eslint-plugin-secure-coding 2.3.3 → 2.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (337) hide show
  1. package/CHANGELOG.md +51 -1
  2. package/README.md +2 -2
  3. package/package.json +1 -1
  4. package/src/index.d.ts +32 -0
  5. package/src/index.js +416 -0
  6. package/src/rules/detect-child-process/index.d.ts +11 -0
  7. package/src/rules/detect-child-process/index.js +529 -0
  8. package/src/rules/detect-eval-with-expression/index.d.ts +9 -0
  9. package/src/rules/detect-eval-with-expression/index.js +392 -0
  10. package/src/rules/detect-mixed-content/index.d.ts +8 -0
  11. package/src/rules/detect-mixed-content/index.js +44 -0
  12. package/src/rules/detect-non-literal-fs-filename/index.d.ts +7 -0
  13. package/src/rules/detect-non-literal-fs-filename/index.js +454 -0
  14. package/src/rules/detect-non-literal-regexp/index.d.ts +9 -0
  15. package/src/rules/detect-non-literal-regexp/index.js +403 -0
  16. package/src/rules/detect-object-injection/index.d.ts +11 -0
  17. package/src/rules/detect-object-injection/index.js +560 -0
  18. package/src/rules/detect-suspicious-dependencies/index.d.ts +8 -0
  19. package/src/rules/detect-suspicious-dependencies/index.js +71 -0
  20. package/src/rules/detect-weak-password-validation/index.d.ts +6 -0
  21. package/src/rules/detect-weak-password-validation/index.js +58 -0
  22. package/src/rules/no-allow-arbitrary-loads/index.d.ts +8 -0
  23. package/src/rules/no-allow-arbitrary-loads/index.js +47 -0
  24. package/src/rules/no-arbitrary-file-access/index.d.ts +13 -0
  25. package/src/rules/no-arbitrary-file-access/index.js +195 -0
  26. package/src/rules/no-buffer-overread/index.d.ts +29 -0
  27. package/src/rules/no-buffer-overread/index.js +606 -0
  28. package/src/rules/no-clickjacking/index.d.ts +10 -0
  29. package/src/rules/no-clickjacking/index.js +396 -0
  30. package/src/rules/no-client-side-auth-logic/index.d.ts +6 -0
  31. package/src/rules/no-client-side-auth-logic/index.js +69 -0
  32. package/src/rules/no-credentials-in-query-params/index.d.ts +8 -0
  33. package/src/rules/no-credentials-in-query-params/index.js +57 -0
  34. package/src/rules/no-data-in-temp-storage/index.d.ts +6 -0
  35. package/src/rules/no-data-in-temp-storage/index.js +64 -0
  36. package/src/rules/no-debug-code-in-production/index.d.ts +8 -0
  37. package/src/rules/no-debug-code-in-production/index.js +51 -0
  38. package/src/rules/no-directive-injection/index.d.ts +12 -0
  39. package/src/rules/no-directive-injection/index.js +457 -0
  40. package/src/rules/no-disabled-certificate-validation/index.d.ts +6 -0
  41. package/src/rules/no-disabled-certificate-validation/index.js +61 -0
  42. package/src/rules/no-dynamic-dependency-loading/index.d.ts +8 -0
  43. package/src/rules/no-dynamic-dependency-loading/index.js +51 -0
  44. package/src/rules/no-electron-security-issues/index.d.ts +10 -0
  45. package/src/rules/no-electron-security-issues/index.js +423 -0
  46. package/src/rules/no-exposed-debug-endpoints/index.d.ts +6 -0
  47. package/src/rules/no-exposed-debug-endpoints/index.js +62 -0
  48. package/src/rules/no-exposed-sensitive-data/index.d.ts +11 -0
  49. package/src/rules/no-exposed-sensitive-data/index.js +340 -0
  50. package/src/rules/no-format-string-injection/index.d.ts +17 -0
  51. package/src/rules/no-format-string-injection/index.js +660 -0
  52. package/src/rules/no-graphql-injection/index.d.ts +12 -0
  53. package/src/rules/no-graphql-injection/index.js +411 -0
  54. package/src/rules/no-hardcoded-credentials/index.d.ts +26 -0
  55. package/src/rules/no-hardcoded-credentials/index.js +376 -0
  56. package/src/rules/no-hardcoded-session-tokens/index.d.ts +6 -0
  57. package/src/rules/no-hardcoded-session-tokens/index.js +59 -0
  58. package/src/rules/no-http-urls/index.d.ts +12 -0
  59. package/src/rules/no-http-urls/index.js +114 -0
  60. package/src/rules/no-improper-sanitization/index.d.ts +12 -0
  61. package/src/rules/no-improper-sanitization/index.js +411 -0
  62. package/src/rules/no-improper-type-validation/index.d.ts +10 -0
  63. package/src/rules/no-improper-type-validation/index.js +475 -0
  64. package/src/rules/no-insecure-comparison/index.d.ts +7 -0
  65. package/src/rules/no-insecure-comparison/index.js +193 -0
  66. package/src/rules/no-insecure-redirects/index.d.ts +7 -0
  67. package/src/rules/no-insecure-redirects/index.js +216 -0
  68. package/src/rules/no-insecure-websocket/index.d.ts +6 -0
  69. package/src/rules/no-insecure-websocket/index.js +61 -0
  70. package/src/rules/no-ldap-injection/index.d.ts +10 -0
  71. package/src/rules/no-ldap-injection/index.js +455 -0
  72. package/src/rules/no-missing-authentication/index.d.ts +13 -0
  73. package/src/rules/no-missing-authentication/index.js +333 -0
  74. package/src/rules/no-missing-cors-check/index.d.ts +9 -0
  75. package/src/rules/no-missing-cors-check/index.js +399 -0
  76. package/src/rules/no-missing-csrf-protection/index.d.ts +11 -0
  77. package/src/rules/no-missing-csrf-protection/index.js +180 -0
  78. package/src/rules/no-missing-security-headers/index.d.ts +7 -0
  79. package/src/rules/no-missing-security-headers/index.js +218 -0
  80. package/src/rules/no-password-in-url/index.d.ts +8 -0
  81. package/src/rules/no-password-in-url/index.js +54 -0
  82. package/src/rules/no-permissive-cors/index.d.ts +8 -0
  83. package/src/rules/no-permissive-cors/index.js +65 -0
  84. package/src/rules/no-pii-in-logs/index.d.ts +8 -0
  85. package/src/rules/no-pii-in-logs/index.js +70 -0
  86. package/src/rules/no-privilege-escalation/index.d.ts +13 -0
