eslint-plugin-secure-coding 2.3.2 → 2.3.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -0
- package/package.json +3 -10
- package/src/index.ts +605 -0
- package/src/rules/__tests__/integration-demo.test.ts +290 -0
- package/src/rules/__tests__/integration-llm.test.ts +89 -0
- package/src/rules/database-injection/database-injection.test.ts +456 -0
- package/src/rules/database-injection/index.ts +488 -0
- package/src/rules/detect-child-process/detect-child-process.test.ts +207 -0
- package/src/rules/detect-child-process/index.ts +634 -0
- package/src/rules/detect-eval-with-expression/detect-eval-with-expression.test.ts +416 -0
- package/src/rules/detect-eval-with-expression/index.ts +463 -0
- package/src/rules/detect-mixed-content/detect-mixed-content.test.ts +28 -0
- package/src/rules/detect-mixed-content/index.ts +52 -0
- package/src/rules/detect-non-literal-fs-filename/detect-non-literal-fs-filename.test.ts +269 -0
- package/src/rules/detect-non-literal-fs-filename/index.ts +551 -0
- package/src/rules/detect-non-literal-regexp/detect-non-literal-regexp.test.ts +189 -0
- package/src/rules/detect-non-literal-regexp/index.ts +490 -0
- package/src/rules/detect-object-injection/detect-object-injection.test.ts +440 -0
- package/src/rules/detect-object-injection/index.ts +674 -0
- package/src/rules/detect-suspicious-dependencies/detect-suspicious-dependencies.test.ts +32 -0
- package/src/rules/detect-suspicious-dependencies/index.ts +84 -0
- package/src/rules/detect-weak-password-validation/detect-weak-password-validation.test.ts +31 -0
- package/src/rules/detect-weak-password-validation/index.ts +68 -0
- package/src/rules/no-allow-arbitrary-loads/index.ts +54 -0
- package/src/rules/no-allow-arbitrary-loads/no-allow-arbitrary-loads.test.ts +28 -0
- package/src/rules/no-arbitrary-file-access/index.ts +238 -0
- package/src/rules/no-arbitrary-file-access/no-arbitrary-file-access.test.ts +119 -0
- package/src/rules/no-buffer-overread/index.ts +724 -0
- package/src/rules/no-buffer-overread/no-buffer-overread.test.ts +313 -0
- package/src/rules/no-clickjacking/index.ts +481 -0
- package/src/rules/no-clickjacking/no-clickjacking.test.ts +253 -0
- package/src/rules/no-client-side-auth-logic/index.ts +81 -0
- package/src/rules/no-client-side-auth-logic/no-client-side-auth-logic.test.ts +33 -0
- package/src/rules/no-credentials-in-query-params/index.ts +69 -0
- package/src/rules/no-credentials-in-query-params/no-credentials-in-query-params.test.ts +33 -0
- package/src/rules/no-credentials-in-storage-api/index.ts +64 -0
- package/src/rules/no-credentials-in-storage-api/no-credentials-in-storage-api.test.ts +31 -0
- package/src/rules/no-data-in-temp-storage/index.ts +75 -0
- package/src/rules/no-data-in-temp-storage/no-data-in-temp-storage.test.ts +33 -0
- package/src/rules/no-debug-code-in-production/index.ts +59 -0
- package/src/rules/no-debug-code-in-production/no-debug-code-in-production.test.ts +26 -0
- package/src/rules/no-directive-injection/index.ts +551 -0
- package/src/rules/no-directive-injection/no-directive-injection.test.ts +305 -0
- package/src/rules/no-disabled-certificate-validation/index.ts +72 -0
- package/src/rules/no-disabled-certificate-validation/no-disabled-certificate-validation.test.ts +33 -0
- package/src/rules/no-document-cookie/index.ts +113 -0
- package/src/rules/no-document-cookie/no-document-cookie.test.ts +382 -0
- package/src/rules/no-dynamic-dependency-loading/index.ts +60 -0
- package/src/rules/no-dynamic-dependency-loading/no-dynamic-dependency-loading.test.ts +27 -0
- package/src/rules/no-electron-security-issues/index.ts +504 -0
- package/src/rules/no-electron-security-issues/no-electron-security-issues.test.ts +324 -0
- package/src/rules/no-exposed-debug-endpoints/index.ts +73 -0
- package/src/rules/no-exposed-debug-endpoints/no-exposed-debug-endpoints.test.ts +40 -0
- package/src/rules/no-exposed-sensitive-data/index.ts +428 -0
- package/src/rules/no-exposed-sensitive-data/no-exposed-sensitive-data.test.ts +75 -0
- package/src/rules/no-format-string-injection/index.ts +801 -0
- package/src/rules/no-format-string-injection/no-format-string-injection.test.ts +437 -0
- package/src/rules/no-graphql-injection/index.ts +508 -0
- package/src/rules/no-graphql-injection/no-graphql-injection.test.ts +371 -0
- package/src/rules/no-hardcoded-credentials/index.ts +478 -0
- package/src/rules/no-hardcoded-credentials/no-hardcoded-credentials.test.ts +639 -0
- package/src/rules/no-hardcoded-session-tokens/index.ts +69 -0
- package/src/rules/no-hardcoded-session-tokens/no-hardcoded-session-tokens.test.ts +42 -0
- package/src/rules/no-http-urls/index.ts +131 -0
- package/src/rules/no-http-urls/no-http-urls.test.ts +60 -0
- package/src/rules/no-improper-sanitization/index.ts +502 -0
- package/src/rules/no-improper-sanitization/no-improper-sanitization.test.ts +156 -0
- package/src/rules/no-improper-type-validation/index.ts +572 -0
- package/src/rules/no-improper-type-validation/no-improper-type-validation.test.ts +372 -0
- package/src/rules/no-insecure-comparison/index.ts +232 -0
- package/src/rules/no-insecure-comparison/no-insecure-comparison.test.ts +218 -0
- package/src/rules/no-insecure-cookie-settings/index.ts +391 -0
- package/src/rules/no-insecure-cookie-settings/no-insecure-cookie-settings.test.ts +409 -0
- package/src/rules/no-insecure-jwt/index.ts +467 -0
- package/src/rules/no-insecure-jwt/no-insecure-jwt.test.ts +259 -0
- package/src/rules/no-insecure-redirects/index.ts +267 -0
- package/src/rules/no-insecure-redirects/no-insecure-redirects.test.ts +108 -0
- package/src/rules/no-insecure-websocket/index.ts +72 -0
- package/src/rules/no-insecure-websocket/no-insecure-websocket.test.ts +42 -0
- package/src/rules/no-insufficient-postmessage-validation/index.ts +497 -0
- package/src/rules/no-insufficient-postmessage-validation/no-insufficient-postmessage-validation.test.ts +360 -0
- package/src/rules/no-insufficient-random/index.ts +288 -0
