eslint-plugin-secure-coding 2.3.3 → 2.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (337) hide show
  1. package/CHANGELOG.md +51 -1
  2. package/README.md +2 -2
  3. package/package.json +1 -1
  4. package/src/index.d.ts +32 -0
  5. package/src/index.js +416 -0
  6. package/src/rules/detect-child-process/index.d.ts +11 -0
  7. package/src/rules/detect-child-process/index.js +529 -0
  8. package/src/rules/detect-eval-with-expression/index.d.ts +9 -0
  9. package/src/rules/detect-eval-with-expression/index.js +392 -0
  10. package/src/rules/detect-mixed-content/index.d.ts +8 -0
  11. package/src/rules/detect-mixed-content/index.js +44 -0
  12. package/src/rules/detect-non-literal-fs-filename/index.d.ts +7 -0
  13. package/src/rules/detect-non-literal-fs-filename/index.js +454 -0
  14. package/src/rules/detect-non-literal-regexp/index.d.ts +9 -0
  15. package/src/rules/detect-non-literal-regexp/index.js +403 -0
  16. package/src/rules/detect-object-injection/index.d.ts +11 -0
  17. package/src/rules/detect-object-injection/index.js +560 -0
  18. package/src/rules/detect-suspicious-dependencies/index.d.ts +8 -0
  19. package/src/rules/detect-suspicious-dependencies/index.js +71 -0
  20. package/src/rules/detect-weak-password-validation/index.d.ts +6 -0
  21. package/src/rules/detect-weak-password-validation/index.js +58 -0
  22. package/src/rules/no-allow-arbitrary-loads/index.d.ts +8 -0
  23. package/src/rules/no-allow-arbitrary-loads/index.js +47 -0
  24. package/src/rules/no-arbitrary-file-access/index.d.ts +13 -0
  25. package/src/rules/no-arbitrary-file-access/index.js +195 -0
  26. package/src/rules/no-buffer-overread/index.d.ts +29 -0
  27. package/src/rules/no-buffer-overread/index.js +606 -0
  28. package/src/rules/no-clickjacking/index.d.ts +10 -0
  29. package/src/rules/no-clickjacking/index.js +396 -0
  30. package/src/rules/no-client-side-auth-logic/index.d.ts +6 -0
  31. package/src/rules/no-client-side-auth-logic/index.js +69 -0
  32. package/src/rules/no-credentials-in-query-params/index.d.ts +8 -0
  33. package/src/rules/no-credentials-in-query-params/index.js +57 -0
  34. package/src/rules/no-data-in-temp-storage/index.d.ts +6 -0
  35. package/src/rules/no-data-in-temp-storage/index.js +64 -0
  36. package/src/rules/no-debug-code-in-production/index.d.ts +8 -0
  37. package/src/rules/no-debug-code-in-production/index.js +51 -0
  38. package/src/rules/no-directive-injection/index.d.ts +12 -0
  39. package/src/rules/no-directive-injection/index.js +457 -0
  40. package/src/rules/no-disabled-certificate-validation/index.d.ts +6 -0
  41. package/src/rules/no-disabled-certificate-validation/index.js +61 -0
  42. package/src/rules/no-dynamic-dependency-loading/index.d.ts +8 -0
  43. package/src/rules/no-dynamic-dependency-loading/index.js +51 -0
  44. package/src/rules/no-electron-security-issues/index.d.ts +10 -0
  45. package/src/rules/no-electron-security-issues/index.js +423 -0
  46. package/src/rules/no-exposed-debug-endpoints/index.d.ts +6 -0
  47. package/src/rules/no-exposed-debug-endpoints/index.js +62 -0
  48. package/src/rules/no-exposed-sensitive-data/index.d.ts +11 -0
  49. package/src/rules/no-exposed-sensitive-data/index.js +340 -0
  50. package/src/rules/no-format-string-injection/index.d.ts +17 -0
  51. package/src/rules/no-format-string-injection/index.js +660 -0
  52. package/src/rules/no-graphql-injection/index.d.ts +12 -0
  53. package/src/rules/no-graphql-injection/index.js +411 -0
  54. package/src/rules/no-hardcoded-credentials/index.d.ts +26 -0
  55. package/src/rules/no-hardcoded-credentials/index.js +376 -0
  56. package/src/rules/no-hardcoded-session-tokens/index.d.ts +6 -0
  57. package/src/rules/no-hardcoded-session-tokens/index.js +59 -0
  58. package/src/rules/no-http-urls/index.d.ts +12 -0
  59. package/src/rules/no-http-urls/index.js +114 -0
  60. package/src/rules/no-improper-sanitization/index.d.ts +12 -0
  61. package/src/rules/no-improper-sanitization/index.js +411 -0
  62. package/src/rules/no-improper-type-validation/index.d.ts +10 -0
  63. package/src/rules/no-improper-type-validation/index.js +475 -0
  64. package/src/rules/no-insecure-comparison/index.d.ts +7 -0
  65. package/src/rules/no-insecure-comparison/index.js +193 -0
