eslint-plugin-secure-coding 2.3.2 → 2.3.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -0
- package/package.json +3 -10
- package/src/index.ts +605 -0
- package/src/rules/__tests__/integration-demo.test.ts +290 -0
- package/src/rules/__tests__/integration-llm.test.ts +89 -0
- package/src/rules/database-injection/database-injection.test.ts +456 -0
- package/src/rules/database-injection/index.ts +488 -0
- package/src/rules/detect-child-process/detect-child-process.test.ts +207 -0
- package/src/rules/detect-child-process/index.ts +634 -0
- package/src/rules/detect-eval-with-expression/detect-eval-with-expression.test.ts +416 -0
- package/src/rules/detect-eval-with-expression/index.ts +463 -0
- package/src/rules/detect-mixed-content/detect-mixed-content.test.ts +28 -0
- package/src/rules/detect-mixed-content/index.ts +52 -0
- package/src/rules/detect-non-literal-fs-filename/detect-non-literal-fs-filename.test.ts +269 -0
- package/src/rules/detect-non-literal-fs-filename/index.ts +551 -0
- package/src/rules/detect-non-literal-regexp/detect-non-literal-regexp.test.ts +189 -0
- package/src/rules/detect-non-literal-regexp/index.ts +490 -0
- package/src/rules/detect-object-injection/detect-object-injection.test.ts +440 -0
- package/src/rules/detect-object-injection/index.ts +674 -0
- package/src/rules/detect-suspicious-dependencies/detect-suspicious-dependencies.test.ts +32 -0
- package/src/rules/detect-suspicious-dependencies/index.ts +84 -0
- package/src/rules/detect-weak-password-validation/detect-weak-password-validation.test.ts +31 -0
- package/src/rules/detect-weak-password-validation/index.ts +68 -0
- package/src/rules/no-allow-arbitrary-loads/index.ts +54 -0
- package/src/rules/no-allow-arbitrary-loads/no-allow-arbitrary-loads.test.ts +28 -0
- package/src/rules/no-arbitrary-file-access/index.ts +238 -0
- package/src/rules/no-arbitrary-file-access/no-arbitrary-file-access.test.ts +119 -0
- package/src/rules/no-buffer-overread/index.ts +724 -0
- package/src/rules/no-buffer-overread/no-buffer-overread.test.ts +313 -0
- package/src/rules/no-clickjacking/index.ts +481 -0
- package/src/rules/no-clickjacking/no-clickjacking.test.ts +253 -0
- package/src/rules/no-client-side-auth-logic/index.ts +81 -0
- package/src/rules/no-client-side-auth-logic/no-client-side-auth-logic.test.ts +33 -0
- package/src/rules/no-credentials-in-query-params/index.ts +69 -0
- package/src/rules/no-credentials-in-query-params/no-credentials-in-query-params.test.ts +33 -0
- package/src/rules/no-credentials-in-storage-api/index.ts +64 -0
- package/src/rules/no-credentials-in-storage-api/no-credentials-in-storage-api.test.ts +31 -0
- package/src/rules/no-data-in-temp-storage/index.ts +75 -0
- package/src/rules/no-data-in-temp-storage/no-data-in-temp-storage.test.ts +33 -0
- package/src/rules/no-debug-code-in-production/index.ts +59 -0
- package/src/rules/no-debug-code-in-production/no-debug-code-in-production.test.ts +26 -0
- package/src/rules/no-directive-injection/index.ts +551 -0
- package/src/rules/no-directive-injection/no-directive-injection.test.ts +305 -0
- package/src/rules/no-disabled-certificate-validation/index.ts +72 -0
- package/src/rules/no-disabled-certificate-validation/no-disabled-certificate-validation.test.ts +33 -0
- package/src/rules/no-document-cookie/index.ts +113 -0
- package/src/rules/no-document-cookie/no-document-cookie.test.ts +382 -0
- package/src/rules/no-dynamic-dependency-loading/index.ts +60 -0
- package/src/rules/no-dynamic-dependency-loading/no-dynamic-dependency-loading.test.ts +27 -0
- package/src/rules/no-electron-security-issues/index.ts +504 -0
- package/src/rules/no-electron-security-issues/no-electron-security-issues.test.ts +324 -0
- package/src/rules/no-exposed-debug-endpoints/index.ts +73 -0
- package/src/rules/no-exposed-debug-endpoints/no-exposed-debug-endpoints.test.ts +40 -0
- package/src/rules/no-exposed-sensitive-data/index.ts +428 -0
- package/src/rules/no-exposed-sensitive-data/no-exposed-sensitive-data.test.ts +75 -0
- package/src/rules/no-format-string-injection/index.ts +801 -0
- package/src/rules/no-format-string-injection/no-format-string-injection.test.ts +437 -0
- package/src/rules/no-graphql-injection/index.ts +508 -0
- package/src/rules/no-graphql-injection/no-graphql-injection.test.ts +371 -0
- package/src/rules/no-hardcoded-credentials/index.ts +478 -0
- package/src/rules/no-hardcoded-credentials/no-hardcoded-credentials.test.ts +639 -0
- package/src/rules/no-hardcoded-session-tokens/index.ts +69 -0
- package/src/rules/no-hardcoded-session-tokens/no-hardcoded-session-tokens.test.ts +42 -0
- package/src/rules/no-http-urls/index.ts +131 -0
- package/src/rules/no-http-urls/no-http-urls.test.ts +60 -0
- package/src/rules/no-improper-sanitization/index.ts +502 -0
- package/src/rules/no-improper-sanitization/no-improper-sanitization.test.ts +156 -0
- package/src/rules/no-improper-type-validation/index.ts +572 -0
- package/src/rules/no-improper-type-validation/no-improper-type-validation.test.ts +372 -0
- package/src/rules/no-insecure-comparison/index.ts +232 -0
- package/src/rules/no-insecure-comparison/no-insecure-comparison.test.ts +218 -0
- package/src/rules/no-insecure-cookie-settings/index.ts +391 -0
- package/src/rules/no-insecure-cookie-settings/no-insecure-cookie-settings.test.ts +409 -0
- package/src/rules/no-insecure-jwt/index.ts +467 -0
- package/src/rules/no-insecure-jwt/no-insecure-jwt.test.ts +259 -0
- package/src/rules/no-insecure-redirects/index.ts +267 -0
- package/src/rules/no-insecure-redirects/no-insecure-redirects.test.ts +108 -0
- package/src/rules/no-insecure-websocket/index.ts +72 -0
- package/src/rules/no-insecure-websocket/no-insecure-websocket.test.ts +42 -0
- package/src/rules/no-insufficient-postmessage-validation/index.ts +497 -0
- package/src/rules/no-insufficient-postmessage-validation/no-insufficient-postmessage-validation.test.ts +360 -0
- package/src/rules/no-insufficient-random/index.ts +288 -0
- package/src/rules/no-insufficient-random/no-insufficient-random.test.ts +246 -0
- package/src/rules/no-ldap-injection/index.ts +547 -0
- package/src/rules/no-ldap-injection/no-ldap-injection.test.ts +317 -0
- package/src/rules/no-missing-authentication/index.ts +408 -0
- package/src/rules/no-missing-authentication/no-missing-authentication.test.ts +350 -0
- package/src/rules/no-missing-cors-check/index.ts +453 -0
- package/src/rules/no-missing-cors-check/no-missing-cors-check.test.ts +392 -0
- package/src/rules/no-missing-csrf-protection/index.ts +229 -0
- package/src/rules/no-missing-csrf-protection/no-missing-csrf-protection.test.ts +222 -0