- package/src/rules/no-insufficient-random/no-insufficient-random.test.ts +246 -0
- package/src/rules/no-ldap-injection/index.ts +547 -0
- package/src/rules/no-ldap-injection/no-ldap-injection.test.ts +317 -0
- package/src/rules/no-missing-authentication/index.ts +408 -0
- package/src/rules/no-missing-authentication/no-missing-authentication.test.ts +350 -0
- package/src/rules/no-missing-cors-check/index.ts +453 -0
- package/src/rules/no-missing-cors-check/no-missing-cors-check.test.ts +392 -0
- package/src/rules/no-missing-csrf-protection/index.ts +229 -0
- package/src/rules/no-missing-csrf-protection/no-missing-csrf-protection.test.ts +222 -0
- package/src/rules/no-missing-security-headers/index.ts +266 -0
- package/src/rules/no-missing-security-headers/no-missing-security-headers.test.ts +98 -0
- package/src/rules/no-password-in-url/index.ts +64 -0
- package/src/rules/no-password-in-url/no-password-in-url.test.ts +27 -0
- package/src/rules/no-permissive-cors/index.ts +78 -0
- package/src/rules/no-permissive-cors/no-permissive-cors.test.ts +28 -0
- package/src/rules/no-pii-in-logs/index.ts +83 -0
- package/src/rules/no-pii-in-logs/no-pii-in-logs.test.ts +26 -0
- package/src/rules/no-postmessage-origin-wildcard/index.ts +67 -0
- package/src/rules/no-postmessage-origin-wildcard/no-postmessage-origin-wildcard.test.ts +27 -0
- package/src/rules/no-privilege-escalation/index.ts +403 -0
- package/src/rules/no-privilege-escalation/no-privilege-escalation.test.ts +306 -0
- package/src/rules/no-redos-vulnerable-regex/index.ts +379 -0
- package/src/rules/no-redos-vulnerable-regex/no-redos-vulnerable-regex.test.ts +83 -0
- package/src/rules/no-sensitive-data-exposure/index.ts +294 -0
- package/src/rules/no-sensitive-data-exposure/no-sensitive-data-exposure.test.ts +262 -0
- package/src/rules/no-sensitive-data-in-analytics/index.ts +73 -0
- package/src/rules/no-sensitive-data-in-analytics/no-sensitive-data-in-analytics.test.ts +42 -0
- package/src/rules/no-sensitive-data-in-cache/index.ts +59 -0
- package/src/rules/no-sensitive-data-in-cache/no-sensitive-data-in-cache.test.ts +32 -0
- package/src/rules/no-sql-injection/index.ts +424 -0
- package/src/rules/no-sql-injection/no-sql-injection.test.ts +303 -0
- package/src/rules/no-timing-attack/index.ts +552 -0
- package/src/rules/no-timing-attack/no-timing-attack.test.ts +348 -0
- package/src/rules/no-toctou-vulnerability/index.ts +250 -0
- package/src/rules/no-toctou-vulnerability/no-toctou-vulnerability.test.ts +60 -0
- package/src/rules/no-tracking-without-consent/index.ts +78 -0
- package/src/rules/no-tracking-without-consent/no-tracking-without-consent.test.ts +34 -0
- package/src/rules/no-unchecked-loop-condition/index.ts +781 -0
- package/src/rules/no-unchecked-loop-condition/no-unchecked-loop-condition.test.ts +459 -0
- package/src/rules/no-unencrypted-local-storage/index.ts +73 -0
- package/src/rules/no-unencrypted-local-storage/no-unencrypted-local-storage.test.ts +41 -0
- package/src/rules/no-unencrypted-transmission/index.ts +296 -0
- package/src/rules/no-unencrypted-transmission/no-unencrypted-transmission.test.ts +287 -0
- package/src/rules/no-unescaped-url-parameter/index.ts +424 -0
- package/src/rules/no-unescaped-url-parameter/no-unescaped-url-parameter.test.ts +263 -0
- package/src/rules/no-unlimited-resource-allocation/index.ts +767 -0
- package/src/rules/no-unlimited-resource-allocation/no-unlimited-resource-allocation.test.ts +544 -0
- package/src/rules/no-unsafe-deserialization/index.ts +593 -0
- package/src/rules/no-unsafe-deserialization/no-unsafe-deserialization.test.ts +310 -0
- package/src/rules/no-unsafe-dynamic-require/index.ts +125 -0
- package/src/rules/no-unsafe-dynamic-require/no-unsafe-dynamic-require.test.ts +151 -0
- package/src/rules/no-unsafe-regex-construction/index.ts +370 -0
- package/src/rules/no-unsafe-regex-construction/no-unsafe-regex-construction.test.ts +181 -0
- package/src/rules/no-unsanitized-html/index.ts +400 -0
- package/src/rules/no-unsanitized-html/no-unsanitized-html.test.ts +488 -0
- package/src/rules/no-unvalidated-deeplinks/index.ts +73 -0
- package/src/rules/no-unvalidated-deeplinks/no-unvalidated-deeplinks.test.ts +29 -0
- package/src/rules/no-unvalidated-user-input/index.ts +498 -0
- package/src/rules/no-unvalidated-user-input/no-unvalidated-user-input.test.ts +463 -0
- package/src/rules/no-verbose-error-messages/index.ts +83 -0
- package/src/rules/no-verbose-error-messages/no-verbose-error-messages.test.ts +34 -0
- package/src/rules/no-weak-crypto/index.ts +447 -0
- package/src/rules/no-weak-crypto/no-weak-crypto.test.ts +297 -0
- package/src/rules/no-weak-password-recovery/index.ts +509 -0
- package/src/rules/no-weak-password-recovery/no-weak-password-recovery.test.ts +184 -0
- package/src/rules/no-xpath-injection/index.ts +596 -0
- package/src/rules/no-xpath-injection/no-xpath-injection.test.ts +405 -0
- package/src/rules/no-xxe-injection/index.ts +342 -0
- package/src/rules/no-xxe-injection/no-xxe-injection.test.ts +122 -0
- package/src/rules/no-zip-slip/index.ts +526 -0
- package/src/rules/no-zip-slip/no-zip-slip.test.ts +305 -0
- package/src/rules/require-backend-authorization/index.ts +71 -0
- package/src/rules/require-backend-authorization/require-backend-authorization.test.ts +31 -0
- package/src/rules/require-code-minification/index.ts +54 -0
- package/src/rules/require-code-minification/require-code-minification.test.ts +30 -0
- package/src/rules/require-csp-headers/index.ts +74 -0
- package/src/rules/require-csp-headers/require-csp-headers.test.ts +34 -0
- package/src/rules/require-data-minimization/index.ts +65 -0
- package/src/rules/require-data-minimization/require-data-minimization.test.ts +31 -0
- package/src/rules/require-dependency-integrity/index.ts +78 -0
- package/src/rules/require-dependency-integrity/require-dependency-integrity.test.ts +44 -0
- package/src/rules/require-https-only/index.ts +75 -0