  66. package/src/rules/no-insecure-redirects/index.d.ts +7 -0
  67. package/src/rules/no-insecure-redirects/index.js +216 -0
  68. package/src/rules/no-insecure-websocket/index.d.ts +6 -0
  69. package/src/rules/no-insecure-websocket/index.js +61 -0
  70. package/src/rules/no-ldap-injection/index.d.ts +10 -0
  71. package/src/rules/no-ldap-injection/index.js +455 -0
  72. package/src/rules/no-missing-authentication/index.d.ts +13 -0
  73. package/src/rules/no-missing-authentication/index.js +333 -0
  74. package/src/rules/no-missing-cors-check/index.d.ts +9 -0
  75. package/src/rules/no-missing-cors-check/index.js +399 -0
  76. package/src/rules/no-missing-csrf-protection/index.d.ts +11 -0
  77. package/src/rules/no-missing-csrf-protection/index.js +180 -0
  78. package/src/rules/no-missing-security-headers/index.d.ts +7 -0
  79. package/src/rules/no-missing-security-headers/index.js +218 -0
  80. package/src/rules/no-password-in-url/index.d.ts +8 -0
  81. package/src/rules/no-password-in-url/index.js +54 -0
  82. package/src/rules/no-permissive-cors/index.d.ts +8 -0
  83. package/src/rules/no-permissive-cors/index.js +65 -0
  84. package/src/rules/no-pii-in-logs/index.d.ts +8 -0
  85. package/src/rules/no-pii-in-logs/index.js +70 -0
  86. package/src/rules/no-privilege-escalation/index.d.ts +13 -0
  87. package/src/rules/no-privilege-escalation/index.js +321 -0
  88. package/src/rules/no-redos-vulnerable-regex/index.d.ts +7 -0
  89. package/src/rules/no-redos-vulnerable-regex/index.js +306 -0
  90. package/src/rules/no-sensitive-data-exposure/index.d.ts +11 -0
  91. package/src/rules/no-sensitive-data-exposure/index.js +250 -0
  92. package/src/rules/no-sensitive-data-in-analytics/index.d.ts +8 -0
  93. package/src/rules/no-sensitive-data-in-analytics/index.js +62 -0
  94. package/src/rules/no-sensitive-data-in-cache/index.d.ts +8 -0
  95. package/src/rules/no-sensitive-data-in-cache/index.js +52 -0
  96. package/src/rules/no-toctou-vulnerability/index.d.ts +7 -0
  97. package/src/rules/no-toctou-vulnerability/index.js +208 -0
  98. package/src/rules/no-tracking-without-consent/index.d.ts +6 -0
  99. package/src/rules/no-tracking-without-consent/index.js +67 -0
  100. package/src/rules/no-unchecked-loop-condition/index.d.ts +12 -0
  101. package/src/rules/no-unchecked-loop-condition/index.js +646 -0
  102. package/src/rules/no-unencrypted-transmission/index.d.ts +11 -0
  103. package/src/rules/no-unencrypted-transmission/index.js +236 -0
  104. package/src/rules/no-unescaped-url-parameter/index.d.ts +9 -0
  105. package/src/rules/no-unescaped-url-parameter/index.js +355 -0
  106. package/src/rules/no-unlimited-resource-allocation/index.d.ts +12 -0
  107. package/src/rules/no-unlimited-resource-allocation/index.js +643 -0
  108. package/src/rules/no-unsafe-deserialization/index.d.ts +10 -0
  109. package/src/rules/no-unsafe-deserialization/index.js +491 -0
  110. package/src/rules/no-unsafe-dynamic-require/index.d.ts +5 -0
  111. package/src/rules/no-unsafe-dynamic-require/index.js +106 -0
  112. package/src/rules/no-unsafe-regex-construction/index.d.ts +9 -0
  113. package/src/rules/no-unsafe-regex-construction/index.js +291 -0
  114. package/src/rules/no-unvalidated-deeplinks/index.d.ts +6 -0
  115. package/src/rules/no-unvalidated-deeplinks/index.js +62 -0
  116. package/src/rules/no-unvalidated-user-input/index.d.ts +9 -0
  117. package/src/rules/no-unvalidated-user-input/index.js +420 -0
  118. package/src/rules/no-verbose-error-messages/index.d.ts +8 -0
  119. package/src/rules/no-verbose-error-messages/index.js +68 -0
  120. package/src/rules/no-weak-password-recovery/index.d.ts +12 -0
  121. package/src/rules/no-weak-password-recovery/index.js +424 -0
  122. package/src/rules/no-xpath-injection/index.d.ts +10 -0
  123. package/src/rules/no-xpath-injection/index.js +487 -0
  124. package/src/rules/no-xxe-injection/index.d.ts +7 -0
  125. package/src/rules/no-xxe-injection/index.js +266 -0
  126. package/src/rules/no-zip-slip/index.d.ts +9 -0
  127. package/src/rules/no-zip-slip/index.js +445 -0
  128. package/src/rules/require-backend-authorization/index.d.ts +6 -0
  129. package/src/rules/require-backend-authorization/index.js +60 -0
  130. package/src/rules/require-code-minification/index.d.ts +8 -0
