Debug Endpoint',
19
- cwe: 'CWE-489',
20
- description: 'Debug endpoint exposed without authentication',
21
- severity: 'HIGH',
22
- fix: 'Remove debug endpoints from production or add authentication',
23
- documentationLink: 'https://cwe.mitre.org/data/definitions/489.html',
24
- })
25
- },
26
- schema: [],
27
- },
28
- defaultOptions: [],
29
- create(context) {
30
- function report(node) {
31
- context.report({ node, messageId: 'violationDetected' });
32
- }
33
- const debugPaths = ['/debug', '/__debug__', '/admin', '/_admin', '/test', '/health'];
34
- return {
35
- CallExpression(node) {
36
- // Detect app.get('/debug', handler)
37
- if (node.callee.type === 'MemberExpression' &&
38
- node.callee.object.type === 'Identifier' &&
39
- ['app', 'router', 'express'].includes(node.callee.object.name) &&
40
- node.callee.property.type === 'Identifier' &&
41
- ['get', 'post', 'use'].includes(node.callee.property.name)) {
42
- const pathArg = node.arguments[0];
43
- if (pathArg && pathArg.type === 'Literal' && typeof pathArg.value === 'string') {
44
- const path = pathArg.value.toLowerCase();
45
- if (debugPaths.some(dp => path.includes(dp))) {
46
- report(node);
47
- }
48
- }
49
- }
50
- },
51
- Literal(node) {
52
- // Flag debug path strings in general
53
- if (typeof node.value === 'string') {
54
- const path = node.value.toLowerCase();
55
- if (debugPaths.some(dp => path === dp)) {
56
- report(node);
57
- }
58
- }
59
- },
60
- };
61
- },
62
- });