eslint-plugin-secure-coding 2.3.3 → 2.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (337) hide show
  1. package/CHANGELOG.md +51 -1
  2. package/README.md +2 -2
  3. package/package.json +1 -1
  4. package/src/index.d.ts +32 -0
  5. package/src/index.js +416 -0
  6. package/src/rules/detect-child-process/index.d.ts +11 -0
  7. package/src/rules/detect-child-process/index.js +529 -0
  8. package/src/rules/detect-eval-with-expression/index.d.ts +9 -0
  9. package/src/rules/detect-eval-with-expression/index.js +392 -0
  10. package/src/rules/detect-mixed-content/index.d.ts +8 -0
  11. package/src/rules/detect-mixed-content/index.js +44 -0
  12. package/src/rules/detect-non-literal-fs-filename/index.d.ts +7 -0
  13. package/src/rules/detect-non-literal-fs-filename/index.js +454 -0
  14. package/src/rules/detect-non-literal-regexp/index.d.ts +9 -0
  15. package/src/rules/detect-non-literal-regexp/index.js +403 -0
  16. package/src/rules/detect-object-injection/index.d.ts +11 -0
  17. package/src/rules/detect-object-injection/index.js +560 -0
  18. package/src/rules/detect-suspicious-dependencies/index.d.ts +8 -0
  19. package/src/rules/detect-suspicious-dependencies/index.js +71 -0
  20. package/src/rules/detect-weak-password-validation/index.d.ts +6 -0
  21. package/src/rules/detect-weak-password-validation/index.js +58 -0
  22. package/src/rules/no-allow-arbitrary-loads/index.d.ts +8 -0
  23. package/src/rules/no-allow-arbitrary-loads/index.js +47 -0
  24. package/src/rules/no-arbitrary-file-access/index.d.ts +13 -0
  25. package/src/rules/no-arbitrary-file-access/index.js +195 -0
  26. package/src/rules/no-buffer-overread/index.d.ts +29 -0
  27. package/src/rules/no-buffer-overread/index.js +606 -0
  28. package/src/rules/no-clickjacking/index.d.ts +10 -0
  29. package/src/rules/no-clickjacking/index.js +396 -0
  30. package/src/rules/no-client-side-auth-logic/index.d.ts +6 -0
  31. package/src/rules/no-client-side-auth-logic/index.js +69 -0
  32. package/src/rules/no-credentials-in-query-params/index.d.ts +8 -0
  33. package/src/rules/no-credentials-in-query-params/index.js +57 -0
  34. package/src/rules/no-data-in-temp-storage/index.d.ts +6 -0
  35. package/src/rules/no-data-in-temp-storage/index.js +64 -0
  36. package/src/rules/no-debug-code-in-production/index.d.ts +8 -0
  37. package/src/rules/no-debug-code-in-production/index.js +51 -0
  38. package/src/rules/no-directive-injection/index.d.ts +12 -0
  39. package/src/rules/no-directive-injection/index.js +457 -0
  40. package/src/rules/no-disabled-certificate-validation/index.d.ts +6 -0
  41. package/src/rules/no-disabled-certificate-validation/index.js +61 -0
  42. package/src/rules/no-dynamic-dependency-loading/index.d.ts +8 -0
  43. package/src/rules/no-dynamic-dependency-loading/index.js +51 -0
  44. package/src/rules/no-electron-security-issues/index.d.ts +10 -0
  45. package/src/rules/no-electron-security-issues/index.js +423 -0
  46. package/src/rules/no-exposed-debug-endpoints/index.d.ts +6 -0
  47. package/src/rules/no-exposed-debug-endpoints/index.js +62 -0
  48. package/src/rules/no-exposed-sensitive-data/index.d.ts +11 -0
  49. package/src/rules/no-exposed-sensitive-data/index.js +340 -0
  50. package/src/rules/no-format-string-injection/index.d.ts +17 -0
  51. package/src/rules/no-format-string-injection/index.js +660 -0
  52. package/src/rules/no-graphql-injection/index.d.ts +12 -0
  53. package/src/rules/no-graphql-injection/index.js +411 -0
  54. package/src/rules/no-hardcoded-credentials/index.d.ts +26 -0
  55. package/src/rules/no-hardcoded-credentials/index.js +376 -0
  56. package/src/rules/no-hardcoded-session-tokens/index.d.ts +6 -0
  57. package/src/rules/no-hardcoded-session-tokens/index.js +59 -0
  58. package/src/rules/no-http-urls/index.d.ts +12 -0
  59. package/src/rules/no-http-urls/index.js +114 -0
  60. package/src/rules/no-improper-sanitization/index.d.ts +12 -0
  61. package/src/rules/no-improper-sanitization/index.js +411 -0
  62. package/src/rules/no-improper-type-validation/index.d.ts +10 -0
  63. package/src/rules/no-improper-type-validation/index.js +475 -0
  64. package/src/rules/no-insecure-comparison/index.d.ts +7 -0
  65. package/src/rules/no-insecure-comparison/index.js +193 -0
  66. package/src/rules/no-insecure-redirects/index.d.ts +7 -0
  67. package/src/rules/no-insecure-redirects/index.js +216 -0
  68. package/src/rules/no-insecure-websocket/index.d.ts +6 -0
  69. package/src/rules/no-insecure-websocket/index.js +61 -0
  70. package/src/rules/no-ldap-injection/index.d.ts +10 -0
  71. package/src/rules/no-ldap-injection/index.js +455 -0
  72. package/src/rules/no-missing-authentication/index.d.ts +13 -0
  73. package/src/rules/no-missing-authentication/index.js +333 -0
  74. package/src/rules/no-missing-cors-check/index.d.ts +9 -0
  75. package/src/rules/no-missing-cors-check/index.js +399 -0
  76. package/src/rules/no-missing-csrf-protection/index.d.ts +11 -0
  77. package/src/rules/no-missing-csrf-protection/index.js +180 -0
  78. package/src/rules/no-missing-security-headers/index.d.ts +7 -0
  79. package/src/rules/no-missing-security-headers/index.js +218 -0
  80. package/src/rules/no-password-in-url/index.d.ts +8 -0
  81. package/src/rules/no-password-in-url/index.js +54 -0
  82. package/src/rules/no-permissive-cors/index.d.ts +8 -0
  83. package/src/rules/no-permissive-cors/index.js +65 -0
  84. package/src/rules/no-pii-in-logs/index.d.ts +8 -0
  85. package/src/rules/no-pii-in-logs/index.js +70 -0
  86. package/src/rules/no-privilege-escalation/index.d.ts +13 -0
  87. package/src/rules/no-privilege-escalation/index.js +321 -0
  88. package/src/rules/no-redos-vulnerable-regex/index.d.ts +7 -0
  89. package/src/rules/no-redos-vulnerable-regex/index.js +306 -0
  90. package/src/rules/no-sensitive-data-exposure/index.d.ts +11 -0