- package/src/rules/no-missing-security-headers/index.ts +266 -0
- package/src/rules/no-missing-security-headers/no-missing-security-headers.test.ts +98 -0
- package/src/rules/no-password-in-url/index.ts +64 -0
- package/src/rules/no-password-in-url/no-password-in-url.test.ts +27 -0
- package/src/rules/no-permissive-cors/index.ts +78 -0
- package/src/rules/no-permissive-cors/no-permissive-cors.test.ts +28 -0
- package/src/rules/no-pii-in-logs/index.ts +83 -0
- package/src/rules/no-pii-in-logs/no-pii-in-logs.test.ts +26 -0
- package/src/rules/no-postmessage-origin-wildcard/index.ts +67 -0
- package/src/rules/no-postmessage-origin-wildcard/no-postmessage-origin-wildcard.test.ts +27 -0
- package/src/rules/no-privilege-escalation/index.ts +403 -0
- package/src/rules/no-privilege-escalation/no-privilege-escalation.test.ts +306 -0
- package/src/rules/no-redos-vulnerable-regex/index.ts +379 -0
- package/src/rules/no-redos-vulnerable-regex/no-redos-vulnerable-regex.test.ts +83 -0
- package/src/rules/no-sensitive-data-exposure/index.ts +294 -0
- package/src/rules/no-sensitive-data-exposure/no-sensitive-data-exposure.test.ts +262 -0
- package/src/rules/no-sensitive-data-in-analytics/index.ts +73 -0
- package/src/rules/no-sensitive-data-in-analytics/no-sensitive-data-in-analytics.test.ts +42 -0
- package/src/rules/no-sensitive-data-in-cache/index.ts +59 -0
- package/src/rules/no-sensitive-data-in-cache/no-sensitive-data-in-cache.test.ts +32 -0
- package/src/rules/no-sql-injection/index.ts +424 -0
- package/src/rules/no-sql-injection/no-sql-injection.test.ts +303 -0
- package/src/rules/no-timing-attack/index.ts +552 -0
- package/src/rules/no-timing-attack/no-timing-attack.test.ts +348 -0
- package/src/rules/no-toctou-vulnerability/index.ts +250 -0
- package/src/rules/no-toctou-vulnerability/no-toctou-vulnerability.test.ts +60 -0
- package/src/rules/no-tracking-without-consent/index.ts +78 -0
- package/src/rules/no-tracking-without-consent/no-tracking-without-consent.test.ts +34 -0
- package/src/rules/no-unchecked-loop-condition/index.ts +781 -0
- package/src/rules/no-unchecked-loop-condition/no-unchecked-loop-condition.test.ts +459 -0
- package/src/rules/no-unencrypted-local-storage/index.ts +73 -0
- package/src/rules/no-unencrypted-local-storage/no-unencrypted-local-storage.test.ts +41 -0
- package/src/rules/no-unencrypted-transmission/index.ts +296 -0
- package/src/rules/no-unencrypted-transmission/no-unencrypted-transmission.test.ts +287 -0
- package/src/rules/no-unescaped-url-parameter/index.ts +424 -0
- package/src/rules/no-unescaped-url-parameter/no-unescaped-url-parameter.test.ts +263 -0
- package/src/rules/no-unlimited-resource-allocation/index.ts +767 -0
- package/src/rules/no-unlimited-resource-allocation/no-unlimited-resource-allocation.test.ts +544 -0
- package/src/rules/no-unsafe-deserialization/index.ts +593 -0
- package/src/rules/no-unsafe-deserialization/no-unsafe-deserialization.test.ts +310 -0
- package/src/rules/no-unsafe-dynamic-require/index.ts +125 -0
- package/src/rules/no-unsafe-dynamic-require/no-unsafe-dynamic-require.test.ts +151 -0
- package/src/rules/no-unsafe-regex-construction/index.ts +370 -0
- package/src/rules/no-unsafe-regex-construction/no-unsafe-regex-construction.test.ts +181 -0
- package/src/rules/no-unsanitized-html/index.ts +400 -0
- package/src/rules/no-unsanitized-html/no-unsanitized-html.test.ts +488 -0
- package/src/rules/no-unvalidated-deeplinks/index.ts +73 -0
- package/src/rules/no-unvalidated-deeplinks/no-unvalidated-deeplinks.test.ts +29 -0
- package/src/rules/no-unvalidated-user-input/index.ts +498 -0
- package/src/rules/no-unvalidated-user-input/no-unvalidated-user-input.test.ts +463 -0
- package/src/rules/no-verbose-error-messages/index.ts +83 -0
- package/src/rules/no-verbose-error-messages/no-verbose-error-messages.test.ts +34 -0
- package/src/rules/no-weak-crypto/index.ts +447 -0
- package/src/rules/no-weak-crypto/no-weak-crypto.test.ts +297 -0
- package/src/rules/no-weak-password-recovery/index.ts +509 -0
- package/src/rules/no-weak-password-recovery/no-weak-password-recovery.test.ts +184 -0
- package/src/rules/no-xpath-injection/index.ts +596 -0
- package/src/rules/no-xpath-injection/no-xpath-injection.test.ts +405 -0
- package/src/rules/no-xxe-injection/index.ts +342 -0
- package/src/rules/no-xxe-injection/no-xxe-injection.test.ts +122 -0
- package/src/rules/no-zip-slip/index.ts +526 -0
- package/src/rules/no-zip-slip/no-zip-slip.test.ts +305 -0
- package/src/rules/require-backend-authorization/index.ts +71 -0
- package/src/rules/require-backend-authorization/require-backend-authorization.test.ts +31 -0
- package/src/rules/require-code-minification/index.ts +54 -0
- package/src/rules/require-code-minification/require-code-minification.test.ts +30 -0
- package/src/rules/require-csp-headers/index.ts +74 -0
- package/src/rules/require-csp-headers/require-csp-headers.test.ts +34 -0
- package/src/rules/require-data-minimization/index.ts +65 -0
- package/src/rules/require-data-minimization/require-data-minimization.test.ts +31 -0
- package/src/rules/require-dependency-integrity/index.ts +78 -0
- package/src/rules/require-dependency-integrity/require-dependency-integrity.test.ts +44 -0
- package/src/rules/require-https-only/index.ts +75 -0
- package/src/rules/require-https-only/require-https-only.test.ts +26 -0
- package/src/rules/require-mime-type-validation/index.ts +77 -0
- package/src/rules/require-mime-type-validation/require-mime-type-validation.test.ts +32 -0
- package/src/rules/require-network-timeout/index.ts +58 -0
- package/src/rules/require-network-timeout/require-network-timeout.test.ts +26 -0
- package/src/rules/require-package-lock/index.ts +75 -0
- package/src/rules/require-package-lock/require-package-lock.test.ts +27 -0
- package/src/rules/require-secure-credential-storage/index.ts +60 -0
- package/src/rules/require-secure-credential-storage/require-secure-credential-storage.test.ts +26 -0
- package/src/rules/require-secure-defaults/index.ts +54 -0
- package/src/rules/require-secure-defaults/require-secure-defaults.test.ts +26 -0
- package/src/rules/require-secure-deletion/index.ts +52 -0
- package/src/rules/require-secure-deletion/require-secure-deletion.test.ts +29 -0
- package/src/rules/require-storage-encryption/index.ts +60 -0
- package/src/rules/require-storage-encryption/require-storage-encryption.test.ts +26 -0
- package/src/rules/require-url-validation/index.ts +85 -0
- package/src/rules/require-url-validation/require-url-validation.test.ts +32 -0
- package/src/types/{index.d.ts → index.ts} +157 -53
- package/src/index.d.ts +0 -32