  131. package/src/rules/require-code-minification/index.js +47 -0
  132. package/src/rules/require-csp-headers/index.d.ts +6 -0
  133. package/src/rules/require-csp-headers/index.js +64 -0
  134. package/src/rules/require-data-minimization/index.d.ts +8 -0
  135. package/src/rules/require-data-minimization/index.js +53 -0
  136. package/src/rules/require-dependency-integrity/index.d.ts +6 -0
  137. package/src/rules/require-dependency-integrity/index.js +64 -0
  138. package/src/rules/require-https-only/index.d.ts +8 -0
  139. package/src/rules/require-https-only/index.js +62 -0
  140. package/src/rules/require-mime-type-validation/index.d.ts +6 -0
  141. package/src/rules/require-mime-type-validation/index.js +66 -0
  142. package/src/rules/require-network-timeout/index.d.ts +8 -0
  143. package/src/rules/require-network-timeout/index.js +50 -0
  144. package/src/rules/require-package-lock/index.d.ts +8 -0
  145. package/src/rules/require-package-lock/index.js +63 -0
  146. package/src/rules/require-secure-credential-storage/index.d.ts +8 -0
  147. package/src/rules/require-secure-credential-storage/index.js +50 -0
  148. package/src/rules/require-secure-defaults/index.d.ts +8 -0
  149. package/src/rules/require-secure-defaults/index.js +47 -0
  150. package/src/rules/require-secure-deletion/index.d.ts +8 -0
  151. package/src/rules/require-secure-deletion/index.js +44 -0
  152. package/src/rules/require-storage-encryption/index.d.ts +8 -0
  153. package/src/rules/require-storage-encryption/index.js +50 -0
  154. package/src/rules/require-url-validation/index.d.ts +6 -0
  155. package/src/rules/require-url-validation/index.js +72 -0
  156. package/src/types/index.d.ts +106 -0
  157. package/src/types/index.js +16 -0
  158. package/src/index.ts +0 -605
  159. package/src/rules/__tests__/integration-demo.test.ts +0 -290
  160. package/src/rules/__tests__/integration-llm.test.ts +0 -89
  161. package/src/rules/database-injection/database-injection.test.ts +0 -456
  162. package/src/rules/database-injection/index.ts +0 -488
  163. package/src/rules/detect-child-process/detect-child-process.test.ts +0 -207
  164. package/src/rules/detect-child-process/index.ts +0 -634
  165. package/src/rules/detect-eval-with-expression/detect-eval-with-expression.test.ts +0 -416
  166. package/src/rules/detect-eval-with-expression/index.ts +0 -463
  167. package/src/rules/detect-mixed-content/detect-mixed-content.test.ts +0 -28
  168. package/src/rules/detect-mixed-content/index.ts +0 -52
  169. package/src/rules/detect-non-literal-fs-filename/detect-non-literal-fs-filename.test.ts +0 -269
  170. package/src/rules/detect-non-literal-fs-filename/index.ts +0 -551
  171. package/src/rules/detect-non-literal-regexp/detect-non-literal-regexp.test.ts +0 -189
  172. package/src/rules/detect-non-literal-regexp/index.ts +0 -490
  173. package/src/rules/detect-object-injection/detect-object-injection.test.ts +0 -440
  174. package/src/rules/detect-object-injection/index.ts +0 -674
  175. package/src/rules/detect-suspicious-dependencies/detect-suspicious-dependencies.test.ts +0 -32
  176. package/src/rules/detect-suspicious-dependencies/index.ts +0 -84
  177. package/src/rules/detect-weak-password-validation/detect-weak-password-validation.test.ts +0 -31
  178. package/src/rules/detect-weak-password-validation/index.ts +0 -68
  179. package/src/rules/no-allow-arbitrary-loads/index.ts +0 -54
  180. package/src/rules/no-allow-arbitrary-loads/no-allow-arbitrary-loads.test.ts +0 -28
  181. package/src/rules/no-arbitrary-file-access/index.ts +0 -238
  182. package/src/rules/no-arbitrary-file-access/no-arbitrary-file-access.test.ts +0 -119
  183. package/src/rules/no-buffer-overread/index.ts +0 -724
  184. package/src/rules/no-buffer-overread/no-buffer-overread.test.ts +0 -313
  185. package/src/rules/no-clickjacking/index.ts +0 -481
  186. package/src/rules/no-clickjacking/no-clickjacking.test.ts +0 -253
  187. package/src/rules/no-client-side-auth-logic/index.ts +0 -81
  188. package/src/rules/no-client-side-auth-logic/no-client-side-auth-logic.test.ts +0 -33
  189. package/src/rules/no-credentials-in-query-params/index.ts +0 -69
  190. package/src/rules/no-credentials-in-query-params/no-credentials-in-query-params.test.ts +0 -33
  191. package/src/rules/no-credentials-in-storage-api/index.ts +0 -64
