eslint-plugin-secure-coding 2.3.3 → 2.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +51 -1
- package/README.md +2 -2
- package/package.json +1 -1
- package/src/index.d.ts +32 -0
- package/src/index.js +416 -0
- package/src/rules/detect-child-process/index.d.ts +11 -0
- package/src/rules/detect-child-process/index.js +529 -0
- package/src/rules/detect-eval-with-expression/index.d.ts +9 -0
- package/src/rules/detect-eval-with-expression/index.js +392 -0
- package/src/rules/detect-mixed-content/index.d.ts +8 -0
- package/src/rules/detect-mixed-content/index.js +44 -0
- package/src/rules/detect-non-literal-fs-filename/index.d.ts +7 -0
- package/src/rules/detect-non-literal-fs-filename/index.js +454 -0
- package/src/rules/detect-non-literal-regexp/index.d.ts +9 -0
- package/src/rules/detect-non-literal-regexp/index.js +403 -0
- package/src/rules/detect-object-injection/index.d.ts +11 -0
- package/src/rules/detect-object-injection/index.js +560 -0
- package/src/rules/detect-suspicious-dependencies/index.d.ts +8 -0
- package/src/rules/detect-suspicious-dependencies/index.js +71 -0
- package/src/rules/detect-weak-password-validation/index.d.ts +6 -0
- package/src/rules/detect-weak-password-validation/index.js +58 -0
- package/src/rules/no-allow-arbitrary-loads/index.d.ts +8 -0
- package/src/rules/no-allow-arbitrary-loads/index.js +47 -0
- package/src/rules/no-arbitrary-file-access/index.d.ts +13 -0
- package/src/rules/no-arbitrary-file-access/index.js +195 -0
- package/src/rules/no-buffer-overread/index.d.ts +29 -0
- package/src/rules/no-buffer-overread/index.js +606 -0
- package/src/rules/no-clickjacking/index.d.ts +10 -0
- package/src/rules/no-clickjacking/index.js +396 -0
- package/src/rules/no-client-side-auth-logic/index.d.ts +6 -0
- package/src/rules/no-client-side-auth-logic/index.js +69 -0
- package/src/rules/no-credentials-in-query-params/index.d.ts +8 -0
- package/src/rules/no-credentials-in-query-params/index.js +57 -0
- package/src/rules/no-data-in-temp-storage/index.d.ts +6 -0
- package/src/rules/no-data-in-temp-storage/index.js +64 -0
- package/src/rules/no-debug-code-in-production/index.d.ts +8 -0
- package/src/rules/no-debug-code-in-production/index.js +51 -0
- package/src/rules/no-directive-injection/index.d.ts +12 -0
- package/src/rules/no-directive-injection/index.js +457 -0
- package/src/rules/no-disabled-certificate-validation/index.d.ts +6 -0
- package/src/rules/no-disabled-certificate-validation/index.js +61 -0
- package/src/rules/no-dynamic-dependency-loading/index.d.ts +8 -0
- package/src/rules/no-dynamic-dependency-loading/index.js +51 -0
- package/src/rules/no-electron-security-issues/index.d.ts +10 -0
- package/src/rules/no-electron-security-issues/index.js +423 -0
- package/src/rules/no-exposed-debug-endpoints/index.d.ts +6 -0
- package/src/rules/no-exposed-debug-endpoints/index.js +62 -0
- package/src/rules/no-exposed-sensitive-data/index.d.ts +11 -0
- package/src/rules/no-exposed-sensitive-data/index.js +340 -0
- package/src/rules/no-format-string-injection/index.d.ts +17 -0
- package/src/rules/no-format-string-injection/index.js +660 -0
- package/src/rules/no-graphql-injection/index.d.ts +12 -0
- package/src/rules/no-graphql-injection/index.js +411 -0
- package/src/rules/no-hardcoded-credentials/index.d.ts +26 -0
- package/src/rules/no-hardcoded-credentials/index.js +376 -0
- package/src/rules/no-hardcoded-session-tokens/index.d.ts +6 -0
- package/src/rules/no-hardcoded-session-tokens/index.js +59 -0
- package/src/rules/no-http-urls/index.d.ts +12 -0
- package/src/rules/no-http-urls/index.js +114 -0
- package/src/rules/no-improper-sanitization/index.d.ts +12 -0
- package/src/rules/no-improper-sanitization/index.js +411 -0
- package/src/rules/no-improper-type-validation/index.d.ts +10 -0
- package/src/rules/no-improper-type-validation/index.js +475 -0
- package/src/rules/no-insecure-comparison/index.d.ts +7 -0
- package/src/rules/no-insecure-comparison/index.js +193 -0
- package/src/rules/no-insecure-redirects/index.d.ts +7 -0
- package/src/rules/no-insecure-redirects/index.js +216 -0
- package/src/rules/no-insecure-websocket/index.d.ts +6 -0
- package/src/rules/no-insecure-websocket/index.js +61 -0
- package/src/rules/no-ldap-injection/index.d.ts +10 -0
- package/src/rules/no-ldap-injection/index.js +455 -0
- package/src/rules/no-missing-authentication/index.d.ts +13 -0
- package/src/rules/no-missing-authentication/index.js +333 -0
- package/src/rules/no-missing-cors-check/index.d.ts +9 -0
- package/src/rules/no-missing-cors-check/index.js +399 -0
- package/src/rules/no-missing-csrf-protection/index.d.ts +11 -0
- package/src/rules/no-missing-csrf-protection/index.js +180 -0
- package/src/rules/no-missing-security-headers/index.d.ts +7 -0
- package/src/rules/no-missing-security-headers/index.js +218 -0
- package/src/rules/no-password-in-url/index.d.ts +8 -0
- package/src/rules/no-password-in-url/index.js +54 -0
- package/src/rules/no-permissive-cors/index.d.ts +8 -0
- package/src/rules/no-permissive-cors/index.js +65 -0
- package/src/rules/no-pii-in-logs/index.d.ts +8 -0
- package/src/rules/no-pii-in-logs/index.js +70 -0
- package/src/rules/no-privilege-escalation/index.d.ts +13 -0
- package/src/rules/no-privilege-escalation/index.js +321 -0
- package/src/rules/no-redos-vulnerable-regex/index.d.ts +7 -0
- package/src/rules/no-redos-vulnerable-regex/index.js +306 -0
- package/src/rules/no-sensitive-data-exposure/index.d.ts +11 -0
- package/src/rules/no-sensitive-data-exposure/index.js +250 -0
- package/src/rules/no-sensitive-data-in-analytics/index.d.ts +8 -0
- package/src/rules/no-sensitive-data-in-analytics/index.js +62 -0
- package/src/rules/no-sensitive-data-in-cache/index.d.ts +8 -0
- package/src/rules/no-sensitive-data-in-cache/index.js +52 -0
- package/src/rules/no-toctou-vulnerability/index.d.ts +7 -0
- package/src/rules/no-toctou-vulnerability/index.js +208 -0
- package/src/rules/no-tracking-without-consent/index.d.ts +6 -0
- package/src/rules/no-tracking-without-consent/index.js +67 -0
- package/src/rules/no-unchecked-loop-condition/index.d.ts +12 -0
- package/src/rules/no-unchecked-loop-condition/index.js +646 -0