- package/src/rules/require-https-only/require-https-only.test.ts +26 -0
- package/src/rules/require-mime-type-validation/index.ts +77 -0
- package/src/rules/require-mime-type-validation/require-mime-type-validation.test.ts +32 -0
- package/src/rules/require-network-timeout/index.ts +58 -0
- package/src/rules/require-network-timeout/require-network-timeout.test.ts +26 -0
- package/src/rules/require-package-lock/index.ts +75 -0
- package/src/rules/require-package-lock/require-package-lock.test.ts +27 -0
- package/src/rules/require-secure-credential-storage/index.ts +60 -0
- package/src/rules/require-secure-credential-storage/require-secure-credential-storage.test.ts +26 -0
- package/src/rules/require-secure-defaults/index.ts +54 -0
- package/src/rules/require-secure-defaults/require-secure-defaults.test.ts +26 -0
- package/src/rules/require-secure-deletion/index.ts +52 -0
- package/src/rules/require-secure-deletion/require-secure-deletion.test.ts +29 -0
- package/src/rules/require-storage-encryption/index.ts +60 -0
- package/src/rules/require-storage-encryption/require-storage-encryption.test.ts +26 -0
- package/src/rules/require-url-validation/index.ts +85 -0
- package/src/rules/require-url-validation/require-url-validation.test.ts +32 -0
- package/src/types/{index.d.ts → index.ts} +157 -53
- package/src/index.d.ts +0 -32
- package/src/index.js +0 -465
- package/src/rules/database-injection/index.d.ts +0 -13
- package/src/rules/database-injection/index.js +0 -406
- package/src/rules/detect-child-process/index.d.ts +0 -11
- package/src/rules/detect-child-process/index.js +0 -529
- package/src/rules/detect-eval-with-expression/index.d.ts +0 -9
- package/src/rules/detect-eval-with-expression/index.js +0 -392
- package/src/rules/detect-mixed-content/index.d.ts +0 -8
- package/src/rules/detect-mixed-content/index.js +0 -44
- package/src/rules/detect-non-literal-fs-filename/index.d.ts +0 -7
- package/src/rules/detect-non-literal-fs-filename/index.js +0 -454
- package/src/rules/detect-non-literal-regexp/index.d.ts +0 -9
- package/src/rules/detect-non-literal-regexp/index.js +0 -403
- package/src/rules/detect-object-injection/index.d.ts +0 -11
- package/src/rules/detect-object-injection/index.js +0 -560
- package/src/rules/detect-suspicious-dependencies/index.d.ts +0 -8
- package/src/rules/detect-suspicious-dependencies/index.js +0 -71
- package/src/rules/detect-weak-password-validation/index.d.ts +0 -6
- package/src/rules/detect-weak-password-validation/index.js +0 -58
- package/src/rules/no-allow-arbitrary-loads/index.d.ts +0 -8
- package/src/rules/no-allow-arbitrary-loads/index.js +0 -47
- package/src/rules/no-arbitrary-file-access/index.d.ts +0 -13
- package/src/rules/no-arbitrary-file-access/index.js +0 -195
- package/src/rules/no-buffer-overread/index.d.ts +0 -29
- package/src/rules/no-buffer-overread/index.js +0 -606
- package/src/rules/no-clickjacking/index.d.ts +0 -10
- package/src/rules/no-clickjacking/index.js +0 -396
- package/src/rules/no-client-side-auth-logic/index.d.ts +0 -6
- package/src/rules/no-client-side-auth-logic/index.js +0 -69
- package/src/rules/no-credentials-in-query-params/index.d.ts +0 -8
- package/src/rules/no-credentials-in-query-params/index.js +0 -57
- package/src/rules/no-credentials-in-storage-api/index.d.ts +0 -6
- package/src/rules/no-credentials-in-storage-api/index.js +0 -54
- package/src/rules/no-data-in-temp-storage/index.d.ts +0 -6
- package/src/rules/no-data-in-temp-storage/index.js +0 -64
- package/src/rules/no-debug-code-in-production/index.d.ts +0 -8
- package/src/rules/no-debug-code-in-production/index.js +0 -51
- package/src/rules/no-directive-injection/index.d.ts +0 -12
- package/src/rules/no-directive-injection/index.js +0 -457
- package/src/rules/no-disabled-certificate-validation/index.d.ts +0 -6
- package/src/rules/no-disabled-certificate-validation/index.js +0 -61
- package/src/rules/no-document-cookie/index.d.ts +0 -5
- package/src/rules/no-document-cookie/index.js +0 -89
- package/src/rules/no-dynamic-dependency-loading/index.d.ts +0 -8
- package/src/rules/no-dynamic-dependency-loading/index.js +0 -51
- package/src/rules/no-electron-security-issues/index.d.ts +0 -10
- package/src/rules/no-electron-security-issues/index.js +0 -423
- package/src/rules/no-exposed-debug-endpoints/index.d.ts +0 -6
- package/src/rules/no-exposed-debug-endpoints/index.js +0 -62
- package/src/rules/no-exposed-sensitive-data/index.d.ts +0 -11
- package/src/rules/no-exposed-sensitive-data/index.js +0 -340
- package/src/rules/no-format-string-injection/index.d.ts +0 -17
- package/src/rules/no-format-string-injection/index.js +0 -660
- package/src/rules/no-graphql-injection/index.d.ts +0 -12
- package/src/rules/no-graphql-injection/index.js +0 -411
- package/src/rules/no-hardcoded-credentials/index.d.ts +0 -26
- package/src/rules/no-hardcoded-credentials/index.js +0 -376
- package/src/rules/no-hardcoded-session-tokens/index.d.ts +0 -6
- package/src/rules/no-hardcoded-session-tokens/index.js +0 -59
- package/src/rules/no-http-urls/index.d.ts +0 -12
- package/src/rules/no-http-urls/index.js +0 -114
- package/src/rules/no-improper-sanitization/index.d.ts +0 -12
- package/src/rules/no-improper-sanitization/index.js +0 -411
- package/src/rules/no-improper-type-validation/index.d.ts +0 -10
- package/src/rules/no-improper-type-validation/index.js +0 -475
- package/src/rules/no-insecure-comparison/index.d.ts +0 -7
- package/src/rules/no-insecure-comparison/index.js +0 -193
- package/src/rules/no-insecure-cookie-settings/index.d.ts +0 -9
- package/src/rules/no-insecure-cookie-settings/index.js +0 -306
- package/src/rules/no-insecure-jwt/index.d.ts +0 -10
- package/src/rules/no-insecure-jwt/index.js +0 -380
- package/src/rules/no-insecure-redirects/index.d.ts +0 -7
- package/src/rules/no-insecure-redirects/index.js +0 -216
- package/src/rules/no-insecure-websocket/index.d.ts +0 -6
- package/src/rules/no-insecure-websocket/index.js +0 -61
