eslint-plugin-secure-coding 2.3.3 → 2.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (337) hide show
  1. package/CHANGELOG.md +51 -1
  2. package/README.md +2 -2
  3. package/package.json +1 -1
  4. package/src/index.d.ts +32 -0
  5. package/src/index.js +416 -0
  6. package/src/rules/detect-child-process/index.d.ts +11 -0
  7. package/src/rules/detect-child-process/index.js +529 -0
  8. package/src/rules/detect-eval-with-expression/index.d.ts +9 -0
  9. package/src/rules/detect-eval-with-expression/index.js +392 -0
  10. package/src/rules/detect-mixed-content/index.d.ts +8 -0
  11. package/src/rules/detect-mixed-content/index.js +44 -0
  12. package/src/rules/detect-non-literal-fs-filename/index.d.ts +7 -0
  13. package/src/rules/detect-non-literal-fs-filename/index.js +454 -0
  14. package/src/rules/detect-non-literal-regexp/index.d.ts +9 -0
  15. package/src/rules/detect-non-literal-regexp/index.js +403 -0
  16. package/src/rules/detect-object-injection/index.d.ts +11 -0
  17. package/src/rules/detect-object-injection/index.js +560 -0
  18. package/src/rules/detect-suspicious-dependencies/index.d.ts +8 -0
  19. package/src/rules/detect-suspicious-dependencies/index.js +71 -0
  20. package/src/rules/detect-weak-password-validation/index.d.ts +6 -0
  21. package/src/rules/detect-weak-password-validation/index.js +58 -0
  22. package/src/rules/no-allow-arbitrary-loads/index.d.ts +8 -0
  23. package/src/rules/no-allow-arbitrary-loads/index.js +47 -0
  24. package/src/rules/no-arbitrary-file-access/index.d.ts +13 -0
  25. package/src/rules/no-arbitrary-file-access/index.js +195 -0
  26. package/src/rules/no-buffer-overread/index.d.ts +29 -0
  27. package/src/rules/no-buffer-overread/index.js +606 -0
  28. package/src/rules/no-clickjacking/index.d.ts +10 -0
  29. package/src/rules/no-clickjacking/index.js +396 -0
  30. package/src/rules/no-client-side-auth-logic/index.d.ts +6 -0
  31. package/src/rules/no-client-side-auth-logic/index.js +69 -0
  32. package/src/rules/no-credentials-in-query-params/index.d.ts +8 -0
  33. package/src/rules/no-credentials-in-query-params/index.js +57 -0
  34. package/src/rules/no-data-in-temp-storage/index.d.ts +6 -0
  35. package/src/rules/no-data-in-temp-storage/index.js +64 -0
  36. package/src/rules/no-debug-code-in-production/index.d.ts +8 -0
  37. package/src/rules/no-debug-code-in-production/index.js +51 -0
  38. package/src/rules/no-directive-injection/index.d.ts +12 -0
  39. package/src/rules/no-directive-injection/index.js +457 -0
  40. package/src/rules/no-disabled-certificate-validation/index.d.ts +6 -0
  41. package/src/rules/no-disabled-certificate-validation/index.js +61 -0
  42. package/src/rules/no-dynamic-dependency-loading/index.d.ts +8 -0
  43. package/src/rules/no-dynamic-dependency-loading/index.js +51 -0
  44. package/src/rules/no-electron-security-issues/index.d.ts +10 -0
  45. package/src/rules/no-electron-security-issues/index.js +423 -0
  46. package/src/rules/no-exposed-debug-endpoints/index.d.ts +6 -0
  47. package/src/rules/no-exposed-debug-endpoints/index.js +62 -0
  48. package/src/rules/no-exposed-sensitive-data/index.d.ts +11 -0
  49. package/src/rules/no-exposed-sensitive-data/index.js +340 -0
  50. package/src/rules/no-format-string-injection/index.d.ts +17 -0
  51. package/src/rules/no-format-string-injection/index.js +660 -0
  52. package/src/rules/no-graphql-injection/index.d.ts +12 -0
  53. package/src/rules/no-graphql-injection/index.js +411 -0
  54. package/src/rules/no-hardcoded-credentials/index.d.ts +26 -0
  55. package/src/rules/no-hardcoded-credentials/index.js +376 -0
  56. package/src/rules/no-hardcoded-session-tokens/index.d.ts +6 -0
  57. package/src/rules/no-hardcoded-session-tokens/index.js +59 -0
  58. package/src/rules/no-http-urls/index.d.ts +12 -0
  59. package/src/rules/no-http-urls/index.js +114 -0
  60. package/src/rules/no-improper-sanitization/index.d.ts +12 -0
  61. package/src/rules/no-improper-sanitization/index.js +411 -0
  62. package/src/rules/no-improper-type-validation/index.d.ts +10 -0
  63. package/src/rules/no-improper-type-validation/index.js +475 -0
  64. package/src/rules/no-insecure-comparison/index.d.ts +7 -0
  65. package/src/rules/no-insecure-comparison/index.js +193 -0
  66. package/src/rules/no-insecure-redirects/index.d.ts +7 -0
  67. package/src/rules/no-insecure-redirects/index.js +216 -0
  68. package/src/rules/no-insecure-websocket/index.d.ts +6 -0
  69. package/src/rules/no-insecure-websocket/index.js +61 -0
  70. package/src/rules/no-ldap-injection/index.d.ts +10 -0
  71. package/src/rules/no-ldap-injection/index.js +455 -0
  72. package/src/rules/no-missing-authentication/index.d.ts +13 -0
  73. package/src/rules/no-missing-authentication/index.js +333 -0
  74. package/src/rules/no-missing-cors-check/index.d.ts +9 -0
  75. package/src/rules/no-missing-cors-check/index.js +399 -0
  76. package/src/rules/no-missing-csrf-protection/index.d.ts +11 -0
  77. package/src/rules/no-missing-csrf-protection/index.js +180 -0
  78. package/src/rules/no-missing-security-headers/index.d.ts +7 -0
  79. package/src/rules/no-missing-security-headers/index.js +218 -0
  80. package/src/rules/no-password-in-url/index.d.ts +8 -0
  81. package/src/rules/no-password-in-url/index.js +54 -0
  82. package/src/rules/no-permissive-cors/index.d.ts +8 -0
  83. package/src/rules/no-permissive-cors/index.js +65 -0
  84. package/src/rules/no-pii-in-logs/index.d.ts +8 -0
  85. package/src/rules/no-pii-in-logs/index.js +70 -0
  86. package/src/rules/no-privilege-escalation/index.d.ts +13 -0
  87. package/src/rules/no-privilege-escalation/index.js +321 -0