  87. package/src/rules/no-privilege-escalation/index.js +321 -0
  88. package/src/rules/no-redos-vulnerable-regex/index.d.ts +7 -0
  89. package/src/rules/no-redos-vulnerable-regex/index.js +306 -0
  90. package/src/rules/no-sensitive-data-exposure/index.d.ts +11 -0
  91. package/src/rules/no-sensitive-data-exposure/index.js +250 -0
  92. package/src/rules/no-sensitive-data-in-analytics/index.d.ts +8 -0
  93. package/src/rules/no-sensitive-data-in-analytics/index.js +62 -0
  94. package/src/rules/no-sensitive-data-in-cache/index.d.ts +8 -0
  95. package/src/rules/no-sensitive-data-in-cache/index.js +52 -0
  96. package/src/rules/no-toctou-vulnerability/index.d.ts +7 -0
  97. package/src/rules/no-toctou-vulnerability/index.js +208 -0
  98. package/src/rules/no-tracking-without-consent/index.d.ts +6 -0
  99. package/src/rules/no-tracking-without-consent/index.js +67 -0
  100. package/src/rules/no-unchecked-loop-condition/index.d.ts +12 -0
  101. package/src/rules/no-unchecked-loop-condition/index.js +646 -0
  102. package/src/rules/no-unencrypted-transmission/index.d.ts +11 -0
  103. package/src/rules/no-unencrypted-transmission/index.js +236 -0
  104. package/src/rules/no-unescaped-url-parameter/index.d.ts +9 -0
  105. package/src/rules/no-unescaped-url-parameter/index.js +355 -0
  106. package/src/rules/no-unlimited-resource-allocation/index.d.ts +12 -0
  107. package/src/rules/no-unlimited-resource-allocation/index.js +643 -0
  108. package/src/rules/no-unsafe-deserialization/index.d.ts +10 -0
  109. package/src/rules/no-unsafe-deserialization/index.js +491 -0
  110. package/src/rules/no-unsafe-dynamic-require/index.d.ts +5 -0
  111. package/src/rules/no-unsafe-dynamic-require/index.js +106 -0
  112. package/src/rules/no-unsafe-regex-construction/index.d.ts +9 -0
  113. package/src/rules/no-unsafe-regex-construction/index.js +291 -0
  114. package/src/rules/no-unvalidated-deeplinks/index.d.ts +6 -0
  115. package/src/rules/no-unvalidated-deeplinks/index.js +62 -0
  116. package/src/rules/no-unvalidated-user-input/index.d.ts +9 -0
  117. package/src/rules/no-unvalidated-user-input/index.js +420 -0
  118. package/src/rules/no-verbose-error-messages/index.d.ts +8 -0
  119. package/src/rules/no-verbose-error-messages/index.js +68 -0
  120. package/src/rules/no-weak-password-recovery/index.d.ts +12 -0
  121. package/src/rules/no-weak-password-recovery/index.js +424 -0
  122. package/src/rules/no-xpath-injection/index.d.ts +10 -0
  123. package/src/rules/no-xpath-injection/index.js +487 -0
  124. package/src/rules/no-xxe-injection/index.d.ts +7 -0
  125. package/src/rules/no-xxe-injection/index.js +266 -0
  126. package/src/rules/no-zip-slip/index.d.ts +9 -0
  127. package/src/rules/no-zip-slip/index.js +445 -0
  128. package/src/rules/require-backend-authorization/index.d.ts +6 -0
  129. package/src/rules/require-backend-authorization/index.js +60 -0
  130. package/src/rules/require-code-minification/index.d.ts +8 -0
  131. package/src/rules/require-code-minification/index.js +47 -0
  132. package/src/rules/require-csp-headers/index.d.ts +6 -0
  133. package/src/rules/require-csp-headers/index.js +64 -0
  134. package/src/rules/require-data-minimization/index.d.ts +8 -0
  135. package/src/rules/require-data-minimization/index.js +53 -0
  136. package/src/rules/require-dependency-integrity/index.d.ts +6 -0
  137. package/src/rules/require-dependency-integrity/index.js +64 -0
  138. package/src/rules/require-https-only/index.d.ts +8 -0
  139. package/src/rules/require-https-only/index.js +62 -0
  140. package/src/rules/require-mime-type-validation/index.d.ts +6 -0
  141. package/src/rules/require-mime-type-validation/index.js +66 -0
  142. package/src/rules/require-network-timeout/index.d.ts +8 -0
  143. package/src/rules/require-network-timeout/index.js +50 -0
  144. package/src/rules/require-package-lock/index.d.ts +8 -0
  145. package/src/rules/require-package-lock/index.js +63 -0
  146. package/src/rules/require-secure-credential-storage/index.d.ts +8 -0
  147. package/src/rules/require-secure-credential-storage/index.js +50 -0
  148. package/src/rules/require-secure-defaults/index.d.ts +8 -0
  149. package/src/rules/require-secure-defaults/index.js +47 -0
  150. package/src/rules/require-secure-deletion/index.d.ts +8 -0
  151. package/src/rules/require-secure-deletion/index.js +44 -0
  152. package/src/rules/require-storage-encryption/index.d.ts +8 -0
  153. package/src/rules/require-storage-encryption/index.js +50 -0
  154. package/src/rules/require-url-validation/index.d.ts +6 -0
  155. package/src/rules/require-url-validation/index.js +72 -0
  156. package/src/types/index.d.ts +106 -0
  157. package/src/types/index.js +16 -0
  158. package/src/index.ts +0 -605
  159. package/src/rules/__tests__/integration-demo.test.ts +0 -290
  160. package/src/rules/__tests__/integration-llm.test.ts +0 -89
  161. package/src/rules/database-injection/database-injection.test.ts +0 -456
  162. package/src/rules/database-injection/index.ts +0 -488
  163. package/src/rules/detect-child-process/detect-child-process.test.ts +0 -207
  164. package/src/rules/detect-child-process/index.ts +0 -634
  165. package/src/rules/detect-eval-with-expression/detect-eval-with-expression.test.ts +0 -416
  166. package/src/rules/detect-eval-with-expression/index.ts +0 -463
  167. package/src/rules/detect-mixed-content/detect-mixed-content.test.ts +0 -28
  168. package/src/rules/detect-mixed-content/index.ts +0 -52
  169. package/src/rules/detect-non-literal-fs-filename/detect-non-literal-fs-filename.test.ts +0 -269
