eslint-plugin-secure-coding 2.3.2 → 2.3.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (361) hide show
  1. package/README.md +1 -0
  2. package/package.json +3 -10
  3. package/src/index.ts +605 -0
  4. package/src/rules/__tests__/integration-demo.test.ts +290 -0
  5. package/src/rules/__tests__/integration-llm.test.ts +89 -0
  6. package/src/rules/database-injection/database-injection.test.ts +456 -0
  7. package/src/rules/database-injection/index.ts +488 -0
  8. package/src/rules/detect-child-process/detect-child-process.test.ts +207 -0
  9. package/src/rules/detect-child-process/index.ts +634 -0
  10. package/src/rules/detect-eval-with-expression/detect-eval-with-expression.test.ts +416 -0
  11. package/src/rules/detect-eval-with-expression/index.ts +463 -0
  12. package/src/rules/detect-mixed-content/detect-mixed-content.test.ts +28 -0
  13. package/src/rules/detect-mixed-content/index.ts +52 -0
  14. package/src/rules/detect-non-literal-fs-filename/detect-non-literal-fs-filename.test.ts +269 -0
  15. package/src/rules/detect-non-literal-fs-filename/index.ts +551 -0
  16. package/src/rules/detect-non-literal-regexp/detect-non-literal-regexp.test.ts +189 -0
  17. package/src/rules/detect-non-literal-regexp/index.ts +490 -0
  18. package/src/rules/detect-object-injection/detect-object-injection.test.ts +440 -0
  19. package/src/rules/detect-object-injection/index.ts +674 -0
  20. package/src/rules/detect-suspicious-dependencies/detect-suspicious-dependencies.test.ts +32 -0
  21. package/src/rules/detect-suspicious-dependencies/index.ts +84 -0
  22. package/src/rules/detect-weak-password-validation/detect-weak-password-validation.test.ts +31 -0
  23. package/src/rules/detect-weak-password-validation/index.ts +68 -0
  24. package/src/rules/no-allow-arbitrary-loads/index.ts +54 -0
  25. package/src/rules/no-allow-arbitrary-loads/no-allow-arbitrary-loads.test.ts +28 -0
  26. package/src/rules/no-arbitrary-file-access/index.ts +238 -0
  27. package/src/rules/no-arbitrary-file-access/no-arbitrary-file-access.test.ts +119 -0
  28. package/src/rules/no-buffer-overread/index.ts +724 -0
  29. package/src/rules/no-buffer-overread/no-buffer-overread.test.ts +313 -0
  30. package/src/rules/no-clickjacking/index.ts +481 -0
  31. package/src/rules/no-clickjacking/no-clickjacking.test.ts +253 -0
  32. package/src/rules/no-client-side-auth-logic/index.ts +81 -0
  33. package/src/rules/no-client-side-auth-logic/no-client-side-auth-logic.test.ts +33 -0
  34. package/src/rules/no-credentials-in-query-params/index.ts +69 -0
  35. package/src/rules/no-credentials-in-query-params/no-credentials-in-query-params.test.ts +33 -0
  36. package/src/rules/no-credentials-in-storage-api/index.ts +64 -0
  37. package/src/rules/no-credentials-in-storage-api/no-credentials-in-storage-api.test.ts +31 -0
  38. package/src/rules/no-data-in-temp-storage/index.ts +75 -0
  39. package/src/rules/no-data-in-temp-storage/no-data-in-temp-storage.test.ts +33 -0
  40. package/src/rules/no-debug-code-in-production/index.ts +59 -0
  41. package/src/rules/no-debug-code-in-production/no-debug-code-in-production.test.ts +26 -0
  42. package/src/rules/no-directive-injection/index.ts +551 -0
  43. package/src/rules/no-directive-injection/no-directive-injection.test.ts +305 -0
  44. package/src/rules/no-disabled-certificate-validation/index.ts +72 -0
  45. package/src/rules/no-disabled-certificate-validation/no-disabled-certificate-validation.test.ts +33 -0
  46. package/src/rules/no-document-cookie/index.ts +113 -0
  47. package/src/rules/no-document-cookie/no-document-cookie.test.ts +382 -0
  48. package/src/rules/no-dynamic-dependency-loading/index.ts +60 -0
  49. package/src/rules/no-dynamic-dependency-loading/no-dynamic-dependency-loading.test.ts +27 -0
  50. package/src/rules/no-electron-security-issues/index.ts +504 -0
  51. package/src/rules/no-electron-security-issues/no-electron-security-issues.test.ts +324 -0
  52. package/src/rules/no-exposed-debug-endpoints/index.ts +73 -0
  53. package/src/rules/no-exposed-debug-endpoints/no-exposed-debug-endpoints.test.ts +40 -0
  54. package/src/rules/no-exposed-sensitive-data/index.ts +428 -0
  55. package/src/rules/no-exposed-sensitive-data/no-exposed-sensitive-data.test.ts +75 -0
  56. package/src/rules/no-format-string-injection/index.ts +801 -0
  57. package/src/rules/no-format-string-injection/no-format-string-injection.test.ts +437 -0
  58. package/src/rules/no-graphql-injection/index.ts +508 -0
  59. package/src/rules/no-graphql-injection/no-graphql-injection.test.ts +371 -0
  60. package/src/rules/no-hardcoded-credentials/index.ts +478 -0
  61. package/src/rules/no-hardcoded-credentials/no-hardcoded-credentials.test.ts +639 -0
  62. package/src/rules/no-hardcoded-session-tokens/index.ts +69 -0
  63. package/src/rules/no-hardcoded-session-tokens/no-hardcoded-session-tokens.test.ts +42 -0
  64. package/src/rules/no-http-urls/index.ts +131 -0
  65. package/src/rules/no-http-urls/no-http-urls.test.ts +60 -0
  66. package/src/rules/no-improper-sanitization/index.ts +502 -0
  67. package/src/rules/no-improper-sanitization/no-improper-sanitization.test.ts +156 -0
  68. package/src/rules/no-improper-type-validation/index.ts +572 -0
  69. package/src/rules/no-improper-type-validation/no-improper-type-validation.test.ts +372 -0
  70. package/src/rules/no-insecure-comparison/index.ts +232 -0
  71. package/src/rules/no-insecure-comparison/no-insecure-comparison.test.ts +218 -0
  72. package/src/rules/no-insecure-cookie-settings/index.ts +391 -0
  73. package/src/rules/no-insecure-cookie-settings/no-insecure-cookie-settings.test.ts +409 -0
  74. package/src/rules/no-insecure-jwt/index.ts +467 -0
  75. package/src/rules/no-insecure-jwt/no-insecure-jwt.test.ts +259 -0