  88. package/src/rules/no-redos-vulnerable-regex/index.d.ts +7 -0
  89. package/src/rules/no-redos-vulnerable-regex/index.js +306 -0
  90. package/src/rules/no-sensitive-data-exposure/index.d.ts +11 -0
  91. package/src/rules/no-sensitive-data-exposure/index.js +250 -0
  92. package/src/rules/no-sensitive-data-in-analytics/index.d.ts +8 -0
  93. package/src/rules/no-sensitive-data-in-analytics/index.js +62 -0
  94. package/src/rules/no-sensitive-data-in-cache/index.d.ts +8 -0
  95. package/src/rules/no-sensitive-data-in-cache/index.js +52 -0
  96. package/src/rules/no-toctou-vulnerability/index.d.ts +7 -0
  97. package/src/rules/no-toctou-vulnerability/index.js +208 -0
  98. package/src/rules/no-tracking-without-consent/index.d.ts +6 -0
  99. package/src/rules/no-tracking-without-consent/index.js +67 -0
  100. package/src/rules/no-unchecked-loop-condition/index.d.ts +12 -0
  101. package/src/rules/no-unchecked-loop-condition/index.js +646 -0
  102. package/src/rules/no-unencrypted-transmission/index.d.ts +11 -0
  103. package/src/rules/no-unencrypted-transmission/index.js +236 -0
  104. package/src/rules/no-unescaped-url-parameter/index.d.ts +9 -0
  105. package/src/rules/no-unescaped-url-parameter/index.js +355 -0
  106. package/src/rules/no-unlimited-resource-allocation/index.d.ts +12 -0
  107. package/src/rules/no-unlimited-resource-allocation/index.js +643 -0
  108. package/src/rules/no-unsafe-deserialization/index.d.ts +10 -0
  109. package/src/rules/no-unsafe-deserialization/index.js +491 -0
  110. package/src/rules/no-unsafe-dynamic-require/index.d.ts +5 -0
  111. package/src/rules/no-unsafe-dynamic-require/index.js +106 -0
  112. package/src/rules/no-unsafe-regex-construction/index.d.ts +9 -0
  113. package/src/rules/no-unsafe-regex-construction/index.js +291 -0
  114. package/src/rules/no-unvalidated-deeplinks/index.d.ts +6 -0
  115. package/src/rules/no-unvalidated-deeplinks/index.js +62 -0
  116. package/src/rules/no-unvalidated-user-input/index.d.ts +9 -0
  117. package/src/rules/no-unvalidated-user-input/index.js +420 -0
  118. package/src/rules/no-verbose-error-messages/index.d.ts +8 -0
  119. package/src/rules/no-verbose-error-messages/index.js +68 -0
  120. package/src/rules/no-weak-password-recovery/index.d.ts +12 -0
  121. package/src/rules/no-weak-password-recovery/index.js +424 -0
  122. package/src/rules/no-xpath-injection/index.d.ts +10 -0
  123. package/src/rules/no-xpath-injection/index.js +487 -0
  124. package/src/rules/no-xxe-injection/index.d.ts +7 -0
  125. package/src/rules/no-xxe-injection/index.js +266 -0
  126. package/src/rules/no-zip-slip/index.d.ts +9 -0
  127. package/src/rules/no-zip-slip/index.js +445 -0
  128. package/src/rules/require-backend-authorization/index.d.ts +6 -0
  129. package/src/rules/require-backend-authorization/index.js +60 -0
  130. package/src/rules/require-code-minification/index.d.ts +8 -0
  131. package/src/rules/require-code-minification/index.js +47 -0
  132. package/src/rules/require-csp-headers/index.d.ts +6 -0
  133. package/src/rules/require-csp-headers/index.js +64 -0
  134. package/src/rules/require-data-minimization/index.d.ts +8 -0
  135. package/src/rules/require-data-minimization/index.js +53 -0
  136. package/src/rules/require-dependency-integrity/index.d.ts +6 -0
  137. package/src/rules/require-dependency-integrity/index.js +64 -0
  138. package/src/rules/require-https-only/index.d.ts +8 -0
  139. package/src/rules/require-https-only/index.js +62 -0
  140. package/src/rules/require-mime-type-validation/index.d.ts +6 -0
  141. package/src/rules/require-mime-type-validation/index.js +66 -0
  142. package/src/rules/require-network-timeout/index.d.ts +8 -0
  143. package/src/rules/require-network-timeout/index.js +50 -0
  144. package/src/rules/require-package-lock/index.d.ts +8 -0
  145. package/src/rules/require-package-lock/index.js +63 -0
  146. package/src/rules/require-secure-credential-storage/index.d.ts +8 -0
  147. package/src/rules/require-secure-credential-storage/index.js +50 -0
  148. package/src/rules/require-secure-defaults/index.d.ts +8 -0
  149. package/src/rules/require-secure-defaults/index.js +47 -0
  150. package/src/rules/require-secure-deletion/index.d.ts +8 -0
  151. package/src/rules/require-secure-deletion/index.js +44 -0
  152. package/src/rules/require-storage-encryption/index.d.ts +8 -0
  153. package/src/rules/require-storage-encryption/index.js +50 -0
  154. package/src/rules/require-url-validation/index.d.ts +6 -0
  155. package/src/rules/require-url-validation/index.js +72 -0
  156. package/src/types/index.d.ts +106 -0
  157. package/src/types/index.js +16 -0
  158. package/src/index.ts +0 -605
  159. package/src/rules/__tests__/integration-demo.test.ts +0 -290
  160. package/src/rules/__tests__/integration-llm.test.ts +0 -89
  161. package/src/rules/database-injection/database-injection.test.ts +0 -456
  162. package/src/rules/database-injection/index.ts +0 -488
  163. package/src/rules/detect-child-process/detect-child-process.test.ts +0 -207
  164. package/src/rules/detect-child-process/index.ts +0 -634
  165. package/src/rules/detect-eval-with-expression/detect-eval-with-expression.test.ts +0 -416
  166. package/src/rules/detect-eval-with-expression/index.ts +0 -463
  167. package/src/rules/detect-mixed-content/detect-mixed-content.test.ts +0 -28
  168. package/src/rules/detect-mixed-content/index.ts +0 -52
  169. package/src/rules/detect-non-literal-fs-filename/detect-non-literal-fs-filename.test.ts +0 -269
  170. package/src/rules/detect-non-literal-fs-filename/index.ts +0 -551
  171. package/src/rules/detect-non-literal-regexp/detect-non-literal-regexp.test.ts +0 -189