  91. package/src/rules/no-sensitive-data-exposure/index.js +250 -0
  92. package/src/rules/no-sensitive-data-in-analytics/index.d.ts +8 -0
  93. package/src/rules/no-sensitive-data-in-analytics/index.js +62 -0
  94. package/src/rules/no-sensitive-data-in-cache/index.d.ts +8 -0
  95. package/src/rules/no-sensitive-data-in-cache/index.js +52 -0
  96. package/src/rules/no-toctou-vulnerability/index.d.ts +7 -0
  97. package/src/rules/no-toctou-vulnerability/index.js +208 -0
  98. package/src/rules/no-tracking-without-consent/index.d.ts +6 -0
  99. package/src/rules/no-tracking-without-consent/index.js +67 -0
  100. package/src/rules/no-unchecked-loop-condition/index.d.ts +12 -0
  101. package/src/rules/no-unchecked-loop-condition/index.js +646 -0
  102. package/src/rules/no-unencrypted-transmission/index.d.ts +11 -0
  103. package/src/rules/no-unencrypted-transmission/index.js +236 -0
  104. package/src/rules/no-unescaped-url-parameter/index.d.ts +9 -0
  105. package/src/rules/no-unescaped-url-parameter/index.js +355 -0
  106. package/src/rules/no-unlimited-resource-allocation/index.d.ts +12 -0
  107. package/src/rules/no-unlimited-resource-allocation/index.js +643 -0
  108. package/src/rules/no-unsafe-deserialization/index.d.ts +10 -0
  109. package/src/rules/no-unsafe-deserialization/index.js +491 -0
  110. package/src/rules/no-unsafe-dynamic-require/index.d.ts +5 -0
  111. package/src/rules/no-unsafe-dynamic-require/index.js +106 -0
  112. package/src/rules/no-unsafe-regex-construction/index.d.ts +9 -0
  113. package/src/rules/no-unsafe-regex-construction/index.js +291 -0
  114. package/src/rules/no-unvalidated-deeplinks/index.d.ts +6 -0
  115. package/src/rules/no-unvalidated-deeplinks/index.js +62 -0
  116. package/src/rules/no-unvalidated-user-input/index.d.ts +9 -0
  117. package/src/rules/no-unvalidated-user-input/index.js +420 -0
  118. package/src/rules/no-verbose-error-messages/index.d.ts +8 -0
  119. package/src/rules/no-verbose-error-messages/index.js +68 -0
  120. package/src/rules/no-weak-password-recovery/index.d.ts +12 -0
  121. package/src/rules/no-weak-password-recovery/index.js +424 -0
  122. package/src/rules/no-xpath-injection/index.d.ts +10 -0
  123. package/src/rules/no-xpath-injection/index.js +487 -0
  124. package/src/rules/no-xxe-injection/index.d.ts +7 -0
  125. package/src/rules/no-xxe-injection/index.js +266 -0
  126. package/src/rules/no-zip-slip/index.d.ts +9 -0
  127. package/src/rules/no-zip-slip/index.js +445 -0
  128. package/src/rules/require-backend-authorization/index.d.ts +6 -0
  129. package/src/rules/require-backend-authorization/index.js +60 -0
  130. package/src/rules/require-code-minification/index.d.ts +8 -0
  131. package/src/rules/require-code-minification/index.js +47 -0
  132. package/src/rules/require-csp-headers/index.d.ts +6 -0
  133. package/src/rules/require-csp-headers/index.js +64 -0
  134. package/src/rules/require-data-minimization/index.d.ts +8 -0
  135. package/src/rules/require-data-minimization/index.js +53 -0
  136. package/src/rules/require-dependency-integrity/index.d.ts +6 -0
  137. package/src/rules/require-dependency-integrity/index.js +64 -0
  138. package/src/rules/require-https-only/index.d.ts +8 -0
  139. package/src/rules/require-https-only/index.js +62 -0
  140. package/src/rules/require-mime-type-validation/index.d.ts +6 -0
  141. package/src/rules/require-mime-type-validation/index.js +66 -0
  142. package/src/rules/require-network-timeout/index.d.ts +8 -0
  143. package/src/rules/require-network-timeout/index.js +50 -0
  144. package/src/rules/require-package-lock/index.d.ts +8 -0
  145. package/src/rules/require-package-lock/index.js +63 -0
  146. package/src/rules/require-secure-credential-storage/index.d.ts +8 -0
  147. package/src/rules/require-secure-credential-storage/index.js +50 -0
  148. package/src/rules/require-secure-defaults/index.d.ts +8 -0
  149. package/src/rules/require-secure-defaults/index.js +47 -0
  150. package/src/rules/require-secure-deletion/index.d.ts +8 -0
  151. package/src/rules/require-secure-deletion/index.js +44 -0
  152. package/src/rules/require-storage-encryption/index.d.ts +8 -0
  153. package/src/rules/require-storage-encryption/index.js +50 -0
  154. package/src/rules/require-url-validation/index.d.ts +6 -0
  155. package/src/rules/require-url-validation/index.js +72 -0
  156. package/src/types/index.d.ts +106 -0
  157. package/src/types/index.js +16 -0
  158. package/src/index.ts +0 -605
  159. package/src/rules/__tests__/integration-demo.test.ts +0 -290
  160. package/src/rules/__tests__/integration-llm.test.ts +0 -89
  161. package/src/rules/database-injection/database-injection.test.ts +0 -456
  162. package/src/rules/database-injection/index.ts +0 -488
  163. package/src/rules/detect-child-process/detect-child-process.test.ts +0 -207
  164. package/src/rules/detect-child-process/index.ts +0 -634
  165. package/src/rules/detect-eval-with-expression/detect-eval-with-expression.test.ts +0 -416
  166. package/src/rules/detect-eval-with-expression/index.ts +0 -463
  167. package/src/rules/detect-mixed-content/detect-mixed-content.test.ts +0 -28
  168. package/src/rules/detect-mixed-content/index.ts +0 -52
  169. package/src/rules/detect-non-literal-fs-filename/detect-non-literal-fs-filename.test.ts +0 -269
  170. package/src/rules/detect-non-literal-fs-filename/index.ts +0 -551
  171. package/src/rules/detect-non-literal-regexp/detect-non-literal-regexp.test.ts +0 -189
  172. package/src/rules/detect-non-literal-regexp/index.ts +0 -490
  173. package/src/rules/detect-object-injection/detect-object-injection.test.ts +0 -440
  174. package/src/rules/detect-object-injection/index.ts +0 -674
  175. package/src/rules/detect-suspicious-dependencies/detect-suspicious-dependencies.test.ts +0 -32