  170. package/src/rules/detect-non-literal-fs-filename/index.ts +0 -551
  171. package/src/rules/detect-non-literal-regexp/detect-non-literal-regexp.test.ts +0 -189
  172. package/src/rules/detect-non-literal-regexp/index.ts +0 -490
  173. package/src/rules/detect-object-injection/detect-object-injection.test.ts +0 -440
  174. package/src/rules/detect-object-injection/index.ts +0 -674
  175. package/src/rules/detect-suspicious-dependencies/detect-suspicious-dependencies.test.ts +0 -32
  176. package/src/rules/detect-suspicious-dependencies/index.ts +0 -84
  177. package/src/rules/detect-weak-password-validation/detect-weak-password-validation.test.ts +0 -31
  178. package/src/rules/detect-weak-password-validation/index.ts +0 -68
  179. package/src/rules/no-allow-arbitrary-loads/index.ts +0 -54
  180. package/src/rules/no-allow-arbitrary-loads/no-allow-arbitrary-loads.test.ts +0 -28
  181. package/src/rules/no-arbitrary-file-access/index.ts +0 -238
  182. package/src/rules/no-arbitrary-file-access/no-arbitrary-file-access.test.ts +0 -119
  183. package/src/rules/no-buffer-overread/index.ts +0 -724
  184. package/src/rules/no-buffer-overread/no-buffer-overread.test.ts +0 -313
  185. package/src/rules/no-clickjacking/index.ts +0 -481
  186. package/src/rules/no-clickjacking/no-clickjacking.test.ts +0 -253
  187. package/src/rules/no-client-side-auth-logic/index.ts +0 -81
  188. package/src/rules/no-client-side-auth-logic/no-client-side-auth-logic.test.ts +0 -33
  189. package/src/rules/no-credentials-in-query-params/index.ts +0 -69
  190. package/src/rules/no-credentials-in-query-params/no-credentials-in-query-params.test.ts +0 -33
  191. package/src/rules/no-credentials-in-storage-api/index.ts +0 -64
  192. package/src/rules/no-credentials-in-storage-api/no-credentials-in-storage-api.test.ts +0 -31
  193. package/src/rules/no-data-in-temp-storage/index.ts +0 -75
  194. package/src/rules/no-data-in-temp-storage/no-data-in-temp-storage.test.ts +0 -33
  195. package/src/rules/no-debug-code-in-production/index.ts +0 -59
  196. package/src/rules/no-debug-code-in-production/no-debug-code-in-production.test.ts +0 -26
  197. package/src/rules/no-directive-injection/index.ts +0 -551
  198. package/src/rules/no-directive-injection/no-directive-injection.test.ts +0 -305
  199. package/src/rules/no-disabled-certificate-validation/index.ts +0 -72
  200. package/src/rules/no-disabled-certificate-validation/no-disabled-certificate-validation.test.ts +0 -33
  201. package/src/rules/no-document-cookie/index.ts +0 -113
  202. package/src/rules/no-document-cookie/no-document-cookie.test.ts +0 -382
  203. package/src/rules/no-dynamic-dependency-loading/index.ts +0 -60
  204. package/src/rules/no-dynamic-dependency-loading/no-dynamic-dependency-loading.test.ts +0 -27
  205. package/src/rules/no-electron-security-issues/index.ts +0 -504
  206. package/src/rules/no-electron-security-issues/no-electron-security-issues.test.ts +0 -324
  207. package/src/rules/no-exposed-debug-endpoints/index.ts +0 -73
  208. package/src/rules/no-exposed-debug-endpoints/no-exposed-debug-endpoints.test.ts +0 -40
  209. package/src/rules/no-exposed-sensitive-data/index.ts +0 -428
  210. package/src/rules/no-exposed-sensitive-data/no-exposed-sensitive-data.test.ts +0 -75
  211. package/src/rules/no-format-string-injection/index.ts +0 -801
  212. package/src/rules/no-format-string-injection/no-format-string-injection.test.ts +0 -437
  213. package/src/rules/no-graphql-injection/index.ts +0 -508
  214. package/src/rules/no-graphql-injection/no-graphql-injection.test.ts +0 -371
  215. package/src/rules/no-hardcoded-credentials/index.ts +0 -478
  216. package/src/rules/no-hardcoded-credentials/no-hardcoded-credentials.test.ts +0 -639
  217. package/src/rules/no-hardcoded-session-tokens/index.ts +0 -69
  218. package/src/rules/no-hardcoded-session-tokens/no-hardcoded-session-tokens.test.ts +0 -42
  219. package/src/rules/no-http-urls/index.ts +0 -131
  220. package/src/rules/no-http-urls/no-http-urls.test.ts +0 -60
  221. package/src/rules/no-improper-sanitization/index.ts +0 -502
  222. package/src/rules/no-improper-sanitization/no-improper-sanitization.test.ts +0 -156
  223. package/src/rules/no-improper-type-validation/index.ts +0 -572
  224. package/src/rules/no-improper-type-validation/no-improper-type-validation.test.ts +0 -372
  225. package/src/rules/no-insecure-comparison/index.ts +0 -232
  226. package/src/rules/no-insecure-comparison/no-insecure-comparison.test.ts +0 -218
  227. package/src/rules/no-insecure-cookie-settings/index.ts +0 -391
  228. package/src/rules/no-insecure-cookie-settings/no-insecure-cookie-settings.test.ts +0 -409
  229. package/src/rules/no-insecure-jwt/index.ts +0 -467
  230. package/src/rules/no-insecure-jwt/no-insecure-jwt.test.ts +0 -259
  231. package/src/rules/no-insecure-redirects/index.ts +0 -267
  232. package/src/rules/no-insecure-redirects/no-insecure-redirects.test.ts +0 -108
  233. package/src/rules/no-insecure-websocket/index.ts +0 -72
  234. package/src/rules/no-insecure-websocket/no-insecure-websocket.test.ts +0 -42
  235. package/src/rules/no-insufficient-postmessage-validation/index.ts +0 -497
  236. package/src/rules/no-insufficient-postmessage-validation/no-insufficient-postmessage-validation.test.ts +0 -360
  237. package/src/rules/no-insufficient-random/index.ts +0 -288
  238. package/src/rules/no-insufficient-random/no-insufficient-random.test.ts +0 -246
  239. package/src/rules/no-ldap-injection/index.ts +0 -547