  172. package/src/rules/detect-non-literal-regexp/index.ts +0 -490
  173. package/src/rules/detect-object-injection/detect-object-injection.test.ts +0 -440
  174. package/src/rules/detect-object-injection/index.ts +0 -674
  175. package/src/rules/detect-suspicious-dependencies/detect-suspicious-dependencies.test.ts +0 -32
  176. package/src/rules/detect-suspicious-dependencies/index.ts +0 -84
  177. package/src/rules/detect-weak-password-validation/detect-weak-password-validation.test.ts +0 -31
  178. package/src/rules/detect-weak-password-validation/index.ts +0 -68
  179. package/src/rules/no-allow-arbitrary-loads/index.ts +0 -54
  180. package/src/rules/no-allow-arbitrary-loads/no-allow-arbitrary-loads.test.ts +0 -28
  181. package/src/rules/no-arbitrary-file-access/index.ts +0 -238
  182. package/src/rules/no-arbitrary-file-access/no-arbitrary-file-access.test.ts +0 -119
  183. package/src/rules/no-buffer-overread/index.ts +0 -724
  184. package/src/rules/no-buffer-overread/no-buffer-overread.test.ts +0 -313
  185. package/src/rules/no-clickjacking/index.ts +0 -481
  186. package/src/rules/no-clickjacking/no-clickjacking.test.ts +0 -253
  187. package/src/rules/no-client-side-auth-logic/index.ts +0 -81
  188. package/src/rules/no-client-side-auth-logic/no-client-side-auth-logic.test.ts +0 -33
  189. package/src/rules/no-credentials-in-query-params/index.ts +0 -69
  190. package/src/rules/no-credentials-in-query-params/no-credentials-in-query-params.test.ts +0 -33
  191. package/src/rules/no-credentials-in-storage-api/index.ts +0 -64
  192. package/src/rules/no-credentials-in-storage-api/no-credentials-in-storage-api.test.ts +0 -31
  193. package/src/rules/no-data-in-temp-storage/index.ts +0 -75
  194. package/src/rules/no-data-in-temp-storage/no-data-in-temp-storage.test.ts +0 -33
  195. package/src/rules/no-debug-code-in-production/index.ts +0 -59
  196. package/src/rules/no-debug-code-in-production/no-debug-code-in-production.test.ts +0 -26
  197. package/src/rules/no-directive-injection/index.ts +0 -551
  198. package/src/rules/no-directive-injection/no-directive-injection.test.ts +0 -305
  199. package/src/rules/no-disabled-certificate-validation/index.ts +0 -72
  200. package/src/rules/no-disabled-certificate-validation/no-disabled-certificate-validation.test.ts +0 -33
  201. package/src/rules/no-document-cookie/index.ts +0 -113
  202. package/src/rules/no-document-cookie/no-document-cookie.test.ts +0 -382
  203. package/src/rules/no-dynamic-dependency-loading/index.ts +0 -60
  204. package/src/rules/no-dynamic-dependency-loading/no-dynamic-dependency-loading.test.ts +0 -27
  205. package/src/rules/no-electron-security-issues/index.ts +0 -504
  206. package/src/rules/no-electron-security-issues/no-electron-security-issues.test.ts +0 -324
  207. package/src/rules/no-exposed-debug-endpoints/index.ts +0 -73
  208. package/src/rules/no-exposed-debug-endpoints/no-exposed-debug-endpoints.test.ts +0 -40
  209. package/src/rules/no-exposed-sensitive-data/index.ts +0 -428
  210. package/src/rules/no-exposed-sensitive-data/no-exposed-sensitive-data.test.ts +0 -75
  211. package/src/rules/no-format-string-injection/index.ts +0 -801
  212. package/src/rules/no-format-string-injection/no-format-string-injection.test.ts +0 -437
  213. package/src/rules/no-graphql-injection/index.ts +0 -508
  214. package/src/rules/no-graphql-injection/no-graphql-injection.test.ts +0 -371
  215. package/src/rules/no-hardcoded-credentials/index.ts +0 -478
  216. package/src/rules/no-hardcoded-credentials/no-hardcoded-credentials.test.ts +0 -639
  217. package/src/rules/no-hardcoded-session-tokens/index.ts +0 -69
  218. package/src/rules/no-hardcoded-session-tokens/no-hardcoded-session-tokens.test.ts +0 -42
  219. package/src/rules/no-http-urls/index.ts +0 -131
  220. package/src/rules/no-http-urls/no-http-urls.test.ts +0 -60
  221. package/src/rules/no-improper-sanitization/index.ts +0 -502
  222. package/src/rules/no-improper-sanitization/no-improper-sanitization.test.ts +0 -156
  223. package/src/rules/no-improper-type-validation/index.ts +0 -572
  224. package/src/rules/no-improper-type-validation/no-improper-type-validation.test.ts +0 -372
  225. package/src/rules/no-insecure-comparison/index.ts +0 -232
  226. package/src/rules/no-insecure-comparison/no-insecure-comparison.test.ts +0 -218
  227. package/src/rules/no-insecure-cookie-settings/index.ts +0 -391
  228. package/src/rules/no-insecure-cookie-settings/no-insecure-cookie-settings.test.ts +0 -409
  229. package/src/rules/no-insecure-jwt/index.ts +0 -467
  230. package/src/rules/no-insecure-jwt/no-insecure-jwt.test.ts +0 -259
  231. package/src/rules/no-insecure-redirects/index.ts +0 -267
  232. package/src/rules/no-insecure-redirects/no-insecure-redirects.test.ts +0 -108
  233. package/src/rules/no-insecure-websocket/index.ts +0 -72
  234. package/src/rules/no-insecure-websocket/no-insecure-websocket.test.ts +0 -42
  235. package/src/rules/no-insufficient-postmessage-validation/index.ts +0 -497
  236. package/src/rules/no-insufficient-postmessage-validation/no-insufficient-postmessage-validation.test.ts +0 -360
  237. package/src/rules/no-insufficient-random/index.ts +0 -288
  238. package/src/rules/no-insufficient-random/no-insufficient-random.test.ts +0 -246
  239. package/src/rules/no-ldap-injection/index.ts +0 -547
  240. package/src/rules/no-ldap-injection/no-ldap-injection.test.ts +0 -317
  241. package/src/rules/no-missing-authentication/index.ts +0 -408
  242. package/src/rules/no-missing-authentication/no-missing-authentication.test.ts +0 -350
  243. package/src/rules/no-missing-cors-check/index.ts +0 -453