- package/src/rules/no-insufficient-postmessage-validation/index.d.ts +0 -14
- package/src/rules/no-insufficient-postmessage-validation/index.js +0 -392
- package/src/rules/no-insufficient-random/index.d.ts +0 -9
- package/src/rules/no-insufficient-random/index.js +0 -208
- package/src/rules/no-ldap-injection/index.d.ts +0 -10
- package/src/rules/no-ldap-injection/index.js +0 -455
- package/src/rules/no-missing-authentication/index.d.ts +0 -13
- package/src/rules/no-missing-authentication/index.js +0 -333
- package/src/rules/no-missing-cors-check/index.d.ts +0 -9
- package/src/rules/no-missing-cors-check/index.js +0 -399
- package/src/rules/no-missing-csrf-protection/index.d.ts +0 -11
- package/src/rules/no-missing-csrf-protection/index.js +0 -180
- package/src/rules/no-missing-security-headers/index.d.ts +0 -7
- package/src/rules/no-missing-security-headers/index.js +0 -218
- package/src/rules/no-password-in-url/index.d.ts +0 -8
- package/src/rules/no-password-in-url/index.js +0 -54
- package/src/rules/no-permissive-cors/index.d.ts +0 -8
- package/src/rules/no-permissive-cors/index.js +0 -65
- package/src/rules/no-pii-in-logs/index.d.ts +0 -8
- package/src/rules/no-pii-in-logs/index.js +0 -70
- package/src/rules/no-postmessage-origin-wildcard/index.d.ts +0 -8
- package/src/rules/no-postmessage-origin-wildcard/index.js +0 -56
- package/src/rules/no-privilege-escalation/index.d.ts +0 -13
- package/src/rules/no-privilege-escalation/index.js +0 -321
- package/src/rules/no-redos-vulnerable-regex/index.d.ts +0 -7
- package/src/rules/no-redos-vulnerable-regex/index.js +0 -306
- package/src/rules/no-sensitive-data-exposure/index.d.ts +0 -11
- package/src/rules/no-sensitive-data-exposure/index.js +0 -250
- package/src/rules/no-sensitive-data-in-analytics/index.d.ts +0 -8
- package/src/rules/no-sensitive-data-in-analytics/index.js +0 -62
- package/src/rules/no-sensitive-data-in-cache/index.d.ts +0 -8
- package/src/rules/no-sensitive-data-in-cache/index.js +0 -52
- package/src/rules/no-sql-injection/index.d.ts +0 -10
- package/src/rules/no-sql-injection/index.js +0 -335
- package/src/rules/no-timing-attack/index.d.ts +0 -10
- package/src/rules/no-timing-attack/index.js +0 -447
- package/src/rules/no-toctou-vulnerability/index.d.ts +0 -7
- package/src/rules/no-toctou-vulnerability/index.js +0 -208
- package/src/rules/no-tracking-without-consent/index.d.ts +0 -6
- package/src/rules/no-tracking-without-consent/index.js +0 -67
- package/src/rules/no-unchecked-loop-condition/index.d.ts +0 -12
- package/src/rules/no-unchecked-loop-condition/index.js +0 -646
- package/src/rules/no-unencrypted-local-storage/index.d.ts +0 -8
- package/src/rules/no-unencrypted-local-storage/index.js +0 -61
- package/src/rules/no-unencrypted-transmission/index.d.ts +0 -11
- package/src/rules/no-unencrypted-transmission/index.js +0 -236
- package/src/rules/no-unescaped-url-parameter/index.d.ts +0 -9
- package/src/rules/no-unescaped-url-parameter/index.js +0 -355
- package/src/rules/no-unlimited-resource-allocation/index.d.ts +0 -12
- package/src/rules/no-unlimited-resource-allocation/index.js +0 -643
- package/src/rules/no-unsafe-deserialization/index.d.ts +0 -10
- package/src/rules/no-unsafe-deserialization/index.js +0 -491
- package/src/rules/no-unsafe-dynamic-require/index.d.ts +0 -5
- package/src/rules/no-unsafe-dynamic-require/index.js +0 -106
- package/src/rules/no-unsafe-regex-construction/index.d.ts +0 -9
- package/src/rules/no-unsafe-regex-construction/index.js +0 -291
- package/src/rules/no-unsanitized-html/index.d.ts +0 -9
- package/src/rules/no-unsanitized-html/index.js +0 -335
- package/src/rules/no-unvalidated-deeplinks/index.d.ts +0 -6
- package/src/rules/no-unvalidated-deeplinks/index.js +0 -62
- package/src/rules/no-unvalidated-user-input/index.d.ts +0 -9
- package/src/rules/no-unvalidated-user-input/index.js +0 -420
- package/src/rules/no-verbose-error-messages/index.d.ts +0 -8
- package/src/rules/no-verbose-error-messages/index.js +0 -68
- package/src/rules/no-weak-crypto/index.d.ts +0 -11
- package/src/rules/no-weak-crypto/index.js +0 -351
- package/src/rules/no-weak-password-recovery/index.d.ts +0 -12
- package/src/rules/no-weak-password-recovery/index.js +0 -424
- package/src/rules/no-xpath-injection/index.d.ts +0 -10
- package/src/rules/no-xpath-injection/index.js +0 -487
- package/src/rules/no-xxe-injection/index.d.ts +0 -7
- package/src/rules/no-xxe-injection/index.js +0 -266
- package/src/rules/no-zip-slip/index.d.ts +0 -9
- package/src/rules/no-zip-slip/index.js +0 -445
- package/src/rules/require-backend-authorization/index.d.ts +0 -6
- package/src/rules/require-backend-authorization/index.js +0 -60
- package/src/rules/require-code-minification/index.d.ts +0 -8
- package/src/rules/require-code-minification/index.js +0 -47
- package/src/rules/require-csp-headers/index.d.ts +0 -6
- package/src/rules/require-csp-headers/index.js +0 -64
- package/src/rules/require-data-minimization/index.d.ts +0 -8
- package/src/rules/require-data-minimization/index.js +0 -53
- package/src/rules/require-dependency-integrity/index.d.ts +0 -6
- package/src/rules/require-dependency-integrity/index.js +0 -64
- package/src/rules/require-https-only/index.d.ts +0 -8
- package/src/rules/require-https-only/index.js +0 -62
- package/src/rules/require-mime-type-validation/index.d.ts +0 -6
- package/src/rules/require-mime-type-validation/index.js +0 -66
- package/src/rules/require-network-timeout/index.d.ts +0 -8
- package/src/rules/require-network-timeout/index.js +0 -50
- package/src/rules/require-package-lock/index.d.ts +0 -8
- package/src/rules/require-package-lock/index.js +0 -63
- package/src/rules/require-secure-credential-storage/index.d.ts +0 -8
- package/src/rules/require-secure-credential-storage/index.js +0 -50
- package/src/rules/require-secure-defaults/index.d.ts +0 -8
- package/src/rules/require-secure-defaults/index.js +0 -47