  240. package/src/rules/no-ldap-injection/no-ldap-injection.test.ts +0 -317
  241. package/src/rules/no-missing-authentication/index.ts +0 -408
  242. package/src/rules/no-missing-authentication/no-missing-authentication.test.ts +0 -350
  243. package/src/rules/no-missing-cors-check/index.ts +0 -453
  244. package/src/rules/no-missing-cors-check/no-missing-cors-check.test.ts +0 -392
  245. package/src/rules/no-missing-csrf-protection/index.ts +0 -229
  246. package/src/rules/no-missing-csrf-protection/no-missing-csrf-protection.test.ts +0 -222
  247. package/src/rules/no-missing-security-headers/index.ts +0 -266
  248. package/src/rules/no-missing-security-headers/no-missing-security-headers.test.ts +0 -98
  249. package/src/rules/no-password-in-url/index.ts +0 -64
  250. package/src/rules/no-password-in-url/no-password-in-url.test.ts +0 -27
  251. package/src/rules/no-permissive-cors/index.ts +0 -78
  252. package/src/rules/no-permissive-cors/no-permissive-cors.test.ts +0 -28
  253. package/src/rules/no-pii-in-logs/index.ts +0 -83
  254. package/src/rules/no-pii-in-logs/no-pii-in-logs.test.ts +0 -26
  255. package/src/rules/no-postmessage-origin-wildcard/index.ts +0 -67
  256. package/src/rules/no-postmessage-origin-wildcard/no-postmessage-origin-wildcard.test.ts +0 -27
  257. package/src/rules/no-privilege-escalation/index.ts +0 -403
  258. package/src/rules/no-privilege-escalation/no-privilege-escalation.test.ts +0 -306
  259. package/src/rules/no-redos-vulnerable-regex/index.ts +0 -379
  260. package/src/rules/no-redos-vulnerable-regex/no-redos-vulnerable-regex.test.ts +0 -83
  261. package/src/rules/no-sensitive-data-exposure/index.ts +0 -294
  262. package/src/rules/no-sensitive-data-exposure/no-sensitive-data-exposure.test.ts +0 -262
  263. package/src/rules/no-sensitive-data-in-analytics/index.ts +0 -73
  264. package/src/rules/no-sensitive-data-in-analytics/no-sensitive-data-in-analytics.test.ts +0 -42
  265. package/src/rules/no-sensitive-data-in-cache/index.ts +0 -59
  266. package/src/rules/no-sensitive-data-in-cache/no-sensitive-data-in-cache.test.ts +0 -32
  267. package/src/rules/no-sql-injection/index.ts +0 -424
  268. package/src/rules/no-sql-injection/no-sql-injection.test.ts +0 -303
  269. package/src/rules/no-timing-attack/index.ts +0 -552
  270. package/src/rules/no-timing-attack/no-timing-attack.test.ts +0 -348
  271. package/src/rules/no-toctou-vulnerability/index.ts +0 -250
  272. package/src/rules/no-toctou-vulnerability/no-toctou-vulnerability.test.ts +0 -60
  273. package/src/rules/no-tracking-without-consent/index.ts +0 -78
  274. package/src/rules/no-tracking-without-consent/no-tracking-without-consent.test.ts +0 -34
  275. package/src/rules/no-unchecked-loop-condition/index.ts +0 -781
  276. package/src/rules/no-unchecked-loop-condition/no-unchecked-loop-condition.test.ts +0 -459
  277. package/src/rules/no-unencrypted-local-storage/index.ts +0 -73
  278. package/src/rules/no-unencrypted-local-storage/no-unencrypted-local-storage.test.ts +0 -41
  279. package/src/rules/no-unencrypted-transmission/index.ts +0 -296
  280. package/src/rules/no-unencrypted-transmission/no-unencrypted-transmission.test.ts +0 -287
  281. package/src/rules/no-unescaped-url-parameter/index.ts +0 -424
  282. package/src/rules/no-unescaped-url-parameter/no-unescaped-url-parameter.test.ts +0 -263
  283. package/src/rules/no-unlimited-resource-allocation/index.ts +0 -767
  284. package/src/rules/no-unlimited-resource-allocation/no-unlimited-resource-allocation.test.ts +0 -544
  285. package/src/rules/no-unsafe-deserialization/index.ts +0 -593
  286. package/src/rules/no-unsafe-deserialization/no-unsafe-deserialization.test.ts +0 -310
  287. package/src/rules/no-unsafe-dynamic-require/index.ts +0 -125
  288. package/src/rules/no-unsafe-dynamic-require/no-unsafe-dynamic-require.test.ts +0 -151
  289. package/src/rules/no-unsafe-regex-construction/index.ts +0 -370
  290. package/src/rules/no-unsafe-regex-construction/no-unsafe-regex-construction.test.ts +0 -181
  291. package/src/rules/no-unsanitized-html/index.ts +0 -400
  292. package/src/rules/no-unsanitized-html/no-unsanitized-html.test.ts +0 -488
  293. package/src/rules/no-unvalidated-deeplinks/index.ts +0 -73
  294. package/src/rules/no-unvalidated-deeplinks/no-unvalidated-deeplinks.test.ts +0 -29
  295. package/src/rules/no-unvalidated-user-input/index.ts +0 -498
  296. package/src/rules/no-unvalidated-user-input/no-unvalidated-user-input.test.ts +0 -463
  297. package/src/rules/no-verbose-error-messages/index.ts +0 -83
  298. package/src/rules/no-verbose-error-messages/no-verbose-error-messages.test.ts +0 -34
  299. package/src/rules/no-weak-crypto/index.ts +0 -447
  300. package/src/rules/no-weak-crypto/no-weak-crypto.test.ts +0 -297
  301. package/src/rules/no-weak-password-recovery/index.ts +0 -509
  302. package/src/rules/no-weak-password-recovery/no-weak-password-recovery.test.ts +0 -184
  303. package/src/rules/no-xpath-injection/index.ts +0 -596
  304. package/src/rules/no-xpath-injection/no-xpath-injection.test.ts +0 -405
  305. package/src/rules/no-xxe-injection/index.ts +0 -342
  306. package/src/rules/no-xxe-injection/no-xxe-injection.test.ts +0 -122
  307. package/src/rules/no-zip-slip/index.ts +0 -526
  308. package/src/rules/no-zip-slip/no-zip-slip.test.ts +0 -305
  309. package/src/rules/require-backend-authorization/index.ts +0 -71
  310. package/src/rules/require-backend-authorization/require-backend-authorization.test.ts +0 -31
  311. package/src/rules/require-code-minification/index.ts +0 -54