  244. package/src/rules/no-missing-cors-check/no-missing-cors-check.test.ts +0 -392
  245. package/src/rules/no-missing-csrf-protection/index.ts +0 -229
  246. package/src/rules/no-missing-csrf-protection/no-missing-csrf-protection.test.ts +0 -222
  247. package/src/rules/no-missing-security-headers/index.ts +0 -266
  248. package/src/rules/no-missing-security-headers/no-missing-security-headers.test.ts +0 -98
  249. package/src/rules/no-password-in-url/index.ts +0 -64
  250. package/src/rules/no-password-in-url/no-password-in-url.test.ts +0 -27
  251. package/src/rules/no-permissive-cors/index.ts +0 -78
  252. package/src/rules/no-permissive-cors/no-permissive-cors.test.ts +0 -28
  253. package/src/rules/no-pii-in-logs/index.ts +0 -83
  254. package/src/rules/no-pii-in-logs/no-pii-in-logs.test.ts +0 -26
  255. package/src/rules/no-postmessage-origin-wildcard/index.ts +0 -67
  256. package/src/rules/no-postmessage-origin-wildcard/no-postmessage-origin-wildcard.test.ts +0 -27
  257. package/src/rules/no-privilege-escalation/index.ts +0 -403
  258. package/src/rules/no-privilege-escalation/no-privilege-escalation.test.ts +0 -306
  259. package/src/rules/no-redos-vulnerable-regex/index.ts +0 -379
  260. package/src/rules/no-redos-vulnerable-regex/no-redos-vulnerable-regex.test.ts +0 -83
  261. package/src/rules/no-sensitive-data-exposure/index.ts +0 -294
  262. package/src/rules/no-sensitive-data-exposure/no-sensitive-data-exposure.test.ts +0 -262
  263. package/src/rules/no-sensitive-data-in-analytics/index.ts +0 -73
  264. package/src/rules/no-sensitive-data-in-analytics/no-sensitive-data-in-analytics.test.ts +0 -42
  265. package/src/rules/no-sensitive-data-in-cache/index.ts +0 -59
  266. package/src/rules/no-sensitive-data-in-cache/no-sensitive-data-in-cache.test.ts +0 -32
  267. package/src/rules/no-sql-injection/index.ts +0 -424
  268. package/src/rules/no-sql-injection/no-sql-injection.test.ts +0 -303
  269. package/src/rules/no-timing-attack/index.ts +0 -552
  270. package/src/rules/no-timing-attack/no-timing-attack.test.ts +0 -348
  271. package/src/rules/no-toctou-vulnerability/index.ts +0 -250
  272. package/src/rules/no-toctou-vulnerability/no-toctou-vulnerability.test.ts +0 -60
  273. package/src/rules/no-tracking-without-consent/index.ts +0 -78
  274. package/src/rules/no-tracking-without-consent/no-tracking-without-consent.test.ts +0 -34
  275. package/src/rules/no-unchecked-loop-condition/index.ts +0 -781
  276. package/src/rules/no-unchecked-loop-condition/no-unchecked-loop-condition.test.ts +0 -459
  277. package/src/rules/no-unencrypted-local-storage/index.ts +0 -73
  278. package/src/rules/no-unencrypted-local-storage/no-unencrypted-local-storage.test.ts +0 -41
  279. package/src/rules/no-unencrypted-transmission/index.ts +0 -296
  280. package/src/rules/no-unencrypted-transmission/no-unencrypted-transmission.test.ts +0 -287
  281. package/src/rules/no-unescaped-url-parameter/index.ts +0 -424
  282. package/src/rules/no-unescaped-url-parameter/no-unescaped-url-parameter.test.ts +0 -263
  283. package/src/rules/no-unlimited-resource-allocation/index.ts +0 -767
  284. package/src/rules/no-unlimited-resource-allocation/no-unlimited-resource-allocation.test.ts +0 -544
  285. package/src/rules/no-unsafe-deserialization/index.ts +0 -593
  286. package/src/rules/no-unsafe-deserialization/no-unsafe-deserialization.test.ts +0 -310
  287. package/src/rules/no-unsafe-dynamic-require/index.ts +0 -125
  288. package/src/rules/no-unsafe-dynamic-require/no-unsafe-dynamic-require.test.ts +0 -151
  289. package/src/rules/no-unsafe-regex-construction/index.ts +0 -370
  290. package/src/rules/no-unsafe-regex-construction/no-unsafe-regex-construction.test.ts +0 -181
  291. package/src/rules/no-unsanitized-html/index.ts +0 -400
  292. package/src/rules/no-unsanitized-html/no-unsanitized-html.test.ts +0 -488
  293. package/src/rules/no-unvalidated-deeplinks/index.ts +0 -73
  294. package/src/rules/no-unvalidated-deeplinks/no-unvalidated-deeplinks.test.ts +0 -29
  295. package/src/rules/no-unvalidated-user-input/index.ts +0 -498
  296. package/src/rules/no-unvalidated-user-input/no-unvalidated-user-input.test.ts +0 -463
  297. package/src/rules/no-verbose-error-messages/index.ts +0 -83
  298. package/src/rules/no-verbose-error-messages/no-verbose-error-messages.test.ts +0 -34
  299. package/src/rules/no-weak-crypto/index.ts +0 -447
  300. package/src/rules/no-weak-crypto/no-weak-crypto.test.ts +0 -297
  301. package/src/rules/no-weak-password-recovery/index.ts +0 -509
  302. package/src/rules/no-weak-password-recovery/no-weak-password-recovery.test.ts +0 -184
  303. package/src/rules/no-xpath-injection/index.ts +0 -596
  304. package/src/rules/no-xpath-injection/no-xpath-injection.test.ts +0 -405
  305. package/src/rules/no-xxe-injection/index.ts +0 -342
  306. package/src/rules/no-xxe-injection/no-xxe-injection.test.ts +0 -122
  307. package/src/rules/no-zip-slip/index.ts +0 -526
  308. package/src/rules/no-zip-slip/no-zip-slip.test.ts +0 -305
  309. package/src/rules/require-backend-authorization/index.ts +0 -71
  310. package/src/rules/require-backend-authorization/require-backend-authorization.test.ts +0 -31
  311. package/src/rules/require-code-minification/index.ts +0 -54
  312. package/src/rules/require-code-minification/require-code-minification.test.ts +0 -30
  313. package/src/rules/require-csp-headers/index.ts +0 -74
  314. package/src/rules/require-csp-headers/require-csp-headers.test.ts +0 -34
  315. package/src/rules/require-data-minimization/index.ts +0 -65
  316. package/src/rules/require-data-minimization/require-data-minimization.test.ts +0 -31