- package/src/rules/require-secure-deletion/index.d.ts +0 -8
- package/src/rules/require-secure-deletion/index.js +0 -44
- package/src/rules/require-storage-encryption/index.d.ts +0 -8
- package/src/rules/require-storage-encryption/index.js +0 -50
- package/src/rules/require-url-validation/index.d.ts +0 -6
- package/src/rules/require-url-validation/index.js +0 -72
- package/src/types/index.js +0 -17
|
@@ -1,376 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.noHardcodedCredentials = void 0;
|
|
4
|
-
const eslint_devkit_1 = require("@interlace/eslint-devkit");
|
|
5
|
-
const eslint_devkit_2 = require("@interlace/eslint-devkit");
|
|
6
|
-
/**
|
|
7
|
-
* Common credential patterns
|
|
8
|
-
*/
|
|
9
|
-
const CREDENTIAL_PATTERNS = {
|
|
10
|
-
// API Keys (typically 32+ character alphanumeric strings)
|
|
11
|
-
apiKey: /^(?:[A-Za-z0-9_-]{32,}|sk_[A-Za-z0-9_-]{32,}|pk_[A-Za-z0-9_-]{32,}|AKIA[0-9A-Z]{16})$/,
|
|
12
|
-
// JWT Tokens (three base64 parts separated by dots)
|
|
13
|
-
jwtToken: /^eyJ[A-Za-z0-9_-]+\.eyJ[A-Za-z0-9_-]+\.[A-Za-z0-9_-]+$/,
|
|
14
|
-
// OAuth tokens
|
|
15
|
-
oauthToken: /^(?:ghp_|gho_|ghu_|ghs_|ghr_)[A-Za-z0-9]{36,}$/,
|
|
16
|
-
// AWS Access Keys
|
|
17
|
-
awsAccessKey: /^AKIA[0-9A-Z]{16}$/,
|
|
18
|
-
// Database connection strings with credentials
|
|
19
|
-
databaseString: /^(?:mysql|postgres|mongodb|redis):\/\/[^:]+:[^@]+@/,
|
|
20
|
-
// Generic password patterns (common weak passwords) - no length requirement
|
|
21
|
-
commonPassword: /^(?:password|admin|123456|qwerty|letmein|welcome|monkey|1234567890|12345678|password123|root|test|guest)$/i,
|
|
22
|
-
// Secret keys (base64-like or hex strings)
|
|
23
|
-
secretKey: /^(?:[A-Za-z0-9+/]{32,}={0,2}|[A-Fa-f0-9]{32,})$/,
|
|
24
|
-
};
|
|
25
|
-
// Note: CREDENTIAL_VARIABLE_NAMES is reserved for future use when we want to
|
|
26
|
-
// check variable names in addition to values
|
|
27
|
-
// @coverage-note: Not currently used, reserved for future enhancement
|
|
28
|
-
/**
|
|
29
|
-
* Check if a string literal looks like a hardcoded credential
|
|
30
|
-
*/
|
|
31
|
-
function looksLikeCredential(value, options, ignorePatterns) {
|
|
32
|
-
// Check ignore patterns first
|
|
33
|
-
if (ignorePatterns.some(pattern => pattern.test(value))) {
|
|
34
|
-
return { isCredential: false, type: '' };
|
|
35
|
-
}
|
|
36
|
-
// Check custom patterns first (highest priority)
|
|
37
|
-
for (const customPattern of options.customPatterns) {
|
|
38
|
-
try {
|
|
39
|
-
const regex = new RegExp(customPattern.pattern);
|
|
40
|
-
if (regex.test(value)) {
|
|
41
|
-
return { isCredential: true, type: customPattern.type };
|
|
42
|
-
}
|
|
43
|
-
// eslint-disable-next-line @typescript-eslint/no-unused-vars
|
|
44
|
-
}
|
|
45
|
-
catch (error) {
|
|
46
|
-
// Invalid regex pattern, skip it
|
|
47
|
-
continue;
|
|
48
|
-
}
|
|
49
|
-
}
|
|
50
|
-
// Check passwords (common weak passwords) - no length requirement, check first
|
|
51
|
-
if (options.detectPasswords) {
|
|
52
|
-
if (CREDENTIAL_PATTERNS.commonPassword.test(value)) {
|
|
53
|
-
return { isCredential: true, type: 'Common password' };
|
|
54
|
-
}
|
|
55
|
-
}
|
|
56
|
-
// Check database connection strings - no length requirement
|
|
57
|
-
if (options.detectDatabaseStrings) {
|
|
58
|
-
if (CREDENTIAL_PATTERNS.databaseString.test(value)) {
|
|
59
|
-
return { isCredential: true, type: 'Database connection string' };
|
|
60
|
-
}
|
|
61
|
-
}
|
|
62
|
-
// Check minimum length for other patterns
|
|
63
|
-
if (value.length < options.minLength) {
|
|
64
|
-
return { isCredential: false, type: '' };
|
|
65
|
-
}
|
|
66
|
-
// Check tokens first (more specific patterns)
|
|
67
|
-
if (options.detectTokens) {
|
|
68
|
-
if (CREDENTIAL_PATTERNS.jwtToken.test(value)) {
|
|
69
|
-
return { isCredential: true, type: 'JWT token' };
|
|
70
|
-
}
|
|
71
|
-
if (CREDENTIAL_PATTERNS.oauthToken.test(value)) {
|
|
72
|
-
return { isCredential: true, type: 'OAuth token' };
|
|
73
|
-
}
|
|
74
|
-
}
|
|
75
|
-
// Check secret keys first (before generic API key patterns)
|
|
76
|
-
if (value.length >= 32 && CREDENTIAL_PATTERNS.secretKey.test(value)) {
|
|
77
|
-
return { isCredential: true, type: 'Secret key' };
|
|
78
|
-
}
|
|
79
|
-
// Check API keys
|
|
80
|
-
if (options.detectApiKeys) {
|
|
81
|
-
if (CREDENTIAL_PATTERNS.awsAccessKey.test(value)) {
|
|
82
|
-
return { isCredential: true, type: 'AWS access key' };
|
|
83
|
-
}
|
|
84
|
-
// Generic API key pattern (long alphanumeric strings)
|
|
85
|
-
if (/^[A-Za-z0-9_-]{32,}$/.test(value)) {
|
|
86
|
-
return { isCredential: true, type: 'API key' };
|
|
87
|
-
}
|
|
88
|
-
}
|
|
89
|
-
return { isCredential: false, type: '' };
|
|
90
|
-
}
|
|
91
|
-
// Note: isCredentialVariableName is reserved for future use when we want to
|
|
92
|
-
// check variable names in addition to values
|
|
93
|
-
// @coverage-note: Not currently used, reserved for future enhancement
|
|
94
|
-
exports.noHardcodedCredentials = (0, eslint_devkit_2.createRule)({
|
|
95
|
-
name: 'no-hardcoded-credentials',
|
|
96
|
-
meta: {
|
|
97
|
-
type: 'problem',
|
|
98
|
-
docs: {
|
|
99
|
-
description: 'Detects hardcoded passwords, API keys, tokens, and other sensitive credentials',
|
|
100
|
-
},
|
|
101
|
-
fixable: 'code',
|
|
102
|
-
hasSuggestions: true,
|
|
103
|
-
messages: {
|
|
104
|
-
useEnvironmentVariable: (0, eslint_devkit_1.formatLLMMessage)({
|
|
105
|
-
icon: eslint_devkit_1.MessageIcons.SECURITY,
|
|
106
|
-
issueName: 'Hard-coded Credential',
|
|
107
|
-
cwe: 'CWE-798',
|
|
108
|
-
description: 'Hard-coded {{credentialType}} detected',
|
|
109
|
-
severity: 'CRITICAL',
|
|
110
|
-
fix: 'Use environment variable: process.env.{{envVarName}} or secret management service',
|
|
111
|
-
documentationLink: 'https://cwe.mitre.org/data/definitions/798.html',
|
|
112
|
-
}),
|
|
113
|
-
useSecretManager: (0, eslint_devkit_1.formatLLMMessage)({
|
|
114
|
-
icon: eslint_devkit_1.MessageIcons.SECURITY,
|
|
115
|
-