  176. package/src/rules/detect-suspicious-dependencies/index.ts +0 -84
  177. package/src/rules/detect-weak-password-validation/detect-weak-password-validation.test.ts +0 -31
  178. package/src/rules/detect-weak-password-validation/index.ts +0 -68
  179. package/src/rules/no-allow-arbitrary-loads/index.ts +0 -54
  180. package/src/rules/no-allow-arbitrary-loads/no-allow-arbitrary-loads.test.ts +0 -28
  181. package/src/rules/no-arbitrary-file-access/index.ts +0 -238
  182. package/src/rules/no-arbitrary-file-access/no-arbitrary-file-access.test.ts +0 -119
  183. package/src/rules/no-buffer-overread/index.ts +0 -724
  184. package/src/rules/no-buffer-overread/no-buffer-overread.test.ts +0 -313
  185. package/src/rules/no-clickjacking/index.ts +0 -481
  186. package/src/rules/no-clickjacking/no-clickjacking.test.ts +0 -253
  187. package/src/rules/no-client-side-auth-logic/index.ts +0 -81
  188. package/src/rules/no-client-side-auth-logic/no-client-side-auth-logic.test.ts +0 -33
  189. package/src/rules/no-credentials-in-query-params/index.ts +0 -69
  190. package/src/rules/no-credentials-in-query-params/no-credentials-in-query-params.test.ts +0 -33
  191. package/src/rules/no-credentials-in-storage-api/index.ts +0 -64
  192. package/src/rules/no-credentials-in-storage-api/no-credentials-in-storage-api.test.ts +0 -31
  193. package/src/rules/no-data-in-temp-storage/index.ts +0 -75
  194. package/src/rules/no-data-in-temp-storage/no-data-in-temp-storage.test.ts +0 -33
  195. package/src/rules/no-debug-code-in-production/index.ts +0 -59
  196. package/src/rules/no-debug-code-in-production/no-debug-code-in-production.test.ts +0 -26
  197. package/src/rules/no-directive-injection/index.ts +0 -551
  198. package/src/rules/no-directive-injection/no-directive-injection.test.ts +0 -305
  199. package/src/rules/no-disabled-certificate-validation/index.ts +0 -72
  200. package/src/rules/no-disabled-certificate-validation/no-disabled-certificate-validation.test.ts +0 -33
  201. package/src/rules/no-document-cookie/index.ts +0 -113
  202. package/src/rules/no-document-cookie/no-document-cookie.test.ts +0 -382
  203. package/src/rules/no-dynamic-dependency-loading/index.ts +0 -60
  204. package/src/rules/no-dynamic-dependency-loading/no-dynamic-dependency-loading.test.ts +0 -27
  205. package/src/rules/no-electron-security-issues/index.ts +0 -504
  206. package/src/rules/no-electron-security-issues/no-electron-security-issues.test.ts +0 -324
  207. package/src/rules/no-exposed-debug-endpoints/index.ts +0 -73
  208. package/src/rules/no-exposed-debug-endpoints/no-exposed-debug-endpoints.test.ts +0 -40
  209. package/src/rules/no-exposed-sensitive-data/index.ts +0 -428
  210. package/src/rules/no-exposed-sensitive-data/no-exposed-sensitive-data.test.ts +0 -75
  211. package/src/rules/no-format-string-injection/index.ts +0 -801
  212. package/src/rules/no-format-string-injection/no-format-string-injection.test.ts +0 -437
  213. package/src/rules/no-graphql-injection/index.ts +0 -508
  214. package/src/rules/no-graphql-injection/no-graphql-injection.test.ts +0 -371
  215. package/src/rules/no-hardcoded-credentials/index.ts +0 -478
  216. package/src/rules/no-hardcoded-credentials/no-hardcoded-credentials.test.ts +0 -639
  217. package/src/rules/no-hardcoded-session-tokens/index.ts +0 -69
  218. package/src/rules/no-hardcoded-session-tokens/no-hardcoded-session-tokens.test.ts +0 -42
  219. package/src/rules/no-http-urls/index.ts +0 -131
  220. package/src/rules/no-http-urls/no-http-urls.test.ts +0 -60
  221. package/src/rules/no-improper-sanitization/index.ts +0 -502
  222. package/src/rules/no-improper-sanitization/no-improper-sanitization.test.ts +0 -156
  223. package/src/rules/no-improper-type-validation/index.ts +0 -572
  224. package/src/rules/no-improper-type-validation/no-improper-type-validation.test.ts +0 -372
  225. package/src/rules/no-insecure-comparison/index.ts +0 -232
  226. package/src/rules/no-insecure-comparison/no-insecure-comparison.test.ts +0 -218
  227. package/src/rules/no-insecure-cookie-settings/index.ts +0 -391
  228. package/src/rules/no-insecure-cookie-settings/no-insecure-cookie-settings.test.ts +0 -409
  229. package/src/rules/no-insecure-jwt/index.ts +0 -467
  230. package/src/rules/no-insecure-jwt/no-insecure-jwt.test.ts +0 -259
  231. package/src/rules/no-insecure-redirects/index.ts +0 -267
  232. package/src/rules/no-insecure-redirects/no-insecure-redirects.test.ts +0 -108
  233. package/src/rules/no-insecure-websocket/index.ts +0 -72
  234. package/src/rules/no-insecure-websocket/no-insecure-websocket.test.ts +0 -42
  235. package/src/rules/no-insufficient-postmessage-validation/index.ts +0 -497
  236. package/src/rules/no-insufficient-postmessage-validation/no-insufficient-postmessage-validation.test.ts +0 -360
  237. package/src/rules/no-insufficient-random/index.ts +0 -288
  238. package/src/rules/no-insufficient-random/no-insufficient-random.test.ts +0 -246
  239. package/src/rules/no-ldap-injection/index.ts +0 -547
  240. package/src/rules/no-ldap-injection/no-ldap-injection.test.ts +0 -317
  241. package/src/rules/no-missing-authentication/index.ts +0 -408
  242. package/src/rules/no-missing-authentication/no-missing-authentication.test.ts +0 -350
  243. package/src/rules/no-missing-cors-check/index.ts +0 -453
  244. package/src/rules/no-missing-cors-check/no-missing-cors-check.test.ts +0 -392
  245. package/src/rules/no-missing-csrf-protection/index.ts +0 -229
  246. package/src/rules/no-missing-csrf-protection/no-missing-csrf-protection.test.ts +0 -222
  247. package/src/rules/no-missing-security-headers/index.ts +0 -266
  248. package/src/rules/no-missing-security-headers/no-missing-security-headers.test.ts +0 -98
  249. package/src/rules/no-password-in-url/index.ts +0 -64
  250. package/src/rules/no-password-in-url/no-password-in-url.test.ts +0 -27