- package/src/rules/no-unencrypted-transmission/index.d.ts +11 -0
- package/src/rules/no-unencrypted-transmission/index.js +236 -0
- package/src/rules/no-unescaped-url-parameter/index.d.ts +9 -0
- package/src/rules/no-unescaped-url-parameter/index.js +355 -0
- package/src/rules/no-unlimited-resource-allocation/index.d.ts +12 -0
- package/src/rules/no-unlimited-resource-allocation/index.js +643 -0
- package/src/rules/no-unsafe-deserialization/index.d.ts +10 -0
- package/src/rules/no-unsafe-deserialization/index.js +491 -0
- package/src/rules/no-unsafe-dynamic-require/index.d.ts +5 -0
- package/src/rules/no-unsafe-dynamic-require/index.js +106 -0
- package/src/rules/no-unsafe-regex-construction/index.d.ts +9 -0
- package/src/rules/no-unsafe-regex-construction/index.js +291 -0
- package/src/rules/no-unvalidated-deeplinks/index.d.ts +6 -0
- package/src/rules/no-unvalidated-deeplinks/index.js +62 -0
- package/src/rules/no-unvalidated-user-input/index.d.ts +9 -0
- package/src/rules/no-unvalidated-user-input/index.js +420 -0
- package/src/rules/no-verbose-error-messages/index.d.ts +8 -0
- package/src/rules/no-verbose-error-messages/index.js +68 -0
- package/src/rules/no-weak-password-recovery/index.d.ts +12 -0
- package/src/rules/no-weak-password-recovery/index.js +424 -0
- package/src/rules/no-xpath-injection/index.d.ts +10 -0
- package/src/rules/no-xpath-injection/index.js +487 -0
- package/src/rules/no-xxe-injection/index.d.ts +7 -0
- package/src/rules/no-xxe-injection/index.js +266 -0
- package/src/rules/no-zip-slip/index.d.ts +9 -0
- package/src/rules/no-zip-slip/index.js +445 -0
- package/src/rules/require-backend-authorization/index.d.ts +6 -0
- package/src/rules/require-backend-authorization/index.js +60 -0
- package/src/rules/require-code-minification/index.d.ts +8 -0
- package/src/rules/require-code-minification/index.js +47 -0
- package/src/rules/require-csp-headers/index.d.ts +6 -0
- package/src/rules/require-csp-headers/index.js +64 -0
- package/src/rules/require-data-minimization/index.d.ts +8 -0
- package/src/rules/require-data-minimization/index.js +53 -0
- package/src/rules/require-dependency-integrity/index.d.ts +6 -0
- package/src/rules/require-dependency-integrity/index.js +64 -0
- package/src/rules/require-https-only/index.d.ts +8 -0
- package/src/rules/require-https-only/index.js +62 -0
- package/src/rules/require-mime-type-validation/index.d.ts +6 -0
- package/src/rules/require-mime-type-validation/index.js +66 -0
- package/src/rules/require-network-timeout/index.d.ts +8 -0
- package/src/rules/require-network-timeout/index.js +50 -0
- package/src/rules/require-package-lock/index.d.ts +8 -0
- package/src/rules/require-package-lock/index.js +63 -0
- package/src/rules/require-secure-credential-storage/index.d.ts +8 -0
- package/src/rules/require-secure-credential-storage/index.js +50 -0
- package/src/rules/require-secure-defaults/index.d.ts +8 -0
- package/src/rules/require-secure-defaults/index.js +47 -0
- package/src/rules/require-secure-deletion/index.d.ts +8 -0
- package/src/rules/require-secure-deletion/index.js +44 -0
- package/src/rules/require-storage-encryption/index.d.ts +8 -0
- package/src/rules/require-storage-encryption/index.js +50 -0
- package/src/rules/require-url-validation/index.d.ts +6 -0
- package/src/rules/require-url-validation/index.js +72 -0
- package/src/types/index.d.ts +106 -0
- package/src/types/index.js +16 -0
- package/src/index.ts +0 -605
- package/src/rules/__tests__/integration-demo.test.ts +0 -290
- package/src/rules/__tests__/integration-llm.test.ts +0 -89
- package/src/rules/database-injection/database-injection.test.ts +0 -456
- package/src/rules/database-injection/index.ts +0 -488
- package/src/rules/detect-child-process/detect-child-process.test.ts +0 -207
- package/src/rules/detect-child-process/index.ts +0 -634
- package/src/rules/detect-eval-with-expression/detect-eval-with-expression.test.ts +0 -416
- package/src/rules/detect-eval-with-expression/index.ts +0 -463
- package/src/rules/detect-mixed-content/detect-mixed-content.test.ts +0 -28
- package/src/rules/detect-mixed-content/index.ts +0 -52
- package/src/rules/detect-non-literal-fs-filename/detect-non-literal-fs-filename.test.ts +0 -269
- package/src/rules/detect-non-literal-fs-filename/index.ts +0 -551
- package/src/rules/detect-non-literal-regexp/detect-non-literal-regexp.test.ts +0 -189
- package/src/rules/detect-non-literal-regexp/index.ts +0 -490
- package/src/rules/detect-object-injection/detect-object-injection.test.ts +0 -440
- package/src/rules/detect-object-injection/index.ts +0 -674
- package/src/rules/detect-suspicious-dependencies/detect-suspicious-dependencies.test.ts +0 -32
- package/src/rules/detect-suspicious-dependencies/index.ts +0 -84
- package/src/rules/detect-weak-password-validation/detect-weak-password-validation.test.ts +0 -31
- package/src/rules/detect-weak-password-validation/index.ts +0 -68
- package/src/rules/no-allow-arbitrary-loads/index.ts +0 -54
- package/src/rules/no-allow-arbitrary-loads/no-allow-arbitrary-loads.test.ts +0 -28
- package/src/rules/no-arbitrary-file-access/index.ts +0 -238
- package/src/rules/no-arbitrary-file-access/no-arbitrary-file-access.test.ts +0 -119
- package/src/rules/no-buffer-overread/index.ts +0 -724
- package/src/rules/no-buffer-overread/no-buffer-overread.test.ts +0 -313
- package/src/rules/no-clickjacking/index.ts +0 -481
- package/src/rules/no-clickjacking/no-clickjacking.test.ts +0 -253
- package/src/rules/no-client-side-auth-logic/index.ts +0 -81
- package/src/rules/no-client-side-auth-logic/no-client-side-auth-logic.test.ts +0 -33
- package/src/rules/no-credentials-in-query-params/index.ts +0 -69
- package/src/rules/no-credentials-in-query-params/no-credentials-in-query-params.test.ts +0 -33
- package/src/rules/no-credentials-in-storage-api/index.ts +0 -64
- package/src/rules/no-credentials-in-storage-api/no-credentials-in-storage-api.test.ts +0 -31
- package/src/rules/no-data-in-temp-storage/index.ts +0 -75
- package/src/rules/no-data-in-temp-storage/no-data-in-temp-storage.test.ts +0 -33
- package/src/rules/no-debug-code-in-production/index.ts +0 -59