issueName: 'Use Secret Manager',
|
|
116
|
-
cwe: 'CWE-798',
|
|
117
|
-
description: 'Use secure secret management service',
|
|
118
|
-
severity: 'HIGH',
|
|
119
|
-
fix: 'Use AWS Secrets Manager, HashiCorp Vault, Azure Key Vault, or similar',
|
|
120
|
-
documentationLink: 'https://cwe.mitre.org/data/definitions/798.html',
|
|
121
|
-
}),
|
|
122
|
-
strategyEnv: (0, eslint_devkit_1.formatLLMMessage)({
|
|
123
|
-
icon: eslint_devkit_1.MessageIcons.DEVELOPMENT,
|
|
124
|
-
issueName: 'Environment Variable Strategy',
|
|
125
|
-
description: 'Move credentials to environment variables',
|
|
126
|
-
severity: 'MEDIUM',
|
|
127
|
-
fix: 'Store credentials in environment variables (process.env)',
|
|
128
|
-
documentationLink: 'https://12factor.net/config',
|
|
129
|
-
}),
|
|
130
|
-
strategyConfig: (0, eslint_devkit_1.formatLLMMessage)({
|
|
131
|
-
icon: eslint_devkit_1.MessageIcons.DEVELOPMENT,
|
|
132
|
-
issueName: 'Configuration File Strategy',
|
|
133
|
-
description: 'Store credentials in encrypted configuration files',
|
|
134
|
-
severity: 'MEDIUM',
|
|
135
|
-
fix: 'Use encrypted configuration files with proper access controls',
|
|
136
|
-
documentationLink: 'https://owasp.org/www-project-cheat-sheets/cheatsheets/Configuration_Management_Cheat_Sheet.html',
|
|
137
|
-
}),
|
|
138
|
-
strategyVault: (0, eslint_devkit_1.formatLLMMessage)({
|
|
139
|
-
icon: eslint_devkit_1.MessageIcons.SECURITY,
|
|
140
|
-
issueName: 'Secret Vault Strategy',
|
|
141
|
-
cwe: 'CWE-798',
|
|
142
|
-
description: 'Use dedicated secret management system',
|
|
143
|
-
severity: 'HIGH',
|
|
144
|
-
fix: 'Implement HashiCorp Vault, AWS Secrets Manager, or similar secret vault',
|
|
145
|
-
documentationLink: 'https://cwe.mitre.org/data/definitions/798.html',
|
|
146
|
-
}),
|
|
147
|
-
strategyAuto: (0, eslint_devkit_1.formatLLMMessage)({
|
|
148
|
-
icon: eslint_devkit_1.MessageIcons.DEVELOPMENT,
|
|
149
|
-
issueName: 'Context-Aware Strategy',
|
|
150
|
-
description: 'Apply context-aware credential management',
|
|
151
|
-
severity: 'MEDIUM',
|
|
152
|
-
fix: 'Choose strategy based on deployment environment and security requirements',
|
|
153
|
-
documentationLink: 'https://owasp.org/www-project-cheat-sheets/cheatsheets/Secrets_Management_Cheat_Sheet.html',
|
|
154
|
-
}),
|
|
155
|
-
},
|
|
156
|
-
schema: [
|
|
157
|
-
{
|
|
158
|
-
type: 'object',
|
|
159
|
-
properties: {
|
|
160
|
-
ignorePatterns: {
|
|
161
|
-
type: 'array',
|
|
162
|
-
items: { type: 'string' },
|
|
163
|
-
default: [],
|
|
164
|
-
description: 'Regex patterns to ignore',
|
|
165
|
-
},
|
|
166
|
-
allowInTests: {
|
|
167
|
-
type: 'boolean',
|
|
168
|
-
default: false,
|
|
169
|
-
description: 'Allow credentials in test files',
|
|
170
|
-
},
|
|
171
|
-
minLength: {
|
|
172
|
-
type: 'number',
|
|
173
|
-
default: 8,
|
|
174
|
-
description: 'Minimum length for credential detection',
|
|
175
|
-
},
|
|
176
|
-
detectApiKeys: {
|
|
177
|
-
type: 'boolean',
|
|
178
|
-
default: true,
|
|
179
|
-
description: 'Detect API keys',
|
|
180
|
-
},
|
|
181
|
-
detectPasswords: {
|
|
182
|
-
type: 'boolean',
|
|
183
|
-
default: true,
|
|
184
|
-
description: 'Detect passwords',
|
|
185
|
-
},
|
|
186
|
-
detectTokens: {
|
|
187
|
-
type: 'boolean',
|
|
188
|
-
default: true,
|
|
189
|
-
description: 'Detect tokens',
|
|
190
|
-
},
|
|
191
|
-
detectDatabaseStrings: {
|
|
192
|
-
type: 'boolean',
|
|
193
|
-
default: true,
|
|
194
|
-
description: 'Detect database connection strings',
|
|
195
|
-
},
|
|
196
|
-
customPatterns: {
|
|
197
|
-
type: 'array',
|
|
198
|
-
items: {
|
|
199
|
-
type: 'object',
|
|
200
|
-
properties: {
|
|
201
|
-
type: {
|
|
202
|
-
type: 'string',
|
|
203
|
-
description: 'The type of credential (e.g., "API key", "token")',
|
|
204
|
-
},
|
|
205
|
-
pattern: {
|
|
206
|
-
type: 'string',
|
|
207
|
-
description: 'Regex pattern to match',
|
|
208
|
-
},
|
|
209
|
-
},
|
|
210
|
-
required: ['type', 'pattern'],
|
|
211
|
-
additionalProperties: false,
|
|
212
|
-
},
|
|
213
|
-
default: [],
|
|
214
|
-
description: 'Custom credential patterns to detect',
|
|
215
|
-
},
|
|
216
|
-
strategy: {
|
|
217
|
-
type: 'string',
|
|
218
|
-
enum: ['env', 'config', 'vault', 'auto'],
|
|
219
|
-
default: 'auto',
|
|
220
|
-
description: 'Strategy for fixing hardcoded credentials (auto = smart detection)'
|
|
221
|
-
},
|
|
222
|
-
},
|
|
223
|
-
additionalProperties: false,
|
|
224
|
-
},
|
|
225
|
-
],
|
|
226
|
-
},
|
|
227
|
-
defaultOptions: [
|
|
228
|
-
{
|
|
229
|
-
ignorePatterns: [],
|
|
230
|
-
allowInTests: false,
|
|
231
|
-
minLength: 8,
|
|
232
|
-
detectApiKeys: true,
|
|
233
|
-
detectPasswords: true,
|
|
234
|
-
detectTokens: true,
|
|
235
|
-
detectDatabaseStrings: true,
|
|
236
|
-
customPatterns: [],
|
|
237
|
-
strategy: 'auto',
|
|
238
|
-
},
|
|
239
|
-
],
|
|
240
|
-
create(context) {
|
|
241
|
-
const options = context.options[0] || {};
|
|
242
|
-
const { ignorePatterns = [], allowInTests = false, minLength = 8, detectApiKeys = true, detectPasswords = true, detectTokens = true, detectDatabaseStrings = true, customPatterns = [], } = options || {};
|
|
243
|
-
const filename = context.filename || context.getFilename();
|
|
244
|
-
const isTestFile = allowInTests && (filename.includes('.test.') ||
|
|
245
|
-
filename.includes('.spec.') ||
|
|
246
|
-
filename.includes('__tests__') ||
|
|
247
|
-
filename.includes('/test/'));
|
|
248
|
-
// Compile ignore patterns to regex
|
|
249
|
-
const compiledIgnorePatterns = ignorePatterns.map((pattern) => new RegExp(pattern));
|
|
250
|
-
const detectionOptions = {
|
|
251
|
-
minLength,
|
|
252
|
-
detectApiKeys,
|
|
253
|
-
detectPasswords,
|
|
254
|
-
detectTokens,
|
|
255
|
-
detectDatabaseStrings,
|
|
256
|
-
customPatterns,
|
|
257
|
-
};
|
|
258
|
-
/**
|
|
259
|
-
* Check a string literal node
|
|
260
|
-
*/
|
|
261
|
-
function checkStringLiteral(node, parent) {
|
|
262
|
-
if (typeof node.value !== 'string') {