  312. package/src/rules/require-code-minification/require-code-minification.test.ts +0 -30
  313. package/src/rules/require-csp-headers/index.ts +0 -74
  314. package/src/rules/require-csp-headers/require-csp-headers.test.ts +0 -34
  315. package/src/rules/require-data-minimization/index.ts +0 -65
  316. package/src/rules/require-data-minimization/require-data-minimization.test.ts +0 -31
  317. package/src/rules/require-dependency-integrity/index.ts +0 -78
  318. package/src/rules/require-dependency-integrity/require-dependency-integrity.test.ts +0 -44
  319. package/src/rules/require-https-only/index.ts +0 -75
  320. package/src/rules/require-https-only/require-https-only.test.ts +0 -26
  321. package/src/rules/require-mime-type-validation/index.ts +0 -77
  322. package/src/rules/require-mime-type-validation/require-mime-type-validation.test.ts +0 -32
  323. package/src/rules/require-network-timeout/index.ts +0 -58
  324. package/src/rules/require-network-timeout/require-network-timeout.test.ts +0 -26
  325. package/src/rules/require-package-lock/index.ts +0 -75
  326. package/src/rules/require-package-lock/require-package-lock.test.ts +0 -27
  327. package/src/rules/require-secure-credential-storage/index.ts +0 -60
  328. package/src/rules/require-secure-credential-storage/require-secure-credential-storage.test.ts +0 -26
  329. package/src/rules/require-secure-defaults/index.ts +0 -54
  330. package/src/rules/require-secure-defaults/require-secure-defaults.test.ts +0 -26
  331. package/src/rules/require-secure-deletion/index.ts +0 -52
  332. package/src/rules/require-secure-deletion/require-secure-deletion.test.ts +0 -29
  333. package/src/rules/require-storage-encryption/index.ts +0 -60
  334. package/src/rules/require-storage-encryption/require-storage-encryption.test.ts +0 -26
  335. package/src/rules/require-url-validation/index.ts +0 -85
  336. package/src/rules/require-url-validation/require-url-validation.test.ts +0 -32
  337. package/src/types/index.ts +0 -235
@@ -0,0 +1,376 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.noHardcodedCredentials = void 0;
4
+ const eslint_devkit_1 = require("@interlace/eslint-devkit");
5
+ const eslint_devkit_2 = require("@interlace/eslint-devkit");
6
+ /**
7
+ * Common credential patterns
8
+ */
9
+ const CREDENTIAL_PATTERNS = {
10
+ // API Keys (typically 32+ character alphanumeric strings)
11
+ apiKey: /^(?:[A-Za-z0-9_-]{32,}|sk_[A-Za-z0-9_-]{32,}|pk_[A-Za-z0-9_-]{32,}|AKIA[0-9A-Z]{16})$/,
12
+ // JWT Tokens (three base64 parts separated by dots)
13
+ jwtToken: /^eyJ[A-Za-z0-9_-]+\.eyJ[A-Za-z0-9_-]+\.[A-Za-z0-9_-]+$/,
14
+ // OAuth tokens
15
+ oauthToken: /^(?:ghp_|gho_|ghu_|ghs_|ghr_)[A-Za-z0-9]{36,}$/,
16
+ // AWS Access Keys
17
+ awsAccessKey: /^AKIA[0-9A-Z]{16}$/,
18
+ // Database connection strings with credentials
19
+ databaseString: /^(?:mysql|postgres|mongodb|redis):\/\/[^:]+:[^@]+@/,
20
+ // Generic password patterns (common weak passwords) - no length requirement
21
+ commonPassword: /^(?:password|admin|123456|qwerty|letmein|welcome|monkey|1234567890|12345678|password123|root|test|guest)$/i,
22
+ // Secret keys (base64-like or hex strings)
23
+ secretKey: /^(?:[A-Za-z0-9+/]{32,}={0,2}|[A-Fa-f0-9]{32,})$/,
24
+ };
25
+ // Note: CREDENTIAL_VARIABLE_NAMES is reserved for future use when we want to
26
+ // check variable names in addition to values
27
+ // @coverage-note: Not currently used, reserved for future enhancement
28
+ /**
29
+ * Check if a string literal looks like a hardcoded credential
30
+ */
31
+ function looksLikeCredential(value, options, ignorePatterns) {
32
+ // Check ignore patterns first
33
+ if (ignorePatterns.some(pattern => pattern.test(value))) {
34
+ return { isCredential: false, type: '' };
35
+ }
36
+ // Check custom patterns first (highest priority)
37
+ for (const customPattern of options.customPatterns) {
38
+ try {
39
+ const regex = new RegExp(customPattern.pattern);
40
+ if (regex.test(value)) {
41
+ return { isCredential: true, type: customPattern.type };
42
+ }
43
+ // eslint-disable-next-line @typescript-eslint/no-unused-vars
44
+ }
45
+ catch (error) {
46
+ // Invalid regex pattern, skip it
47
+ continue;
48
+ }
49
+ }
50
+ // Check passwords (common weak passwords) - no length requirement, check first
51
+ if (options.detectPasswords) {
52
+ if (CREDENTIAL_PATTERNS.commonPassword.test(value)) {
53
+ return { isCredential: true, type: 'Common password' };
54
+ }
55
+ }
56
+ // Check database connection strings - no length requirement
57
+ if (options.detectDatabaseStrings) {
58
+ if (CREDENTIAL_PATTERNS.databaseString.test(value)) {
59
+ return { isCredential: true, type: 'Database connection string' };
60
+ }
61
+ }
62
+ // Check minimum length for other patterns
63
+ if (value.length < options.minLength) {
64
+ return { isCredential: false, type: '' };
65
+ }
66
+ // Check tokens first (more specific patterns)
67
+ if (options.detectTokens) {
68
+ if (CREDENTIAL_PATTERNS.jwtToken.test(value)) {
69
+ return { isCredential: true, type: 'JWT token' };
70
+ }
71
+ if (CREDENTIAL_PATTERNS.oauthToken.test(value)) {
72
+ return { isCredential: true, type: 'OAuth token' };
73
+ }
74
+ }
75
+ // Check secret keys first (before generic API key patterns)
76
+ if (value.length >= 32 && CREDENTIAL_PATTERNS.secretKey.test(value)) {
77
+ return { isCredential: true, type: 'Secret key' };
78
+ }
79
+ // Check API keys
80
+ if (options.detectApiKeys) {
81
+ if (CREDENTIAL_PATTERNS.awsAccessKey.test(value)) {
82
+ return { isCredential: true, type: 'AWS access key' };