  76. package/src/rules/no-insecure-redirects/index.ts +267 -0
  77. package/src/rules/no-insecure-redirects/no-insecure-redirects.test.ts +108 -0
  78. package/src/rules/no-insecure-websocket/index.ts +72 -0
  79. package/src/rules/no-insecure-websocket/no-insecure-websocket.test.ts +42 -0
  80. package/src/rules/no-insufficient-postmessage-validation/index.ts +497 -0
  81. package/src/rules/no-insufficient-postmessage-validation/no-insufficient-postmessage-validation.test.ts +360 -0
  82. package/src/rules/no-insufficient-random/index.ts +288 -0
  83. package/src/rules/no-insufficient-random/no-insufficient-random.test.ts +246 -0
  84. package/src/rules/no-ldap-injection/index.ts +547 -0
  85. package/src/rules/no-ldap-injection/no-ldap-injection.test.ts +317 -0
  86. package/src/rules/no-missing-authentication/index.ts +408 -0
  87. package/src/rules/no-missing-authentication/no-missing-authentication.test.ts +350 -0
  88. package/src/rules/no-missing-cors-check/index.ts +453 -0
  89. package/src/rules/no-missing-cors-check/no-missing-cors-check.test.ts +392 -0
  90. package/src/rules/no-missing-csrf-protection/index.ts +229 -0
  91. package/src/rules/no-missing-csrf-protection/no-missing-csrf-protection.test.ts +222 -0
  92. package/src/rules/no-missing-security-headers/index.ts +266 -0
  93. package/src/rules/no-missing-security-headers/no-missing-security-headers.test.ts +98 -0
  94. package/src/rules/no-password-in-url/index.ts +64 -0
  95. package/src/rules/no-password-in-url/no-password-in-url.test.ts +27 -0
  96. package/src/rules/no-permissive-cors/index.ts +78 -0
  97. package/src/rules/no-permissive-cors/no-permissive-cors.test.ts +28 -0
  98. package/src/rules/no-pii-in-logs/index.ts +83 -0
  99. package/src/rules/no-pii-in-logs/no-pii-in-logs.test.ts +26 -0
  100. package/src/rules/no-postmessage-origin-wildcard/index.ts +67 -0
  101. package/src/rules/no-postmessage-origin-wildcard/no-postmessage-origin-wildcard.test.ts +27 -0
  102. package/src/rules/no-privilege-escalation/index.ts +403 -0
  103. package/src/rules/no-privilege-escalation/no-privilege-escalation.test.ts +306 -0
  104. package/src/rules/no-redos-vulnerable-regex/index.ts +379 -0
  105. package/src/rules/no-redos-vulnerable-regex/no-redos-vulnerable-regex.test.ts +83 -0
  106. package/src/rules/no-sensitive-data-exposure/index.ts +294 -0
  107. package/src/rules/no-sensitive-data-exposure/no-sensitive-data-exposure.test.ts +262 -0
  108. package/src/rules/no-sensitive-data-in-analytics/index.ts +73 -0
  109. package/src/rules/no-sensitive-data-in-analytics/no-sensitive-data-in-analytics.test.ts +42 -0
  110. package/src/rules/no-sensitive-data-in-cache/index.ts +59 -0
  111. package/src/rules/no-sensitive-data-in-cache/no-sensitive-data-in-cache.test.ts +32 -0
  112. package/src/rules/no-sql-injection/index.ts +424 -0
  113. package/src/rules/no-sql-injection/no-sql-injection.test.ts +303 -0
  114. package/src/rules/no-timing-attack/index.ts +552 -0
  115. package/src/rules/no-timing-attack/no-timing-attack.test.ts +348 -0
  116. package/src/rules/no-toctou-vulnerability/index.ts +250 -0
  117. package/src/rules/no-toctou-vulnerability/no-toctou-vulnerability.test.ts +60 -0
  118. package/src/rules/no-tracking-without-consent/index.ts +78 -0
  119. package/src/rules/no-tracking-without-consent/no-tracking-without-consent.test.ts +34 -0
  120. package/src/rules/no-unchecked-loop-condition/index.ts +781 -0
  121. package/src/rules/no-unchecked-loop-condition/no-unchecked-loop-condition.test.ts +459 -0
  122. package/src/rules/no-unencrypted-local-storage/index.ts +73 -0
  123. package/src/rules/no-unencrypted-local-storage/no-unencrypted-local-storage.test.ts +41 -0
  124. package/src/rules/no-unencrypted-transmission/index.ts +296 -0
  125. package/src/rules/no-unencrypted-transmission/no-unencrypted-transmission.test.ts +287 -0
  126. package/src/rules/no-unescaped-url-parameter/index.ts +424 -0
  127. package/src/rules/no-unescaped-url-parameter/no-unescaped-url-parameter.test.ts +263 -0
  128. package/src/rules/no-unlimited-resource-allocation/index.ts +767 -0
  129. package/src/rules/no-unlimited-resource-allocation/no-unlimited-resource-allocation.test.ts +544 -0
  130. package/src/rules/no-unsafe-deserialization/index.ts +593 -0
  131. package/src/rules/no-unsafe-deserialization/no-unsafe-deserialization.test.ts +310 -0
  132. package/src/rules/no-unsafe-dynamic-require/index.ts +125 -0
  133. package/src/rules/no-unsafe-dynamic-require/no-unsafe-dynamic-require.test.ts +151 -0
  134. package/src/rules/no-unsafe-regex-construction/index.ts +370 -0
  135. package/src/rules/no-unsafe-regex-construction/no-unsafe-regex-construction.test.ts +181 -0
  136. package/src/rules/no-unsanitized-html/index.ts +400 -0
  137. package/src/rules/no-unsanitized-html/no-unsanitized-html.test.ts +488 -0
  138. package/src/rules/no-unvalidated-deeplinks/index.ts +73 -0
  139. package/src/rules/no-unvalidated-deeplinks/no-unvalidated-deeplinks.test.ts +29 -0
  140. package/src/rules/no-unvalidated-user-input/index.ts +498 -0
  141. package/src/rules/no-unvalidated-user-input/no-unvalidated-user-input.test.ts +463 -0
  142. package/src/rules/no-verbose-error-messages/index.ts +83 -0
  143. package/src/rules/no-verbose-error-messages/no-verbose-error-messages.test.ts +34 -0
  144. package/src/rules/no-weak-crypto/index.ts +447 -0
  145. package/src/rules/no-weak-crypto/no-weak-crypto.test.ts +297 -0
  146. package/src/rules/no-weak-password-recovery/index.ts +509 -0
  147. package/src/rules/no-weak-password-recovery/no-weak-password-recovery.test.ts +184 -0
  148. package/src/rules/no-xpath-injection/index.ts +596 -0
  149. package/src/rules/no-xpath-injection/no-xpath-injection.test.ts +405 -0