  251. package/src/rules/no-permissive-cors/index.ts +0 -78
  252. package/src/rules/no-permissive-cors/no-permissive-cors.test.ts +0 -28
  253. package/src/rules/no-pii-in-logs/index.ts +0 -83
  254. package/src/rules/no-pii-in-logs/no-pii-in-logs.test.ts +0 -26
  255. package/src/rules/no-postmessage-origin-wildcard/index.ts +0 -67
  256. package/src/rules/no-postmessage-origin-wildcard/no-postmessage-origin-wildcard.test.ts +0 -27
  257. package/src/rules/no-privilege-escalation/index.ts +0 -403
  258. package/src/rules/no-privilege-escalation/no-privilege-escalation.test.ts +0 -306
  259. package/src/rules/no-redos-vulnerable-regex/index.ts +0 -379
  260. package/src/rules/no-redos-vulnerable-regex/no-redos-vulnerable-regex.test.ts +0 -83
  261. package/src/rules/no-sensitive-data-exposure/index.ts +0 -294
  262. package/src/rules/no-sensitive-data-exposure/no-sensitive-data-exposure.test.ts +0 -262
  263. package/src/rules/no-sensitive-data-in-analytics/index.ts +0 -73
  264. package/src/rules/no-sensitive-data-in-analytics/no-sensitive-data-in-analytics.test.ts +0 -42
  265. package/src/rules/no-sensitive-data-in-cache/index.ts +0 -59
  266. package/src/rules/no-sensitive-data-in-cache/no-sensitive-data-in-cache.test.ts +0 -32
  267. package/src/rules/no-sql-injection/index.ts +0 -424
  268. package/src/rules/no-sql-injection/no-sql-injection.test.ts +0 -303
  269. package/src/rules/no-timing-attack/index.ts +0 -552
  270. package/src/rules/no-timing-attack/no-timing-attack.test.ts +0 -348
  271. package/src/rules/no-toctou-vulnerability/index.ts +0 -250
  272. package/src/rules/no-toctou-vulnerability/no-toctou-vulnerability.test.ts +0 -60
  273. package/src/rules/no-tracking-without-consent/index.ts +0 -78
  274. package/src/rules/no-tracking-without-consent/no-tracking-without-consent.test.ts +0 -34
  275. package/src/rules/no-unchecked-loop-condition/index.ts +0 -781
  276. package/src/rules/no-unchecked-loop-condition/no-unchecked-loop-condition.test.ts +0 -459
  277. package/src/rules/no-unencrypted-local-storage/index.ts +0 -73
  278. package/src/rules/no-unencrypted-local-storage/no-unencrypted-local-storage.test.ts +0 -41
  279. package/src/rules/no-unencrypted-transmission/index.ts +0 -296
  280. package/src/rules/no-unencrypted-transmission/no-unencrypted-transmission.test.ts +0 -287
  281. package/src/rules/no-unescaped-url-parameter/index.ts +0 -424
  282. package/src/rules/no-unescaped-url-parameter/no-unescaped-url-parameter.test.ts +0 -263
  283. package/src/rules/no-unlimited-resource-allocation/index.ts +0 -767
  284. package/src/rules/no-unlimited-resource-allocation/no-unlimited-resource-allocation.test.ts +0 -544
  285. package/src/rules/no-unsafe-deserialization/index.ts +0 -593
  286. package/src/rules/no-unsafe-deserialization/no-unsafe-deserialization.test.ts +0 -310
  287. package/src/rules/no-unsafe-dynamic-require/index.ts +0 -125
  288. package/src/rules/no-unsafe-dynamic-require/no-unsafe-dynamic-require.test.ts +0 -151
  289. package/src/rules/no-unsafe-regex-construction/index.ts +0 -370
  290. package/src/rules/no-unsafe-regex-construction/no-unsafe-regex-construction.test.ts +0 -181
  291. package/src/rules/no-unsanitized-html/index.ts +0 -400
  292. package/src/rules/no-unsanitized-html/no-unsanitized-html.test.ts +0 -488
  293. package/src/rules/no-unvalidated-deeplinks/index.ts +0 -73
  294. package/src/rules/no-unvalidated-deeplinks/no-unvalidated-deeplinks.test.ts +0 -29
  295. package/src/rules/no-unvalidated-user-input/index.ts +0 -498
  296. package/src/rules/no-unvalidated-user-input/no-unvalidated-user-input.test.ts +0 -463
  297. package/src/rules/no-verbose-error-messages/index.ts +0 -83
  298. package/src/rules/no-verbose-error-messages/no-verbose-error-messages.test.ts +0 -34
  299. package/src/rules/no-weak-crypto/index.ts +0 -447
  300. package/src/rules/no-weak-crypto/no-weak-crypto.test.ts +0 -297
  301. package/src/rules/no-weak-password-recovery/index.ts +0 -509
  302. package/src/rules/no-weak-password-recovery/no-weak-password-recovery.test.ts +0 -184
  303. package/src/rules/no-xpath-injection/index.ts +0 -596
  304. package/src/rules/no-xpath-injection/no-xpath-injection.test.ts +0 -405
  305. package/src/rules/no-xxe-injection/index.ts +0 -342
  306. package/src/rules/no-xxe-injection/no-xxe-injection.test.ts +0 -122
  307. package/src/rules/no-zip-slip/index.ts +0 -526
  308. package/src/rules/no-zip-slip/no-zip-slip.test.ts +0 -305
  309. package/src/rules/require-backend-authorization/index.ts +0 -71
  310. package/src/rules/require-backend-authorization/require-backend-authorization.test.ts +0 -31
  311. package/src/rules/require-code-minification/index.ts +0 -54
  312. package/src/rules/require-code-minification/require-code-minification.test.ts +0 -30
  313. package/src/rules/require-csp-headers/index.ts +0 -74
  314. package/src/rules/require-csp-headers/require-csp-headers.test.ts +0 -34
  315. package/src/rules/require-data-minimization/index.ts +0 -65
  316. package/src/rules/require-data-minimization/require-data-minimization.test.ts +0 -31
  317. package/src/rules/require-dependency-integrity/index.ts +0 -78
  318. package/src/rules/require-dependency-integrity/require-dependency-integrity.test.ts +0 -44
  319. package/src/rules/require-https-only/index.ts +0 -75
  320. package/src/rules/require-https-only/require-https-only.test.ts +0 -26
  321. package/src/rules/require-mime-type-validation/index.ts +0 -77
  322. package/src/rules/require-mime-type-validation/require-mime-type-validation.test.ts +0 -32
  323. package/src/rules/require-network-timeout/index.ts +0 -58
  324. package/src/rules/require-network-timeout/require-network-timeout.test.ts +0 -26
  325. package/src/rules/require-package-lock/index.ts +0 -75