83
+ }
84
+ // Generic API key pattern (long alphanumeric strings)
85
+ if (/^[A-Za-z0-9_-]{32,}$/.test(value)) {
86
+ return { isCredential: true, type: 'API key' };
87
+ }
88
+ }
89
+ return { isCredential: false, type: '' };
90
+ }
91
+ // Note: isCredentialVariableName is reserved for future use when we want to
92
+ // check variable names in addition to values
93
+ // @coverage-note: Not currently used, reserved for future enhancement
94
+ exports.noHardcodedCredentials = (0, eslint_devkit_2.createRule)({
95
+ name: 'no-hardcoded-credentials',
96
+ meta: {
97
+ type: 'problem',
98
+ docs: {
99
+ description: 'Detects hardcoded passwords, API keys, tokens, and other sensitive credentials',
100
+ },
101
+ fixable: 'code',
102
+ hasSuggestions: true,
103
+ messages: {
104
+ useEnvironmentVariable: (0, eslint_devkit_1.formatLLMMessage)({
105
+ icon: eslint_devkit_1.MessageIcons.SECURITY,
106
+ issueName: 'Hard-coded Credential',
107
+ cwe: 'CWE-798',
108
+ description: 'Hard-coded {{credentialType}} detected',
109
+ severity: 'CRITICAL',
110
+ fix: 'Use environment variable: process.env.{{envVarName}} or secret management service',
111
+ documentationLink: 'https://cwe.mitre.org/data/definitions/798.html',
112
+ }),
113
+ useSecretManager: (0, eslint_devkit_1.formatLLMMessage)({
114
+ icon: eslint_devkit_1.MessageIcons.SECURITY,
115
+ issueName: 'Use Secret Manager',
116
+ cwe: 'CWE-798',
117
+ description: 'Use secure secret management service',
118
+ severity: 'HIGH',
119
+ fix: 'Use AWS Secrets Manager, HashiCorp Vault, Azure Key Vault, or similar',
120
+ documentationLink: 'https://cwe.mitre.org/data/definitions/798.html',
121
+ }),
122
+ strategyEnv: (0, eslint_devkit_1.formatLLMMessage)({
123
+ icon: eslint_devkit_1.MessageIcons.DEVELOPMENT,
124
+ issueName: 'Environment Variable Strategy',
125
+ description: 'Move credentials to environment variables',
126
+ severity: 'MEDIUM',
127
+ fix: 'Store credentials in environment variables (process.env)',
128
+ documentationLink: 'https://12factor.net/config',
129
+ }),
130
+ strategyConfig: (0, eslint_devkit_1.formatLLMMessage)({
131
+ icon: eslint_devkit_1.MessageIcons.DEVELOPMENT,
132
+ issueName: 'Configuration File Strategy',
133
+ description: 'Store credentials in encrypted configuration files',
134
+ severity: 'MEDIUM',
135
+ fix: 'Use encrypted configuration files with proper access controls',
136
+ documentationLink: 'https://owasp.org/www-project-cheat-sheets/cheatsheets/Configuration_Management_Cheat_Sheet.html',
137
+ }),
138
+ strategyVault: (0, eslint_devkit_1.formatLLMMessage)({
139
+ icon: eslint_devkit_1.MessageIcons.SECURITY,
140
+ issueName: 'Secret Vault Strategy',
141
+ cwe: 'CWE-798',
142
+ description: 'Use dedicated secret management system',
143
+ severity: 'HIGH',
144
+ fix: 'Implement HashiCorp Vault, AWS Secrets Manager, or similar secret vault',
145
+ documentationLink: 'https://cwe.mitre.org/data/definitions/798.html',
146
+ }),
147
+ strategyAuto: (0, eslint_devkit_1.formatLLMMessage)({
148
+ icon: eslint_devkit_1.MessageIcons.DEVELOPMENT,
149
+ issueName: 'Context-Aware Strategy',
150
+ description: 'Apply context-aware credential management',
151
+ severity: 'MEDIUM',
152
+ fix: 'Choose strategy based on deployment environment and security requirements',
153
+ documentationLink: 'https://owasp.org/www-project-cheat-sheets/cheatsheets/Secrets_Management_Cheat_Sheet.html',
154
+ }),
155
+ },
156
+ schema: [
157
+ {
158
+ type: 'object',
159
+ properties: {
160
+ ignorePatterns: {
161
+ type: 'array',
162
+ items: { type: 'string' },
163
+ default: [],
164
+ description: 'Regex patterns to ignore',
165
+ },
166
+ allowInTests: {
167
+ type: 'boolean',
168
+ default: false,
169
+ description: 'Allow credentials in test files',
170
+ },
171
+ minLength: {
172
+ type: 'number',
173
+ default: 8,
174
+ description: 'Minimum length for credential detection',
175
+ },
176
+ detectApiKeys: {
177
+ type: 'boolean',
178
+ default: true,
179
+ description: 'Detect API keys',
180
+ },
181
+ detectPasswords: {
182
+ type: 'boolean',
183
+ default: true,
184
+ description: 'Detect passwords',
185
+ },
186
+ detectTokens: {
187
+ type: 'boolean',
188
+ default: true,
189
+ description: 'Detect tokens',
190
+ },
191
+ detectDatabaseStrings: {
192
+ type: 'boolean',
193
+ default: true,
194
+ description: 'Detect database connection strings',
195
+ },
196
+ customPatterns: {
197
+ type: 'array',
198
+ items: {
199
+ type: 'object',
200
+ properties: {
201
+ type: {
202
+ type: 'string',
203
+ description: 'The type of credential (e.g., "API key", "token")',
204
+ },
205
+ pattern: {
206
+ type: 'string',
207
+ description: 'Regex pattern to match',
208
+ },
209
+ },
210
+ required: ['type', 'pattern'],
211
+ additionalProperties: false,
212
+ },
213
+ default: [],
214
+ description: 'Custom credential patterns to detect',
215
+ },
216
+ strategy: {
217
+ type: 'string',
218
+ enum: ['env', 'config', 'vault', 'auto'],
219
+ default: 'auto',
220
+ description: 'Strategy for fixing hardcoded credentials (auto = smart detection)'
221
+ },
222
+ },
223
+ additionalProperties: false,
224
+ },
225
+ ],
226
+ },
227
+ defaultOptions: [
228
+ {
229
+ ignorePatterns: [],
230
+ allowInTests: false,
231
+ minLength: 8,
232
+ detectApiKeys: true,
233
+ detectPasswords: true,
234
+ detectTokens: true,
235
+ detectDatabaseStrings: true,
236
+ customPatterns: [],
237
+ strategy: 'auto',
238
+ },
239
+ ],
240
+ create(context) {
241
+ const options = context.options[0] || {};
242