- package/src/rules/no-debug-code-in-production/no-debug-code-in-production.test.ts +0 -26
- package/src/rules/no-directive-injection/index.ts +0 -551
- package/src/rules/no-directive-injection/no-directive-injection.test.ts +0 -305
- package/src/rules/no-disabled-certificate-validation/index.ts +0 -72
- package/src/rules/no-disabled-certificate-validation/no-disabled-certificate-validation.test.ts +0 -33
- package/src/rules/no-document-cookie/index.ts +0 -113
- package/src/rules/no-document-cookie/no-document-cookie.test.ts +0 -382
- package/src/rules/no-dynamic-dependency-loading/index.ts +0 -60
- package/src/rules/no-dynamic-dependency-loading/no-dynamic-dependency-loading.test.ts +0 -27
- package/src/rules/no-electron-security-issues/index.ts +0 -504
- package/src/rules/no-electron-security-issues/no-electron-security-issues.test.ts +0 -324
- package/src/rules/no-exposed-debug-endpoints/index.ts +0 -73
- package/src/rules/no-exposed-debug-endpoints/no-exposed-debug-endpoints.test.ts +0 -40
- package/src/rules/no-exposed-sensitive-data/index.ts +0 -428
- package/src/rules/no-exposed-sensitive-data/no-exposed-sensitive-data.test.ts +0 -75
- package/src/rules/no-format-string-injection/index.ts +0 -801
- package/src/rules/no-format-string-injection/no-format-string-injection.test.ts +0 -437
- package/src/rules/no-graphql-injection/index.ts +0 -508
- package/src/rules/no-graphql-injection/no-graphql-injection.test.ts +0 -371
- package/src/rules/no-hardcoded-credentials/index.ts +0 -478
- package/src/rules/no-hardcoded-credentials/no-hardcoded-credentials.test.ts +0 -639
- package/src/rules/no-hardcoded-session-tokens/index.ts +0 -69
- package/src/rules/no-hardcoded-session-tokens/no-hardcoded-session-tokens.test.ts +0 -42
- package/src/rules/no-http-urls/index.ts +0 -131
- package/src/rules/no-http-urls/no-http-urls.test.ts +0 -60
- package/src/rules/no-improper-sanitization/index.ts +0 -502
- package/src/rules/no-improper-sanitization/no-improper-sanitization.test.ts +0 -156
- package/src/rules/no-improper-type-validation/index.ts +0 -572
- package/src/rules/no-improper-type-validation/no-improper-type-validation.test.ts +0 -372
- package/src/rules/no-insecure-comparison/index.ts +0 -232
- package/src/rules/no-insecure-comparison/no-insecure-comparison.test.ts +0 -218
- package/src/rules/no-insecure-cookie-settings/index.ts +0 -391
- package/src/rules/no-insecure-cookie-settings/no-insecure-cookie-settings.test.ts +0 -409
- package/src/rules/no-insecure-jwt/index.ts +0 -467
- package/src/rules/no-insecure-jwt/no-insecure-jwt.test.ts +0 -259
- package/src/rules/no-insecure-redirects/index.ts +0 -267
- package/src/rules/no-insecure-redirects/no-insecure-redirects.test.ts +0 -108
- package/src/rules/no-insecure-websocket/index.ts +0 -72
- package/src/rules/no-insecure-websocket/no-insecure-websocket.test.ts +0 -42
- package/src/rules/no-insufficient-postmessage-validation/index.ts +0 -497
- package/src/rules/no-insufficient-postmessage-validation/no-insufficient-postmessage-validation.test.ts +0 -360
- package/src/rules/no-insufficient-random/index.ts +0 -288
- package/src/rules/no-insufficient-random/no-insufficient-random.test.ts +0 -246
- package/src/rules/no-ldap-injection/index.ts +0 -547
- package/src/rules/no-ldap-injection/no-ldap-injection.test.ts +0 -317
- package/src/rules/no-missing-authentication/index.ts +0 -408
- package/src/rules/no-missing-authentication/no-missing-authentication.test.ts +0 -350
- package/src/rules/no-missing-cors-check/index.ts +0 -453
- package/src/rules/no-missing-cors-check/no-missing-cors-check.test.ts +0 -392
- package/src/rules/no-missing-csrf-protection/index.ts +0 -229
- package/src/rules/no-missing-csrf-protection/no-missing-csrf-protection.test.ts +0 -222
- package/src/rules/no-missing-security-headers/index.ts +0 -266
- package/src/rules/no-missing-security-headers/no-missing-security-headers.test.ts +0 -98
- package/src/rules/no-password-in-url/index.ts +0 -64
- package/src/rules/no-password-in-url/no-password-in-url.test.ts +0 -27
- package/src/rules/no-permissive-cors/index.ts +0 -78
- package/src/rules/no-permissive-cors/no-permissive-cors.test.ts +0 -28
- package/src/rules/no-pii-in-logs/index.ts +0 -83
- package/src/rules/no-pii-in-logs/no-pii-in-logs.test.ts +0 -26
- package/src/rules/no-postmessage-origin-wildcard/index.ts +0 -67
- package/src/rules/no-postmessage-origin-wildcard/no-postmessage-origin-wildcard.test.ts +0 -27
- package/src/rules/no-privilege-escalation/index.ts +0 -403
- package/src/rules/no-privilege-escalation/no-privilege-escalation.test.ts +0 -306
- package/src/rules/no-redos-vulnerable-regex/index.ts +0 -379
- package/src/rules/no-redos-vulnerable-regex/no-redos-vulnerable-regex.test.ts +0 -83
- package/src/rules/no-sensitive-data-exposure/index.ts +0 -294
- package/src/rules/no-sensitive-data-exposure/no-sensitive-data-exposure.test.ts +0 -262
- package/src/rules/no-sensitive-data-in-analytics/index.ts +0 -73
- package/src/rules/no-sensitive-data-in-analytics/no-sensitive-data-in-analytics.test.ts +0 -42
- package/src/rules/no-sensitive-data-in-cache/index.ts +0 -59
- package/src/rules/no-sensitive-data-in-cache/no-sensitive-data-in-cache.test.ts +0 -32
- package/src/rules/no-sql-injection/index.ts +0 -424
- package/src/rules/no-sql-injection/no-sql-injection.test.ts +0 -303
- package/src/rules/no-timing-attack/index.ts +0 -552
- package/src/rules/no-timing-attack/no-timing-attack.test.ts +0 -348
- package/src/rules/no-toctou-vulnerability/index.ts +0 -250
- package/src/rules/no-toctou-vulnerability/no-toctou-vulnerability.test.ts +0 -60
- package/src/rules/no-tracking-without-consent/index.ts +0 -78
- package/src/rules/no-tracking-without-consent/no-tracking-without-consent.test.ts +0 -34
- package/src/rules/no-unchecked-loop-condition/index.ts +0 -781
- package/src/rules/no-unchecked-loop-condition/no-unchecked-loop-condition.test.ts +0 -459
- package/src/rules/no-unencrypted-local-storage/index.ts +0 -73
- package/src/rules/no-unencrypted-local-storage/no-unencrypted-local-storage.test.ts +0 -41
- package/src/rules/no-unencrypted-transmission/index.ts +0 -296