  326. package/src/rules/require-package-lock/require-package-lock.test.ts +0 -27
  327. package/src/rules/require-secure-credential-storage/index.ts +0 -60
  328. package/src/rules/require-secure-credential-storage/require-secure-credential-storage.test.ts +0 -26
  329. package/src/rules/require-secure-defaults/index.ts +0 -54
  330. package/src/rules/require-secure-defaults/require-secure-defaults.test.ts +0 -26
  331. package/src/rules/require-secure-deletion/index.ts +0 -52
  332. package/src/rules/require-secure-deletion/require-secure-deletion.test.ts +0 -29
  333. package/src/rules/require-storage-encryption/index.ts +0 -60
  334. package/src/rules/require-storage-encryption/require-storage-encryption.test.ts +0 -26
  335. package/src/rules/require-url-validation/index.ts +0 -85
  336. package/src/rules/require-url-validation/require-url-validation.test.ts +0 -32
  337. package/src/types/index.ts +0 -235
@@ -1,32 +0,0 @@
1
- /**
2
- * @fileoverview Tests for detect-suspicious-dependencies
3
- */
4
-
5
- import { RuleTester } from '@typescript-eslint/rule-tester';
6
- import { detectSuspiciousDependencies } from './index';
7
-
8
- const ruleTester = new RuleTester({
9
- languageOptions: {
10
- ecmaVersion: 2022,
11
- sourceType: 'module',
12
- },
13
- });
14
-
15
- ruleTester.run('detect-suspicious-dependencies', detectSuspiciousDependencies, {
16
- valid: [
17
- // Valid popular package names
18
- { code: "import React from 'react'" },
19
- { code: "import _ from 'lodash'" },
20
- { code: "import express from 'express'" },
21
- // Local imports
22
- { code: "import foo from './foo'" },
23
- // Scoped packages
24
- { code: "import pkg from '@scope/package'" },
25
- ],
26
-
27
- invalid: [
28
- // Typosquatting-like names (within 2 Levenshtein distance of popular packages)
29
- { code: "import r from 'reakt'", errors: [{ messageId: 'violationDetected' }] },
30
- { code: "import l from 'lodas'", errors: [{ messageId: 'violationDetected' }] },
31
- ],
32
- });
@@ -1,84 +0,0 @@
1
- /**
2
- * @fileoverview Detect potential typosquatting in dependencies
3
- * @see https://owasp.org/www-project-mobile-top-10/
4
- * @see https://cwe.mitre.org/data/definitions/506.html
5
- */
6
-
7
- import { createRule, formatLLMMessage, MessageIcons } from '@interlace/eslint-devkit';
8
- import type { TSESTree } from '@interlace/eslint-devkit';
9
-
10
- type MessageIds = 'violationDetected';
11
-
12
- // eslint-disable-next-line @typescript-eslint/no-empty-object-type, @typescript-eslint/no-empty-interface -- Rule has no configurable options
13
- export interface Options {}
14
-
15
- type RuleOptions = [Options?];
16
-
17
- export const detectSuspiciousDependencies = createRule<RuleOptions, MessageIds>({
18
- name: 'detect-suspicious-dependencies',
19
- meta: {
20
- type: 'problem',
21
- docs: {
22
- description: 'Detect typosquatting in package names',
23
- },
24
- messages: {
25
- violationDetected: formatLLMMessage({
26
- icon: MessageIcons.SECURITY,
27
- issueName: 'Suspicious Dependency',
28
- cwe: 'CWE-506',
29
- description: 'Suspicious package name detected - possible typosquatting',
30
- severity: 'HIGH',
31
- fix: 'Verify package authenticity on npm registry',
32
- documentationLink: 'https://cwe.mitre.org/data/definitions/506.html',
33
- })
34
- },
35
- schema: [],
36
- },
37
- defaultOptions: [],
38
- create(context) {
39
- const popularPackages = ['react', 'lodash', 'express', 'axios', 'webpack'];
40
-
41
- function levenshtein(a: string, b: string): number {
42
- const matrix = [];
43
- for (let i = 0; i <= b.length; i++) {
44
- matrix[i] = [i];
45
- }
46
- for (let j = 0; j <= a.length; j++) {
47
- matrix[0][j] = j;
48
- }
49
- for (let i = 1; i <= b.length; i++) {
50
- for (let j = 1; j <= a.length; j++) {
51
- if (b.charAt(i - 1) === a.charAt(j - 1)) {
52
- matrix[i][j] = matrix[i - 1][j - 1];
53
- } else {
54
- matrix[i][j] = Math.min(
55
- matrix[i - 1][j - 1] + 1,
56
- matrix[i][j - 1] + 1,
57
- matrix[i - 1][j] + 1
58
- );
59
- }
60
- }
61
- }
62
- return matrix[b.length][a.length];
63
- }
64
-
65
- return {
66
- ImportDeclaration(node: TSESTree.ImportDeclaration) {
67
- const source = node.source.value;
68
- if (typeof source === 'string' && !source.startsWith('.') && !source.startsWith('@')) {
69
- for (const popular of popularPackages) {
70
- const distance = levenshtein(source, popular);
71
- if (distance > 0 && distance <= 2) {
72
- context.report({
73
- node,
74
- messageId: 'violationDetected',
75
- data: { name: source, similar: popular },
76
- });
77
- }
78
- }
79
- }
80
- },
81
- };
82
- },
83
- });
84
-
@@ -1,31 +0,0 @@
1
- /**
2
- * @fileoverview Tests for detect-weak-password-validation
3
- */
4
-
5
- import { RuleTester } from '@typescript-eslint/rule-tester';
6
- import { detectWeakPasswordValidation } from './index';
7
-
8
- const ruleTester = new RuleTester({
9
- languageOptions: {
10
- ecmaVersion: 2022,
11
- sourceType: 'module',
12
- },
13
- });
14
-
15
- ruleTester.run('detect-weak-password-validation', detectWeakPasswordValidation, {
16
- valid: [
17
- // Strong password requirements
18
- { code: "if (password.length >= 12) { valid() }" },
19
- { code: "if (pwd.length >= 8) { valid() }" },
20
- // Non-password length checks
21
- { code: "if (name.length >= 2) { valid() }" },
22
- { code: "const x = 1" },
23
- ],
24
-
25
- invalid: [
26
- // Weak password requirements
27
- { code: "if (password.length >= 4) { accept() }", errors: [{ messageId: 'violationDetected' }] },
28
- { code: "if (pwd.length >= 6) { proceed() }", errors: [{ messageId: 'violationDetected' }] },
29
- { code: "if (pass.length > 3) { ok() }", errors: [{ messageId: 'violationDetected' }] },
30
- ],
31
- });
@@ -1,68 +0,0 @@
1
- /**
2
- * @fileoverview Identify weak password requirements
3
- */
4
-
5
- import { createRule, formatLLMMessage, MessageIcons } from '@interlace/eslint-devkit';