  150. package/src/rules/no-xxe-injection/index.ts +342 -0
  151. package/src/rules/no-xxe-injection/no-xxe-injection.test.ts +122 -0
  152. package/src/rules/no-zip-slip/index.ts +526 -0
  153. package/src/rules/no-zip-slip/no-zip-slip.test.ts +305 -0
  154. package/src/rules/require-backend-authorization/index.ts +71 -0
  155. package/src/rules/require-backend-authorization/require-backend-authorization.test.ts +31 -0
  156. package/src/rules/require-code-minification/index.ts +54 -0
  157. package/src/rules/require-code-minification/require-code-minification.test.ts +30 -0
  158. package/src/rules/require-csp-headers/index.ts +74 -0
  159. package/src/rules/require-csp-headers/require-csp-headers.test.ts +34 -0
  160. package/src/rules/require-data-minimization/index.ts +65 -0
  161. package/src/rules/require-data-minimization/require-data-minimization.test.ts +31 -0
  162. package/src/rules/require-dependency-integrity/index.ts +78 -0
  163. package/src/rules/require-dependency-integrity/require-dependency-integrity.test.ts +44 -0
  164. package/src/rules/require-https-only/index.ts +75 -0
  165. package/src/rules/require-https-only/require-https-only.test.ts +26 -0
  166. package/src/rules/require-mime-type-validation/index.ts +77 -0
  167. package/src/rules/require-mime-type-validation/require-mime-type-validation.test.ts +32 -0
  168. package/src/rules/require-network-timeout/index.ts +58 -0
  169. package/src/rules/require-network-timeout/require-network-timeout.test.ts +26 -0
  170. package/src/rules/require-package-lock/index.ts +75 -0
  171. package/src/rules/require-package-lock/require-package-lock.test.ts +27 -0
  172. package/src/rules/require-secure-credential-storage/index.ts +60 -0
  173. package/src/rules/require-secure-credential-storage/require-secure-credential-storage.test.ts +26 -0
  174. package/src/rules/require-secure-defaults/index.ts +54 -0
  175. package/src/rules/require-secure-defaults/require-secure-defaults.test.ts +26 -0
  176. package/src/rules/require-secure-deletion/index.ts +52 -0
  177. package/src/rules/require-secure-deletion/require-secure-deletion.test.ts +29 -0
  178. package/src/rules/require-storage-encryption/index.ts +60 -0
  179. package/src/rules/require-storage-encryption/require-storage-encryption.test.ts +26 -0
  180. package/src/rules/require-url-validation/index.ts +85 -0
  181. package/src/rules/require-url-validation/require-url-validation.test.ts +32 -0
  182. package/src/types/{index.d.ts → index.ts} +157 -53
  183. package/src/index.d.ts +0 -32
  184. package/src/index.js +0 -465
  185. package/src/rules/database-injection/index.d.ts +0 -13
  186. package/src/rules/database-injection/index.js +0 -406
  187. package/src/rules/detect-child-process/index.d.ts +0 -11
  188. package/src/rules/detect-child-process/index.js +0 -529
  189. package/src/rules/detect-eval-with-expression/index.d.ts +0 -9
  190. package/src/rules/detect-eval-with-expression/index.js +0 -392
  191. package/src/rules/detect-mixed-content/index.d.ts +0 -8
  192. package/src/rules/detect-mixed-content/index.js +0 -44
  193. package/src/rules/detect-non-literal-fs-filename/index.d.ts +0 -7
  194. package/src/rules/detect-non-literal-fs-filename/index.js +0 -454
  195. package/src/rules/detect-non-literal-regexp/index.d.ts +0 -9
  196. package/src/rules/detect-non-literal-regexp/index.js +0 -403
  197. package/src/rules/detect-object-injection/index.d.ts +0 -11
  198. package/src/rules/detect-object-injection/index.js +0 -560
  199. package/src/rules/detect-suspicious-dependencies/index.d.ts +0 -8
  200. package/src/rules/detect-suspicious-dependencies/index.js +0 -71
  201. package/src/rules/detect-weak-password-validation/index.d.ts +0 -6
  202. package/src/rules/detect-weak-password-validation/index.js +0 -58
  203. package/src/rules/no-allow-arbitrary-loads/index.d.ts +0 -8
  204. package/src/rules/no-allow-arbitrary-loads/index.js +0 -47
  205. package/src/rules/no-arbitrary-file-access/index.d.ts +0 -13
  206. package/src/rules/no-arbitrary-file-access/index.js +0 -195
  207. package/src/rules/no-buffer-overread/index.d.ts +0 -29
  208. package/src/rules/no-buffer-overread/index.js +0 -606
  209. package/src/rules/no-clickjacking/index.d.ts +0 -10
  210. package/src/rules/no-clickjacking/index.js +0 -396
  211. package/src/rules/no-client-side-auth-logic/index.d.ts +0 -6
  212. package/src/rules/no-client-side-auth-logic/index.js +0 -69
  213. package/src/rules/no-credentials-in-query-params/index.d.ts +0 -8
  214. package/src/rules/no-credentials-in-query-params/index.js +0 -57
  215. package/src/rules/no-credentials-in-storage-api/index.d.ts +0 -6
  216. package/src/rules/no-credentials-in-storage-api/index.js +0 -54
  217. package/src/rules/no-data-in-temp-storage/index.d.ts +0 -6
  218. package/src/rules/no-data-in-temp-storage/index.js +0 -64
  219. package/src/rules/no-debug-code-in-production/index.d.ts +0 -8
  220. package/src/rules/no-debug-code-in-production/index.js +0 -51
  221. package/src/rules/no-directive-injection/index.d.ts +0 -12
  222. package/src/rules/no-directive-injection/index.js +0 -457
  223. package/src/rules/no-disabled-certificate-validation/index.d.ts +0 -6
  224. package/src/rules/no-disabled-certificate-validation/index.js +0 -61
  225. package/src/rules/no-document-cookie/index.d.ts +0 -5
  226. package/src/rules/no-document-cookie/index.js +0 -89
  227. package/src/rules/no-dynamic-dependency-loading/index.d.ts +0 -8
  228. package/src/rules/no-dynamic-dependency-loading/index.js +0 -51
  229. package/src/rules/no-electron-security-issues/index.d.ts +0 -10
  230. package/src/rules/no-electron-security-issues/index.js +0 -423
  231. package/src/rules/no-exposed-debug-endpoints/index.d.ts +0 -6