  317. package/src/rules/require-dependency-integrity/index.ts +0 -78
  318. package/src/rules/require-dependency-integrity/require-dependency-integrity.test.ts +0 -44
  319. package/src/rules/require-https-only/index.ts +0 -75
  320. package/src/rules/require-https-only/require-https-only.test.ts +0 -26
  321. package/src/rules/require-mime-type-validation/index.ts +0 -77
  322. package/src/rules/require-mime-type-validation/require-mime-type-validation.test.ts +0 -32
  323. package/src/rules/require-network-timeout/index.ts +0 -58
  324. package/src/rules/require-network-timeout/require-network-timeout.test.ts +0 -26
  325. package/src/rules/require-package-lock/index.ts +0 -75
  326. package/src/rules/require-package-lock/require-package-lock.test.ts +0 -27
  327. package/src/rules/require-secure-credential-storage/index.ts +0 -60
  328. package/src/rules/require-secure-credential-storage/require-secure-credential-storage.test.ts +0 -26
  329. package/src/rules/require-secure-defaults/index.ts +0 -54
  330. package/src/rules/require-secure-defaults/require-secure-defaults.test.ts +0 -26
  331. package/src/rules/require-secure-deletion/index.ts +0 -52
  332. package/src/rules/require-secure-deletion/require-secure-deletion.test.ts +0 -29
  333. package/src/rules/require-storage-encryption/index.ts +0 -60
  334. package/src/rules/require-storage-encryption/require-storage-encryption.test.ts +0 -26
  335. package/src/rules/require-url-validation/index.ts +0 -85
  336. package/src/rules/require-url-validation/require-url-validation.test.ts +0 -32
  337. package/src/types/index.ts +0 -235
@@ -0,0 +1,250 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.noSensitiveDataExposure = void 0;
4
+ const eslint_devkit_1 = require("@interlace/eslint-devkit");
5
+ const eslint_devkit_2 = require("@interlace/eslint-devkit");
6
+ /**
7
+ * Check if string contains sensitive data patterns
8
+ */
9
+ function containsSensitiveData(text, patterns) {
10
+ const lowerText = text.toLowerCase();
11
+ return patterns.some(pattern => lowerText.includes(pattern.toLowerCase()));
12
+ }
13
+ exports.noSensitiveDataExposure = (0, eslint_devkit_2.createRule)({
14
+ name: 'no-sensitive-data-exposure',
15
+ meta: {
16
+ type: 'problem',
17
+ docs: {
18
+ description: 'Detects PII/credentials in logs, responses, or error messages',
19
+ },
20
+ hasSuggestions: true,
21
+ messages: {
22
+ sensitiveDataExposure: (0, eslint_devkit_1.formatLLMMessage)({
23
+ icon: eslint_devkit_1.MessageIcons.SECURITY,
24
+ issueName: 'Sensitive data exposure',
25
+ cwe: 'CWE-532',
26
+ description: 'Sensitive data detected in {{context}}: {{dataType}}',
27
+ severity: 'HIGH',
28
+ fix: 'Redact or mask sensitive data before logging/exposing',
29
+ documentationLink: 'https://cwe.mitre.org/data/definitions/532.html',
30
+ }),
31
+ redactData: (0, eslint_devkit_1.formatLLMMessage)({
32
+ icon: eslint_devkit_1.MessageIcons.INFO,
33
+ issueName: 'Redact Data',
34
+ description: 'Redact sensitive data before logging',
35
+ severity: 'LOW',
36
+ fix: 'Redact sensitive fields before logging',
37
+ documentationLink: 'https://cwe.mitre.org/data/definitions/532.html',
38
+ }),
39
+ useMasking: (0, eslint_devkit_1.formatLLMMessage)({
40
+ icon: eslint_devkit_1.MessageIcons.INFO,
41
+ issueName: 'Use Masking',
42
+ description: 'Use data masking function',
43
+ severity: 'LOW',
44
+ fix: 'maskSensitive(data)',
45
+ documentationLink: 'https://cwe.mitre.org/data/definitions/532.html',
46
+ }),
47
+ removeFromLogs: (0, eslint_devkit_1.formatLLMMessage)({
48
+ icon: eslint_devkit_1.MessageIcons.INFO,
49
+ issueName: 'Remove From Logs',
50
+ description: 'Remove sensitive data from logs and errors',
51
+ severity: 'LOW',
52
+ fix: 'Filter sensitive data before logging',
53
+ documentationLink: 'https://cwe.mitre.org/data/definitions/532.html',
54
+ }),
55
+ },
56
+ schema: [
57
+ {
58
+ type: 'object',
59
+ properties: {
60
+ sensitivePatterns: {
61
+ type: 'array',
62
+ items: { type: 'string' },
63
+ default: ['password', 'secret', 'token', 'key', 'ssn', 'credit', 'card', 'api_key', 'apikey'],
64
+ description: 'Sensitive data patterns',
65
+ },
66
+ checkConsoleLog: {
67
+ type: 'boolean',
68
+ default: true,
69
+ description: 'Check console.log statements',
70
+ },
71
+ checkErrorMessages: {
72
+ type: 'boolean',
73
+ default: true,
74
+ description: 'Check error messages',
75
+ },
76
+ checkApiResponses: {
77
+ type: 'boolean',
78
+ default: true,
79
+ description: 'Check API responses',
80
+ },
81
+ },
82
+ additionalProperties: false,
83
+ },
84
+ ],
85
+ },
86
+ defaultOptions: [
87
+ {
88
+ sensitivePatterns: ['password', 'secret', 'token', 'key', 'ssn', 'credit', 'card', 'api_key', 'apikey'],
89
+ checkConsoleLog: true,
90
+ checkErrorMessages: true,
91
+ checkApiResponses: true,
92
+ },
93
+ ],
94
+ create(context, [options = {}]) {
95
+ const { sensitivePatterns = ['password', 'secret', 'token', 'key', 'ssn', 'credit', 'card', 'api_key', 'apikey'], checkConsoleLog = true, checkErrorMessages = true, } = options || {};
96
+ /**
97
+ * Check CallExpression for logging calls with sensitive data
98
+ */
99
+ function checkCallExpression(node) {
100
+ // Check if it's a logging call (console.*, logger.*)
101
+ const isLoggingCall = (() => {
102
+ if (node.callee.type === 'MemberExpression') {
103
+ const object = node.callee.object;
104
+ const property = node.callee.property;
105
+ if (property.type === 'Identifier') {
106
+ const methodName = property.name.toLowerCase();
107
+ if (['log', 'info', 'warn', 'error', 'debug', 'trace'].includes(methodName)) {
108
+ // Check if it's console.* or logger.*
109
+ if (object.type === 'Identifier') {