+ const { ignorePatterns = [], allowInTests = false, minLength = 8, detectApiKeys = true, detectPasswords = true, detectTokens = true, detectDatabaseStrings = true, customPatterns = [], } = options || {};
243
+ const filename = context.filename || context.getFilename();
244
+ const isTestFile = allowInTests && (filename.includes('.test.') ||
245
+ filename.includes('.spec.') ||
246
+ filename.includes('__tests__') ||
247
+ filename.includes('/test/'));
248
+ // Compile ignore patterns to regex
249
+ const compiledIgnorePatterns = ignorePatterns.map((pattern) => new RegExp(pattern));
250
+ const detectionOptions = {
251
+ minLength,
252
+ detectApiKeys,
253
+ detectPasswords,
254
+ detectTokens,
255
+ detectDatabaseStrings,
256
+ customPatterns,
257
+ };
258
+ /**
259
+ * Check a string literal node
260
+ */
261
+ function checkStringLiteral(node, parent) {
262
+ if (typeof node.value !== 'string') {
263
+ return;
264
+ }
265
+ const value = node.value;
266
+ // Skip if in test files and allowed
267
+ if (isTestFile) {
268
+ return;
269
+ }
270
+ // Check if it looks like a credential
271
+ const { isCredential, type } = looksLikeCredential(value, detectionOptions, compiledIgnorePatterns);
272
+ if (!isCredential) {
273
+ return;
274
+ }
275
+ // Generate environment variable name suggestion
276
+ let envVarName = 'API_KEY';
277
+ if (parent && parent.type === 'Property' && parent.key.type === 'Identifier') {
278
+ const keyName = parent.key.name;
279
+ envVarName = keyName
280
+ .replace(/([a-z])([A-Z])/g, '$1_$2')
281
+ .toUpperCase()
282
+ .replace(/[^A-Z0-9_]/g, '_');
283
+ }
284
+ else if (parent && parent.type === 'VariableDeclarator' && parent.id.type === 'Identifier') {
285
+ const varName = parent.id.name;
286
+ envVarName = varName
287
+ .replace(/([a-z])([A-Z])/g, '$1_$2')
288
+ .toUpperCase()
289
+ .replace(/[^A-Z0-9_]/g, '_');
290
+ }
291
+ context.report({
292
+ node,
293
+ messageId: 'useEnvironmentVariable',
294
+ data: {
295
+ credentialType: type,
296
+ envVarName,
297
+ },
298
+ suggest: [
299
+ {
300
+ messageId: 'useEnvironmentVariable',
301
+ data: { envVarName, credentialType: type },
302
+ fix: (fixer) => {
303
+ return fixer.replaceText(node, `process.env.${envVarName} || '${value}'`);
304
+ },
305
+ },
306
+ {
307
+ messageId: 'useSecretManager',
308
+ data: { credentialType: type },
309
+ fix: (fixer) => {
310
+ return fixer.replaceText(node, `await getSecret('${envVarName.toLowerCase()}')`);
311
+ },
312
+ },
313
+ ],
314
+ });
315
+ }
316
+ return {
317
+ Literal(node) {
318
+ checkStringLiteral(node, node.parent);
319
+ },
320
+ TemplateLiteral(node) {
321
+ // Check template literal parts for credentials
322
+ // Only check if there are no interpolations (static template literal)
323
+ if (node.expressions.length === 0) {
324
+ const fullText = node.quasis.map((q) => q.value.raw).join('');
325
+ const { isCredential, type } = looksLikeCredential(fullText, detectionOptions, compiledIgnorePatterns);
326
+ if (isCredential && !isTestFile) {
327
+ context.report({
328
+ node,
329
+ messageId: 'useEnvironmentVariable',
330
+ data: {
331
+ credentialType: type,
332
+ envVarName: 'API_KEY',
333
+ },
334
+ suggest: [
335
+ {
336
+ messageId: 'useEnvironmentVariable',
337
+ data: { envVarName: 'API_KEY', credentialType: type },
338
+ fix: (fixer) => {
339
+ return fixer.replaceText(node, `process.env.API_KEY || \`${fullText}\``);
340
+ },
341
+ },
342
+ {
343
+ messageId: 'useSecretManager',
344
+ data: { credentialType: type },
345
+ fix: (fixer) => {
346
+ return fixer.replaceText(node, `await getSecret('api_key')`);
347
+ },
348
+ },
349
+ ],
350
+ });
351
+ }
352
+ }
353
+ else {
354
+ // For template literals with interpolations, check each quasi part
355
+ for (const quasi of node.quasis) {
356
+ if (quasi.value.raw) {
357
+ const { isCredential, type } = looksLikeCredential(quasi.value.raw, detectionOptions, compiledIgnorePatterns);
358
+ if (isCredential && !isTestFile) {
359
+ // Note: Template literals with interpolations are complex to fix automatically
360
+ // So we report the error without suggestions
361
+ context.report({
362
+ node: quasi,
363
+ messageId: 'useEnvironmentVariable',
364
+ data: {
365
+ credentialType: type,
366
+ envVarName: 'API_KEY',
367
+ },
368
+ });
369
+ }
370
+ }
371
+ }
372
+ }
373
+ },
374
+ };
375
+ },
376
+ });
@@ -0,0 +1,6 @@
1
+ /**
2
+ * @fileoverview Detect hardcoded session/JWT tokens
3
+ */
4
+ export interface Options {
5
+ }
6
+ export declare const noHardcodedSessionTokens: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
@@ -0,0 +1,59 @@
1
+ "use strict";
2
+ /**
3
+ * @fileoverview Detect hardcoded session/JWT tokens
4
+ */
5
+ Object.defineProperty(exports, "__esModule", { value: true });
6
+ exports.noHardcodedSessionTokens = void 0;
7
+ const eslint_devkit_1 = require("@interlace/eslint-devkit");
8
+ exports.noHardcodedSessionTokens = (0, eslint_devkit_1.createRule)({
9
+ name: 'no-hardcoded-session-tokens',
10
+ meta: {
11
+ type: 'problem',
12
+ docs: {
13
+ description: 'Detect hardcoded session/JWT tokens',
14
+ },
15
+ messages: {
16
+ violationDetected: (0, eslint_devkit_1.formatLLMMessage)({
17
+ icon: eslint_devkit_1.MessageIcons.SECURITY,
18
+ issueName: 'Hardcoded Token',
19
+ cwe: 'CWE-798',
20
+ description: 'Hardcoded session or JWT token detected - credentials at risk',
21
+ severity: 'CRITICAL',
22
+ fix: 'Use environment variables or secure credential management',
23
+ documentationLink: 'https://cwe.mitre.org/data/definitions/798.html',
24
+ })
25
+ },
26
+ schema: [],
27
+ },