- package/src/rules/no-unencrypted-transmission/no-unencrypted-transmission.test.ts +0 -287
- package/src/rules/no-unescaped-url-parameter/index.ts +0 -424
- package/src/rules/no-unescaped-url-parameter/no-unescaped-url-parameter.test.ts +0 -263
- package/src/rules/no-unlimited-resource-allocation/index.ts +0 -767
- package/src/rules/no-unlimited-resource-allocation/no-unlimited-resource-allocation.test.ts +0 -544
- package/src/rules/no-unsafe-deserialization/index.ts +0 -593
- package/src/rules/no-unsafe-deserialization/no-unsafe-deserialization.test.ts +0 -310
- package/src/rules/no-unsafe-dynamic-require/index.ts +0 -125
- package/src/rules/no-unsafe-dynamic-require/no-unsafe-dynamic-require.test.ts +0 -151
- package/src/rules/no-unsafe-regex-construction/index.ts +0 -370
- package/src/rules/no-unsafe-regex-construction/no-unsafe-regex-construction.test.ts +0 -181
- package/src/rules/no-unsanitized-html/index.ts +0 -400
- package/src/rules/no-unsanitized-html/no-unsanitized-html.test.ts +0 -488
- package/src/rules/no-unvalidated-deeplinks/index.ts +0 -73
- package/src/rules/no-unvalidated-deeplinks/no-unvalidated-deeplinks.test.ts +0 -29
- package/src/rules/no-unvalidated-user-input/index.ts +0 -498
- package/src/rules/no-unvalidated-user-input/no-unvalidated-user-input.test.ts +0 -463
- package/src/rules/no-verbose-error-messages/index.ts +0 -83
- package/src/rules/no-verbose-error-messages/no-verbose-error-messages.test.ts +0 -34
- package/src/rules/no-weak-crypto/index.ts +0 -447
- package/src/rules/no-weak-crypto/no-weak-crypto.test.ts +0 -297
- package/src/rules/no-weak-password-recovery/index.ts +0 -509
- package/src/rules/no-weak-password-recovery/no-weak-password-recovery.test.ts +0 -184
- package/src/rules/no-xpath-injection/index.ts +0 -596
- package/src/rules/no-xpath-injection/no-xpath-injection.test.ts +0 -405
- package/src/rules/no-xxe-injection/index.ts +0 -342
- package/src/rules/no-xxe-injection/no-xxe-injection.test.ts +0 -122
- package/src/rules/no-zip-slip/index.ts +0 -526
- package/src/rules/no-zip-slip/no-zip-slip.test.ts +0 -305
- package/src/rules/require-backend-authorization/index.ts +0 -71
- package/src/rules/require-backend-authorization/require-backend-authorization.test.ts +0 -31
- package/src/rules/require-code-minification/index.ts +0 -54
- package/src/rules/require-code-minification/require-code-minification.test.ts +0 -30
- package/src/rules/require-csp-headers/index.ts +0 -74
- package/src/rules/require-csp-headers/require-csp-headers.test.ts +0 -34
- package/src/rules/require-data-minimization/index.ts +0 -65
- package/src/rules/require-data-minimization/require-data-minimization.test.ts +0 -31
- package/src/rules/require-dependency-integrity/index.ts +0 -78
- package/src/rules/require-dependency-integrity/require-dependency-integrity.test.ts +0 -44
- package/src/rules/require-https-only/index.ts +0 -75
- package/src/rules/require-https-only/require-https-only.test.ts +0 -26
- package/src/rules/require-mime-type-validation/index.ts +0 -77
- package/src/rules/require-mime-type-validation/require-mime-type-validation.test.ts +0 -32
- package/src/rules/require-network-timeout/index.ts +0 -58
- package/src/rules/require-network-timeout/require-network-timeout.test.ts +0 -26
- package/src/rules/require-package-lock/index.ts +0 -75
- package/src/rules/require-package-lock/require-package-lock.test.ts +0 -27
- package/src/rules/require-secure-credential-storage/index.ts +0 -60
- package/src/rules/require-secure-credential-storage/require-secure-credential-storage.test.ts +0 -26
- package/src/rules/require-secure-defaults/index.ts +0 -54
- package/src/rules/require-secure-defaults/require-secure-defaults.test.ts +0 -26
- package/src/rules/require-secure-deletion/index.ts +0 -52
- package/src/rules/require-secure-deletion/require-secure-deletion.test.ts +0 -29
- package/src/rules/require-storage-encryption/index.ts +0 -60
- package/src/rules/require-storage-encryption/require-storage-encryption.test.ts +0 -26
- package/src/rules/require-url-validation/index.ts +0 -85
- package/src/rules/require-url-validation/require-url-validation.test.ts +0 -32
- package/src/types/index.ts +0 -235
|
@@ -0,0 +1,250 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.noSensitiveDataExposure = void 0;
|
|
4
|
+
const eslint_devkit_1 = require("@interlace/eslint-devkit");
|
|
5
|
+
const eslint_devkit_2 = require("@interlace/eslint-devkit");
|
|
6
|
+
/**
|
|
7
|
+
* Check if string contains sensitive data patterns
|
|
8
|
+
*/
|
|
9
|
+
function containsSensitiveData(text, patterns) {
|
|
10
|
+
const lowerText = text.toLowerCase();
|
|
11
|
+
return patterns.some(pattern => lowerText.includes(pattern.toLowerCase()));
|
|
12
|
+
}
|
|
13
|
+
exports.noSensitiveDataExposure = (0, eslint_devkit_2.createRule)({
|
|
14
|
+
name: 'no-sensitive-data-exposure',
|
|
15
|
+
meta: {
|
|
16
|
+
type: 'problem',
|
|
17
|
+
docs: {
|
|
18
|
+
description: 'Detects PII/credentials in logs, responses, or error messages',
|
|
19
|
+
},
|
|
20
|
+
hasSuggestions: true,
|
|
21
|
+
messages: {
|
|
22
|
+
sensitiveDataExposure: (0, eslint_devkit_1.formatLLMMessage)({
|
|
23
|
+
icon: eslint_devkit_1.MessageIcons.SECURITY,
|
|
24
|
+
issueName: 'Sensitive data exposure',
|
|
25
|
+
cwe: 'CWE-532',
|
|
26
|
+
description: 'Sensitive data detected in {{context}}: {{dataType}}',
|
|
27
|
+
severity: 'HIGH',
|
|
28
|
+
fix: 'Redact or mask sensitive data before logging/exposing',
|
|
29
|
+
documentationLink: 'https://cwe.mitre.org/data/definitions/532.html',
|
|
30
|
+
}),
|
|
31
|
+
redactData: (0, eslint_devkit_1.formatLLMMessage)({
|
|
32
|
+
icon: eslint_devkit_1.MessageIcons.INFO,
|
|
33
|
+
issueName: 'Redact Data',
|
|
34
|
+
description: 'Redact sensitive data before logging',
|
|
35
|
+
severity: 'LOW',
|
|
36
|
+
fix: 'Redact sensitive fields before logging',
|
|
37
|
+
documentationLink: 'https://cwe.mitre.org/data/definitions/532.html',
|
|
38
|
+
}),
|
|
39
|
+
useMasking: (0, eslint_devkit_1.formatLLMMessage)({
|
|
40
|
+
icon: eslint_devkit_1.MessageIcons.INFO,
|
|
41
|
+
issueName: 'Use Masking',
|
|
42
|
+
description: 'Use data masking function',
|
|
43
|