|
|
263
|
-
return;
|
|
264
|
-
}
|
|
265
|
-
const value = node.value;
|
|
266
|
-
// Skip if in test files and allowed
|
|
267
|
-
if (isTestFile) {
|
|
268
|
-
return;
|
|
269
|
-
}
|
|
270
|
-
// Check if it looks like a credential
|
|
271
|
-
const { isCredential, type } = looksLikeCredential(value, detectionOptions, compiledIgnorePatterns);
|
|
272
|
-
if (!isCredential) {
|
|
273
|
-
return;
|
|
274
|
-
}
|
|
275
|
-
// Generate environment variable name suggestion
|
|
276
|
-
let envVarName = 'API_KEY';
|
|
277
|
-
if (parent && parent.type === 'Property' && parent.key.type === 'Identifier') {
|
|
278
|
-
const keyName = parent.key.name;
|
|
279
|
-
envVarName = keyName
|
|
280
|
-
.replace(/([a-z])([A-Z])/g, '$1_$2')
|
|
281
|
-
.toUpperCase()
|
|
282
|
-
.replace(/[^A-Z0-9_]/g, '_');
|
|
283
|
-
}
|
|
284
|
-
else if (parent && parent.type === 'VariableDeclarator' && parent.id.type === 'Identifier') {
|
|
285
|
-
const varName = parent.id.name;
|
|
286
|
-
envVarName = varName
|
|
287
|
-
.replace(/([a-z])([A-Z])/g, '$1_$2')
|
|
288
|
-
.toUpperCase()
|
|
289
|
-
.replace(/[^A-Z0-9_]/g, '_');
|
|
290
|
-
}
|
|
291
|
-
context.report({
|
|
292
|
-
node,
|
|
293
|
-
messageId: 'useEnvironmentVariable',
|
|
294
|
-
data: {
|
|
295
|
-
credentialType: type,
|
|
296
|
-
envVarName,
|
|
297
|
-
},
|
|
298
|
-
suggest: [
|
|
299
|
-
{
|
|
300
|
-
messageId: 'useEnvironmentVariable',
|
|
301
|
-
data: { envVarName, credentialType: type },
|
|
302
|
-
fix: (fixer) => {
|
|
303
|
-
return fixer.replaceText(node, `process.env.${envVarName} || '${value}'`);
|
|
304
|
-
},
|
|
305
|
-
},
|
|
306
|
-
{
|
|
307
|
-
messageId: 'useSecretManager',
|
|
308
|
-
data: { credentialType: type },
|
|
309
|
-
fix: (fixer) => {
|
|
310
|
-
return fixer.replaceText(node, `await getSecret('${envVarName.toLowerCase()}')`);
|
|
311
|
-
},
|
|
312
|
-
},
|
|
313
|
-
],
|
|
314
|
-
});
|
|
315
|
-
}
|
|
316
|
-
return {
|
|
317
|
-
Literal(node) {
|
|
318
|
-
checkStringLiteral(node, node.parent);
|
|
319
|
-
},
|
|
320
|
-
TemplateLiteral(node) {
|
|
321
|
-
// Check template literal parts for credentials
|
|
322
|
-
// Only check if there are no interpolations (static template literal)
|
|
323
|
-
if (node.expressions.length === 0) {
|
|
324
|
-
const fullText = node.quasis.map((q) => q.value.raw).join('');
|
|
325
|
-
const { isCredential, type } = looksLikeCredential(fullText, detectionOptions, compiledIgnorePatterns);
|
|
326
|
-
if (isCredential && !isTestFile) {
|
|
327
|
-
context.report({
|
|
328
|
-
node,
|
|
329
|
-
messageId: 'useEnvironmentVariable',
|
|
330
|
-
data: {
|
|
331
|
-
credentialType: type,
|
|
332
|
-
envVarName: 'API_KEY',
|
|
333
|
-
},
|
|
334
|
-
suggest: [
|
|
335
|
-
{
|
|
336
|
-
messageId: 'useEnvironmentVariable',
|
|
337
|
-
data: { envVarName: 'API_KEY', credentialType: type },
|
|
338
|
-
fix: (fixer) => {
|
|
339
|
-
return fixer.replaceText(node, `process.env.API_KEY || \`${fullText}\``);
|
|
340
|
-
},
|
|
341
|
-
},
|
|
342
|
-
{
|
|
343
|
-
messageId: 'useSecretManager',
|
|
344
|
-
data: { credentialType: type },
|
|
345
|
-
fix: (fixer) => {
|
|
346
|
-
return fixer.replaceText(node, `await getSecret('api_key')`);
|
|
347
|
-
},
|
|
348
|
-
},
|
|
349
|
-
],
|
|
350
|
-
});
|
|
351
|
-
}
|
|
352
|
-
}
|
|
353
|
-
else {
|
|
354
|
-
// For template literals with interpolations, check each quasi part
|
|
355
|
-
for (const quasi of node.quasis) {
|
|
356
|
-
if (quasi.value.raw) {
|
|
357
|
-
const { isCredential, type } = looksLikeCredential(quasi.value.raw, detectionOptions, compiledIgnorePatterns);
|
|
358
|
-
if (isCredential && !isTestFile) {
|
|
359
|
-
// Note: Template literals with interpolations are complex to fix automatically
|
|
360
|
-
// So we report the error without suggestions
|
|
361
|
-
context.report({
|
|
362
|
-
node: quasi,
|
|
363
|
-
messageId: 'useEnvironmentVariable',
|
|
364
|
-
data: {
|
|
365
|
-
credentialType: type,
|
|
366
|
-
envVarName: 'API_KEY',
|
|
367
|
-
},
|
|
368
|
-
});
|
|
369
|
-
}
|
|
370
|
-
}
|
|
371
|
-
}
|
|
372
|
-
}
|
|
373
|
-
},
|
|
374
|
-
};
|
|
375
|
-
},
|
|
376
|
-
});
|
|
@@ -1,59 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
/**
|
|
3
|
-
* @fileoverview Detect hardcoded session/JWT tokens
|
|
4
|
-
*/
|
|
5
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
6
|
-
exports.noHardcodedSessionTokens = void 0;
|
|
7
|
-
const eslint_devkit_1 = require("@interlace/eslint-devkit");
|
|
8
|
-
exports.noHardcodedSessionTokens = (0, eslint_devkit_1.createRule)({
|
|
9
|
-
name: 'no-hardcoded-session-tokens',
|
|
10
|
-
meta: {
|
|
11
|
-
type: 'problem',
|
|
12
|
-
docs: {
|
|
13
|
-
description: 'Detect hardcoded session/JWT tokens',
|
|
14
|
-
},
|
|
15
|
-
messages: {
|
|
16
|
-
violationDetected: (0, eslint_devkit_1.formatLLMMessage)({
|
|
17
|
-
icon: eslint_devkit_1.MessageIcons.SECURITY,
|
|
18
|
-
issueName: 'Hardcoded Token',
|
|
19
|
-
cwe: 'CWE-798',
|
|
20
|
-
description: 'Hardcoded session or JWT token detected - credentials at risk',
|
|
21
|
-
severity: 'CRITICAL',
|
|
22
|
-
fix: 'Use environment variables or secure credential management',
|
|
23
|
-
documentationLink: 'https://cwe.mitre.org/data/definitions/798.html',
|
|
24
|
-
})
|
|
25
|
-
},
|
|
26
|
-
schema: [],
|
|
27
|
-
},
|
|
28
|
-
defaultOptions: [],
|
|
29
|
-
create(context) {
|
|
30
|
-
function report(node) {
|
|
31
|
-
context.report({ node, messageId: 'violationDetected' });
|
|
32
|
-
}
|
|
33
|
-
return {
|
|
34
|
-
Literal(node) {
|
|
35
|
-
if (typeof node.value !== 'string')
|
|
36
|
-
return;
|
|
37
|
-
// Detect JWT tokens (start with eyJ and contain 2 dots)
|
|
38
|
-
if (node.value.startsWith('eyJ') && node.value.length > 50 &&
|
|
39
|
-
(node.value.match(/\./g) || []).length >= 2) {
|
|
40
|
-
report(node);
|
|
41
|
-
}
|
|
42
|
-
// Detect Bearer tokens
|
|
43
|
-
if (node.value.startsWith('Bearer ') && node.value.length > 20) {
|
|
44
|
-