28
+ defaultOptions: [],
29
+ create(context) {
30
+ function report(node) {
31
+ context.report({ node, messageId: 'violationDetected' });
32
+ }
33
+ return {
34
+ Literal(node) {
35
+ if (typeof node.value !== 'string')
36
+ return;
37
+ // Detect JWT tokens (start with eyJ and contain 2 dots)
38
+ if (node.value.startsWith('eyJ') && node.value.length > 50 &&
39
+ (node.value.match(/\./g) || []).length >= 2) {
40
+ report(node);
41
+ }
42
+ // Detect Bearer tokens
43
+ if (node.value.startsWith('Bearer ') && node.value.length > 20) {
44
+ report(node);
45
+ }
46
+ // Detect session_id patterns
47
+ const parent = node.parent;
48
+ if (parent?.type === 'VariableDeclarator' &&
49
+ parent.id.type === 'Identifier') {
50
+ const varName = parent.id.name.toLowerCase();
51
+ if ((varName.includes('session') || varName.includes('token')) &&
52
+ node.value.length >= 16 && /^[a-zA-Z0-9]+$/.test(node.value)) {
53
+ report(node);
54
+ }
55
+ }
56
+ },
57
+ };
58
+ },
59
+ });
@@ -0,0 +1,12 @@
1
+ /**
2
+ * @fileoverview Disallow hardcoded HTTP URLs
3
+ * @see https://owasp.org/www-project-mobile-top-10/
4
+ * @see https://cwe.mitre.org/data/definitions/319.html
5
+ */
6
+ export interface Options {
7
+ /** List of hostnames allowed to use HTTP (e.g., localhost, 127.0.0.1) */
8
+ allowedHosts?: string[];
9
+ /** List of ports allowed for HTTP (e.g., 3000, 8080 for development) */
10
+ allowedPorts?: number[];
11
+ }
12
+ export declare const noHttpUrls: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
@@ -0,0 +1,114 @@
1
+ "use strict";
2
+ /**
3
+ * @fileoverview Disallow hardcoded HTTP URLs
4
+ * @see https://owasp.org/www-project-mobile-top-10/
5
+ * @see https://cwe.mitre.org/data/definitions/319.html
6
+ */
7
+ Object.defineProperty(exports, "__esModule", { value: true });
8
+ exports.noHttpUrls = void 0;
9
+ const eslint_devkit_1 = require("@interlace/eslint-devkit");
10
+ exports.noHttpUrls = (0, eslint_devkit_1.createRule)({
11
+ name: 'no-http-urls',
12
+ meta: {
13
+ type: 'problem',
14
+ docs: {
15
+ description: 'Disallow hardcoded HTTP URLs (require HTTPS)',
16
+ },
17
+ messages: {
18
+ insecureHttp: (0, eslint_devkit_1.formatLLMMessage)({
19
+ icon: eslint_devkit_1.MessageIcons.SECURITY,
20
+ issueName: 'Insecure HTTP URL',
21
+ cwe: 'CWE-319',
22
+ owasp: 'A02:2021',
23
+ cvss: 7.5,
24
+ description: 'Hardcoded HTTP URL detected: "{{url}}"',
25
+ severity: 'HIGH',
26
+ compliance: ['SOC2', 'PCI-DSS', 'HIPAA'],
27
+ fix: 'Use HTTPS instead: const url = "https://..."',
28
+ documentationLink: 'https://cwe.mitre.org/data/definitions/319.html',
29
+ }),
30
+ insecureHttpWithException: (0, eslint_devkit_1.formatLLMMessage)({
31
+ icon: eslint_devkit_1.MessageIcons.WARNING,
32
+ issueName: 'Insecure HTTP URL',
33
+ cwe: 'CWE-319',
34
+ owasp: 'A02:2021',
35
+ cvss: 5.3,
36
+ description: 'HTTP URL detected: "{{url}}"',
37
+ severity: 'MEDIUM',
38
+ fix: 'Use HTTPS or add to allowedHosts config',
39
+ documentationLink: 'https://cwe.mitre.org/data/definitions/319.html',
40
+ }),
41
+ },
42
+ schema: [
43
+ {
44
+ type: 'object',
45
+ properties: {
46
+ allowedHosts: {
47
+ type: 'array',
48
+ items: { type: 'string' },
49
+ description: 'List of hostnames allowed to use HTTP (e.g., localhost, 127.0.0.1)',
50
+ },
51
+ allowedPorts: {
52
+ type: 'array',
53
+ items: { type: 'number' },
54
+ description: 'List of ports allowed for HTTP (e.g., 3000, 8080 for development)',
55
+ },
56
+ },
57
+ additionalProperties: false,
58
+ },
59
+ ],
60
+ },
61
+ defaultOptions: [
62
+ {
63
+ allowedHosts: ['localhost', '127.0.0.1'],
64
+ allowedPorts: [],
65
+ },
66
+ ],
67
+ create(context) {
68
+ const [options = {}] = context.options;
69
+ const allowedHosts = options.allowedHosts ?? ['localhost', '127.0.0.1'];
70
+ const allowedPorts = options.allowedPorts ?? [];
71
+ function isAllowedException(url) {
72
+ try {
73
+ const parsedUrl = new URL(url);
74
+ // Check if host is in allowed list
75
+ if (allowedHosts.includes(parsedUrl.hostname)) {
76
+ return true;
77
+ }
78
+ // Check if port is in allowed list
79
+ if (parsedUrl.port && allowedPorts.includes(parseInt(parsedUrl.port, 10))) {
80
+ return true;
81
+ }
82
+ return false;
83
+ }
84
+ catch {
85
+ // If URL parsing fails, treat as pattern match
86
+ return allowedHosts.some(host => url.includes(host));
87
+ }
88
+ }
89
+ function checkStringValue(node, value) {
90
+ const httpPattern = /^http:\/\//i;
91
+ if (httpPattern.test(value) && !isAllowedException(value)) {
92
+ context.report({
93
+ node,
94
+ messageId: allowedHosts.length > 0 || allowedPorts.length > 0
95
+ ? 'insecureHttpWithException'
96
+ : 'insecureHttp',
97
+ data: { url: value },
98
+ });
99
+ }
100
+ }
101
+ return {
102
+ Literal(node) {
103
+ if (typeof node.value === 'string') {
104
+ checkStringValue(node, node.value);
105
+ }
106
+ },
107
+ TemplateElement(node) {
108
+ if (node.value.cooked) {
109
+ checkStringValue(node, node.value.cooked);
110
+ }
111
+ },
112
+ };
113
+ },
114
+ });
@@ -0,0 +1,12 @@
1
+ import { type SecurityRuleOptions } from '@interlace/eslint-devkit';
2
+ export interface Options extends SecurityRuleOptions {
3
+ /** Safe sanitization functions */
4
+ safeSanitizers?: string[];
5
+ /** Characters that should be escaped */
6
+ dangerousChars?: string[];
7
+ /** Contexts that require different encoding */
8
+ contexts?: string[];
9
+ /** Trusted sanitization libraries */
10
+ trustedLibraries?: string[];
11
+ }
12
+ export declare const noImproperSanitization: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;