  192. package/src/rules/no-credentials-in-storage-api/no-credentials-in-storage-api.test.ts +0 -31
  193. package/src/rules/no-data-in-temp-storage/index.ts +0 -75
  194. package/src/rules/no-data-in-temp-storage/no-data-in-temp-storage.test.ts +0 -33
  195. package/src/rules/no-debug-code-in-production/index.ts +0 -59
  196. package/src/rules/no-debug-code-in-production/no-debug-code-in-production.test.ts +0 -26
  197. package/src/rules/no-directive-injection/index.ts +0 -551
  198. package/src/rules/no-directive-injection/no-directive-injection.test.ts +0 -305
  199. package/src/rules/no-disabled-certificate-validation/index.ts +0 -72
  200. package/src/rules/no-disabled-certificate-validation/no-disabled-certificate-validation.test.ts +0 -33
  201. package/src/rules/no-document-cookie/index.ts +0 -113
  202. package/src/rules/no-document-cookie/no-document-cookie.test.ts +0 -382
  203. package/src/rules/no-dynamic-dependency-loading/index.ts +0 -60
  204. package/src/rules/no-dynamic-dependency-loading/no-dynamic-dependency-loading.test.ts +0 -27
  205. package/src/rules/no-electron-security-issues/index.ts +0 -504
  206. package/src/rules/no-electron-security-issues/no-electron-security-issues.test.ts +0 -324
  207. package/src/rules/no-exposed-debug-endpoints/index.ts +0 -73
  208. package/src/rules/no-exposed-debug-endpoints/no-exposed-debug-endpoints.test.ts +0 -40
  209. package/src/rules/no-exposed-sensitive-data/index.ts +0 -428
  210. package/src/rules/no-exposed-sensitive-data/no-exposed-sensitive-data.test.ts +0 -75
  211. package/src/rules/no-format-string-injection/index.ts +0 -801
  212. package/src/rules/no-format-string-injection/no-format-string-injection.test.ts +0 -437
  213. package/src/rules/no-graphql-injection/index.ts +0 -508
  214. package/src/rules/no-graphql-injection/no-graphql-injection.test.ts +0 -371
  215. package/src/rules/no-hardcoded-credentials/index.ts +0 -478
  216. package/src/rules/no-hardcoded-credentials/no-hardcoded-credentials.test.ts +0 -639
  217. package/src/rules/no-hardcoded-session-tokens/index.ts +0 -69
  218. package/src/rules/no-hardcoded-session-tokens/no-hardcoded-session-tokens.test.ts +0 -42
  219. package/src/rules/no-http-urls/index.ts +0 -131
  220. package/src/rules/no-http-urls/no-http-urls.test.ts +0 -60
  221. package/src/rules/no-improper-sanitization/index.ts +0 -502
  222. package/src/rules/no-improper-sanitization/no-improper-sanitization.test.ts +0 -156
  223. package/src/rules/no-improper-type-validation/index.ts +0 -572
  224. package/src/rules/no-improper-type-validation/no-improper-type-validation.test.ts +0 -372
  225. package/src/rules/no-insecure-comparison/index.ts +0 -232
  226. package/src/rules/no-insecure-comparison/no-insecure-comparison.test.ts +0 -218
  227. package/src/rules/no-insecure-cookie-settings/index.ts +0 -391
  228. package/src/rules/no-insecure-cookie-settings/no-insecure-cookie-settings.test.ts +0 -409
  229. package/src/rules/no-insecure-jwt/index.ts +0 -467
  230. package/src/rules/no-insecure-jwt/no-insecure-jwt.test.ts +0 -259
  231. package/src/rules/no-insecure-redirects/index.ts +0 -267
  232. package/src/rules/no-insecure-redirects/no-insecure-redirects.test.ts +0 -108
  233. package/src/rules/no-insecure-websocket/index.ts +0 -72
  234. package/src/rules/no-insecure-websocket/no-insecure-websocket.test.ts +0 -42
  235. package/src/rules/no-insufficient-postmessage-validation/index.ts +0 -497
  236. package/src/rules/no-insufficient-postmessage-validation/no-insufficient-postmessage-validation.test.ts +0 -360
  237. package/src/rules/no-insufficient-random/index.ts +0 -288
  238. package/src/rules/no-insufficient-random/no-insufficient-random.test.ts +0 -246
  239. package/src/rules/no-ldap-injection/index.ts +0 -547
  240. package/src/rules/no-ldap-injection/no-ldap-injection.test.ts +0 -317
  241. package/src/rules/no-missing-authentication/index.ts +0 -408
  242. package/src/rules/no-missing-authentication/no-missing-authentication.test.ts +0 -350
  243. package/src/rules/no-missing-cors-check/index.ts +0 -453
  244. package/src/rules/no-missing-cors-check/no-missing-cors-check.test.ts +0 -392
  245. package/src/rules/no-missing-csrf-protection/index.ts +0 -229