- package/src/index.js +0 -465
- package/src/rules/database-injection/index.d.ts +0 -13
- package/src/rules/database-injection/index.js +0 -406
- package/src/rules/detect-child-process/index.d.ts +0 -11
- package/src/rules/detect-child-process/index.js +0 -529
- package/src/rules/detect-eval-with-expression/index.d.ts +0 -9
- package/src/rules/detect-eval-with-expression/index.js +0 -392
- package/src/rules/detect-mixed-content/index.d.ts +0 -8
- package/src/rules/detect-mixed-content/index.js +0 -44
- package/src/rules/detect-non-literal-fs-filename/index.d.ts +0 -7
- package/src/rules/detect-non-literal-fs-filename/index.js +0 -454
- package/src/rules/detect-non-literal-regexp/index.d.ts +0 -9
- package/src/rules/detect-non-literal-regexp/index.js +0 -403
- package/src/rules/detect-object-injection/index.d.ts +0 -11
- package/src/rules/detect-object-injection/index.js +0 -560
- package/src/rules/detect-suspicious-dependencies/index.d.ts +0 -8
- package/src/rules/detect-suspicious-dependencies/index.js +0 -71
- package/src/rules/detect-weak-password-validation/index.d.ts +0 -6
- package/src/rules/detect-weak-password-validation/index.js +0 -58
- package/src/rules/no-allow-arbitrary-loads/index.d.ts +0 -8
- package/src/rules/no-allow-arbitrary-loads/index.js +0 -47
- package/src/rules/no-arbitrary-file-access/index.d.ts +0 -13
- package/src/rules/no-arbitrary-file-access/index.js +0 -195
- package/src/rules/no-buffer-overread/index.d.ts +0 -29
- package/src/rules/no-buffer-overread/index.js +0 -606
- package/src/rules/no-clickjacking/index.d.ts +0 -10
- package/src/rules/no-clickjacking/index.js +0 -396
- package/src/rules/no-client-side-auth-logic/index.d.ts +0 -6
- package/src/rules/no-client-side-auth-logic/index.js +0 -69
- package/src/rules/no-credentials-in-query-params/index.d.ts +0 -8
- package/src/rules/no-credentials-in-query-params/index.js +0 -57
- package/src/rules/no-credentials-in-storage-api/index.d.ts +0 -6
- package/src/rules/no-credentials-in-storage-api/index.js +0 -54
- package/src/rules/no-data-in-temp-storage/index.d.ts +0 -6
- package/src/rules/no-data-in-temp-storage/index.js +0 -64
- package/src/rules/no-debug-code-in-production/index.d.ts +0 -8
- package/src/rules/no-debug-code-in-production/index.js +0 -51
- package/src/rules/no-directive-injection/index.d.ts +0 -12
- package/src/rules/no-directive-injection/index.js +0 -457
- package/src/rules/no-disabled-certificate-validation/index.d.ts +0 -6
- package/src/rules/no-disabled-certificate-validation/index.js +0 -61
- package/src/rules/no-document-cookie/index.d.ts +0 -5
- package/src/rules/no-document-cookie/index.js +0 -89
- package/src/rules/no-dynamic-dependency-loading/index.d.ts +0 -8
- package/src/rules/no-dynamic-dependency-loading/index.js +0 -51
- package/src/rules/no-electron-security-issues/index.d.ts +0 -10
- package/src/rules/no-electron-security-issues/index.js +0 -423
- package/src/rules/no-exposed-debug-endpoints/index.d.ts +0 -6
- package/src/rules/no-exposed-debug-endpoints/index.js +0 -62
- package/src/rules/no-exposed-sensitive-data/index.d.ts +0 -11
- package/src/rules/no-exposed-sensitive-data/index.js +0 -340
- package/src/rules/no-format-string-injection/index.d.ts +0 -17
- package/src/rules/no-format-string-injection/index.js +0 -660
- package/src/rules/no-graphql-injection/index.d.ts +0 -12
- package/src/rules/no-graphql-injection/index.js +0 -411
- package/src/rules/no-hardcoded-credentials/index.d.ts +0 -26
- package/src/rules/no-hardcoded-credentials/index.js +0 -376
- package/src/rules/no-hardcoded-session-tokens/index.d.ts +0 -6
- package/src/rules/no-hardcoded-session-tokens/index.js +0 -59
- package/src/rules/no-http-urls/index.d.ts +0 -12
- package/src/rules/no-http-urls/index.js +0 -114
- package/src/rules/no-improper-sanitization/index.d.ts +0 -12
- package/src/rules/no-improper-sanitization/index.js +0 -411
- package/src/rules/no-improper-type-validation/index.d.ts +0 -10
- package/src/rules/no-improper-type-validation/index.js +0 -475
- package/src/rules/no-insecure-comparison/index.d.ts +0 -7
- package/src/rules/no-insecure-comparison/index.js +0 -193
- package/src/rules/no-insecure-cookie-settings/index.d.ts +0 -9
- package/src/rules/no-insecure-cookie-settings/index.js +0 -306
- package/src/rules/no-insecure-jwt/index.d.ts +0 -10
- package/src/rules/no-insecure-jwt/index.js +0 -380
- package/src/rules/no-insecure-redirects/index.d.ts +0 -7
- package/src/rules/no-insecure-redirects/index.js +0 -216
- package/src/rules/no-insecure-websocket/index.d.ts +0 -6
- package/src/rules/no-insecure-websocket/index.js +0 -61
- package/src/rules/no-insufficient-postmessage-validation/index.d.ts +0 -14
- package/src/rules/no-insufficient-postmessage-validation/index.js +0 -392
- package/src/rules/no-insufficient-random/index.d.ts +0 -9
- package/src/rules/no-insufficient-random/index.js +0 -208
- package/src/rules/no-ldap-injection/index.d.ts +0 -10
- package/src/rules/no-ldap-injection/index.js +0 -455
- package/src/rules/no-missing-authentication/index.d.ts +0 -13
- package/src/rules/no-missing-authentication/index.js +0 -333
- package/src/rules/no-missing-cors-check/index.d.ts +0 -9
- package/src/rules/no-missing-cors-check/index.js +0 -399
- package/src/rules/no-missing-csrf-protection/index.d.ts +0 -11
- package/src/rules/no-missing-csrf-protection/index.js +0 -180
- package/src/rules/no-missing-security-headers/index.d.ts +0 -7
- package/src/rules/no-missing-security-headers/index.js +0 -218
- package/src/rules/no-password-in-url/index.d.ts +0 -8
- package/src/rules/no-password-in-url/index.js +0 -54
- package/src/rules/no-permissive-cors/index.d.ts +0 -8
- package/src/rules/no-permissive-cors/index.js +0 -65
- package/src/rules/no-pii-in-logs/index.d.ts +0 -8
- package/src/rules/no-pii-in-logs/index.js +0 -70
- package/src/rules/no-postmessage-origin-wildcard/index.d.ts +0 -8
- package/src/rules/no-postmessage-origin-wildcard/index.js +0 -56
- package/src/rules/no-privilege-escalation/index.d.ts +0 -13
- package/src/rules/no-privilege-escalation/index.js +0 -321
- package/src/rules/no-redos-vulnerable-regex/index.d.ts +0 -7
- package/src/rules/no-redos-vulnerable-regex/index.js +0 -306
- package/src/rules/no-sensitive-data-exposure/index.d.ts +0 -11
- package/src/rules/no-sensitive-data-exposure/index.js +0 -250
- package/src/rules/no-sensitive-data-in-analytics/index.d.ts +0 -8
- package/src/rules/no-sensitive-data-in-analytics/index.js +0 -62
- package/src/rules/no-sensitive-data-in-cache/index.d.ts +0 -8
- package/src/rules/no-sensitive-data-in-cache/index.js +0 -52