report(node);
|
|
45
|
-
}
|
|
46
|
-
// Detect session_id patterns
|
|
47
|
-
const parent = node.parent;
|
|
48
|
-
if (parent?.type === 'VariableDeclarator' &&
|
|
49
|
-
parent.id.type === 'Identifier') {
|
|
50
|
-
const varName = parent.id.name.toLowerCase();
|
|
51
|
-
if ((varName.includes('session') || varName.includes('token')) &&
|
|
52
|
-
node.value.length >= 16 && /^[a-zA-Z0-9]+$/.test(node.value)) {
|
|
53
|
-
report(node);
|
|
54
|
-
}
|
|
55
|
-
}
|
|
56
|
-
},
|
|
57
|
-
};
|
|
58
|
-
},
|
|
59
|
-
});
|
|
@@ -1,12 +0,0 @@
|
|
|
1
|
-
/**
|
|
2
|
-
* @fileoverview Disallow hardcoded HTTP URLs
|
|
3
|
-
* @see https://owasp.org/www-project-mobile-top-10/
|
|
4
|
-
* @see https://cwe.mitre.org/data/definitions/319.html
|
|
5
|
-
*/
|
|
6
|
-
export interface Options {
|
|
7
|
-
/** List of hostnames allowed to use HTTP (e.g., localhost, 127.0.0.1) */
|
|
8
|
-
allowedHosts?: string[];
|
|
9
|
-
/** List of ports allowed for HTTP (e.g., 3000, 8080 for development) */
|
|
10
|
-
allowedPorts?: number[];
|
|
11
|
-
}
|
|
12
|
-
export declare const noHttpUrls: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
|
|
@@ -1,114 +0,0 @@
|
|
|
1
|
-
"use strict";
|
|
2
|
-
/**
|
|
3
|
-
* @fileoverview Disallow hardcoded HTTP URLs
|
|
4
|
-
* @see https://owasp.org/www-project-mobile-top-10/
|
|
5
|
-
* @see https://cwe.mitre.org/data/definitions/319.html
|
|
6
|
-
*/
|
|
7
|
-
Object.defineProperty(exports, "__esModule", { value: true });
|
|
8
|
-
exports.noHttpUrls = void 0;
|
|
9
|
-
const eslint_devkit_1 = require("@interlace/eslint-devkit");
|
|
10
|
-
exports.noHttpUrls = (0, eslint_devkit_1.createRule)({
|
|
11
|
-
name: 'no-http-urls',
|
|
12
|
-
meta: {
|
|
13
|
-
type: 'problem',
|
|
14
|
-
docs: {
|
|
15
|
-
description: 'Disallow hardcoded HTTP URLs (require HTTPS)',
|
|
16
|
-
},
|
|
17
|
-
messages: {
|
|
18
|
-
insecureHttp: (0, eslint_devkit_1.formatLLMMessage)({
|
|
19
|
-
icon: eslint_devkit_1.MessageIcons.SECURITY,
|
|
20
|
-
issueName: 'Insecure HTTP URL',
|
|
21
|
-
cwe: 'CWE-319',
|
|
22
|
-
owasp: 'A02:2021',
|
|
23
|
-
cvss: 7.5,
|
|
24
|
-
description: 'Hardcoded HTTP URL detected: "{{url}}"',
|
|
25
|
-
severity: 'HIGH',
|
|
26
|
-
compliance: ['SOC2', 'PCI-DSS', 'HIPAA'],
|
|
27
|
-
fix: 'Use HTTPS instead: const url = "https://..."',
|
|
28
|
-
documentationLink: 'https://cwe.mitre.org/data/definitions/319.html',
|
|
29
|
-
}),
|
|
30
|
-
insecureHttpWithException: (0, eslint_devkit_1.formatLLMMessage)({
|
|
31
|
-
icon: eslint_devkit_1.MessageIcons.WARNING,
|
|
32
|
-
issueName: 'Insecure HTTP URL',
|
|
33
|
-
cwe: 'CWE-319',
|
|
34
|
-
owasp: 'A02:2021',
|
|
35
|
-
cvss: 5.3,
|
|
36
|
-
description: 'HTTP URL detected: "{{url}}"',
|
|
37
|
-
severity: 'MEDIUM',
|
|
38
|
-
fix: 'Use HTTPS or add to allowedHosts config',
|
|
39
|
-
documentationLink: 'https://cwe.mitre.org/data/definitions/319.html',
|
|
40
|
-
}),
|
|
41
|
-
},
|
|
42
|
-
schema: [
|
|
43
|
-
{
|
|
44
|
-
type: 'object',
|
|
45
|
-
properties: {
|
|
46
|
-
allowedHosts: {
|
|
47
|
-
type: 'array',
|
|
48
|
-
items: { type: 'string' },
|
|
49
|
-
description: 'List of hostnames allowed to use HTTP (e.g., localhost, 127.0.0.1)',
|
|
50
|
-
},
|
|
51
|
-
allowedPorts: {
|
|
52
|
-
type: 'array',
|
|
53
|
-
items: { type: 'number' },
|
|
54
|
-
description: 'List of ports allowed for HTTP (e.g., 3000, 8080 for development)',
|
|
55
|
-
},
|
|
56
|
-
},
|
|
57
|
-
additionalProperties: false,
|
|
58
|
-
},
|
|
59
|
-
],
|
|
60
|
-
},
|
|
61
|
-
defaultOptions: [
|
|
62
|
-
{
|
|
63
|
-
allowedHosts: ['localhost', '127.0.0.1'],
|
|
64
|
-
allowedPorts: [],
|
|
65
|
-
},
|
|
66
|
-
],
|
|
67
|
-
create(context) {
|
|
68
|
-
const [options = {}] = context.options;
|
|
69
|
-
const allowedHosts = options.allowedHosts ?? ['localhost', '127.0.0.1'];
|
|
70
|
-
const allowedPorts = options.allowedPorts ?? [];
|
|
71
|
-
function isAllowedException(url) {
|
|
72
|
-
try {
|
|
73
|
-
const parsedUrl = new URL(url);
|
|
74
|
-
// Check if host is in allowed list
|
|
75
|
-
if (allowedHosts.includes(parsedUrl.hostname)) {
|
|
76
|
-
return true;
|
|
77
|
-
}
|
|
78
|
-
// Check if port is in allowed list
|
|
79
|
-
if (parsedUrl.port && allowedPorts.includes(parseInt(parsedUrl.port, 10))) {
|
|
80
|
-
return true;
|
|
81
|
-
}
|
|
82
|
-
return false;
|
|
83
|
-
}
|
|
84
|
-
catch {
|
|
85
|
-
// If URL parsing fails, treat as pattern match
|
|
86
|
-
return allowedHosts.some(host => url.includes(host));
|
|
87
|
-
}
|
|
88
|
-
}
|
|
89
|
-
function checkStringValue(node, value) {
|
|
90
|
-
const httpPattern = /^http:\/\//i;
|
|
91
|
-
if (httpPattern.test(value) && !isAllowedException(value)) {
|
|
92
|
-
context.report({
|
|
93
|
-
node,
|
|
94
|
-
messageId: allowedHosts.length > 0 || allowedPorts.length > 0
|
|
95
|
-
? 'insecureHttpWithException'
|
|
96
|
-
: 'insecureHttp',
|
|
97
|
-
data: { url: value },
|
|
98
|
-
});
|
|
99
|
-
}
|
|
100
|
-
}
|
|
101
|
-
return {
|
|
102
|
-
Literal(node) {
|
|
103
|
-
if (typeof node.value === 'string') {
|
|
104
|
-
checkStringValue(node, node.value);
|
|
105
|
-
}
|
|
106
|
-
},
|
|
107
|
-
TemplateElement(node) {
|
|
108
|
-
if (node.value.cooked) {
|
|
109
|
-
checkStringValue(node, node.value.cooked);
|
|
110
|
-
}
|
|
111
|
-
},
|
|
112
|
-
};
|
|
113
|
-
},
|
|
114
|
-
});
|
|
@@ -1,12 +0,0 @@
|
|
|
1
|
-
import { type SecurityRuleOptions } from '@interlace/eslint-devkit';
|
|
2
|
-
export interface Options extends SecurityRuleOptions {
|
|
3
|
-
/** Safe sanitization functions */
|
|
4
|
-
safeSanitizers?: string[];
|
|
5
|
-
/** Characters that should be escaped */
|
|
6
|
-
dangerousChars?: string[];
|
|
7
|
-
/** Contexts that require different encoding */
|
|
8
|
-
contexts?: string[];
|
|
9
|
-
/** Trusted sanitization libraries */
|
|
10
|
-
trustedLibraries?: string[];
|
|
11
|
-
}
|
|
12
|
-
export declare const noImproperSanitization: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
|