+
severity: 'LOW',
|
|
44
|
+
fix: 'maskSensitive(data)',
|
|
45
|
+
documentationLink: 'https://cwe.mitre.org/data/definitions/532.html',
|
|
46
|
+
}),
|
|
47
|
+
removeFromLogs: (0, eslint_devkit_1.formatLLMMessage)({
|
|
48
|
+
icon: eslint_devkit_1.MessageIcons.INFO,
|
|
49
|
+
issueName: 'Remove From Logs',
|
|
50
|
+
description: 'Remove sensitive data from logs and errors',
|
|
51
|
+
severity: 'LOW',
|
|
52
|
+
fix: 'Filter sensitive data before logging',
|
|
53
|
+
documentationLink: 'https://cwe.mitre.org/data/definitions/532.html',
|
|
54
|
+
}),
|
|
55
|
+
},
|
|
56
|
+
schema: [
|
|
57
|
+
{
|
|
58
|
+
type: 'object',
|
|
59
|
+
properties: {
|
|
60
|
+
sensitivePatterns: {
|
|
61
|
+
type: 'array',
|
|
62
|
+
items: { type: 'string' },
|
|
63
|
+
default: ['password', 'secret', 'token', 'key', 'ssn', 'credit', 'card', 'api_key', 'apikey'],
|
|
64
|
+
description: 'Sensitive data patterns',
|
|
65
|
+
},
|
|
66
|
+
checkConsoleLog: {
|
|
67
|
+
type: 'boolean',
|
|
68
|
+
default: true,
|
|
69
|
+
description: 'Check console.log statements',
|
|
70
|
+
},
|
|
71
|
+
checkErrorMessages: {
|
|
72
|
+
type: 'boolean',
|
|
73
|
+
default: true,
|
|
74
|
+
description: 'Check error messages',
|
|
75
|
+
},
|
|
76
|
+
checkApiResponses: {
|
|
77
|
+
type: 'boolean',
|
|
78
|
+
default: true,
|
|
79
|
+
description: 'Check API responses',
|
|
80
|
+
},
|
|
81
|
+
},
|
|
82
|
+
additionalProperties: false,
|
|
83
|
+
},
|
|
84
|
+
],
|
|
85
|
+
},
|
|
86
|
+
defaultOptions: [
|
|
87
|
+
{
|
|
88
|
+
sensitivePatterns: ['password', 'secret', 'token', 'key', 'ssn', 'credit', 'card', 'api_key', 'apikey'],
|
|
89
|
+
checkConsoleLog: true,
|
|
90
|
+
checkErrorMessages: true,
|
|
91
|
+
checkApiResponses: true,
|
|
92
|
+
},
|
|
93
|
+
],
|
|
94
|
+
create(context, [options = {}]) {
|
|
95
|
+
const { sensitivePatterns = ['password', 'secret', 'token', 'key', 'ssn', 'credit', 'card', 'api_key', 'apikey'], checkConsoleLog = true, checkErrorMessages = true, } = options || {};
|
|
96
|
+
/**
|
|
97
|
+
* Check CallExpression for logging calls with sensitive data
|
|
98
|
+
*/
|
|
99
|
+
function checkCallExpression(node) {
|
|
100
|
+
// Check if it's a logging call (console.*, logger.*)
|
|
101
|
+
const isLoggingCall = (() => {
|
|
102
|
+
if (node.callee.type === 'MemberExpression') {
|
|
103
|
+
const object = node.callee.object;
|
|
104
|
+
const property = node.callee.property;
|
|
105
|
+
if (property.type === 'Identifier') {
|
|
106
|
+
const methodName = property.name.toLowerCase();
|
|
107
|
+
if (['log', 'info', 'warn', 'error', 'debug', 'trace'].includes(methodName)) {
|
|
108
|
+
// Check if it's console.* or logger.*
|
|
109
|
+
if (object.type === 'Identifier') {
|
|
110
|
+
const objName = object.name.toLowerCase();
|
|
111
|
+
if (objName === 'console' || objName === 'logger') {
|
|
112
|
+
return true;
|
|
113
|
+
}
|
|
114
|
+
}
|
|
115
|
+
}
|
|
116
|
+
}
|
|
117
|
+
}
|
|
118
|
+
else if (node.callee.type === 'Identifier') {
|
|
119
|
+
// Check for logger.info() pattern
|
|
120
|
+
const calleeName = node.callee.name.toLowerCase();
|
|
121
|
+
if (calleeName.includes('log') || calleeName.includes('logger')) {
|
|
122
|
+
return true;
|
|
123
|
+
}
|
|
124
|
+
}
|
|
125
|
+
return false;
|
|
126
|
+
})();
|
|
127
|
+
if (isLoggingCall && checkConsoleLog) {
|
|
128
|
+
// Check if any argument contains sensitive data
|
|
129
|
+
for (const arg of node.arguments) {
|
|
130
|
+
if (arg.type === 'Literal' && typeof arg.value === 'string') {
|
|
131
|
+
const text = arg.value;
|
|
132
|
+
if (containsSensitiveData(text, sensitivePatterns)) {
|
|
133
|
+
context.report({
|
|
134
|
+
node: arg,
|
|
135
|
+
messageId: 'sensitiveDataExposure',
|
|
136
|
+
data: {
|
|
137
|
+
context: 'logs',
|
|
138
|
+
dataType: 'password',
|
|
139
|
+
},
|
|
140
|
+
suggest: [
|
|
141
|
+
{ messageId: 'redactData', fix: () => null },
|
|
142
|
+
{ messageId: 'useMasking', fix: () => null },
|
|
143
|
+
{ messageId: 'removeFromLogs', fix: () => null },
|
|
144
|
+
],
|
|
145
|
+
});
|
|
146
|
+
return; // Only report once per call
|
|
147
|
+
}
|
|
148
|
+
}
|
|
149
|
+
else if (arg.type === 'Identifier' && arg.name) {
|
|
150
|
+
const name = arg.name.toLowerCase();
|
|
151
|
+
if (containsSensitiveData(name, sensitivePatterns)) {
|
|
152
|
+
context.report({
|
|
153
|
+
node: arg,
|
|
154
|
+
messageId: 'sensitiveDataExposure',
|
|
155
|
+
data: {
|
|
156
|
+
context: 'logs',
|
|
157
|
+
dataType: 'password',
|
|
158
|
+
},
|
|
159
|
+
suggest: [
|
|
160
|
+
{ messageId: 'redactData', fix: () => null },
|
|
161
|
+
{ messageId: 'useMasking', fix: () => null },
|
|
162
|
+
{ messageId: 'removeFromLogs', fix: () => null },
|
|
163
|
+
],
|
|
164
|
+
});
|
|
165
|
+
return; // Only report once per call
|
|
166
|
+
}
|
|
167
|
+
}
|
|
168
|
+
}
|
|
169
|
+
}
|
|
170
|
+
}
|
|
171
|
+
/**
|
|
172
|
+
* Check NewExpression for Error with sensitive data
|
|
173
|
+
*/
|
|
174
|
+
function checkNewExpression(node) {
|
|
175
|
+
if (!checkErrorMessages) {
|
|
176
|
+
return;
|
|
177
|
+
}
|
|
178
|
+
if (node.callee && node.callee.type === 'Identifier' && node.callee.name === 'Error') {
|
|
179
|
+
// Check all arguments for sensitive data (report only once per error)
|
|
180
|
+
for (const arg of node.arguments) {
|
|
181
|
+
if (arg.type === 'Literal' && typeof arg.value === 'string') {
|
|
182
|
+
const text = arg.value;
|
|
183
|
+
if (containsSensitiveData(text, sensitivePatterns)) {
|
|
184
|
+
context.report({
|
|
185
|
+
node: arg,
|
|
186
|
+
messageId: 'sensitiveDataExposure',
|
|
187
|
+
data: {
|
|
188
|
+
context: 'error messages',
|
|
189
|
+
dataType: 'password',
|
|
190
|
+
},
|
|
191
|
+
suggest: [
|
|
192
|
+
{ messageId: 'redactData', fix: () => null },
|
|
193
|
+
{ messageId: 'useMasking', fix: () => null },
|
|
194
|
+
{ messageId: 'removeFromLogs', fix: () => null },
|
|
195
|
+
],
|
|
196
|
+
});
|
|
197
|
+
return; // Only report once per error
|
|
198
|
+
}
|
|
199
|
+
}
|
|
200
|
+
else if (arg.type === 'BinaryExpression' && arg.operator === '+') {
|
|
201
|
+
// Check left side if it's a literal
|
|
202
|
+