110
+ const objName = object.name.toLowerCase();
111
+ if (objName === 'console' || objName === 'logger') {
112
+ return true;
113
+ }
114
+ }
115
+ }
116
+ }
117
+ }
118
+ else if (node.callee.type === 'Identifier') {
119
+ // Check for logger.info() pattern
120
+ const calleeName = node.callee.name.toLowerCase();
121
+ if (calleeName.includes('log') || calleeName.includes('logger')) {
122
+ return true;
123
+ }
124
+ }
125
+ return false;
126
+ })();
127
+ if (isLoggingCall && checkConsoleLog) {
128
+ // Check if any argument contains sensitive data
129
+ for (const arg of node.arguments) {
130
+ if (arg.type === 'Literal' && typeof arg.value === 'string') {
131
+ const text = arg.value;
132
+ if (containsSensitiveData(text, sensitivePatterns)) {
133
+ context.report({
134
+ node: arg,
135
+ messageId: 'sensitiveDataExposure',
136
+ data: {
137
+ context: 'logs',
138
+ dataType: 'password',
139
+ },
140
+ suggest: [
141
+ { messageId: 'redactData', fix: () => null },
142
+ { messageId: 'useMasking', fix: () => null },
143
+ { messageId: 'removeFromLogs', fix: () => null },
144
+ ],
145
+ });
146
+ return; // Only report once per call
147
+ }
148
+ }
149
+ else if (arg.type === 'Identifier' && arg.name) {
150
+ const name = arg.name.toLowerCase();
151
+ if (containsSensitiveData(name, sensitivePatterns)) {
152
+ context.report({
153
+ node: arg,
154
+ messageId: 'sensitiveDataExposure',
155
+ data: {
156
+ context: 'logs',
157
+ dataType: 'password',
158
+ },
159
+ suggest: [
160
+ { messageId: 'redactData', fix: () => null },
161
+ { messageId: 'useMasking', fix: () => null },
162
+ { messageId: 'removeFromLogs', fix: () => null },
163
+ ],
164
+ });
165
+ return; // Only report once per call
166
+ }
167
+ }
168
+ }
169
+ }
170
+ }
171
+ /**
172
+ * Check NewExpression for Error with sensitive data
173
+ */
174
+ function checkNewExpression(node) {
175
+ if (!checkErrorMessages) {
176
+ return;
177
+ }
178
+ if (node.callee && node.callee.type === 'Identifier' && node.callee.name === 'Error') {
179
+ // Check all arguments for sensitive data (report only once per error)
180
+ for (const arg of node.arguments) {
181
+ if (arg.type === 'Literal' && typeof arg.value === 'string') {
182
+ const text = arg.value;
183
+ if (containsSensitiveData(text, sensitivePatterns)) {
184
+ context.report({
185
+ node: arg,
186
+ messageId: 'sensitiveDataExposure',
187
+ data: {
188
+ context: 'error messages',
189
+ dataType: 'password',
190
+ },
191
+ suggest: [
192
+ { messageId: 'redactData', fix: () => null },
193
+ { messageId: 'useMasking', fix: () => null },
194
+ { messageId: 'removeFromLogs', fix: () => null },
195
+ ],
196
+ });
197
+ return; // Only report once per error
198
+ }
199
+ }
200
+ else if (arg.type === 'BinaryExpression' && arg.operator === '+') {
201
+ // Check left side if it's a literal
202
+ if (arg.left && arg.left.type === 'Literal' && typeof arg.left.value === 'string') {
203
+ const leftText = arg.left.value;
204
+ if (containsSensitiveData(leftText, sensitivePatterns)) {
205
+ context.report({
206
+ node: arg.left,
207
+ messageId: 'sensitiveDataExposure',
208
+ data: {
209
+ context: 'error messages',
210
+ dataType: 'password',
211
+ },
212
+ suggest: [
213
+ { messageId: 'redactData', fix: () => null },
214
+ { messageId: 'useMasking', fix: () => null },
215
+ { messageId: 'removeFromLogs', fix: () => null },
216
+ ],
217
+ });
218
+ return; // Only report once per error
219
+ }
220
+ }
221
+ // Check right side if it's an identifier
222
+ if (arg.right && arg.right.type === 'Identifier' && arg.right.name) {
223
+ const rightName = arg.right.name.toLowerCase();
224
+ if (containsSensitiveData(rightName, sensitivePatterns)) {
225
+ context.report({
226
+ node: arg.right,
227
+ messageId: 'sensitiveDataExposure',
228
+ data: {
229
+ context: 'error messages',
230
+ dataType: 'password',
231
+ },
232
+ suggest: [
233
+ { messageId: 'redactData', fix: () => null },
234
+ { messageId: 'useMasking', fix: () => null },
235
+ { messageId: 'removeFromLogs', fix: () => null },
236
+ ],
237
+ });
238
+ return; // Only report once per error
239
+ }
240
+ }
241
+ }
242
+ }
243
+ }
244
+ }
245
+ return {
246
+ CallExpression: checkCallExpression,
247
+ NewExpression: checkNewExpression,
248
+ };
249
+ },
250
+ });
@@ -0,0 +1,8 @@
1
+ /**
2
+ * @fileoverview Prevent PII sent to analytics
3
+ * @see https://owasp.org/www-project-mobile-top-10/
4
+ * @see https://cwe.mitre.org/data/definitions/359.html
5
+ */
6
+ export interface Options {
7
+ }
8
+ export declare const noSensitiveDataInAnalytics: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
@@ -0,0 +1,62 @@
1
+ "use strict";
2
+ /**
3
+ * @fileoverview Prevent PII sent to analytics
4
+ * @see https://owasp.org/www-project-mobile-top-10/
5
+ * @see https://cwe.mitre.org/data/definitions/359.html
6
+ */
7
+ Object.defineProperty(exports, "__esModule", { value: true });
8
+ exports.noSensitiveDataInAnalytics = void 0;
9
+ const eslint_devkit_1 = require("@interlace/eslint-devkit");
10
+ exports.noSensitiveDataInAnalytics = (0, eslint_devkit_1.createRule)({
11
+ name: 'no-sensitive-data-in-analytics',
12
+ meta: {
13
+ type: 'problem',
14
+ docs: {
15
+ description: 'Prevent PII being sent to analytics services',
16
+ category: 'Security',
17
+ recommended: true,
18
+ owaspMobile: ['M6'],
19
+ cweIds: ['CWE-359'],
20
+ },
21
+ messages: {
22
+ violationDetected: (0, eslint_devkit_1.formatLLMMessage)({
23
+ icon: eslint_devkit_1.MessageIcons.SECURITY,
24
+ issueName: 'Sensitive Data in Analytics',
25
+ cwe: 'CWE-359',
26
+ description: 'Sensitive field sent to analytics - this is a privacy violation',