  232. package/src/rules/no-exposed-debug-endpoints/index.js +0 -62
  233. package/src/rules/no-exposed-sensitive-data/index.d.ts +0 -11
  234. package/src/rules/no-exposed-sensitive-data/index.js +0 -340
  235. package/src/rules/no-format-string-injection/index.d.ts +0 -17
  236. package/src/rules/no-format-string-injection/index.js +0 -660
  237. package/src/rules/no-graphql-injection/index.d.ts +0 -12
  238. package/src/rules/no-graphql-injection/index.js +0 -411
  239. package/src/rules/no-hardcoded-credentials/index.d.ts +0 -26
  240. package/src/rules/no-hardcoded-credentials/index.js +0 -376
  241. package/src/rules/no-hardcoded-session-tokens/index.d.ts +0 -6
  242. package/src/rules/no-hardcoded-session-tokens/index.js +0 -59
  243. package/src/rules/no-http-urls/index.d.ts +0 -12
  244. package/src/rules/no-http-urls/index.js +0 -114
  245. package/src/rules/no-improper-sanitization/index.d.ts +0 -12
  246. package/src/rules/no-improper-sanitization/index.js +0 -411
  247. package/src/rules/no-improper-type-validation/index.d.ts +0 -10
  248. package/src/rules/no-improper-type-validation/index.js +0 -475
  249. package/src/rules/no-insecure-comparison/index.d.ts +0 -7
  250. package/src/rules/no-insecure-comparison/index.js +0 -193
  251. package/src/rules/no-insecure-cookie-settings/index.d.ts +0 -9
  252. package/src/rules/no-insecure-cookie-settings/index.js +0 -306
  253. package/src/rules/no-insecure-jwt/index.d.ts +0 -10
  254. package/src/rules/no-insecure-jwt/index.js +0 -380
  255. package/src/rules/no-insecure-redirects/index.d.ts +0 -7
  256. package/src/rules/no-insecure-redirects/index.js +0 -216
  257. package/src/rules/no-insecure-websocket/index.d.ts +0 -6
  258. package/src/rules/no-insecure-websocket/index.js +0 -61
  259. package/src/rules/no-insufficient-postmessage-validation/index.d.ts +0 -14
  260. package/src/rules/no-insufficient-postmessage-validation/index.js +0 -392
  261. package/src/rules/no-insufficient-random/index.d.ts +0 -9
  262. package/src/rules/no-insufficient-random/index.js +0 -208
  263. package/src/rules/no-ldap-injection/index.d.ts +0 -10
  264. package/src/rules/no-ldap-injection/index.js +0 -455
  265. package/src/rules/no-missing-authentication/index.d.ts +0 -13
  266. package/src/rules/no-missing-authentication/index.js +0 -333
  267. package/src/rules/no-missing-cors-check/index.d.ts +0 -9
  268. package/src/rules/no-missing-cors-check/index.js +0 -399
  269. package/src/rules/no-missing-csrf-protection/index.d.ts +0 -11
  270. package/src/rules/no-missing-csrf-protection/index.js +0 -180
  271. package/src/rules/no-missing-security-headers/index.d.ts +0 -7
  272. package/src/rules/no-missing-security-headers/index.js +0 -218
  273. package/src/rules/no-password-in-url/index.d.ts +0 -8
  274. package/src/rules/no-password-in-url/index.js +0 -54
  275. package/src/rules/no-permissive-cors/index.d.ts +0 -8
  276. package/src/rules/no-permissive-cors/index.js +0 -65
  277. package/src/rules/no-pii-in-logs/index.d.ts +0 -8
  278. package/src/rules/no-pii-in-logs/index.js +0 -70
  279. package/src/rules/no-postmessage-origin-wildcard/index.d.ts +0 -8
  280. package/src/rules/no-postmessage-origin-wildcard/index.js +0 -56
  281. package/src/rules/no-privilege-escalation/index.d.ts +0 -13
  282. package/src/rules/no-privilege-escalation/index.js +0 -321
  283. package/src/rules/no-redos-vulnerable-regex/index.d.ts +0 -7
  284. package/src/rules/no-redos-vulnerable-regex/index.js +0 -306
  285. package/src/rules/no-sensitive-data-exposure/index.d.ts +0 -11
  286. package/src/rules/no-sensitive-data-exposure/index.js +0 -250
  287. package/src/rules/no-sensitive-data-in-analytics/index.d.ts +0 -8
  288. package/src/rules/no-sensitive-data-in-analytics/index.js +0 -62
  289. package/src/rules/no-sensitive-data-in-cache/index.d.ts +0 -8
  290. package/src/rules/no-sensitive-data-in-cache/index.js +0 -52
  291. package/src/rules/no-sql-injection/index.d.ts +0 -10
  292. package/src/rules/no-sql-injection/index.js +0 -335
  293. package/src/rules/no-timing-attack/index.d.ts +0 -10
  294. package/src/rules/no-timing-attack/index.js +0 -447
  295. package/src/rules/no-toctou-vulnerability/index.d.ts +0 -7
  296. package/src/rules/no-toctou-vulnerability/index.js +0 -208
  297. package/src/rules/no-tracking-without-consent/index.d.ts +0 -6
  298. package/src/rules/no-tracking-without-consent/index.js +0 -67
  299. package/src/rules/no-unchecked-loop-condition/index.d.ts +0 -12
  300. package/src/rules/no-unchecked-loop-condition/index.js +0 -646
  301. package/src/rules/no-unencrypted-local-storage/index.d.ts +0 -8
  302. package/src/rules/no-unencrypted-local-storage/index.js +0 -61
  303. package/src/rules/no-unencrypted-transmission/index.d.ts +0 -11
  304. package/src/rules/no-unencrypted-transmission/index.js +0 -236
  305. package/src/rules/no-unescaped-url-parameter/index.d.ts +0 -9
  306. package/src/rules/no-unescaped-url-parameter/index.js +0 -355
  307. package/src/rules/no-unlimited-resource-allocation/index.d.ts +0 -12
  308. package/src/rules/no-unlimited-resource-allocation/index.js +0 -643
  309. package/src/rules/no-unsafe-deserialization/index.d.ts +0 -10
  310. package/src/rules/no-unsafe-deserialization/index.js +0 -491
  311. package/src/rules/no-unsafe-dynamic-require/index.d.ts +0 -5
  312. package/src/rules/no-unsafe-dynamic-require/index.js +0 -106
  313. package/src/rules/no-unsafe-regex-construction/index.d.ts +0 -9
  314. package/src/rules/no-unsafe-regex-construction/index.js +0 -291
  315. package/src/rules/no-unsanitized-html/index.d.ts +0 -9
  316. package/src/rules/no-unsanitized-html/index.js +0 -335
  317. package/src/rules/no-unvalidated-deeplinks/index.d.ts +0 -6