6
- import type { TSESTree } from '@interlace/eslint-devkit';
7
-
8
- type MessageIds = 'violationDetected';
9
-
10
- // eslint-disable-next-line @typescript-eslint/no-empty-object-type, @typescript-eslint/no-empty-interface -- Rule has no configurable options
11
- export interface Options {}
12
-
13
- type RuleOptions = [Options?];
14
-
15
- export const detectWeakPasswordValidation = createRule<RuleOptions, MessageIds>({
16
- name: 'detect-weak-password-validation',
17
- meta: {
18
- type: 'problem',
19
- docs: {
20
- description: 'Identify weak password requirements',
21
- },
22
- messages: {
23
- violationDetected: formatLLMMessage({
24
- icon: MessageIcons.SECURITY,
25
- issueName: 'Weak Password Validation',
26
- cwe: 'CWE-521',
27
- description: 'Password length requirement is too weak (less than 8 characters)',
28
- severity: 'CRITICAL',
29
- fix: 'Require at least 12 characters with complexity requirements',
30
- documentationLink: 'https://cwe.mitre.org/data/definitions/521.html',
31
- })
32
- },
33
- schema: [],
34
- },
35
- defaultOptions: [],
36
- create(context) {
37
- function report(node: TSESTree.Node) {
38
- context.report({ node, messageId: 'violationDetected' });
39
- }
40
-
41
- return {
42
- BinaryExpression(node: TSESTree.BinaryExpression) {
43
- // Detect weak length requirements like password.length >= 4
44
- if (['>=', '>', '==', '==='].includes(node.operator)) {
45
- // Check if left side is .length
46
- if (node.left.type === 'MemberExpression' &&
47
- node.left.property.type === 'Identifier' &&
48
- node.left.property.name === 'length') {
49
-
50
- // Check if comparing to a weak number
51
- if (node.right.type === 'Literal' &&
52
- typeof node.right.value === 'number' &&
53
- node.right.value < 8) {
54
-
55
- // Check if variable name suggests password
56
- if (node.left.object.type === 'Identifier') {
57
- const varName = node.left.object.name.toLowerCase();
58
- if (varName.includes('password') || varName.includes('pwd') || varName.includes('pass')) {
59
- report(node);
60
- }
61
- }
62
- }
63
- }
64
- }
65
- },
66
- };
67
- },
68
- });
@@ -1,54 +0,0 @@
1
- /**
2
- * @fileoverview Prevent configuration allowing insecure loads
3
- * @see https://owasp.org/www-project-mobile-top-10/
4
- * @see https://cwe.mitre.org/data/definitions/749.html
5
- */
6
-
7
- import { createRule, formatLLMMessage, MessageIcons } from '@interlace/eslint-devkit';
8
- import type { TSESTree } from '@interlace/eslint-devkit';
9
-
10
- type MessageIds = 'violationDetected';
11
-
12
- // eslint-disable-next-line @typescript-eslint/no-empty-object-type, @typescript-eslint/no-empty-interface -- Rule has no configurable options
13
- export interface Options {}
14
-
15
- type RuleOptions = [Options?];
16
-
17
- export const noAllowArbitraryLoads = createRule<RuleOptions, MessageIds>({
18
- name: 'no-allow-arbitrary-loads',
19
- meta: {
20
- type: 'problem',
21
- docs: {
22
- description: 'Prevent configuration allowing insecure loads',
23
- category: 'Security',
24
- recommended: true,
25
- owaspMobile: ['M5'],
26
- cweIds: ["CWE-749"],
27
- },
28
- messages: {
29
- violationDetected: formatLLMMessage({
30
- icon: MessageIcons.SECURITY,
31
- issueName: 'violation Detected',
32
- cwe: 'CWE-295',
33
- description: 'Prevent configuration allowing insecure loads detected - allowArbitraryLoads: true',
34
- severity: 'HIGH',
35
- fix: 'Review and apply secure practices',
36
- documentationLink: 'https://cwe.mitre.org/data/definitions/295.html',
37
- })
38
- },
39
- schema: [],
40
- },
41
- defaultOptions: [],
42
- create(context) {
43
- return {
44
- Property(node: TSESTree.Property) {
45
- if (node.key.type === 'Identifier' &&
46
- node.key.name === 'allowArbitraryLoads' &&
47
- node.value.type === 'Literal' &&
48
- node.value.value === true) {
49
- context.report({ node, messageId: 'violationDetected' });
50
- }
51
- },
52
- };
53
- },
54
- });
@@ -1,28 +0,0 @@
1
- /**
2
- * @fileoverview Tests for no-allow-arbitrary-loads
3
- */
4
-
5
- import { RuleTester } from '@typescript-eslint/rule-tester';
6
- import { noAllowArbitraryLoads } from './index';
7
-
8
- const ruleTester = new RuleTester({
9
- languageOptions: {
10
- ecmaVersion: 2022,
11
- sourceType: 'module',
12
- },
13
- });
14
-
15
- ruleTester.run('no-allow-arbitrary-loads', noAllowArbitraryLoads, {
16
- valid: [
17
- // Secure configuration
18
- { code: "const config = { allowArbitraryLoads: false }" },
19
- { code: "const settings = { secureMode: true }" },
20
- { code: "const x = 1" },
21
- ],
22
-
23
- invalid: [
24
- // Insecure configuration
25
- { code: "const config = { allowArbitraryLoads: true }", errors: [{ messageId: 'violationDetected' }] },
26
- { code: "module.exports = { NSAppTransportSecurity: { allowArbitraryLoads: true } }", errors: [{ messageId: 'violationDetected' }] },
27
- ],
28
- });
@@ -1,238 +0,0 @@
1
- /**
2
- * @fileoverview Prevent file access from user input
3
- *
4
- * False Positive Reduction:
5
- * This rule detects safe patterns including:
6
- * - path.basename() sanitization
7
- * - path.join() with validated base directories
8
- * - startsWith() validation guards
9
- * - Early-return throw patterns
10
- */
11
-
12
- import { AST_NODE_TYPES, createRule, formatLLMMessage, MessageIcons } from '@interlace/eslint-devkit';
13
- import type { TSESTree } from '@interlace/eslint-devkit';
14
-
15
- type MessageIds = 'violationDetected';
16
-
17
- // eslint-disable-next-line @typescript-eslint/no-empty-object-type, @typescript-eslint/no-empty-interface -- Rule has no configurable options
18
- export interface Options {}
19
-
20
- type RuleOptions = [Options?];
21
-
22
- export const noArbitraryFileAccess = createRule<RuleOptions, MessageIds>({
23
- name: 'no-arbitrary-file-access',
24
- meta: {
25
- type: 'problem',
26
- docs: {
27