if (arg.left && arg.left.type === 'Literal' && typeof arg.left.value === 'string') {
|
|
203
|
+
const leftText = arg.left.value;
|
|
204
|
+
if (containsSensitiveData(leftText, sensitivePatterns)) {
|
|
205
|
+
context.report({
|
|
206
|
+
node: arg.left,
|
|
207
|
+
messageId: 'sensitiveDataExposure',
|
|
208
|
+
data: {
|
|
209
|
+
context: 'error messages',
|
|
210
|
+
dataType: 'password',
|
|
211
|
+
},
|
|
212
|
+
suggest: [
|
|
213
|
+
{ messageId: 'redactData', fix: () => null },
|
|
214
|
+
{ messageId: 'useMasking', fix: () => null },
|
|
215
|
+
{ messageId: 'removeFromLogs', fix: () => null },
|
|
216
|
+
],
|
|
217
|
+
});
|
|
218
|
+
return; // Only report once per error
|
|
219
|
+
}
|
|
220
|
+
}
|
|
221
|
+
// Check right side if it's an identifier
|
|
222
|
+
if (arg.right && arg.right.type === 'Identifier' && arg.right.name) {
|
|
223
|
+
const rightName = arg.right.name.toLowerCase();
|
|
224
|
+
if (containsSensitiveData(rightName, sensitivePatterns)) {
|
|
225
|
+
context.report({
|
|
226
|
+
node: arg.right,
|
|
227
|
+
messageId: 'sensitiveDataExposure',
|
|
228
|
+
data: {
|
|
229
|
+
context: 'error messages',
|
|
230
|
+
dataType: 'password',
|
|
231
|
+
},
|
|
232
|
+
suggest: [
|
|
233
|
+
{ messageId: 'redactData', fix: () => null },
|
|
234
|
+
{ messageId: 'useMasking', fix: () => null },
|
|
235
|
+
{ messageId: 'removeFromLogs', fix: () => null },
|
|
236
|
+
],
|
|
237
|
+
});
|
|
238
|
+
return; // Only report once per error
|
|
239
|
+
}
|
|
240
|
+
}
|
|
241
|
+
}
|
|
242
|
+
}
|
|
243
|
+
}
|
|
244
|
+
}
|
|
245
|
+
return {
|
|
246
|
+
CallExpression: checkCallExpression,
|
|
247
|
+
NewExpression: checkNewExpression,
|
|
248
|
+
};
|
|
249
|
+
},
|
|
250
|
+
});
|
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* @fileoverview Prevent PII sent to analytics
|
|
3
|
+
* @see https://owasp.org/www-project-mobile-top-10/
|
|
4
|
+
* @see https://cwe.mitre.org/data/definitions/359.html
|
|
5
|
+
*/
|
|
6
|
+
export interface Options {
|
|
7
|
+
}
|
|
8
|
+
export declare const noSensitiveDataInAnalytics: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
|
|
@@ -0,0 +1,62 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* @fileoverview Prevent PII sent to analytics
|
|
4
|
+
* @see https://owasp.org/www-project-mobile-top-10/
|
|
5
|
+
* @see https://cwe.mitre.org/data/definitions/359.html
|
|
6
|
+
*/
|
|
7
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
8
|
+
exports.noSensitiveDataInAnalytics = void 0;
|
|
9
|
+
const eslint_devkit_1 = require("@interlace/eslint-devkit");
|
|
10
|
+
exports.noSensitiveDataInAnalytics = (0, eslint_devkit_1.createRule)({
|
|
11
|
+
name: 'no-sensitive-data-in-analytics',
|
|
12
|
+
meta: {
|
|
13
|
+
type: 'problem',
|
|
14
|
+
docs: {
|
|
15
|
+
description: 'Prevent PII being sent to analytics services',
|
|
16
|
+
category: 'Security',
|
|
17
|
+
recommended: true,
|
|
18
|
+
owaspMobile: ['M6'],
|
|
19
|
+
cweIds: ['CWE-359'],
|
|
20
|
+
},
|
|
21
|
+
messages: {
|
|
22
|
+
violationDetected: (0, eslint_devkit_1.formatLLMMessage)({
|
|
23
|
+
icon: eslint_devkit_1.MessageIcons.SECURITY,
|
|
24
|
+
issueName: 'Sensitive Data in Analytics',
|
|
25
|
+
cwe: 'CWE-359',
|
|
26
|
+
description: 'Sensitive field sent to analytics - this is a privacy violation',
|
|
27
|
+
severity: 'HIGH',
|
|
28
|
+
fix: 'Remove PII from analytics tracking data',
|
|
29
|
+
documentationLink: 'https://cwe.mitre.org/data/definitions/359.html',
|
|
30
|
+
})
|
|
31
|
+
},
|
|
32
|
+
schema: [],
|
|
33
|
+
},
|
|
34
|
+
defaultOptions: [],
|
|
35
|
+
create(context) {
|
|
36
|
+
const sensitiveFields = ['email', 'ssn', 'creditcard', 'password', 'phone', 'address'];
|
|
37
|
+
function report(node, field) {
|
|
38
|
+
context.report({ node, messageId: 'violationDetected', data: { field } });
|
|
39
|
+
}
|
|
40
|
+
return {
|
|
41
|
+
CallExpression(node) {
|
|
42
|
+
// analytics.track() with sensitive data
|
|
43
|
+
if (node.callee.type === 'MemberExpression' &&
|
|
44
|
+
node.callee.object.name === 'analytics' &&
|
|
45
|
+
node.callee.property.name === 'track') {
|
|
46
|
+
const dataArg = node.arguments[1];
|
|
47
|
+
if (dataArg?.type === 'ObjectExpression') {
|
|
48
|
+
dataArg.properties.forEach(prop => {
|
|
49
|
+
if (prop.type === 'Property') {
|
|
50
|
+
const key = prop.key.name?.toLowerCase();
|
|
51
|
+
const matchedField = sensitiveFields.find(f => key?.includes(f));
|
|
52
|
+
if (matchedField) {
|
|
53
|
+
report(prop, matchedField);
|
|
54
|
+
}
|
|
55
|
+
}
|
|
56
|
+
});
|
|
57
|
+
}
|
|
58
|
+
}
|
|
59
|
+
},
|
|
60
|
+
};
|
|
61
|
+
},
|
|
62
|
+
});
|
|
@@ -0,0 +1,8 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* @fileoverview Prevent caching sensitive data without encryption
|
|
3
|
+
* @see https://owasp.org/www-project-mobile-top-10/
|
|
4
|
+
* @see https://cwe.mitre.org/data/definitions/524.html
|
|
5
|
+
*/
|
|
6
|
+
export interface Options {
|
|
7
|
+
}
|
|
8
|
+
export declare const noSensitiveDataInCache: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
|
|
@@ -0,0 +1,52 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/**
|
|
3
|
+
* @fileoverview Prevent caching sensitive data without encryption
|
|
4
|
+
* @see https://owasp.org/www-project-mobile-top-10/
|
|
5
|
+
* @see https://cwe.mitre.org/data/definitions/524.html
|
|
6
|
+
*/
|
|
7
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
8
|
+
exports.noSensitiveDataInCache = void 0;
|
|
9
|
+
const eslint_devkit_1 = require("@interlace/eslint-devkit");
|
|
10
|
+
exports.noSensitiveDataInCache = (0, eslint_devkit_1.createRule)({
|
|
11
|
+
name: 'no-sensitive-data-in-cache',
|
|
12
|
+
meta: {
|
|
13
|
+
type: 'problem',
|
|
14
|
+
docs: {
|
|
15
|
+
description: 'Prevent caching sensitive data without encryption',
|
|
16
|
+
category: 'Security',
|
|
17
|
+
recommended: true,
|
|
18
|
+
owaspMobile: ['M9'],
|
|
19
|
+
cweIds: ["CWE-524"],
|
|
20
|
+
},
|
|
21
|
+
messages: {
|
|
22
|
+
violationDetected: (0, eslint_devkit_1.formatLLMMessage)({
|
|
23
|
+
icon: eslint_devkit_1.MessageIcons.SECURITY,
|
|
24
|
+
issueName: 'violation Detected',
|
|
25
|
+
cwe: 'CWE-200',
|
|
26
|
+