  318. package/src/rules/no-unvalidated-deeplinks/index.js +0 -62
  319. package/src/rules/no-unvalidated-user-input/index.d.ts +0 -9
  320. package/src/rules/no-unvalidated-user-input/index.js +0 -420
  321. package/src/rules/no-verbose-error-messages/index.d.ts +0 -8
  322. package/src/rules/no-verbose-error-messages/index.js +0 -68
  323. package/src/rules/no-weak-crypto/index.d.ts +0 -11
  324. package/src/rules/no-weak-crypto/index.js +0 -351
  325. package/src/rules/no-weak-password-recovery/index.d.ts +0 -12
  326. package/src/rules/no-weak-password-recovery/index.js +0 -424
  327. package/src/rules/no-xpath-injection/index.d.ts +0 -10
  328. package/src/rules/no-xpath-injection/index.js +0 -487
  329. package/src/rules/no-xxe-injection/index.d.ts +0 -7
  330. package/src/rules/no-xxe-injection/index.js +0 -266
  331. package/src/rules/no-zip-slip/index.d.ts +0 -9
  332. package/src/rules/no-zip-slip/index.js +0 -445
  333. package/src/rules/require-backend-authorization/index.d.ts +0 -6
  334. package/src/rules/require-backend-authorization/index.js +0 -60
  335. package/src/rules/require-code-minification/index.d.ts +0 -8
  336. package/src/rules/require-code-minification/index.js +0 -47
  337. package/src/rules/require-csp-headers/index.d.ts +0 -6
  338. package/src/rules/require-csp-headers/index.js +0 -64
  339. package/src/rules/require-data-minimization/index.d.ts +0 -8
  340. package/src/rules/require-data-minimization/index.js +0 -53
  341. package/src/rules/require-dependency-integrity/index.d.ts +0 -6
  342. package/src/rules/require-dependency-integrity/index.js +0 -64
  343. package/src/rules/require-https-only/index.d.ts +0 -8
  344. package/src/rules/require-https-only/index.js +0 -62
  345. package/src/rules/require-mime-type-validation/index.d.ts +0 -6
  346. package/src/rules/require-mime-type-validation/index.js +0 -66
  347. package/src/rules/require-network-timeout/index.d.ts +0 -8
  348. package/src/rules/require-network-timeout/index.js +0 -50
  349. package/src/rules/require-package-lock/index.d.ts +0 -8
  350. package/src/rules/require-package-lock/index.js +0 -63
  351. package/src/rules/require-secure-credential-storage/index.d.ts +0 -8
  352. package/src/rules/require-secure-credential-storage/index.js +0 -50
  353. package/src/rules/require-secure-defaults/index.d.ts +0 -8
  354. package/src/rules/require-secure-defaults/index.js +0 -47
  355. package/src/rules/require-secure-deletion/index.d.ts +0 -8
  356. package/src/rules/require-secure-deletion/index.js +0 -44
  357. package/src/rules/require-storage-encryption/index.d.ts +0 -8
  358. package/src/rules/require-storage-encryption/index.js +0 -50
  359. package/src/rules/require-url-validation/index.d.ts +0 -6
  360. package/src/rules/require-url-validation/index.js +0 -72
  361. package/src/types/index.js +0 -17
@@ -1,376 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- exports.noHardcodedCredentials = void 0;
4
- const eslint_devkit_1 = require("@interlace/eslint-devkit");
5
- const eslint_devkit_2 = require("@interlace/eslint-devkit");
6
- /**
7
- * Common credential patterns
8
- */
9
- const CREDENTIAL_PATTERNS = {
10
- // API Keys (typically 32+ character alphanumeric strings)
11
- apiKey: /^(?:[A-Za-z0-9_-]{32,}|sk_[A-Za-z0-9_-]{32,}|pk_[A-Za-z0-9_-]{32,}|AKIA[0-9A-Z]{16})$/,
12
- // JWT Tokens (three base64 parts separated by dots)
13
- jwtToken: /^eyJ[A-Za-z0-9_-]+\.eyJ[A-Za-z0-9_-]+\.[A-Za-z0-9_-]+$/,
14
- // OAuth tokens
15
- oauthToken: /^(?:ghp_|gho_|ghu_|ghs_|ghr_)[A-Za-z0-9]{36,}$/,
16
- // AWS Access Keys
17
- awsAccessKey: /^AKIA[0-9A-Z]{16}$/,
18
- // Database connection strings with credentials
19
- databaseString: /^(?:mysql|postgres|mongodb|redis):\/\/[^:]+:[^@]+@/,
20
- // Generic password patterns (common weak passwords) - no length requirement
21
- commonPassword: /^(?:password|admin|123456|qwerty|letmein|welcome|monkey|1234567890|12345678|password123|root|test|guest)$/i,
22
- // Secret keys (base64-like or hex strings)
23
- secretKey: /^(?:[A-Za-z0-9+/]{32,}={0,2}|[A-Fa-f0-9]{32,})$/,
24
- };
25
- // Note: CREDENTIAL_VARIABLE_NAMES is reserved for future use when we want to
26
- // check variable names in addition to values
27
- // @coverage-note: Not currently used, reserved for future enhancement
28
- /**
29
- * Check if a string literal looks like a hardcoded credential
30
- */
31
- function looksLikeCredential(value, options, ignorePatterns) {
32
- // Check ignore patterns first
33
- if (ignorePatterns.some(pattern => pattern.test(value))) {
34
- return { isCredential: false, type: '' };
35
- }
36
- // Check custom patterns first (highest priority)
37
- for (const customPattern of options.customPatterns) {
38
- try {
39
- const regex = new RegExp(customPattern.pattern);
40
- if (regex.test(value)) {
41
- return { isCredential: true, type: customPattern.type };
42
- }
43
- // eslint-disable-next-line @typescript-eslint/no-unused-vars
44
- }
45
- catch (error) {
46
- // Invalid regex pattern, skip it
47
- continue;
48
- }
49
- }
50
- // Check passwords (common weak passwords) - no length requirement, check first
51
- if (options.detectPasswords) {
52
- if (CREDENTIAL_PATTERNS.commonPassword.test(value)) {
53
- return { isCredential: true, type: 'Common password' };
54
- }
55
- }
56
- // Check database connection strings - no length requirement
57
- if (options.detectDatabaseStrings) {
58
- if (CREDENTIAL_PATTERNS.databaseString.test(value)) {
59
- return { isCredential: true, type: 'Database connection string' };
60
- }
61
- }
62
- // Check minimum length for other patterns
63
- if (value.length < options.minLength) {
64
- return { isCredential: false, type: '' };
65
- }
66
- // Check tokens first (more specific patterns)
67
- if (options.detectTokens) {