- description: 'Prevent file access from user input',
28
- },
29
- messages: {
30
- violationDetected: formatLLMMessage({
31
- icon: MessageIcons.SECURITY,
32
- issueName: 'Arbitrary File Access',
33
- cwe: 'CWE-22',
34
- description: 'File path from user input - path traversal vulnerability',
35
- severity: 'HIGH',
36
- fix: 'Validate and sanitize file paths, use allowlists',
37
- documentationLink: 'https://cwe.mitre.org/data/definitions/22.html',
38
- })
39
- },
40
- schema: [],
41
- },
42
- defaultOptions: [],
43
- create(context) {
44
- const sourceCode = context.sourceCode;
45
-
46
- function report(node: TSESTree.Node) {
47
- context.report({ node, messageId: 'violationDetected' });
48
- }
49
-
50
- const fsReadMethods = ['readFile', 'readFileSync', 'readdir', 'readdirSync', 'stat', 'statSync'];
51
- const fsWriteMethods = ['writeFile', 'writeFileSync', 'appendFile', 'appendFileSync'];
52
- const userInputSources = ['req', 'request', 'params', 'query', 'body'];
53
-
54
- // Track variables that have been sanitized with path.basename()
55
- const sanitizedVariables = new Set<string>();
56
- // Track variables that have been validated with startsWith() guards
57
- const validatedVariables = new Set<string>();
58
-
59
- /**
60
- * Check if a variable is assigned from path.basename() or path.join() with basename
61
- */
62
- function checkVariableDeclaration(node: TSESTree.VariableDeclarator) {
63
- if (node.id.type !== 'Identifier' || !node.init) {
64
- return;
65
- }
66
-
67
- const varName = node.id.name;
68
- const init = node.init;
69
-
70
- // Check for path.basename() assignment
71
- if (init.type === 'CallExpression' &&
72
- init.callee.type === 'MemberExpression' &&
73
- init.callee.object.type === 'Identifier' &&
74
- init.callee.object.name === 'path' &&
75
- init.callee.property.type === 'Identifier' &&
76
- init.callee.property.name === 'basename') {
77
- sanitizedVariables.add(varName);
78
- }
79
-
80
- // Check for path.join() with a sanitized variable or literal base
81
- if (init.type === 'CallExpression' &&
82
- init.callee.type === 'MemberExpression' &&
83
- init.callee.object.type === 'Identifier' &&
84
- init.callee.object.name === 'path' &&
85
- init.callee.property.type === 'Identifier' &&
86
- init.callee.property.name === 'join') {
87
-
88
- // Check if any argument is a sanitized variable
89
- const hasSanitizedArg = init.arguments.some((arg: TSESTree.CallExpressionArgument) =>
90
- arg.type === 'Identifier' && sanitizedVariables.has(arg.name)
91
- );
92
-
93
- // Check if first arg is a safe base (literal or known safe variable)
94
- const firstArg = init.arguments[0];
95
- const hasSafeBase = firstArg && (
96
- firstArg.type === 'Literal' ||
97
- (firstArg.type === 'Identifier' && /^(SAFE|BASE|ROOT|UPLOAD|PUBLIC)/i.test(firstArg.name))
98
- );
99
-
100
- if (hasSanitizedArg && hasSafeBase) {
101
- sanitizedVariables.add(varName);
102
- }
103
- }
104
- }
105
-
106
- /**
107
- * Check if there's a startsWith() guard validation for this variable
108
- * Looks for patterns like:
109
- * if (!path.startsWith(baseDir)) { throw ... }
110
- * if (!path.startsWith(baseDir)) { return ... }
111
- */
112
- function hasStartsWithGuard(node: TSESTree.Node, varName: string): boolean {
113
- // Already validated
114
- if (validatedVariables.has(varName)) {
115
- return true;
116
- }
117
-
118
- // Walk up to find the containing block or function
119
- let current: TSESTree.Node | undefined = node.parent;
120
-
121
- while (current) {
122
- // If we've reached a function body or block, search its statements
123
- if (current.type === AST_NODE_TYPES.BlockStatement) {
124
- const statements = current.body;
125
-
126
- // Look for IF statements in this block that validate our variable
127
- for (const stmt of statements) {
128
- if (stmt.type === AST_NODE_TYPES.IfStatement) {
129
- const testText = sourceCode.getText(stmt.test).toLowerCase();
130
-
131
- // Check for startsWith() validation pattern with our variable
132
- if (testText.includes('startswith') && testText.includes(varName.toLowerCase())) {
133
- // Check if this is a guard clause (negated condition with throw/return)
134
- const consequent = stmt.consequent;
135
-
136
- // Handle block statement: if (...) { throw/return; }
137
- if (consequent.type === AST_NODE_TYPES.BlockStatement && consequent.body.length > 0) {
138
- const firstStmt = consequent.body[0];
139
- if (firstStmt.type === AST_NODE_TYPES.ThrowStatement || firstStmt.type === AST_NODE_TYPES.ReturnStatement) {
140
- validatedVariables.add(varName);
141
- return true;
142
- }
143
- }
144
-
145
- // Handle direct statement: if (...) throw/return;
146
- if (consequent.type === AST_NODE_TYPES.ThrowStatement || consequent.type === AST_NODE_TYPES.ReturnStatement) {
147
- validatedVariables.add(varName);
148
- return true;
149
- }
150
- }
151
- }
152
- }
153
- }
154
-
155
- // Also check if current IS an if statement (when node is inside the consequent)
156
- if (current.type === AST_NODE_TYPES.IfStatement) {
157
- const testText = sourceCode.getText(current.test).toLowerCase();
158
- if (testText.includes('startswith') && testText.includes(varName.toLowerCase())) {
159
- validatedVariables.add(varName);
160
- return true;
161
- }
162
- }
163
-
164
- current = current.parent;
165
- }
166
-
167
- return false;
168
- }
169
-
170
- /**
171
- * Check if a variable comes from a sanitized/validated source
172
- */
173
- function isVariableSafe(varName: string, node: TSESTree.Node): boolean {
174
- // Already tracked as sanitized
175
- if (sanitizedVariables.has(varName)) {
176
- return true;
177
- }
178
-
179
- // Has startsWith guard validation
180
- if (hasStartsWithGuard(node, varName)) {
181
- return true;
182
- }
183
-
184
- // Check naming conventions that suggest safety
185
- if (/^(safe|sanitized|validated|clean)/i.test(varName)) {