  246. package/src/rules/no-missing-csrf-protection/no-missing-csrf-protection.test.ts +0 -222
  247. package/src/rules/no-missing-security-headers/index.ts +0 -266
  248. package/src/rules/no-missing-security-headers/no-missing-security-headers.test.ts +0 -98
  249. package/src/rules/no-password-in-url/index.ts +0 -64
  250. package/src/rules/no-password-in-url/no-password-in-url.test.ts +0 -27
  251. package/src/rules/no-permissive-cors/index.ts +0 -78
  252. package/src/rules/no-permissive-cors/no-permissive-cors.test.ts +0 -28
  253. package/src/rules/no-pii-in-logs/index.ts +0 -83
  254. package/src/rules/no-pii-in-logs/no-pii-in-logs.test.ts +0 -26
  255. package/src/rules/no-postmessage-origin-wildcard/index.ts +0 -67
  256. package/src/rules/no-postmessage-origin-wildcard/no-postmessage-origin-wildcard.test.ts +0 -27
  257. package/src/rules/no-privilege-escalation/index.ts +0 -403
  258. package/src/rules/no-privilege-escalation/no-privilege-escalation.test.ts +0 -306
  259. package/src/rules/no-redos-vulnerable-regex/index.ts +0 -379
  260. package/src/rules/no-redos-vulnerable-regex/no-redos-vulnerable-regex.test.ts +0 -83
  261. package/src/rules/no-sensitive-data-exposure/index.ts +0 -294
  262. package/src/rules/no-sensitive-data-exposure/no-sensitive-data-exposure.test.ts +0 -262
  263. package/src/rules/no-sensitive-data-in-analytics/index.ts +0 -73
  264. package/src/rules/no-sensitive-data-in-analytics/no-sensitive-data-in-analytics.test.ts +0 -42
  265. package/src/rules/no-sensitive-data-in-cache/index.ts +0 -59
  266. package/src/rules/no-sensitive-data-in-cache/no-sensitive-data-in-cache.test.ts +0 -32
  267. package/src/rules/no-sql-injection/index.ts +0 -424
  268. package/src/rules/no-sql-injection/no-sql-injection.test.ts +0 -303
  269. package/src/rules/no-timing-attack/index.ts +0 -552
  270. package/src/rules/no-timing-attack/no-timing-attack.test.ts +0 -348
  271. package/src/rules/no-toctou-vulnerability/index.ts +0 -250
  272. package/src/rules/no-toctou-vulnerability/no-toctou-vulnerability.test.ts +0 -60
  273. package/src/rules/no-tracking-without-consent/index.ts +0 -78
  274. package/src/rules/no-tracking-without-consent/no-tracking-without-consent.test.ts +0 -34
  275. package/src/rules/no-unchecked-loop-condition/index.ts +0 -781
  276. package/src/rules/no-unchecked-loop-condition/no-unchecked-loop-condition.test.ts +0 -459
  277. package/src/rules/no-unencrypted-local-storage/index.ts +0 -73
  278. package/src/rules/no-unencrypted-local-storage/no-unencrypted-local-storage.test.ts +0 -41
  279. package/src/rules/no-unencrypted-transmission/index.ts +0 -296
  280. package/src/rules/no-unencrypted-transmission/no-unencrypted-transmission.test.ts +0 -287
  281. package/src/rules/no-unescaped-url-parameter/index.ts +0 -424
  282. package/src/rules/no-unescaped-url-parameter/no-unescaped-url-parameter.test.ts +0 -263
  283. package/src/rules/no-unlimited-resource-allocation/index.ts +0 -767
  284. package/src/rules/no-unlimited-resource-allocation/no-unlimited-resource-allocation.test.ts +0 -544
  285. package/src/rules/no-unsafe-deserialization/index.ts +0 -593
  286. package/src/rules/no-unsafe-deserialization/no-unsafe-deserialization.test.ts +0 -310
  287. package/src/rules/no-unsafe-dynamic-require/index.ts +0 -125
  288. package/src/rules/no-unsafe-dynamic-require/no-unsafe-dynamic-require.test.ts +0 -151
  289. package/src/rules/no-unsafe-regex-construction/index.ts +0 -370
  290. package/src/rules/no-unsafe-regex-construction/no-unsafe-regex-construction.test.ts +0 -181
  291. package/src/rules/no-unsanitized-html/index.ts +0 -400
  292. package/src/rules/no-unsanitized-html/no-unsanitized-html.test.ts +0 -488
  293. package/src/rules/no-unvalidated-deeplinks/index.ts +0 -73
  294. package/src/rules/no-unvalidated-deeplinks/no-unvalidated-deeplinks.test.ts +0 -29
  295. package/src/rules/no-unvalidated-user-input/index.ts +0 -498
  296. package/src/rules/no-unvalidated-user-input/no-unvalidated-user-input.test.ts +0 -463
  297. package/src/rules/no-verbose-error-messages/index.ts +0 -83
  298. package/src/rules/no-verbose-error-messages/no-verbose-error-messages.test.ts +0 -34
  299. package/src/rules/no-weak-crypto/index.ts +0 -447
  300. package/src/rules/no-weak-crypto/no-weak-crypto.test.ts +0 -297