description: 'Prevent caching sensitive data without encryption detected - Sensitive data in cache',
|
|
27
|
+
severity: 'HIGH',
|
|
28
|
+
fix: 'Review and apply secure practices',
|
|
29
|
+
documentationLink: 'https://cwe.mitre.org/data/definitions/200.html',
|
|
30
|
+
})
|
|
31
|
+
},
|
|
32
|
+
schema: [],
|
|
33
|
+
},
|
|
34
|
+
defaultOptions: [],
|
|
35
|
+
create(context) {
|
|
36
|
+
return {
|
|
37
|
+
CallExpression(node) {
|
|
38
|
+
if (node.callee.type === 'MemberExpression' &&
|
|
39
|
+
node.callee.property.type === 'Identifier' &&
|
|
40
|
+
['set', 'put', 'store'].includes(node.callee.property.name)) {
|
|
41
|
+
const keyArg = node.arguments[0];
|
|
42
|
+
if (keyArg && keyArg.type === 'Literal') {
|
|
43
|
+
const key = keyArg.value.toString().toLowerCase();
|
|
44
|
+
if (['password', 'token', 'credit', 'ssn'].some(k => key.includes(k))) {
|
|
45
|
+
context.report({ node, messageId: 'violationDetected' });
|
|
46
|
+
}
|
|
47
|
+
}
|
|
48
|
+
}
|
|
49
|
+
},
|
|
50
|
+
};
|
|
51
|
+
},
|
|
52
|
+
});
|
|
@@ -0,0 +1,7 @@
|
|
|
1
|
+
export interface Options {
|
|
2
|
+
/** Ignore in test files. Default: true */
|
|
3
|
+
ignoreInTests?: boolean;
|
|
4
|
+
/** File system methods to check. Default: ['fs.existsSync', 'fs.statSync', 'fs.accessSync'] */
|
|
5
|
+
fsMethods?: string[];
|
|
6
|
+
}
|
|
7
|
+
export declare const noToctouVulnerability: ESLintUtils.RuleModule<MessageIds, Options, unknown, ESLintUtils.RuleListener>;
|
|
@@ -0,0 +1,208 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
+
exports.noToctouVulnerability = void 0;
|
|
4
|
+
const eslint_devkit_1 = require("@interlace/eslint-devkit");
|
|
5
|
+
const eslint_devkit_2 = require("@interlace/eslint-devkit");
|
|
6
|
+
exports.noToctouVulnerability = (0, eslint_devkit_2.createRule)({
|
|
7
|
+
name: 'no-toctou-vulnerability',
|
|
8
|
+
meta: {
|
|
9
|
+
type: 'problem',
|
|
10
|
+
docs: {
|
|
11
|
+
description: 'Detects Time-of-Check-Time-of-Use vulnerabilities',
|
|
12
|
+
},
|
|
13
|
+
hasSuggestions: true,
|
|
14
|
+
messages: {
|
|
15
|
+
toctouVulnerability: (0, eslint_devkit_1.formatLLMMessage)({
|
|
16
|
+
icon: eslint_devkit_1.MessageIcons.SECURITY,
|
|
17
|
+
issueName: 'TOCTOU vulnerability',
|
|
18
|
+
cwe: 'CWE-367',
|
|
19
|
+
description: 'Time-of-check Time-of-use race condition detected',
|
|
20
|
+
severity: 'HIGH',
|
|
21
|
+
fix: 'Use atomic operations or fs.promises for file operations',
|
|
22
|
+
documentationLink: 'https://cwe.mitre.org/data/definitions/367.html',
|
|
23
|
+
}),
|
|
24
|
+
useAtomicOperations: (0, eslint_devkit_1.formatLLMMessage)({
|
|
25
|
+
icon: eslint_devkit_1.MessageIcons.INFO,
|
|
26
|
+
issueName: 'Use Atomic Operations',
|
|
27
|
+
description: 'Use atomic file operations',
|
|
28
|
+
severity: 'LOW',
|
|
29
|
+
fix: 'fs.promises.access() then fs.promises.readFile()',
|
|
30
|
+
documentationLink: 'https://nodejs.org/api/fs.html#fspromisesaccesspath-mode',
|
|
31
|
+
}),
|
|
32
|
+
useFsPromises: (0, eslint_devkit_1.formatLLMMessage)({
|
|
33
|
+
icon: eslint_devkit_1.MessageIcons.INFO,
|
|
34
|
+
issueName: 'Use fs.promises',
|
|
35
|
+
description: 'Use fs.promises API',
|
|
36
|
+
severity: 'LOW',
|
|
37
|
+
fix: 'await fs.promises.readFile() instead of sync operations',
|
|
38
|
+
documentationLink: 'https://nodejs.org/api/fs.html#promises-api',
|
|
39
|
+
}),
|
|
40
|
+
addProperLocking: (0, eslint_devkit_1.formatLLMMessage)({
|
|
41
|
+
icon: eslint_devkit_1.MessageIcons.INFO,
|
|
42
|
+
issueName: 'Add File Locking',
|
|
43
|
+
description: 'Add proper locking mechanism',
|
|
44
|
+
severity: 'LOW',
|
|
45
|
+
fix: 'Use proper-lockfile or similar for concurrent access',
|
|
46
|
+
documentationLink: 'https://github.com/moxystudio/node-proper-lockfile',
|
|
47
|
+
}),
|
|
48
|
+
},
|
|
49
|
+
schema: [
|
|
50
|
+
{
|
|
51
|
+
type: 'object',
|
|
52
|
+
properties: {
|
|
53
|
+
ignoreInTests: {
|
|
54
|
+
type: 'boolean',
|
|
55
|
+
default: true,
|
|
56
|
+
},
|
|
57
|
+
fsMethods: {
|
|
58
|
+
type: 'array',
|
|
59
|
+
items: { type: 'string' },
|
|
60
|
+
default: ['fs.existsSync', 'fs.statSync', 'fs.accessSync'],
|
|
61
|
+
},
|
|
62
|
+
},
|
|
63
|
+
additionalProperties: false,
|
|
64
|
+
},
|
|
65
|
+
],
|
|
66
|
+
},
|
|
67
|
+
defaultOptions: [
|
|
68
|
+
{
|
|
69
|
+
ignoreInTests: true,
|
|
70
|
+
fsMethods: ['fs.existsSync', 'fs.statSync', 'fs.accessSync'],
|
|
71
|
+
},
|
|
72
|
+
],
|
|
73
|
+
create(context, [options = {}]) {
|
|
74
|
+
const { ignoreInTests = true } = options || {};
|
|
75
|
+
const filename = context.getFilename();
|
|
76
|
+
const isTestFile = ignoreInTests && /\.(test|spec)\.(ts|tsx|js|jsx)$/.test(filename);
|
|
77
|
+
if (isTestFile) {
|
|
78
|
+
return {};
|
|
79
|
+
}
|
|
80
|
+
const sourceCode = context.sourceCode || context.sourceCode;
|
|
81
|
+
/**
|
|
82
|
+
* Check for TOCTOU patterns
|
|
83
|
+
*/
|
|
84
|
+
function checkCallExpression(node) {
|
|
85
|
+
// 1. Identify the file operation (Use)
|
|
86
|
+
let useMethodName = '';
|
|
87
|
+
if (node.callee.type === 'MemberExpression' && node.callee.property.type === 'Identifier') {
|
|
88
|
+
const objectName = node.callee.object.type === 'Identifier' ? node.callee.object.name : '';
|
|
89
|
+
if (objectName === 'fs' || objectName === 'fsPromises') {
|
|
90
|
+
useMethodName = node.callee.property.name;
|
|
91
|
+
}
|
|
92
|
+
}
|
|
93
|
+
else if (node.callee.type === 'Identifier') {
|
|
94
|
+
useMethodName = node.callee.name;
|
|
95
|
+
}
|
|
96
|
+
const riskyUseMethods = ['readFileSync', 'writeFileSync', 'readFile', 'writeFile', 'openSync', 'open', 'unlinkSync', 'unlink'];
|
|
97
|
+
if (!riskyUseMethods.includes(useMethodName)) {
|
|
98
|
+
return;
|
|
99
|
+
}
|
|
100
|
+
const useArg = node.arguments[0];
|
|
101
|
+
if (!useArg)
|
|
102
|
+
return;
|
|
103
|
+
// 2. Walk up to find the condition (Check)
|
|
104
|
+
let current = node.parent;
|
|
105
|
+
while (current) {
|
|
106
|
+
if (current.type === 'IfStatement') {
|
|
107
|
+
// Extract the condition node
|
|
108
|
+
let condition = current.test;
|
|
109
|
+
// Handle negated condition: if (!exists(path)) { create(path) } -> also TOCTOU but different logic?