186
- return true;
187
- }
188
-
189
- return false;
190
- }
191
-
192
- return {
193
- // Track variable declarations for sanitization patterns
194
- VariableDeclarator(node: TSESTree.VariableDeclarator) {
195
- checkVariableDeclaration(node);
196
- },
197
-
198
- CallExpression(node: TSESTree.CallExpression) {
199
- // Detect fs.* with user input
200
- if (node.callee.type === 'MemberExpression' &&
201
- node.callee.object.type === 'Identifier' &&
202
- node.callee.object.name === 'fs' &&
203
- node.callee.property.type === 'Identifier' &&
204
- [...fsReadMethods, ...fsWriteMethods].includes(node.callee.property.name)) {
205
-
206
- const pathArg = node.arguments[0];
207
-
208
- // Skip if path is a literal (safe)
209
- if (pathArg && pathArg.type === 'Literal') {
210
- return;
211
- }
212
-
213
- // Check if path is a variable
214
- if (pathArg && pathArg.type === 'Identifier') {
215
- const varName = pathArg.name;
216
-
217
- // Skip if variable is sanitized or validated
218
- if (isVariableSafe(varName, node)) {
219
- return;
220
- }
221
-
222
- report(node);
223
- return;
224
- }
225
-
226
- // Flag if path is from a member expression (user input sources)
227
- if (pathArg?.type === 'MemberExpression' &&
228
- pathArg.object.type === 'Identifier') {
229
- const objName = pathArg.object.name.toLowerCase();
230
- if (userInputSources.includes(objName)) {
231
- report(node);
232
- }
233
- }
234
- }
235
- },
236
- };
237
- },
238
- });
@@ -1,119 +0,0 @@
1
- /**
2
- * @fileoverview Tests for no-arbitrary-file-access
3
- */
4
-
5
- import { RuleTester } from '@typescript-eslint/rule-tester';
6
- import { noArbitraryFileAccess } from './index';
7
-
8
- const ruleTester = new RuleTester({
9
- languageOptions: {
10
- ecmaVersion: 2022,
11
- sourceType: 'module',
12
- },
13
- });
14
-
15
- ruleTester.run('no-arbitrary-file-access', noArbitraryFileAccess, {
16
- valid: [
17
- // Static file paths
18
- { code: "fs.readFileSync('./config.json')" },
19
- { code: "fs.writeFile('/app/data/log.txt', data, cb)" },
20
- { code: "fs.readdir('/safe/path')" },
21
- { code: "fs.stat('/known/file.txt')" },
22
- // Non-fs code
23
- { code: "const x = 1" },
24
- { code: "other.readFile(path)" },
25
-
26
- // ============================================
27
- // FALSE POSITIVE PREVENTION TESTS
28
- // ============================================
29
-
30
- // FP-1: path.basename() sanitization
31
- {
32
- code: `
33
- const safeName = path.basename(userFilename);
34
- fs.readFileSync(safeName);
35
- `,
36
- },
37
-
38
- // FP-2: path.basename() + path.join() with safe base
39
- {
40
- code: `
41
- const safeName = path.basename(userFilename);
42
- const safePath = path.join(SAFE_DIR, safeName);
43
- fs.readFileSync(safePath);
44
- `,
45
- },
46
-
47
- // FP-3: startsWith() validation guard with throw
48
- {
49
- code: `
50
- function readFile(userPath) {
51
- const filePath = path.join('/uploads', userPath);
52
- if (!filePath.startsWith('/uploads')) {
53
- throw new Error('Invalid path');
54
- }
55
- return fs.readFileSync(filePath);
56
- }
57
- `,
58
- },
59
-
60
- // FP-4: startsWith() validation guard with return
61
- {
62
- code: `
63
- function readFile(userPath) {
64
- const filePath = path.join(baseDir, userPath);
65
- if (!filePath.startsWith(baseDir)) {
66
- return null;
67
- }
68
- return fs.readFileSync(filePath);
69
- }
70
- `,
71
- },
72
-
73
- // FP-5: Variables with safe naming conventions
74
- { code: "fs.readFileSync(safePath)" },
75
- { code: "fs.readFileSync(sanitizedPath)" },
76
- { code: "fs.readFileSync(validatedFilename)" },
77
- { code: "fs.readFileSync(cleanPath)" },
78
-
79
- // FP-6: Combined pattern (real-world safe pattern from safe-patterns.js)
80
- {
81
- code: `
82
- const SAFE_DIR = path.resolve(__dirname, 'uploads');
83
- function safeReadFile(userFilename) {
84
- const safeName = path.basename(userFilename);
85
- const safePath = path.join(SAFE_DIR, safeName);
86
- if (!safePath.startsWith(SAFE_DIR)) {
87
- throw new Error('Invalid path');
88
- }
89
- return fs.readFileSync(safePath);
90
- }
91
- `,
92
- },
93
- ],
94
-
95
- invalid: [
96
- // Variable file paths - all fs read methods
97
- { code: "fs.readFileSync(filePath)", errors: [{ messageId: 'violationDetected' }] },
98
- { code: "fs.readFile(userFile, cb)", errors: [{ messageId: 'violationDetected' }] },
99
- { code: "fs.readdir(userDir)", errors: [{ messageId: 'violationDetected' }] },
100
- { code: "fs.readdirSync(scanPath)", errors: [{ messageId: 'violationDetected' }] },
101
- { code: "fs.stat(targetPath)", errors: [{ messageId: 'violationDetected' }] },
102
- { code: "fs.statSync(checkPath)", errors: [{ messageId: 'violationDetected' }] },
103
- // Variable file paths - all fs write methods
104
- { code: "fs.writeFile(outputPath, data, cb)", errors: [{ messageId: 'violationDetected' }] },
105
- { code: "fs.writeFileSync(destPath, content)", errors: [{ messageId: 'violationDetected' }] },
106
- { code: "fs.appendFile(logPath, text, cb)", errors: [{ messageId: 'violationDetected' }] },
107
- { code: "fs.appendFileSync(filePath, data)", errors: [{ messageId: 'violationDetected' }] },
108
- // User input from req object
109
- { code: "fs.readFile(req.file, cb)", errors: [{ messageId: 'violationDetected' }] },
110
- // User input from request object
111
- { code: "fs.readFile(request.path, cb)", errors: [{ messageId: 'violationDetected' }] },
112
- // User input from params object
113
- { code: "fs.readFileSync(params.filename)", errors: [{ messageId: 'violationDetected' }] },
114
- // User input from query object
115
- { code: "fs.readFile(query.file, cb)", errors: [{ messageId: 'violationDetected' }] },
116
- // User input from body object
117
- { code: "fs.writeFile(body.path, data, cb)", errors: [{ messageId: 'violationDetected' }] },
118
- ],
119
- });