  301. package/src/rules/no-weak-password-recovery/index.ts +0 -509
  302. package/src/rules/no-weak-password-recovery/no-weak-password-recovery.test.ts +0 -184
  303. package/src/rules/no-xpath-injection/index.ts +0 -596
  304. package/src/rules/no-xpath-injection/no-xpath-injection.test.ts +0 -405
  305. package/src/rules/no-xxe-injection/index.ts +0 -342
  306. package/src/rules/no-xxe-injection/no-xxe-injection.test.ts +0 -122
  307. package/src/rules/no-zip-slip/index.ts +0 -526
  308. package/src/rules/no-zip-slip/no-zip-slip.test.ts +0 -305
  309. package/src/rules/require-backend-authorization/index.ts +0 -71
  310. package/src/rules/require-backend-authorization/require-backend-authorization.test.ts +0 -31
  311. package/src/rules/require-code-minification/index.ts +0 -54
  312. package/src/rules/require-code-minification/require-code-minification.test.ts +0 -30
  313. package/src/rules/require-csp-headers/index.ts +0 -74
  314. package/src/rules/require-csp-headers/require-csp-headers.test.ts +0 -34
  315. package/src/rules/require-data-minimization/index.ts +0 -65
  316. package/src/rules/require-data-minimization/require-data-minimization.test.ts +0 -31
  317. package/src/rules/require-dependency-integrity/index.ts +0 -78
  318. package/src/rules/require-dependency-integrity/require-dependency-integrity.test.ts +0 -44
  319. package/src/rules/require-https-only/index.ts +0 -75
  320. package/src/rules/require-https-only/require-https-only.test.ts +0 -26
  321. package/src/rules/require-mime-type-validation/index.ts +0 -77
  322. package/src/rules/require-mime-type-validation/require-mime-type-validation.test.ts +0 -32
  323. package/src/rules/require-network-timeout/index.ts +0 -58
  324. package/src/rules/require-network-timeout/require-network-timeout.test.ts +0 -26
  325. package/src/rules/require-package-lock/index.ts +0 -75
  326. package/src/rules/require-package-lock/require-package-lock.test.ts +0 -27
  327. package/src/rules/require-secure-credential-storage/index.ts +0 -60
  328. package/src/rules/require-secure-credential-storage/require-secure-credential-storage.test.ts +0 -26
  329. package/src/rules/require-secure-defaults/index.ts +0 -54
  330. package/src/rules/require-secure-defaults/require-secure-defaults.test.ts +0 -26
  331. package/src/rules/require-secure-deletion/index.ts +0 -52
  332. package/src/rules/require-secure-deletion/require-secure-deletion.test.ts +0 -29
  333. package/src/rules/require-storage-encryption/index.ts +0 -60
  334. package/src/rules/require-storage-encryption/require-storage-encryption.test.ts +0 -26
  335. package/src/rules/require-url-validation/index.ts +0 -85
  336. package/src/rules/require-url-validation/require-url-validation.test.ts +0 -32
  337. package/src/types/index.ts +0 -235
@@ -1,259 +0,0 @@
1
- /**
2
- * Comprehensive tests for no-insecure-jwt rule
3
- * Security: CWE-347 (JWT Security Vulnerabilities)
4
- */
5
- import { RuleTester } from '@typescript-eslint/rule-tester';
6
- import { describe, it, afterAll } from 'vitest';
7
- import parser from '@typescript-eslint/parser';
8
- import { noInsecureJwt } from './index';
9
-
10
- // Configure RuleTester for Vitest
11
- RuleTester.afterAll = afterAll;
12
- RuleTester.it = it;
13
- RuleTester.itOnly = it.only;
14
- RuleTester.describe = describe;
15
-
16
- // Use Flat Config format (ESLint 9+)
17
- const ruleTester = new RuleTester({
18
- languageOptions: {
19
- parser,
20
- ecmaVersion: 2022,
21
- sourceType: 'module',
22
- },
23
- });
24
-
25
- describe('no-insecure-jwt', () => {
26
- describe('Valid Code', () => {
27
- ruleTester.run('valid - secure JWT operations', noInsecureJwt, {
28
- valid: [
29
- // Secure JWT verification
30
- {
31
- code: 'jwt.verify(token, publicKey, { algorithms: ["RS256"] });',
32
- },
33
- {
34
- code: 'jwt.verify(token, secret, { algorithms: ["HS256"] });',
35
- },
36
- // Using jose library
37
- {
38
- code: 'const payload = await jwtVerify(token, publicKey);',
39
- },
40
- // Strong secrets
41
- {
42
- code: 'jwt.sign(payload, crypto.randomBytes(32).toString("hex"));',
43
- },
44
- // Literal JWT strings (not flagged as they might be test data)
45
- {
46