27
+ severity: 'HIGH',
28
+ fix: 'Remove PII from analytics tracking data',
29
+ documentationLink: 'https://cwe.mitre.org/data/definitions/359.html',
30
+ })
31
+ },
32
+ schema: [],
33
+ },
34
+ defaultOptions: [],
35
+ create(context) {
36
+ const sensitiveFields = ['email', 'ssn', 'creditcard', 'password', 'phone', 'address'];
37
+ function report(node, field) {
38
+ context.report({ node, messageId: 'violationDetected', data: { field } });
39
+ }
40
+ return {
41
+ CallExpression(node) {
42
+ // analytics.track() with sensitive data
43
+ if (node.callee.type === 'MemberExpression' &&
44
+ node.callee.object.name === 'analytics' &&
45
+ node.callee.property.name === 'track') {
46
+ const dataArg = node.arguments[1];
47
+ if (dataArg?.type === 'ObjectExpression') {
48
+ dataArg.properties.forEach(prop => {
49
+ if (prop.type === 'Property') {
50
+ const key = prop.key.name?.toLowerCase();
51
+ const matchedField = sensitiveFields.find(f => key?.includes(f));
52
+ if (matchedField) {
53
+ report(prop, matchedField);
54
+ }
55
+ }
56
+ });
57
+ }
58
+ }
59
+ },
60
+ };
61
+ },
62
+ });
@@ -0,0 +1,8 @@
1
+ /**
2
+ * @fileoverview Prevent caching sensitive data without encryption
3
+ * @see https://owasp.org/www-project-mobile-top-10/
4
+ * @see https://cwe.mitre.org/data/definitions/524.html
5
+ */
6
+ export interface Options {
7
+ }
8
+ export declare const noSensitiveDataInCache: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
@@ -0,0 +1,52 @@
1
+ "use strict";
2
+ /**
3
+ * @fileoverview Prevent caching sensitive data without encryption
4
+ * @see https://owasp.org/www-project-mobile-top-10/
5
+ * @see https://cwe.mitre.org/data/definitions/524.html
6
+ */
7
+ Object.defineProperty(exports, "__esModule", { value: true });
8
+ exports.noSensitiveDataInCache = void 0;
9
+ const eslint_devkit_1 = require("@interlace/eslint-devkit");
10
+ exports.noSensitiveDataInCache = (0, eslint_devkit_1.createRule)({
11
+ name: 'no-sensitive-data-in-cache',
12
+ meta: {
13
+ type: 'problem',
14
+ docs: {
15
+ description: 'Prevent caching sensitive data without encryption',
16
+ category: 'Security',
17
+ recommended: true,
18
+ owaspMobile: ['M9'],
19
+ cweIds: ["CWE-524"],
20
+ },
21
+ messages: {
22
+ violationDetected: (0, eslint_devkit_1.formatLLMMessage)({
23
+ icon: eslint_devkit_1.MessageIcons.SECURITY,
24
+ issueName: 'violation Detected',
25
+ cwe: 'CWE-200',
26
+ description: 'Prevent caching sensitive data without encryption detected - Sensitive data in cache',
27
+ severity: 'HIGH',
28
+ fix: 'Review and apply secure practices',
29
+ documentationLink: 'https://cwe.mitre.org/data/definitions/200.html',
30
+ })
31
+ },
32
+ schema: [],
33
+ },
34
+ defaultOptions: [],
35
+ create(context) {
36
+ return {
37
+ CallExpression(node) {
38
+ if (node.callee.type === 'MemberExpression' &&
39
+ node.callee.property.type === 'Identifier' &&
40
+ ['set', 'put', 'store'].includes(node.callee.property.name)) {
41
+ const keyArg = node.arguments[0];
42
+ if (keyArg && keyArg.type === 'Literal') {
43
+ const key = keyArg.value.toString().toLowerCase();
44
+ if (['password', 'token', 'credit', 'ssn'].some(k => key.includes(k))) {
45
+ context.report({ node, messageId: 'violationDetected' });
46
+ }
47
+ }
48
+ }
49
+ },
50
+ };
51
+ },
52
+ });
@@ -0,0 +1,7 @@
1
+ export interface Options {
2
+ /** Ignore in test files. Default: true */
3
+ ignoreInTests?: boolean;
4
+ /** File system methods to check. Default: ['fs.existsSync', 'fs.statSync', 'fs.accessSync'] */
5
+ fsMethods?: string[];
6
+ }
7
+ export declare const noToctouVulnerability: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
@@ -0,0 +1,208 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.noToctouVulnerability = void 0;
4
+ const eslint_devkit_1 = require("@interlace/eslint-devkit");
5
+ const eslint_devkit_2 = require("@interlace/eslint-devkit");
6
+ exports.noToctouVulnerability = (0, eslint_devkit_2.createRule)({
7
+ name: 'no-toctou-vulnerability',
8
+ meta: {
9
+ type: 'problem',
10
+ docs: {
11
+ description: 'Detects Time-of-Check-Time-of-Use vulnerabilities',
12
+ },
13
+ hasSuggestions: true,
14
+ messages: {
15
+ toctouVulnerability: (0, eslint_devkit_1.formatLLMMessage)({
16
+ icon: eslint_devkit_1.MessageIcons.SECURITY,
17
+ issueName: 'TOCTOU vulnerability',
18
+ cwe: 'CWE-367',
19
+ description: 'Time-of-check Time-of-use race condition detected',
20
+ severity: 'HIGH',
21
+ fix: 'Use atomic operations or fs.promises for file operations',
22
+ documentationLink: 'https://cwe.mitre.org/data/definitions/367.html',
23
+ }),
24
+ useAtomicOperations: (0, eslint_devkit_1.formatLLMMessage)({
25
+ icon: eslint_devkit_1.MessageIcons.INFO,
26
+ issueName: 'Use Atomic Operations',
27
+ description: 'Use atomic file operations',
28
+ severity: 'LOW',
29
+ fix: 'fs.promises.access() then fs.promises.readFile()',
30
+ documentationLink: 'https://nodejs.org/api/fs.html#fspromisesaccesspath-mode',
31
+ }),
32
+ useFsPromises: (0, eslint_devkit_1.formatLLMMessage)({
33
+ icon: eslint_devkit_1.MessageIcons.INFO,
34
+ issueName: 'Use fs.promises',
35
+ description: 'Use fs.promises API',
36
+ severity: 'LOW',
37
+ fix: 'await fs.promises.readFile() instead of sync operations',
38
+ documentationLink: 'https://nodejs.org/api/fs.html#promises-api',
39
+ }),
40
+ addProperLocking: (0, eslint_devkit_1.formatLLMMessage)({
41
+ icon: eslint_devkit_1.MessageIcons.INFO,
42
+ issueName: 'Add File Locking',
43
+ description: 'Add proper locking mechanism',
44
+ severity: 'LOW',
45
+ fix: 'Use proper-lockfile or similar for concurrent access',
46
+ documentationLink: 'https://github.com/moxystudio/node-proper-lockfile',