68
- if (CREDENTIAL_PATTERNS.jwtToken.test(value)) {
69
- return { isCredential: true, type: 'JWT token' };
70
- }
71
- if (CREDENTIAL_PATTERNS.oauthToken.test(value)) {
72
- return { isCredential: true, type: 'OAuth token' };
73
- }
74
- }
75
- // Check secret keys first (before generic API key patterns)
76
- if (value.length >= 32 && CREDENTIAL_PATTERNS.secretKey.test(value)) {
77
- return { isCredential: true, type: 'Secret key' };
78
- }
79
- // Check API keys
80
- if (options.detectApiKeys) {
81
- if (CREDENTIAL_PATTERNS.awsAccessKey.test(value)) {
82
- return { isCredential: true, type: 'AWS access key' };
83
- }
84
- // Generic API key pattern (long alphanumeric strings)
85
- if (/^[A-Za-z0-9_-]{32,}$/.test(value)) {
86
- return { isCredential: true, type: 'API key' };
87
- }
88
- }
89
- return { isCredential: false, type: '' };
90
- }
91
- // Note: isCredentialVariableName is reserved for future use when we want to
92
- // check variable names in addition to values
93
- // @coverage-note: Not currently used, reserved for future enhancement
94
- exports.noHardcodedCredentials = (0, eslint_devkit_2.createRule)({
95
- name: 'no-hardcoded-credentials',
96
- meta: {
97
- type: 'problem',
98
- docs: {
99
- description: 'Detects hardcoded passwords, API keys, tokens, and other sensitive credentials',
100
- },
101
- fixable: 'code',
102
- hasSuggestions: true,
103
- messages: {
104
- useEnvironmentVariable: (0, eslint_devkit_1.formatLLMMessage)({
105
- icon: eslint_devkit_1.MessageIcons.SECURITY,
106
- issueName: 'Hard-coded Credential',
107
- cwe: 'CWE-798',
108
- description: 'Hard-coded {{credentialType}} detected',
109
- severity: 'CRITICAL',
110
- fix: 'Use environment variable: process.env.{{envVarName}} or secret management service',
111
- documentationLink: 'https://cwe.mitre.org/data/definitions/798.html',
112
- }),
113
- useSecretManager: (0, eslint_devkit_1.formatLLMMessage)({
114
- icon: eslint_devkit_1.MessageIcons.SECURITY,
115
- issueName: 'Use Secret Manager',
116
- cwe: 'CWE-798',
117
- description: 'Use secure secret management service',
118
- severity: 'HIGH',
119
- fix: 'Use AWS Secrets Manager, HashiCorp Vault, Azure Key Vault, or similar',
120
- documentationLink: 'https://cwe.mitre.org/data/definitions/798.html',
121
- }),
122
- strategyEnv: (0, eslint_devkit_1.formatLLMMessage)({
123
- icon: eslint_devkit_1.MessageIcons.DEVELOPMENT,
124
- issueName: 'Environment Variable Strategy',
125
- description: 'Move credentials to environment variables',
126
- severity: 'MEDIUM',
127
- fix: 'Store credentials in environment variables (process.env)',
128
- documentationLink: 'https://12factor.net/config',
129
- }),
130
- strategyConfig: (0, eslint_devkit_1.formatLLMMessage)({
131
- icon: eslint_devkit_1.MessageIcons.DEVELOPMENT,
132
- issueName: 'Configuration File Strategy',
133
- description: 'Store credentials in encrypted configuration files',
134
- severity: 'MEDIUM',
135
- fix: 'Use encrypted configuration files with proper access controls',
136
- documentationLink: 'https://owasp.org/www-project-cheat-sheets/cheatsheets/Configuration_Management_Cheat_Sheet.html',
137
- }),
138
- strategyVault: (0, eslint_devkit_1.formatLLMMessage)({
139
- icon: eslint_devkit_1.MessageIcons.SECURITY,
140
- issueName: 'Secret Vault Strategy',
141
- cwe: 'CWE-798',
142
- description: 'Use dedicated secret management system',
143
- severity: 'HIGH',
144
- fix: 'Implement HashiCorp Vault, AWS Secrets Manager, or similar secret vault',
145
- documentationLink: 'https://cwe.mitre.org/data/definitions/798.html',
146
- }),
147
- strategyAuto: (0, eslint_devkit_1.formatLLMMessage)({
148
- icon: eslint_devkit_1.MessageIcons.DEVELOPMENT,
149
- issueName: 'Context-Aware Strategy',
150
- description: 'Apply context-aware credential management',
151
- severity: 'MEDIUM',
152
- fix: 'Choose strategy based on deployment environment and security requirements',
153
- documentationLink: 'https://owasp.org/www-project-cheat-sheets/cheatsheets/Secrets_Management_Cheat_Sheet.html',
154
- }),
155
- },
156
- schema: [
157
- {
158
- type: 'object',
159
- properties: {
160
- ignorePatterns: {
161
- type: 'array',
162
- items: { type: 'string' },
163
- default: [],
164
- description: 'Regex patterns to ignore',
165
- },
166
- allowInTests: {
167
- type: 'boolean',
168
- default: false,
169
- description: 'Allow credentials in test files',
170
- },
171
- minLength: {
172
- type: 'number',
173
- default: 8,
174
- description: 'Minimum length for credential detection',
175
- },
176
- detectApiKeys: {
177
- type: 'boolean',
178
- default: true,
179
- description: 'Detect API keys',
180
- },
181
- detectPasswords: {
182
- type: 'boolean',
183
- default: true,
184
- description: 'Detect passwords',
185
- },
186
- detectTokens: {
187
- type: 'boolean',
188
- default: true,
189
- description: 'Detect tokens',
190
- },
191
- detectDatabaseStrings: {
192
- type: 'boolean',
193
- default: true,
194
- description: 'Detect database connection strings',
195
- },
196
- customPatterns: {
197
- type: 'array',
198
- items: {
199
- type: 'object',
200
- properties: {
201
- type: {
202
- type: 'string',
203
- description: 'The type of credential (e.g., "API key", "token")',
204
- },
205
- pattern: {
206
- type: 'string',
207
- description: 'Regex pattern to match',
208
- },
209
- },
210
- required: ['type', 'pattern'],
211
- additionalProperties: false,
212
- },
213
- default: [],
214
- description: 'Custom credential patterns to detect',
215
- },
216
- strategy: {
217
- type: 'string',
218
- enum: ['env', 'config', 'vault', 'auto'],
219
- default: 'auto',
220
- description: 'Strategy for fixing hardcoded credentials (auto = smart detection)'
221
- },
222
- },
223
- additionalProperties: false,