|
|
110
|
+
// Actually TOCTOU is usually Check(exists) -> Use(read).
|
|
111
|
+
// If (!exists) -> create is Check -> Use.
|
|
112
|
+
// But strict TOCTOU is checking state then acting.
|
|
113
|
+
// If checking for negation
|
|
114
|
+
if (condition.type === 'UnaryExpression' && condition.operator === '!') {
|
|
115
|
+
condition = condition.argument;
|
|
116
|
+
}
|
|
117
|
+
if (condition.type === 'CallExpression') {
|
|
118
|
+
// Check if it's a file check method
|
|
119
|
+
let checkMethodName = '';
|
|
120
|
+
if (condition.callee.type === 'MemberExpression' && condition.callee.property.type === 'Identifier') {
|
|
121
|
+
checkMethodName = condition.callee.property.name;
|
|
122
|
+
}
|
|
123
|
+
else if (condition.callee.type === 'Identifier') {
|
|
124
|
+
checkMethodName = condition.callee.name;
|
|
125
|
+
}
|
|
126
|
+
const checkMethods = ['existsSync', 'statSync', 'accessSync', 'exists', 'stat', 'access'];
|
|
127
|
+
if (checkMethods.includes(checkMethodName)) {
|
|
128
|
+
// Compare arguments
|
|
129
|
+
const checkArg = condition.arguments[0];
|
|
130
|
+
if (checkArg) {
|
|
131
|
+
// Method 1: Identifier match (same variable)
|
|
132
|
+
if (checkArg.type === 'Identifier' && useArg.type === 'Identifier' && checkArg.name === useArg.name) {
|
|
133
|
+
reportToctou(node);
|
|
134
|
+
return;
|
|
135
|
+
}
|
|
136
|
+
// Method 2: Text match (fallback)
|
|
137
|
+
const checkArgText = sourceCode.getText(checkArg).replace(/\s/g, '');
|
|
138
|
+
const useArgText = sourceCode.getText(useArg).replace(/\s/g, '');
|
|
139
|
+
if (checkArgText === useArgText) {
|
|
140
|
+
reportToctou(node);
|
|
141
|
+
return;
|
|
142
|
+
}
|
|
143
|
+
}
|
|
144
|
+
}
|
|
145
|
+
// Handle stats.isFile() / stats.isDirectory() pattern
|
|
146
|
+
if (condition.callee.type === 'MemberExpression' &&
|
|
147
|
+
condition.callee.property.type === 'Identifier' &&
|
|
148
|
+
['isFile', 'isDirectory'].includes(condition.callee.property.name) &&
|
|
149
|
+
condition.callee.object.type === 'Identifier') {
|
|
150
|
+
const statsVarName = condition.callee.object.name;
|
|
151
|
+
let currentScope = sourceCode.getScope(condition);
|
|
152
|
+
let variable = null;
|
|
153
|
+
while (currentScope) {
|
|
154
|
+
variable = currentScope.variables.find(v => v.name === statsVarName);
|
|
155
|
+
if (variable)
|
|
156
|
+
break;
|
|
157
|
+
currentScope = currentScope.upper;
|
|
158
|
+
}
|
|
159
|
+
if (variable && variable.defs.length > 0) {
|
|
160
|
+
const def = variable.defs[0];
|
|
161
|
+
if (def.type === 'Variable' && def.node.init && def.node.init.type === 'CallExpression') {
|
|
162
|
+
const init = def.node.init;
|
|
163
|
+
if (init.callee.type === 'MemberExpression' &&
|
|
164
|
+
init.callee.property.type === 'Identifier' &&
|
|
165
|
+
['statSync', 'lstatSync', 'stat', 'lstat'].includes(init.callee.property.name)) {
|
|
166
|
+
const statArg = init.arguments[0];
|
|
167
|
+
if (statArg) {
|
|
168
|
+
const checkArgText = sourceCode.getText(statArg).replace(/\s/g, '');
|
|
169
|
+
const useArgText = sourceCode.getText(useArg).replace(/\s/g, '');
|
|
170
|
+
if (checkArgText === useArgText) {
|
|
171
|
+
reportToctou(node);
|
|
172
|
+
return;
|
|
173
|
+
}
|
|
174
|
+
}
|
|
175
|
+
}
|
|
176
|
+
}
|
|
177
|
+
}
|
|
178
|
+
}
|
|
179
|
+
}
|
|
180
|
+
}
|
|
181
|
+
current = current.parent;
|
|
182
|
+
}
|
|
183
|
+
}
|
|
184
|
+
function reportToctou(node) {
|
|
185
|
+
context.report({
|
|
186
|
+
node,
|
|
187
|
+
messageId: 'toctouVulnerability',
|
|
188
|
+
suggest: [
|
|
189
|
+
{
|
|
190
|
+
messageId: 'useAtomicOperations',
|
|
191
|
+
fix: () => null,
|
|
192
|
+
},
|
|
193
|
+
{
|
|
194
|
+
messageId: 'useFsPromises',
|
|
195
|
+
fix: () => null,
|
|
196
|
+
},
|
|
197
|
+
{
|
|
198
|
+
messageId: 'addProperLocking',
|
|
199
|
+
fix: () => null,
|
|
200
|
+
},
|
|
201
|
+
],
|
|
202
|
+
});
|
|
203
|
+
}
|
|
204
|
+
return {
|
|
205
|
+
CallExpression: checkCallExpression,
|
|
206
|
+
};
|
|
207
|
+
},
|
|
208
|
+
});
|