- code: '// eslint-disable-next-line\nconst testToken = "eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWV9.TJVA95OrM7E2cBab30RMHrHDcEfxjoYZgeFONFh7HgQ";',
47
- },
48
- // Non-JWT libraries
49
- {
50
- code: 'const token = crypto.randomBytes(32);',
51
- },
52
- ],
53
- invalid: [],
54
- });
55
- });
56
-
57
- describe('Invalid Code - Algorithm Confusion', () => {
58
- ruleTester.run('invalid - algorithm confusion attacks', noInsecureJwt, {
59
- valid: [],
60
- invalid: [
61
- // String literal algorithm spec triggers detection
62
- {
63
- code: 'jwt.verify(token, "secret", { alg: "none" });',
64
- errors: [
65
- {
66
- messageId: 'insecureJwtAlgorithm',
67
- },
68
- ],
69
- },
70
- ],
71
- });
72
- });
73
-
74
- describe('Invalid Code - Missing Signature Verification', () => {
75
- ruleTester.run('invalid - missing signature verification', noInsecureJwt, {
76
- valid: [],
77
- invalid: [
78
- {
79
- code: 'const payload = jwt.decode(token);',
80
- errors: [
81
- {
82
- messageId: 'jwtWithoutValidation',
83
- },
84
- {
85
- messageId: 'missingSignatureVerification',
86
- },
87
- ],
88
- },
89
- {
90
- code: 'const decoded = jwt.decode(token, { complete: true });',
91
- errors: [
92
- {
93
- messageId: 'jwtWithoutValidation',
94
- },
95
- {
96
- messageId: 'missingSignatureVerification',
97
- },
98
- ],
99
- },
100
- {
101
- code: 'const user = jwt.decode(authToken);',
102
- errors: [
103
- {
104
- messageId: 'jwtWithoutValidation',
105
- },
106
- {
107
- messageId: 'missingSignatureVerification',
108
- },
109
- ],
110
- },
111
- ],
112
- });
113
- });
114
-
115
- describe('Invalid Code - Weak Secrets', () => {
116
- ruleTester.run('invalid - weak JWT secrets with weak algorithms', noInsecureJwt, {
117
- valid: [
118
- // Weak secrets without algorithm spec are not flagged
119
- {
120
- code: 'jwt.sign(payload, "weak");',
121
- },
122
- // Strong secret with weak algorithm is OK
123
- {
124
- code: 'jwt.sign(payload, "ThisIsAVeryLongSecretThatIsDefinitelyLongerThan32Characters", { algorithms: ["HS256"] });',
125
- },
126
- ],
127
- invalid: [
128
- // Weak algorithm (HS256) with weak (short) secret - triggers weakJwtSecret
129
- {
130
- code: 'jwt.verify(token, "weak", { alg: "HS256" });',
131
- errors: [{ messageId: 'weakJwtSecret' }],
132
- },
133
- // Weak algorithm with short secret
134
- {
135
- code: 'jwt.sign(payload, "short", { algorithm: "HS384" });',
136
- errors: [{ messageId: 'weakJwtSecret' }],
137
- },
138
- ],
139
- });
140
- });
141
-
142
- describe('Invalid Code - JWT Without Validation', () => {
143
- ruleTester.run('invalid - JWT used without validation', noInsecureJwt, {
144
- valid: [],
145
- invalid: [
146
- {
147
- code: 'const payload = jwt.decode(token); const userId = payload.userId;',
148
- errors: [
149
- {
150
- messageId: 'jwtWithoutValidation',
151
- },
152
- {
153
- messageId: 'missingSignatureVerification',
154
- },
155
- ],
156
- },
157
- {
158
- code: 'const decoded = jwt.decode(authToken); if (decoded.exp < Date.now()) { /* use decoded */ }',
159
- errors: [
160
- {
161
- messageId: 'jwtWithoutValidation',
162
- },
163
- {
164
- messageId: 'missingSignatureVerification',
165
- },
166
- ],
167
- },
168
- ],
169
- });
170
- });
171
-
172
-
173
- describe('Valid Code - False Positives Reduced', () => {
174
- ruleTester.run('valid - false positives reduced', noInsecureJwt, {
175
- valid: [
176
- // Safe annotations suppress warnings
177
- {
178
- code: `
179
- /** @verified */
180
- const payload = jwt.decode(token);
181
- `,
182
- },
183
- {
184
- code: `
185
- // @safe
186
- const decoded = jwt.decode(authToken);
187
- `,
188
- },
189
- // Strong secrets (no algorithm spec, so not flagged)
190
- {
191
- code: 'jwt.sign(payload, crypto.randomBytes(32).toString("hex"));',
192
- },
193
- {
194
- code: 'jwt.sign(payload, "ThisIsAVeryLongSecretThatIsDefinitelyLongerThan32Characters");',
195
- },
196
- ],
197
- invalid: [],
198
- });
199
- });
200
-
201
- describe('Invalid Code - Unsafe JWT Parsing', () => {
202
- ruleTester.run('invalid - unsafe JWT string usage', noInsecureJwt, {
203
- valid: [
204
- // Hardcoded JWT but verified (inline)
205
- {
206
- code: `
207
- jwt.verify("eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWV9.TJVA95OrM7E2cBab30RMHrHDcEfxjoYZgeFONFh7HgQ", secret);
208
- `,
209
- },
210
- // Not a JWT (not 3 parts)
211