224
- },
225
- ],
226
- },
227
- defaultOptions: [
228
- {
229
- ignorePatterns: [],
230
- allowInTests: false,
231
- minLength: 8,
232
- detectApiKeys: true,
233
- detectPasswords: true,
234
- detectTokens: true,
235
- detectDatabaseStrings: true,
236
- customPatterns: [],
237
- strategy: 'auto',
238
- },
239
- ],
240
- create(context) {
241
- const options = context.options[0] || {};
242
- const { ignorePatterns = [], allowInTests = false, minLength = 8, detectApiKeys = true, detectPasswords = true, detectTokens = true, detectDatabaseStrings = true, customPatterns = [], } = options || {};
243
- const filename = context.filename || context.getFilename();
244
- const isTestFile = allowInTests && (filename.includes('.test.') ||
245
- filename.includes('.spec.') ||
246
- filename.includes('__tests__') ||
247
- filename.includes('/test/'));
248
- // Compile ignore patterns to regex
249
- const compiledIgnorePatterns = ignorePatterns.map((pattern) => new RegExp(pattern));
250
- const detectionOptions = {
251
- minLength,
252
- detectApiKeys,
253
- detectPasswords,
254
- detectTokens,
255
- detectDatabaseStrings,
256
- customPatterns,
257
- };
258
- /**
259
- * Check a string literal node
260
- */
261
- function checkStringLiteral(node, parent) {
262
- if (typeof node.value !== 'string') {
263
- return;
264
- }
265
- const value = node.value;
266
- // Skip if in test files and allowed
267
- if (isTestFile) {
268
- return;
269
- }
270
- // Check if it looks like a credential
271
- const { isCredential, type } = looksLikeCredential(value, detectionOptions, compiledIgnorePatterns);
272
- if (!isCredential) {
273
- return;
274
- }
275
- // Generate environment variable name suggestion
276
- let envVarName = 'API_KEY';
277
- if (parent && parent.type === 'Property' && parent.key.type === 'Identifier') {
278
- const keyName = parent.key.name;
279
- envVarName = keyName
280
- .replace(/([a-z])([A-Z])/g, '$1_$2')
281
- .toUpperCase()
282
- .replace(/[^A-Z0-9_]/g, '_');
283
- }
284
- else if (parent && parent.type === 'VariableDeclarator' && parent.id.type === 'Identifier') {
285
- const varName = parent.id.name;
286
- envVarName = varName
287
- .replace(/([a-z])([A-Z])/g, '$1_$2')
288
- .toUpperCase()
289
- .replace(/[^A-Z0-9_]/g, '_');
290
- }
291
- context.report({
292
- node,
293
- messageId: 'useEnvironmentVariable',
294
- data: {
295
- credentialType: type,
296
- envVarName,
297
- },
298
- suggest: [
299
- {
300
- messageId: 'useEnvironmentVariable',
301
- data: { envVarName, credentialType: type },
302
- fix: (fixer) => {
303
- return fixer.replaceText(node, `process.env.${envVarName} || '${value}'`);
304
- },
305
- },
306
- {
307
- messageId: 'useSecretManager',
308
- data: { credentialType: type },
309
- fix: (fixer) => {
310
- return fixer.replaceText(node, `await getSecret('${envVarName.toLowerCase()}')`);
311
- },
312
- },
313
- ],
314
- });
315
- }
316
- return {
317
- Literal(node) {
318
- checkStringLiteral(node, node.parent);
319
- },
320
- TemplateLiteral(node) {
321
- // Check template literal parts for credentials
322
- // Only check if there are no interpolations (static template literal)
323
- if (node.expressions.length === 0) {
324
- const fullText = node.quasis.map((q) => q.value.raw).join('');
325
- const { isCredential, type } = looksLikeCredential(fullText, detectionOptions, compiledIgnorePatterns);
326
- if (isCredential && !isTestFile) {
327
- context.report({
328
- node,
329
- messageId: 'useEnvironmentVariable',
330
- data: {
331
- credentialType: type,
332
- envVarName: 'API_KEY',
333
- },
334
- suggest: [
335
- {
336
- messageId: 'useEnvironmentVariable',
337
- data: { envVarName: 'API_KEY', credentialType: type },
338
- fix: (fixer) => {
339
- return fixer.replaceText(node, `process.env.API_KEY || \`${fullText}\``);
340
- },
341
- },
342
- {
343
- messageId: 'useSecretManager',
344
- data: { credentialType: type },
345
- fix: (fixer) => {
346
- return fixer.replaceText(node, `await getSecret('api_key')`);
347
- },
348
- },
349
- ],
350
- });
351
- }
352
- }
353
- else {
354
- // For template literals with interpolations, check each quasi part
355
- for (const quasi of node.quasis) {
356
- if (quasi.value.raw) {
357
- const { isCredential, type } = looksLikeCredential(quasi.value.raw, detectionOptions, compiledIgnorePatterns);
358
- if (isCredential && !isTestFile) {
359
- // Note: Template literals with interpolations are complex to fix automatically
360
- // So we report the error without suggestions
361
- context.report({
362
- node: quasi,
363
- messageId: 'useEnvironmentVariable',
364
- data: {
365
- credentialType: type,
366
- envVarName: 'API_KEY',
367
- },
368
- });
369
- }
370
- }
371
- }
372
- }
373
- },
374
- };
375
- },
376
- });
@@ -1,6 +0,0 @@
1
- /**
2
- * @fileoverview Detect hardcoded session/JWT tokens
3
- */
4
- export interface Options {
5
- }
6
- export declare const noHardcodedSessionTokens: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
@@ -1,59 +0,0 @@
1
- "use strict";
2
- /**
3
- * @fileoverview Detect hardcoded session/JWT tokens
4
- */
5
- Object.defineProperty(exports, "__esModule", { value: true });
6
- exports.noHardcodedSessionTokens = void 0;
7
- const eslint_devkit_1 = require("@interlace/eslint-devkit");
8
- exports.noHardcodedSessionTokens = (0, eslint_devkit_1.createRule)({
9
- name: 'no-hardcoded-session-tokens',
10
- meta: {
11
- type: 'problem',
12
- docs: {
13
- description: 'Detect hardcoded session/JWT tokens',
14
- },
15
- messages: {
16
- violationDetected: (0, eslint_devkit_1.formatLLMMessage)({
17
- icon: eslint_devkit_1.MessageIcons.SECURITY,
18
- issueName: 'Hardcoded Token',
19
- cwe: 'CWE-798',
20
- description: 'Hardcoded session or JWT token detected - credentials at risk',
21