- package/src/rules/no-sql-injection/index.d.ts +0 -10
- package/src/rules/no-sql-injection/index.js +0 -335
- package/src/rules/no-timing-attack/index.d.ts +0 -10
- package/src/rules/no-timing-attack/index.js +0 -447
- package/src/rules/no-toctou-vulnerability/index.d.ts +0 -7
- package/src/rules/no-toctou-vulnerability/index.js +0 -208
- package/src/rules/no-tracking-without-consent/index.d.ts +0 -6
- package/src/rules/no-tracking-without-consent/index.js +0 -67
- package/src/rules/no-unchecked-loop-condition/index.d.ts +0 -12
- package/src/rules/no-unchecked-loop-condition/index.js +0 -646
- package/src/rules/no-unencrypted-local-storage/index.d.ts +0 -8
- package/src/rules/no-unencrypted-local-storage/index.js +0 -61
- package/src/rules/no-unencrypted-transmission/index.d.ts +0 -11
- package/src/rules/no-unencrypted-transmission/index.js +0 -236
- package/src/rules/no-unescaped-url-parameter/index.d.ts +0 -9
- package/src/rules/no-unescaped-url-parameter/index.js +0 -355
- package/src/rules/no-unlimited-resource-allocation/index.d.ts +0 -12
- package/src/rules/no-unlimited-resource-allocation/index.js +0 -643
- package/src/rules/no-unsafe-deserialization/index.d.ts +0 -10
- package/src/rules/no-unsafe-deserialization/index.js +0 -491
- package/src/rules/no-unsafe-dynamic-require/index.d.ts +0 -5
- package/src/rules/no-unsafe-dynamic-require/index.js +0 -106
- package/src/rules/no-unsafe-regex-construction/index.d.ts +0 -9
- package/src/rules/no-unsafe-regex-construction/index.js +0 -291
- package/src/rules/no-unsanitized-html/index.d.ts +0 -9
- package/src/rules/no-unsanitized-html/index.js +0 -335
- package/src/rules/no-unvalidated-deeplinks/index.d.ts +0 -6
- package/src/rules/no-unvalidated-deeplinks/index.js +0 -62
- package/src/rules/no-unvalidated-user-input/index.d.ts +0 -9
- package/src/rules/no-unvalidated-user-input/index.js +0 -420
- package/src/rules/no-verbose-error-messages/index.d.ts +0 -8
- package/src/rules/no-verbose-error-messages/index.js +0 -68
- package/src/rules/no-weak-crypto/index.d.ts +0 -11
- package/src/rules/no-weak-crypto/index.js +0 -351
- package/src/rules/no-weak-password-recovery/index.d.ts +0 -12
- package/src/rules/no-weak-password-recovery/index.js +0 -424
- package/src/rules/no-xpath-injection/index.d.ts +0 -10
- package/src/rules/no-xpath-injection/index.js +0 -487
- package/src/rules/no-xxe-injection/index.d.ts +0 -7
- package/src/rules/no-xxe-injection/index.js +0 -266
- package/src/rules/no-zip-slip/index.d.ts +0 -9
- package/src/rules/no-zip-slip/index.js +0 -445
- package/src/rules/require-backend-authorization/index.d.ts +0 -6
- package/src/rules/require-backend-authorization/index.js +0 -60
- package/src/rules/require-code-minification/index.d.ts +0 -8
- package/src/rules/require-code-minification/index.js +0 -47
- package/src/rules/require-csp-headers/index.d.ts +0 -6
- package/src/rules/require-csp-headers/index.js +0 -64
- package/src/rules/require-data-minimization/index.d.ts +0 -8
- package/src/rules/require-data-minimization/index.js +0 -53
- package/src/rules/require-dependency-integrity/index.d.ts +0 -6
- package/src/rules/require-dependency-integrity/index.js +0 -64
- package/src/rules/require-https-only/index.d.ts +0 -8
- package/src/rules/require-https-only/index.js +0 -62
- package/src/rules/require-mime-type-validation/index.d.ts +0 -6
- package/src/rules/require-mime-type-validation/index.js +0 -66
- package/src/rules/require-network-timeout/index.d.ts +0 -8
- package/src/rules/require-network-timeout/index.js +0 -50
- package/src/rules/require-package-lock/index.d.ts +0 -8
- package/src/rules/require-package-lock/index.js +0 -63
- package/src/rules/require-secure-credential-storage/index.d.ts +0 -8
- package/src/rules/require-secure-credential-storage/index.js +0 -50
- package/src/rules/require-secure-defaults/index.d.ts +0 -8
- package/src/rules/require-secure-defaults/index.js +0 -47
- package/src/rules/require-secure-deletion/index.d.ts +0 -8
- package/src/rules/require-secure-deletion/index.js +0 -44
- package/src/rules/require-storage-encryption/index.d.ts +0 -8
- package/src/rules/require-storage-encryption/index.js +0 -50
- package/src/rules/require-url-validation/index.d.ts +0 -6
- package/src/rules/require-url-validation/index.js +0 -72
- package/src/types/index.js +0 -17
|
@@ -1,89 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.noDocumentCookie = void 0;
|
|
4
|
-
const eslint_devkit_1 = require("@interlace/eslint-devkit");
|
|
5
|
-
const eslint_devkit_2 = require("@interlace/eslint-devkit");
|
|
6
|
-
exports.noDocumentCookie = (0, eslint_devkit_1.createRule)({
|
|
7
|
-
name: 'no-document-cookie',
|
|
8
|
-
meta: {
|
|
9
|
-
type: 'problem',
|
|
10
|
-
docs: {
|
|
11
|
-
description: 'Prevent direct usage of document.cookie - use Cookie Store API or cookie libraries instead',
|
|
12
|
-
},
|
|
13
|
-
hasSuggestions: false,
|
|
14
|
-
messages: {
|
|
15
|
-
noDocumentCookie: (0, eslint_devkit_2.formatLLMMessage)({
|
|
16
|
-
icon: eslint_devkit_2.MessageIcons.WARNING,
|
|
17
|
-
issueName: 'Document Cookie',
|
|
18
|
-
description: 'Avoid direct document.cookie usage',
|
|
19
|
-
severity: 'MEDIUM',
|
|
20
|
-
fix: 'Use Cookie Store API or cookie library instead',
|
|
21
|
-
documentationLink: 'https://github.com/sindresorhus/eslint-plugin-unicorn/blob/main/docs/rules/no-document-cookie.md',
|
|
22
|
-
}),
|
|
23
|
-
},
|
|
24
|
-
schema: [
|
|
25
|
-
{
|
|
26
|
-
type: 'object',
|
|
27
|
-
properties: {
|
|
28
|
-
allowReading: {
|
|
29
|
-
type: 'boolean',
|
|
30
|
-
default: true,
|
|
31
|
-
},
|
|
32
|
-
},
|
|
33
|
-
additionalProperties: false,
|
|
34
|
-
},
|
|
35
|
-
],
|
|
36
|
-
},
|
|
37
|
-
defaultOptions: [{ allowReading: true }],
|
|
38
|
-
create(context) {
|
|
39
|
-
const [options] = context.options;
|
|
40
|
-
const { allowReading = true } = options || {};
|
|
41
|
-
function isDocumentCookieAccess(node) {
|
|
42
|
-
// Check if this is accessing document.cookie
|
|
43
|
-
return (node.object.type === 'Identifier' &&
|
|
44
|
-
node.object.name === 'document' &&
|
|
45
|
-
((node.property.type === 'Identifier' && node.property.name === 'cookie') ||
|
|
46
|
-
(node.computed && node.property.type === 'Literal' && node.property.value === 'cookie')));
|
|
47
|
-
}
|
|
48
|
-
function isAssignmentToCookie(node) {
|
|
49
|
-
// Check if this is an assignment to document.cookie
|
|
50
|
-
const parent = node.parent;
|
|
51
|
-
// Check direct assignment
|
|
52
|
-
if (parent?.type === 'AssignmentExpression' && parent.left === node) {
|
|
53
|
-
return true;
|
|
54
|
-
}
|
|
55
|
-
// Check compound assignment (+=, -=, etc.)