47
+ }),
48
+ },
49
+ schema: [
50
+ {
51
+ type: 'object',
52
+ properties: {
53
+ ignoreInTests: {
54
+ type: 'boolean',
55
+ default: true,
56
+ },
57
+ fsMethods: {
58
+ type: 'array',
59
+ items: { type: 'string' },
60
+ default: ['fs.existsSync', 'fs.statSync', 'fs.accessSync'],
61
+ },
62
+ },
63
+ additionalProperties: false,
64
+ },
65
+ ],
66
+ },
67
+ defaultOptions: [
68
+ {
69
+ ignoreInTests: true,
70
+ fsMethods: ['fs.existsSync', 'fs.statSync', 'fs.accessSync'],
71
+ },
72
+ ],
73
+ create(context, [options = {}]) {
74
+ const { ignoreInTests = true } = options || {};
75
+ const filename = context.getFilename();
76
+ const isTestFile = ignoreInTests && /\.(test|spec)\.(ts|tsx|js|jsx)$/.test(filename);
77
+ if (isTestFile) {
78
+ return {};
79
+ }
80
+ const sourceCode = context.sourceCode || context.sourceCode;
81
+ /**
82
+ * Check for TOCTOU patterns
83
+ */
84
+ function checkCallExpression(node) {
85
+ // 1. Identify the file operation (Use)
86
+ let useMethodName = '';
87
+ if (node.callee.type === 'MemberExpression' && node.callee.property.type === 'Identifier') {
88
+ const objectName = node.callee.object.type === 'Identifier' ? node.callee.object.name : '';
89
+ if (objectName === 'fs' || objectName === 'fsPromises') {
90
+ useMethodName = node.callee.property.name;
91
+ }
92
+ }
93
+ else if (node.callee.type === 'Identifier') {
94
+ useMethodName = node.callee.name;
95
+ }
96
+ const riskyUseMethods = ['readFileSync', 'writeFileSync', 'readFile', 'writeFile', 'openSync', 'open', 'unlinkSync', 'unlink'];
97
+ if (!riskyUseMethods.includes(useMethodName)) {
98
+ return;
99
+ }
100
+ const useArg = node.arguments[0];
101
+ if (!useArg)
102
+ return;
103
+ // 2. Walk up to find the condition (Check)
104
+ let current = node.parent;
105
+ while (current) {
106
+ if (current.type === 'IfStatement') {
107
+ // Extract the condition node
108
+ let condition = current.test;
109
+ // Handle negated condition: if (!exists(path)) { create(path) } -> also TOCTOU but different logic?
110
+ // Actually TOCTOU is usually Check(exists) -> Use(read).
111
+ // If (!exists) -> create is Check -> Use.
112
+ // But strict TOCTOU is checking state then acting.
113
+ // If checking for negation
114
+ if (condition.type === 'UnaryExpression' && condition.operator === '!') {
115
+ condition = condition.argument;
116
+ }
117
+ if (condition.type === 'CallExpression') {
118
+ // Check if it's a file check method
119
+ let checkMethodName = '';
120
+ if (condition.callee.type === 'MemberExpression' && condition.callee.property.type === 'Identifier') {
121
+ checkMethodName = condition.callee.property.name;
122
+ }
123
+ else if (condition.callee.type === 'Identifier') {
124
+ checkMethodName = condition.callee.name;
125
+ }
126
+ const checkMethods = ['existsSync', 'statSync', 'accessSync', 'exists', 'stat', 'access'];
127
+ if (checkMethods.includes(checkMethodName)) {
128
+ // Compare arguments
129
+ const checkArg = condition.arguments[0];
130
+ if (checkArg) {
131
+ // Method 1: Identifier match (same variable)
132
+ if (checkArg.type === 'Identifier' && useArg.type === 'Identifier' && checkArg.name === useArg.name) {
133
+ reportToctou(node);
134
+ return;
135
+ }
136
+ // Method 2: Text match (fallback)
137
+ const checkArgText = sourceCode.getText(checkArg).replace(/\s/g, '');
138
+ const useArgText = sourceCode.getText(useArg).replace(/\s/g, '');
139
+ if (checkArgText === useArgText) {
140
+ reportToctou(node);
141
+ return;
142
+ }
143
+ }
144
+ }
145
+ // Handle stats.isFile() / stats.isDirectory() pattern
146
+ if (condition.callee.type === 'MemberExpression' &&
147
+ condition.callee.property.type === 'Identifier' &&
148
+ ['isFile', 'isDirectory'].includes(condition.callee.property.name) &&
149
+ condition.callee.object.type === 'Identifier') {
150
+ const statsVarName = condition.callee.object.name;
151
+ let currentScope = sourceCode.getScope(condition);
152
+ let variable = null;
153
+ while (currentScope) {
154
+ variable = currentScope.variables.find(v => v.name === statsVarName);
155
+ if (variable)
156
+ break;
157
+ currentScope = currentScope.upper;
158
+ }
159
+ if (variable && variable.defs.length > 0) {
160
+ const def = variable.defs[0];
161
+ if (def.type === 'Variable' && def.node.init && def.node.init.type === 'CallExpression') {
162
+ const init = def.node.init;
163
+ if (init.callee.type === 'MemberExpression' &&
164
+ init.callee.property.type === 'Identifier' &&
165
+ ['statSync', 'lstatSync', 'stat', 'lstat'].includes(init.callee.property.name)) {
166
+ const statArg = init.arguments[0];
167
+ if (statArg) {
168
+ const checkArgText = sourceCode.getText(statArg).replace(/\s/g, '');
169
+ const useArgText = sourceCode.getText(useArg).replace(/\s/g, '');
170
+ if (checkArgText === useArgText) {
171
+ reportToctou(node);
172
+ return;
173
+ }
174
+ }
175
+ }
176
+ }
177
+ }
178
+ }
179
+ }
180
+ }
181
+ current = current.parent;
182
+ }
183
+ }
184
+ function reportToctou(node) {
185
+ context.report({
186
+ node,
187
+ messageId: 'toctouVulnerability',
188
+ suggest: [
189
+ {
190
+ messageId: 'useAtomicOperations',
191
+ fix: () => null,
192
+ },
193
+ {
194
+ messageId: 'useFsPromises',
195
+ fix: () => null,
196
+ },
197
+ {
198
+ messageId: 'addProperLocking',
199
+ fix: () => null,
200
+ },
201
+ ],
202
+ });
203
+ }
204
+ return {
205
+ CallExpression: checkCallExpression,
206
+ };
207
+ },
208
+ });
@@ -0,0 +1,6 @@
1
+ /**
2
+ * @fileoverview Require consent before tracking
3
+ */
4
+ export interface Options {
5
+ }
6
+ export declare const noTrackingWithoutConsent: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;