- severity: 'CRITICAL',
22
- fix: 'Use environment variables or secure credential management',
23
- documentationLink: 'https://cwe.mitre.org/data/definitions/798.html',
24
- })
25
- },
26
- schema: [],
27
- },
28
- defaultOptions: [],
29
- create(context) {
30
- function report(node) {
31
- context.report({ node, messageId: 'violationDetected' });
32
- }
33
- return {
34
- Literal(node) {
35
- if (typeof node.value !== 'string')
36
- return;
37
- // Detect JWT tokens (start with eyJ and contain 2 dots)
38
- if (node.value.startsWith('eyJ') && node.value.length > 50 &&
39
- (node.value.match(/\./g) || []).length >= 2) {
40
- report(node);
41
- }
42
- // Detect Bearer tokens
43
- if (node.value.startsWith('Bearer ') && node.value.length > 20) {
44
- report(node);
45
- }
46
- // Detect session_id patterns
47
- const parent = node.parent;
48
- if (parent?.type === 'VariableDeclarator' &&
49
- parent.id.type === 'Identifier') {
50
- const varName = parent.id.name.toLowerCase();
51
- if ((varName.includes('session') || varName.includes('token')) &&
52
- node.value.length >= 16 && /^[a-zA-Z0-9]+$/.test(node.value)) {
53
- report(node);
54
- }
55
- }
56
- },
57
- };
58
- },
59
- });
@@ -1,12 +0,0 @@
1
- /**
2
- * @fileoverview Disallow hardcoded HTTP URLs
3
- * @see https://owasp.org/www-project-mobile-top-10/
4
- * @see https://cwe.mitre.org/data/definitions/319.html
5
- */
6
- export interface Options {
7
- /** List of hostnames allowed to use HTTP (e.g., localhost, 127.0.0.1) */
8
- allowedHosts?: string[];
9
- /** List of ports allowed for HTTP (e.g., 3000, 8080 for development) */
10
- allowedPorts?: number[];
11
- }
12
- export declare const noHttpUrls: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
@@ -1,114 +0,0 @@
1
- "use strict";
2
- /**
3
- * @fileoverview Disallow hardcoded HTTP URLs
4
- * @see https://owasp.org/www-project-mobile-top-10/
5
- * @see https://cwe.mitre.org/data/definitions/319.html
6
- */
7
- Object.defineProperty(exports, "__esModule", { value: true });
8
- exports.noHttpUrls = void 0;
9
- const eslint_devkit_1 = require("@interlace/eslint-devkit");
10
- exports.noHttpUrls = (0, eslint_devkit_1.createRule)({
11
- name: 'no-http-urls',
12
- meta: {
13
- type: 'problem',
14
- docs: {
15
- description: 'Disallow hardcoded HTTP URLs (require HTTPS)',
16
- },
17
- messages: {
18
- insecureHttp: (0, eslint_devkit_1.formatLLMMessage)({
19
- icon: eslint_devkit_1.MessageIcons.SECURITY,
20
- issueName: 'Insecure HTTP URL',
21
- cwe: 'CWE-319',
22
- owasp: 'A02:2021',
23
- cvss: 7.5,
24
- description: 'Hardcoded HTTP URL detected: "{{url}}"',
25
- severity: 'HIGH',
26
- compliance: ['SOC2', 'PCI-DSS', 'HIPAA'],
27
- fix: 'Use HTTPS instead: const url = "https://..."',
28
- documentationLink: 'https://cwe.mitre.org/data/definitions/319.html',
29
- }),
30
- insecureHttpWithException: (0, eslint_devkit_1.formatLLMMessage)({
31
- icon: eslint_devkit_1.MessageIcons.WARNING,
32
- issueName: 'Insecure HTTP URL',
33
- cwe: 'CWE-319',
34
- owasp: 'A02:2021',
35
- cvss: 5.3,
36
- description: 'HTTP URL detected: "{{url}}"',
37
- severity: 'MEDIUM',
38
- fix: 'Use HTTPS or add to allowedHosts config',
39
- documentationLink: 'https://cwe.mitre.org/data/definitions/319.html',
40
- }),
41
- },
42
- schema: [
43
- {
44
- type: 'object',
45
- properties: {
46
- allowedHosts: {
47
- type: 'array',
48
- items: { type: 'string' },
49
- description: 'List of hostnames allowed to use HTTP (e.g., localhost, 127.0.0.1)',
50
- },
51
- allowedPorts: {
52
- type: 'array',
53
- items: { type: 'number' },
54
- description: 'List of ports allowed for HTTP (e.g., 3000, 8080 for development)',
55
- },
56
- },
57
- additionalProperties: false,
58
- },
59
- ],
60
- },
61
- defaultOptions: [
62
- {
63
- allowedHosts: ['localhost', '127.0.0.1'],
64
- allowedPorts: [],
65
- },
66
- ],
67
- create(context) {
68
- const [options = {}] = context.options;
69
- const allowedHosts = options.allowedHosts ?? ['localhost', '127.0.0.1'];
70
- const allowedPorts = options.allowedPorts ?? [];
71
- function isAllowedException(url) {
72
- try {
73
- const parsedUrl = new URL(url);
74
- // Check if host is in allowed list
75
- if (allowedHosts.includes(parsedUrl.hostname)) {
76
- return true;
77
- }
78
- // Check if port is in allowed list
79
- if (parsedUrl.port && allowedPorts.includes(parseInt(parsedUrl.port, 10))) {
80
- return true;
81
- }
82
- return false;
83
- }
84
- catch {
85
- // If URL parsing fails, treat as pattern match
86
- return allowedHosts.some(host => url.includes(host));
87
- }
88
- }
89
- function checkStringValue(node, value) {
90
- const httpPattern = /^http:\/\//i;
91
- if (httpPattern.test(value) && !isAllowedException(value)) {
92
- context.report({
93
- node,
94
- messageId: allowedHosts.length > 0 || allowedPorts.length > 0
95
- ? 'insecureHttpWithException'
96
- : 'insecureHttp',
97
- data: { url: value },
98
- });
99
- }
100
- }
101
- return {
102
- Literal(node) {
103
- if (typeof node.value === 'string') {
104
- checkStringValue(node, node.value);
105
- }
106
- },
107
- TemplateElement(node) {
108
- if (node.value.cooked) {
109
- checkStringValue(node, node.value.cooked);
110
- }
111
- },
112
- };
113
- },
114
- });
@@ -1,12 +0,0 @@
1
- import { type SecurityRuleOptions } from '@interlace/eslint-devkit';
2
- export interface Options extends SecurityRuleOptions {
3
- /** Safe sanitization functions */
4
- safeSanitizers?: string[];
5
- /** Characters that should be escaped */
6
- dangerousChars?: string[];
7
- /** Contexts that require different encoding */
8
- contexts?: string[];
9
- /** Trusted sanitization libraries */
10
- trustedLibraries?: string[];
11
- }
12
- export declare const noImproperSanitization: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;