|
|
56
|
-
if (parent?.type === 'AssignmentExpression' &&
|
|
57
|
-
parent.operator &&
|
|
58
|
-
parent.operator.includes('=') &&
|
|
59
|
-
parent.left === node) {
|
|
60
|
-
return true;
|
|
61
|
-
}
|
|
62
|
-
// Variable declarator (const/let/var x = document.cookie) - this is reading, not assigning
|
|
63
|
-
if (parent?.type === 'VariableDeclarator' && parent.init === node) {
|
|
64
|
-
return false;
|
|
65
|
-
}
|
|
66
|
-
return false;
|
|
67
|
-
}
|
|
68
|
-
return {
|
|
69
|
-
MemberExpression(node) {
|
|
70
|
-
if (isDocumentCookieAccess(node)) {
|
|
71
|
-
const isAssigning = isAssignmentToCookie(node);
|
|
72
|
-
// If allowReading is true, only flag assignments
|
|
73
|
-
// If allowReading is false, flag everything
|
|
74
|
-
if (allowReading && !isAssigning) {
|
|
75
|
-
return; // Allow reading when option is enabled
|
|
76
|
-
}
|
|
77
|
-
// Flag document.cookie usage
|
|
78
|
-
context.report({
|
|
79
|
-
node,
|
|
80
|
-
messageId: 'noDocumentCookie',
|
|
81
|
-
data: {
|
|
82
|
-
operation: isAssigning ? 'assignment to' : 'reading from',
|
|
83
|
-
},
|
|
84
|
-
});
|
|
85
|
-
}
|
|
86
|
-
},
|
|
87
|
-
};
|
|
88
|
-
},
|
|
89
|
-
});
|
|
@@ -1,8 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* @fileoverview Prevent dynamic dependency injection
|
|
3
|
-
* @see https://owasp.org/www-project-mobile-top-10/
|
|
4
|
-
* @see https://cwe.mitre.org/data/definitions/494.html
|
|
5
|
-
*/
|
|
6
|
-
export interface Options {
|
|
7
|
-
}
|
|
8
|
-
export declare const noDynamicDependencyLoading: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
|
|
@@ -1,51 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
/**
|
|
3
|
-
* @fileoverview Prevent dynamic dependency injection
|
|
4
|
-
* @see https://owasp.org/www-project-mobile-top-10/
|
|
5
|
-
* @see https://cwe.mitre.org/data/definitions/494.html
|
|
6
|
-
*/
|
|
7
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
8
|
-
exports.noDynamicDependencyLoading = void 0;
|
|
9
|
-
const eslint_devkit_1 = require("@interlace/eslint-devkit");
|
|
10
|
-
exports.noDynamicDependencyLoading = (0, eslint_devkit_1.createRule)({
|
|
11
|
-
name: 'no-dynamic-dependency-loading',
|
|
12
|
-
meta: {
|
|
13
|
-
type: 'problem',
|
|
14
|
-
docs: {
|
|
15
|
-
description: 'Prevent runtime dependency injection with dynamic paths',
|
|
16
|
-
category: 'Security',
|
|
17
|
-
recommended: true,
|
|
18
|
-
owaspMobile: ['M2'],
|
|
19
|
-
cweIds: ['CWE-494'],
|
|
20
|
-
},
|
|
21
|
-
messages: {
|
|
22
|
-
violationDetected: (0, eslint_devkit_1.formatLLMMessage)({
|
|
23
|
-
icon: eslint_devkit_1.MessageIcons.SECURITY,
|
|
24
|
-
issueName: 'violation Detected',
|
|
25
|
-
cwe: 'CWE-1104',
|
|
26
|
-
description: 'Dynamic import/require detected - use static imports for security',
|
|
27
|
-
severity: 'HIGH',
|
|
28
|
-
fix: 'Review and apply secure practices',
|
|
29
|
-
documentationLink: 'https://cwe.mitre.org/data/definitions/1104.html',
|
|
30
|
-
})
|
|
31
|
-
},
|
|
32
|
-
schema: [],
|
|
33
|
-
},
|
|
34
|
-
defaultOptions: [],
|
|
35
|
-
create(context) {
|
|
36
|
-
return {
|
|
37
|
-
CallExpression(node) {
|
|
38
|
-
// Dynamic require
|
|
39
|
-
if (node.callee.name === 'require' && node.arguments[0]?.type !== 'Literal') {
|
|
40
|
-
context.report({ node, messageId: 'violationDetected' });
|
|
41
|
-
}
|
|
42
|
-
},
|
|
43
|
-
ImportExpression(node) {
|
|
44
|
-
// Dynamic import()
|
|
45
|
-
if (node.source.type !== 'Literal') {
|
|
46
|
-
context.report({ node, messageId: 'violationDetected' });
|
|
47
|
-
}
|
|
48
|
-
},
|
|
49
|
-
};
|
|
50
|
-
},
|
|
51
|
-
});
|
|
@@ -1,10 +0,0 @@
|
|
|
1
|
-
import { type SecurityRuleOptions } from '@interlace/eslint-devkit';
|
|
2
|
-
export interface Options extends SecurityRuleOptions {
|
|
3
|
-
/** Allow insecure settings in development */
|
|
4
|
-
allowInDev?: boolean;
|
|
5
|
-
/** Safe preload script patterns */
|
|
6
|
-
safePreloadPatterns?: string[];
|
|
7
|
-
/** Allowed IPC channels */
|
|
8
|
-
allowedIpcChannels?: string[];
|
|
9
|
-
}
|
|
10
|
-
export declare const noElectronSecurityIssues: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
|
|
@@ -1,423 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.noElectronSecurityIssues = void 0;
|
|
4
|
-
const eslint_devkit_1 = require("@interlace/eslint-devkit");
|
|
5
|
-
const eslint_devkit_2 = require("@interlace/eslint-devkit");
|
|
6
|
-
const eslint_devkit_3 = require("@interlace/eslint-devkit");
|
|
7
|
-
exports.noElectronSecurityIssues = (0, eslint_devkit_1.createRule)({
|
|
8
|
-
name: 'no-electron-security-issues',
|
|
9
|
-
meta: {
|
|
10
|
-
type: 'problem',
|
|
11
|
-
docs: {
|
|
12
|
-
description: 'Detects Electron security vulnerabilities and insecure configurations',
|
|
13
|
-
},
|
|
14
|
-
fixable: 'code',
|
|
15
|
-
hasSuggestions: true,
|
|
16
|
-
messages: {
|
|
17
|
-
electronSecurityIssue: (0, eslint_devkit_2.formatLLMMessage)({
|
|
18
|
-
icon: eslint_devkit_2.MessageIcons.SECURITY,
|
|
19
|
-
issueName: 'Electron Security Issue',
|
|
20
|
-
cwe: 'CWE-16',
|
|
21
|
-
description: 'Electron security vulnerability detected',
|
|
22
|
-
severity: '{{severity}}',
|
|
23
|
-
fix: '{{safeAlternative}}',
|
|
24
|
-
documentationLink: 'https://electronjs.org/docs/tutorial/security',
|
|
25
|
-
}),
|
|
26
|
-
nodeIntegrationEnabled: (0, eslint_devkit_2.formatLLMMessage)({
|
|
27
|
-
icon: eslint_devkit_2.MessageIcons.SECURITY,
|
|
28
|
-
issueName: 'Node Integration Enabled',
|
|
29
|
-
cwe: 'CWE-16',
|
|
30
|
-
description: 'nodeIntegration enabled allows Node.js access in renderer',
|
|
31
|
-
severity: 'CRITICAL',
|
|
32
|
-
fix: 'Set nodeIntegration: false and use secure preload scripts',
|
|
33
|
-
documentationLink: 'https://electronjs.org/docs/tutorial/security#2-do-not-enable-nodejs-integration-for-remote-content',
|
|
34
|
-
}),
|
|
35
|
-
contextIsolationDisabled: (0, eslint_devkit_2.formatLLMMessage)({
|
|
36
|
-
icon: eslint_devkit_2.MessageIcons.SECURITY,
|
|
37
|
-
issueName: 'Context Isolation Disabled',
|
|
38
|
-
cwe: 'CWE-16',
|
|
39
|
-
description: 'contextIsolation disabled removes security boundary',
|
|
40
|
-
severity: 'CRITICAL',
|
|
41
|
-
fix: 'Enable contextIsolation and use preload scripts',
|
|
42
|
-
documentationLink: 'https://electronjs.org/docs/tutorial/context-isolation',
|
|
43
|
-
}),
|
|
44
|
-
webSecurityDisabled: (0, eslint_devkit_2.formatLLMMessage)({
|
|
45
|
-
icon: eslint_devkit_2.MessageIcons.SECURITY,
|
|
46
|
-
issueName: 'Web Security Disabled',
|
|
47
|
-
cwe: 'CWE-16',
|
|
48
|
-
description: 'webSecurity disabled removes CORS and security protections',
|
|
49
|
-
severity: 'HIGH',
|
|
50
|
-
fix: 'Keep webSecurity enabled',
|
|
51
|
-
documentationLink: 'https://electronjs.org/docs/tutorial/security#6-define-a-content-security-policy',
|
|
52
|
-
}),
|
|
53
|
-
insecureContentEnabled: (0, eslint_devkit_2.formatLLMMessage)({
|
|
54
|
-
icon: eslint_devkit_2.MessageIcons.SECURITY,
|
|
55
|
-
issueName: 'Insecure Content Enabled',
|
|
56
|
-
cwe: 'CWE-16',
|
|
57
|
-
description: 'allowRunningInsecureContent allows mixed content',
|
|
58
|
-
severity: 'MEDIUM',
|
|
59
|
-
fix: 'Set allowRunningInsecureContent: false',
|
|
60
|
-
documentationLink: 'https://electronjs.org/docs/tutorial/security#5-do-not-disable-websecurity',
|
|
61
|
-
}),
|
|
62
|
-
unsafePreloadScript: (0, eslint_devkit_2.formatLLMMessage)({
|
|
63
|
-
icon: eslint_devkit_2.MessageIcons.SECURITY,
|
|
64
|
-
issueName: 'Unsafe Preload Script',
|
|
65
|
-
cwe: 'CWE-16',
|
|
66
|
-
description: 'Preload script may expose sensitive APIs',
|
|
67
|
-
severity: 'HIGH',
|
|
68
|
-
fix: 'Use minimal, secure preload scripts',
|
|
69
|
-
documentationLink: 'https://electronjs.org/docs/tutorial/security#3-enable-context-isolation-for-remote-content',
|
|
70
|
-
}),
|
|
71
|
-
directNodeAccess: (0, eslint_devkit_2.formatLLMMessage)({
|
|
72
|
-
icon: eslint_devkit_2.MessageIcons.SECURITY,
|
|
73
|
-
issueName: 'Direct Node Access',
|
|
74
|
-
cwe: 'CWE-16',
|
|
75
|
-
description: 'Direct access to Node.js APIs in renderer process',
|
|
76
|
-
severity: 'HIGH',
|
|
77
|
-
fix: 'Access Node.js APIs only through secure IPC channels',
|
|
78
|
-
documentationLink: 'https://electronjs.org/docs/tutorial/security#3-enable-context-isolation-for-remote-content',
|
|
79
|
-
}),
|
|
80
|
-
insecureIpcPattern: (0, eslint_devkit_2.formatLLMMessage)({
|
|
81
|
-
icon: eslint_devkit_2.MessageIcons.SECURITY,
|
|
82
|
-
issueName: 'Insecure IPC Pattern',
|
|
83
|
-
cwe: 'CWE-16',
|
|
84
|
-
description: 'IPC communication lacks proper validation',
|
|
85
|
-
severity: 'MEDIUM',
|
|
86
|
-
fix: 'Validate IPC messages and restrict channels',
|
|
87
|
-
documentationLink: 'https://electronjs.org/docs/tutorial/security#7-do-not-use-the-ipc-transport-for-sensitive-data',
|
|
88
|
-
}),
|
|
89
|
-
missingSandbox: (0, eslint_devkit_2.formatLLMMessage)({
|
|
90
|
-
icon: eslint_devkit_2.MessageIcons.SECURITY,
|
|
91
|
-
issueName: 'Missing Sandbox',
|
|
92
|
-
cwe: 'CWE-16',
|
|
93
|
-
description: 'BrowserWindow not sandboxed',
|
|
94
|
-
severity: 'MEDIUM',
|
|
95
|
-
fix: 'Enable sandbox for untrusted content',
|
|
96
|
-
documentationLink: 'https://electronjs.org/docs/tutorial/sandbox',
|
|
97
|
-
}),
|
|
98
|
-
enableSecurityFeatures: (0, eslint_devkit_2.formatLLMMessage)({
|
|
99
|
-
icon: eslint_devkit_2.MessageIcons.INFO,
|
|
100
|
-
issueName: 'Enable Security Features',
|
|
101
|
-
description: 'Enable Electron security features',
|
|
102
|
-
severity: 'LOW',
|
|
103
|
-
fix: 'Set contextIsolation: true, nodeIntegration: false',
|
|
104
|
-
documentationLink: 'https://electronjs.org/docs/tutorial/security',
|
|
105
|
-
}),
|
|
106
|
-
useContextIsolation: (0, eslint_devkit_2.formatLLMMessage)({
|
|
107
|
-
icon: eslint_devkit_2.MessageIcons.INFO,
|
|
108
|
-
issueName: 'Use Context Isolation',
|
|
109
|
-
description: 'Use context isolation for security',
|
|
110
|
-
severity: 'LOW',
|
|
111
|
-
fix: 'Enable contextIsolation in BrowserWindow options',
|
|
112
|
-
documentationLink: 'https://electronjs.org/docs/tutorial/context-isolation',
|
|
113
|
-
}),
|
|
114
|
-
securePreloadScripts: (0, eslint_devkit_2.formatLLMMessage)({
|
|
115
|
-
icon: eslint_devkit_2.MessageIcons.INFO,
|
|
116
|
-
issueName: 'Secure Preload Scripts',
|
|
117
|
-
description: 'Use secure preload scripts',
|
|
118
|
-
severity: 'LOW',
|
|
119
|
-
fix: 'Limit APIs exposed in preload scripts',
|
|
120
|
-
documentationLink: 'https://electronjs.org/docs/tutorial/security#3-enable-context-isolation-for-remote-content',
|
|
121
|
-
}),
|
|
122
|
-
strategySecureDefaults: (0, eslint_devkit_2.formatLLMMessage)({
|
|
123
|
-
icon: eslint_devkit_2.MessageIcons.STRATEGY,
|
|
124
|
-
issueName: 'Secure Defaults Strategy',
|
|
125
|
-
description: 'Use secure defaults for Electron applications',
|
|
126
|
-
severity: 'LOW',
|
|
127
|
-
fix: 'Start with secure configuration and relax only when necessary',
|
|
128
|
-
documentationLink: 'https://electronjs.org/docs/tutorial/security',
|
|
129
|
-
}),
|
|
130
|
-
strategyProcessSeparation: (0, eslint_devkit_2.formatLLMMessage)({
|
|
131
|
-
icon: eslint_devkit_2.MessageIcons.STRATEGY,
|
|
132
|
-
issueName: 'Process Separation Strategy',
|
|
133
|
-
description: 'Separate main and renderer processes properly',
|
|
134
|
-
severity: 'LOW',
|
|
135
|
-
fix: 'Keep Node.js APIs in main process, use IPC for communication',
|
|
136
|
-
documentationLink: 'https://electronjs.org/docs/tutorial/application-architecture',
|
|
137
|
-
}),
|
|
138
|
-
strategyInputValidation: (0, eslint_devkit_2.formatLLMMessage)({
|
|
139
|
-
icon: eslint_devkit_2.MessageIcons.STRATEGY,
|
|
140
|
-
issueName: 'Input Validation Strategy',
|
|
141
|
-
description: 'Validate all inputs in Electron applications',
|
|
142
|
-
severity: 'LOW',
|
|
143
|
-
fix: 'Validate IPC messages and user inputs',
|
|
144
|
-
documentationLink: 'https://electronjs.org/docs/tutorial/security#7-do-not-use-the-ipc-transport-for-sensitive-data',
|
|
145
|
-
})
|
|
146
|
-
},
|
|
147
|
-
schema: [
|
|
148
|
-
{
|
|
149
|
-
type: 'object',
|
|
150
|
-
properties: {
|
|
151
|
-
allowInDev: {
|
|
152
|
-
type: 'boolean',
|
|
153
|
-
default: false,
|
|
154
|
-
description: 'Allow insecure settings in development'
|
|
155
|
-
},
|
|
156
|
-
safePreloadPatterns: {
|
|
157
|
-
type: 'array',
|
|
158
|
-
items: { type: 'string' },
|
|
159
|
-
default: ['contextBridge', 'ipcRenderer'],
|
|
160
|
-
},
|
|
161
|
-
allowedIpcChannels: {
|
|
162
|
-
type: 'array',
|
|
163
|
-
items: { type: 'string' },
|
|
164
|
-
default: [],
|
|
165
|
-
},
|
|
166
|
-
trustedSanitizers: {
|
|
167
|
-
type: 'array',
|
|
168
|
-
items: { type: 'string' },
|
|
169
|
-
default: [],
|
|
170
|
-
description: 'Additional function names to consider as safe',
|
|
171
|
-
},
|
|
172
|
-
trustedAnnotations: {
|
|
173
|
-
type: 'array',
|
|
174
|
-
items: { type: 'string' },
|
|
175
|
-
default: [],
|
|
176
|
-
description: 'Additional JSDoc annotations to consider as safe markers',
|
|
177
|
-
},
|
|
178
|
-
strictMode: {
|
|
179
|
-
type: 'boolean',
|
|
180
|
-
default: false,
|
|
181
|
-
description: 'Disable all false positive detection (strict mode)',
|
|
182
|
-
},
|
|
183
|
-
},
|
|
184
|
-
additionalProperties: false,
|
|
185
|
-
},
|
|
186
|
-
],
|
|
187
|
-
},
|
|
188
|
-
defaultOptions: [
|
|
189
|
-
{
|
|
190
|
-
allowInDev: false,
|
|
191
|
-
safePreloadPatterns: ['contextBridge', 'ipcRenderer'],
|
|
192
|
-
allowedIpcChannels: [],
|
|
193
|
-
trustedSanitizers: [],
|
|
194
|
-
trustedAnnotations: [],
|
|
195
|
-
strictMode: false,
|
|
196
|
-
},
|
|
197
|
-
],
|
|
198
|
-
create(context) {
|
|
199
|
-
const options = context.options[0] || {};
|
|
200
|
-
const { allowedIpcChannels = [], trustedSanitizers = [], trustedAnnotations = [], strictMode = false, } = options;
|
|
201
|
-
const filename = context.filename || context.getFilename();
|
|
202
|
-
// Create safety checker for false positive detection
|
|
203
|
-
const safetyChecker = (0, eslint_devkit_3.createSafetyChecker)({
|
|
204
|
-
trustedSanitizers,
|
|
205
|
-
trustedAnnotations,
|
|
206
|
-
trustedOrmPatterns: [],
|
|
207
|
-
strictMode,
|
|
208
|
-
});
|
|
209
|
-
/**
|
|
210
|
-
* Check if this is an Electron BrowserWindow creation
|
|
211
|
-
*/
|
|
212
|
-
const isBrowserWindowCreation = (node) => {
|
|
213
|
-
return node.callee.type === 'Identifier' &&
|
|
214
|
-
node.callee.name === 'BrowserWindow';
|
|
215
|
-
};
|
|
216
|
-
/**
|
|
217
|
-
* Check if BrowserWindow options contain insecure settings
|
|
218
|
-
*/
|
|
219
|
-
const checkBrowserWindowOptions = (optionsNode) => {
|
|
220
|
-
for (const prop of optionsNode.properties) {
|
|
221
|
-
if (prop.type === 'Property' &&
|
|
222
|
-
prop.key.type === 'Identifier') {
|
|
223
|
-
const key = prop.key.name;
|
|
224
|
-
const value = prop.value;
|
|
225
|
-
// Check for insecure boolean options
|
|
226
|
-
if (['nodeIntegration', 'contextIsolation', 'webSecurity', 'allowRunningInsecureContent', 'sandbox'].includes(key)) {
|
|
227
|
-
if (value.type === 'Literal') {
|
|
228
|
-
const isInsecure = ((key === 'nodeIntegration' && value.value === true) ||
|
|
229
|
-
(key === 'contextIsolation' && value.value === false) ||
|
|
230
|
-
(key === 'webSecurity' && value.value === false) ||
|
|
231
|
-
(key === 'allowRunningInsecureContent' && value.value === true) ||
|
|
232
|
-
(key === 'sandbox' && value.value === false));
|
|
233
|
-
if (isInsecure) {
|
|
234
|
-
// FALSE POSITIVE REDUCTION
|
|
235
|
-
if (safetyChecker.isSafe(prop, context)) {
|
|
236
|
-
continue;
|
|
237
|
-
}
|
|
238
|
-
const messageId = (key === 'nodeIntegration' ? 'nodeIntegrationEnabled' :
|
|
239
|
-
key === 'contextIsolation' ? 'contextIsolationDisabled' :
|
|
240
|
-
key === 'webSecurity' ? 'webSecurityDisabled' :
|
|
241
|
-
key === 'allowRunningInsecureContent' ? 'insecureContentEnabled' :
|
|
242
|
-
'missingSandbox');
|
|
243
|
-
context.report({
|
|
244
|
-
node: prop,
|
|
245
|
-
messageId,
|
|
246
|
-
data: {
|
|
247
|
-
filePath: filename,
|
|
248
|
-
line: String(prop.loc?.start.line ?? 0),
|
|
249
|
-
},
|
|
250
|
-
});
|
|
251
|
-
}
|
|
252
|
-
}
|
|
253
|
-
}
|
|
254
|
-
}
|
|
255
|
-
}
|
|
256
|
-
};
|
|
257
|
-
/**
|
|
258
|
-
* Check if this is an IPC call
|
|
259
|
-
*/
|
|
260
|
-
const isIpcCall = (node) => {
|
|
261
|
-
const callee = node.callee;
|
|
262
|
-
if (callee.type === 'MemberExpression' &&
|
|
263
|
-
callee.object.type === 'Identifier' &&
|
|
264
|
-
['ipcMain', 'ipcRenderer'].includes(callee.object.name) &&
|
|
265
|
-
callee.property.type === 'Identifier') {
|
|
266
|
-
return ['send', 'invoke', 'handle', 'on', 'once'].includes(callee.property.name);
|
|
267
|
-
}
|
|
268
|
-
return false;
|
|
269
|
-
};
|
|
270
|
-
/**
|
|
271
|
-
* Check for unsafe IPC patterns
|
|
272
|
-
*/
|
|
273
|
-
const checkIpcCall = (node) => {
|
|
274
|
-
const args = node.arguments;
|
|
275
|
-
if (args.length === 0) {
|
|
276
|
-
return;
|
|
277
|
-
}
|
|
278
|
-
// Check channel name (first argument)
|
|
279
|
-
const channelArg = args[0];
|
|
280
|
-
if (channelArg.type === 'Literal' && typeof channelArg.value === 'string') {
|
|
281
|
-
const channel = channelArg.value;
|
|
282
|
-
// Check if channel is allowed
|
|
283
|
-
if (allowedIpcChannels.length > 0 && !allowedIpcChannels.includes(channel)) {
|
|
284
|
-
/* c8 ignore start -- safetyChecker requires JSDoc annotations not testable via RuleTester */
|
|
285
|
-
if (safetyChecker.isSafe(node, context)) {
|
|
286
|
-
return;
|
|
287
|
-
}
|
|
288
|
-
/* c8 ignore stop */
|
|
289
|
-
context.report({
|
|
290
|
-
node: channelArg,
|
|
291
|
-
messageId: 'insecureIpcPattern',
|
|
292
|
-
data: {
|
|
293
|
-
filePath: filename,
|
|
294
|
-
line: String(node.loc?.start.line ?? 0),
|
|
295
|
-
},
|
|
296
|
-
});
|
|
297
|
-
}
|
|
298
|
-
}
|
|
299
|
-
};
|
|
300
|
-
/**
|
|
301
|
-
* Check for direct Node.js API access in renderer-like files
|
|
302
|
-
*/
|
|
303
|
-
const isRendererFile = () => {
|
|
304
|
-
const fileName = filename.toLowerCase();
|
|
305
|
-
return fileName.includes('renderer') ||
|
|
306
|
-
fileName.includes('preload') ||
|
|
307
|
-
fileName.includes('ui') ||
|
|
308
|
-
fileName.includes('view');
|
|
309
|
-
};
|
|
310
|
-
/**
|
|
311
|
-
* Check for Node.js API usage
|
|
312
|
-
*/
|
|
313
|
-
const isNodeApiCall = (node) => {
|
|
314
|
-
const callee = node.callee;
|
|
315
|
-
// Check for require('fs'), require('child_process'), etc.
|
|
316
|
-
if (callee.type === 'Identifier' && callee.name === 'require') {
|
|
317
|
-
const arg = node.arguments[0];
|
|
318
|
-
if (arg?.type === 'Literal' && typeof arg.value === 'string') {
|
|
319
|
-
const moduleName = arg.value;
|
|
320
|
-
return ['fs', 'child_process', 'os', 'path', 'crypto', 'http', 'https'].includes(moduleName);
|
|
321
|
-
}
|
|
322
|
-
}
|
|
323
|
-
// Check for global Node.js objects
|
|
324
|
-
if (callee.type === 'MemberExpression' &&
|
|
325
|
-
callee.object.type === 'Identifier' &&
|
|
326
|
-
['process', 'global', '__dirname', '__filename'].includes(callee.object.name)) {
|
|
327
|
-
return true;
|
|
328
|
-
}
|
|
329
|
-
return false;
|
|
330
|
-
};
|
|
331
|
-
return {
|
|
332
|
-
// Check BrowserWindow creation
|
|
333
|
-
NewExpression(node) {
|
|
334
|
-
try {
|
|
335
|
-
if (isBrowserWindowCreation(node)) {
|
|
336
|
-
const args = node.arguments;
|
|
337
|
-
if (args.length > 0 && args[0]?.type === 'ObjectExpression') {
|
|
338
|
-
checkBrowserWindowOptions(args[0]);
|
|
339
|
-
}
|
|
340
|
-
}
|
|
341
|
-
}
|
|
342
|
-
catch {
|
|
343
|
-
return;
|
|
344
|
-
}
|
|
345
|
-
},
|
|
346
|
-
// Check IPC calls
|
|
347
|
-
CallExpression(node) {
|
|
348
|
-
try {
|
|
349
|
-
if (isIpcCall(node)) {
|
|
350
|
-
checkIpcCall(node);
|
|
351
|
-
}
|
|
352
|
-
// Check for Node.js API usage in renderer files
|
|
353
|
-
if (isRendererFile() && isNodeApiCall(node)) {
|
|
354
|
-
/* c8 ignore start -- safetyChecker requires JSDoc annotations not testable via RuleTester */
|
|
355
|
-
if (safetyChecker.isSafe(node, context)) {
|
|
356
|
-
return;
|
|
357
|
-
}
|
|
358
|
-
/* c8 ignore stop */
|
|
359
|
-
context.report({
|
|
360
|
-
node,
|
|
361
|
-
messageId: 'directNodeAccess',
|
|
362
|
-
data: {
|
|
363
|
-
filePath: filename,
|
|
364
|
-
line: String(node.loc?.start.line ?? 0),
|
|
365
|
-
},
|
|
366
|
-
});
|
|
367
|
-
}
|
|
368
|
-
}
|
|
369
|
-
catch {
|
|
370
|
-
// Skip problematic nodes to avoid rule crashes
|
|
371
|
-
return;
|
|
372
|
-
}
|
|
373
|
-
},
|
|
374
|
-
// Check for preload script issues
|
|
375
|
-
AssignmentExpression(node) {
|
|
376
|
-
try {
|
|
377
|
-
// Look for preload script assignments
|
|
378
|
-
if (node.left.type === 'MemberExpression' &&
|
|
379
|
-
node.left.property.type === 'Identifier' &&
|
|
380
|
-
node.left.property.name === 'preload') {
|
|
381
|
-
if (node.right.type === 'Literal' && typeof node.right.value === 'string') {
|
|
382
|
-
const preloadPath = node.right.value;
|
|
383
|
-
// Check for potentially unsafe preload patterns
|
|
384
|
-
if (preloadPath.includes('node_modules') ||
|
|
385
|
-
preloadPath.includes('http') ||
|
|
386
|
-
preloadPath.includes('remote')) {
|
|
387
|
-
/* c8 ignore start -- safetyChecker requires JSDoc annotations not testable via RuleTester */
|
|
388
|
-
if (safetyChecker.isSafe(node, context)) {
|
|
389
|
-
return;
|
|
390
|
-
}
|
|
391
|
-
/* c8 ignore stop */
|
|
392
|
-
context.report({
|
|
393
|
-
node: node.right,
|
|
394
|
-
messageId: 'unsafePreloadScript',
|
|
395
|
-
data: {
|
|
396
|
-
filePath: filename,
|
|
397
|
-
line: String(node.loc?.start.line ?? 0),
|
|
398
|
-
},
|
|
399
|
-
});
|
|
400
|
-
}
|
|
401
|
-
}
|
|
402
|
-
}
|
|
403
|
-
}
|
|
404
|
-
catch {
|
|
405
|
-
return;
|
|
406
|
-
}
|
|
407
|
-
},
|
|
408
|
-
// Check for insecure webPreferences patterns
|
|
409
|
-
Property(node) {
|
|
410
|
-
try {
|
|
411
|
-
if (node.key.type === 'Identifier' && node.key.name === 'webPreferences') {
|
|
412
|
-
if (node.value.type === 'ObjectExpression') {
|
|
413
|
-
checkBrowserWindowOptions(node.value);
|
|
414
|
-
}
|
|
415
|
-
}
|
|
416
|
-
}
|
|
417
|
-
catch {
|
|
418
|
-
return;
|
|
419
|
-
}
|
|
420
|
-
}
|
|
421
|
-
};
|
|
422
|
-
},
|
|
423
|
-
});
|
|
@@ -1,62 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
/**
|
|
3
|
-
* @fileoverview Detect debug endpoints without auth
|
|
4
|
-
*/
|
|
5
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
-
exports.noExposedDebugEndpoints = void 0;
|
|
7
|
-
const eslint_devkit_1 = require("@interlace/eslint-devkit");
|
|
8
|
-
exports.noExposedDebugEndpoints = (0, eslint_devkit_1.createRule)({
|
|
9
|
-
name: 'no-exposed-debug-endpoints',
|
|
10
|
-
meta: {
|
|
11
|
-
type: 'problem',
|
|
12
|
-
docs: {
|
|
13
|
-
description: 'Detect debug endpoints without auth',
|
|
14
|
-
},
|
|
15
|
-
messages: {
|
|
16
|
-
violationDetected: (0, eslint_devkit_1.formatLLMMessage)({
|
|
17
|
-
icon: eslint_devkit_1.MessageIcons.SECURITY,
|
|
18
|
-
issueName: 'Exposed Debug Endpoint',
|
|
19
|
-
cwe: 'CWE-489',
|
|
20
|
-
description: 'Debug endpoint exposed without authentication',
|
|
21
|
-
severity: 'HIGH',
|
|
22
|
-
fix: 'Remove debug endpoints from production or add authentication',
|
|
23
|
-
documentationLink: 'https://cwe.mitre.org/data/definitions/489.html',
|
|
24
|
-
})
|
|
25
|
-
},
|
|
26
|
-
schema: [],
|
|
27
|
-
},
|
|
28
|
-
defaultOptions: [],
|
|
29
|
-
create(context) {
|
|
30
|
-
function report(node) {
|
|
31
|
-
context.report({ node, messageId: 'violationDetected' });
|
|
32
|
-
}
|
|
33
|
-
const debugPaths = ['/debug', '/__debug__', '/admin', '/_admin', '/test', '/health'];
|
|
34
|
-
return {
|
|
35
|
-
CallExpression(node) {
|
|
36
|
-
// Detect app.get('/debug', handler)
|
|
37
|
-
if (node.callee.type === 'MemberExpression' &&
|
|
38
|
-
node.callee.object.type === 'Identifier' &&
|
|
39
|
-
['app', 'router', 'express'].includes(node.callee.object.name) &&
|
|
40
|
-
node.callee.property.type === 'Identifier' &&
|
|
41
|
-
['get', 'post', 'use'].includes(node.callee.property.name)) {
|
|
42
|
-
const pathArg = node.arguments[0];
|
|
43
|
-
if (pathArg && pathArg.type === 'Literal' && typeof pathArg.value === 'string') {
|
|
44
|
-
const path = pathArg.value.toLowerCase();
|
|
45
|
-
if (debugPaths.some(dp => path.includes(dp))) {
|
|
46
|
-
report(node);
|
|
47
|
-
}
|
|
48
|
-
}
|
|
49
|
-
}
|
|
50
|
-
},
|
|
51
|
-
Literal(node) {
|
|
52
|
-
// Flag debug path strings in general
|
|
53
|
-
if (typeof node.value === 'string') {
|
|
54
|
-
const path = node.value.toLowerCase();
|
|
55
|
-
if (debugPaths.some(dp => path === dp)) {
|
|
56
|
-
report(node);
|
|
57
|
-
}
|
|
58
|
-
}
|
|
59
|
-
},
|
|
60
|
-
};
|
|
61
|
-
},
|
|
62
|
-
});
|