- {
212
- code: 'const token = "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWV9";',
213
- },
214
- ],
215
- invalid: [
216
- // Hardcoded JWT used without verification context
217
- {
218
- code: 'const token = "eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWV9.TJVA95OrM7E2cBab30RMHrHDcEfxjoYZgeFONFh7HgQ"; console.log(token);',
219
- errors: [{ messageId: 'unsafeJwtParsing' }],
220
- },
221
- ],
222
- });
223
- });
224
-
225
- describe('Configuration Options', () => {
226
- // Note: allowedInsecureAlgorithms option not fully implemented in rule
227
-
228
- ruleTester.run('config - custom min secret length', noInsecureJwt, {
229
- valid: [
230
- // Secret length not checked without algorithm spec
231
- {
232
- code: 'jwt.sign(payload, "ThisIs16Chars");',
233
- options: [{ minSecretLength: 16 }],
234
- },
235
- // Short secret without algorithm spec is valid
236
- {
237
- code: 'jwt.sign(payload, "short");',
238
- options: [{ minSecretLength: 16 }],
239
- },
240
- ],
241
- invalid: [],
242
- });
243
-
244
- ruleTester.run('config - custom trusted libraries', noInsecureJwt, {
245
- valid: [
246
- // Custom trusted library
247
- {
248
- code: 'myJwt.verify(token, secret);',
249
- options: [{ trustedJwtLibraries: ['myJwt'] }],
250
- },
251
- // Unknown library isn't flagged (rule only checks trusted libraries)
252
- {
253
- code: 'unknownJwt.verify(token, secret);',
254
- },
255
- ],
256
- invalid: [],
257
- });
258
- });
259
- });
@@ -1,267 +0,0 @@
1
- /**
2
- * ESLint Rule: no-insecure-redirects
3
- * Detects open redirect vulnerabilities
4
- * CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
5
- *
6
- * @see https://cwe.mitre.org/data/definitions/601.html
7
- * @see https://owasp.org/www-community/vulnerabilities/Unvalidated_Redirects_and_Forwards
8
- */
9
- import type { TSESLint, TSESTree } from '@interlace/eslint-devkit';
10
- import { formatLLMMessage, MessageIcons } from '@interlace/eslint-devkit';
11
- import { createRule } from '@interlace/eslint-devkit';
12
-
13
- type MessageIds =
14
- | 'insecureRedirect'
15
- | 'whitelistDomains'
16
- | 'validateRedirect'
17
- | 'useRelativeUrl';
18
-
19
- export interface Options {
20
- /** Ignore in test files. Default: true */
21
- ignoreInTests?: boolean;
22
-
23
- /** Allowed redirect domains. Default: [] */
24
- allowedDomains?: string[];
25
- }
26
-
27
- type RuleOptions = [Options?];
28
-
29
- /**
30
- * Check if redirect URL is validated
31
- */
32
- function isRedirectValidated(
33
- node: TSESTree.CallExpression,
34
- sourceCode: TSESLint.SourceCode
35
- ): boolean {
36
- const callText = sourceCode.getText(node);
37
-
38
- // Check if URL is from user input (req.query, req.body, req.params)
39
- const userInputPattern = /\b(req\.(query|body|params)|window\.location|document\.location)\b/;
40
-
41
- if (!userInputPattern.test(callText)) {
42
- // Not from user input, assume safe
43
- return true;
44
- }
45
-
46
- // Look for validation patterns in the surrounding code
47
- // This is a simplified static analysis - in practice, would need data flow analysis
48
-
49
- const program = sourceCode.ast;
50
- const nodeStart = node.loc?.start;
51
- const nodeEnd = node.loc?.end;
52
-
53
- /* c8 ignore start -- Guard clause: loc is always present in RuleTester */
54
- if (!nodeStart || !nodeEnd || !program) {
55
- return false;
56
- }
57
- /* c8 ignore stop */
58
-
59
- // Check for validation function calls before this redirect
60
- const validationPatterns = [
61
- /\b(validateUrl|validateRedirect|isValidUrl|isSafeUrl)\s*\(/,
62
- /\b(whitelist|allowedDomains|permittedUrls)\s*\./,
63
- /\b(url\.hostname|url\.host)\s*===/,
64
- /\ballowedDomains\.includes\s*\(/,
65
- /\bstartsWith\s*\(\s*['"]/,
66
- /\bendsWith\s*\(\s*['"]/,
67
- /\bindexOf\s*\(\s*['"]/,
68
- /\bmatch\s*\(\s*\//,
69
- ];
70
-
71
- // Look for validation in the same function scope
72
- let current: TSESTree.Node | null = node;
73
- let depth = 0;
74
- const maxDepth = 20;
75
-
76
- while (current && depth < maxDepth) {
77
- // Check siblings before this node
78
- const parent: TSESTree.Node | undefined = (current as TSESTree.Node & { parent?: TSESTree.Node }).parent;
79
- if (!parent) break;
80
-
81
- if (parent.type === 'BlockStatement') {
82
- const body = parent.body;
83
- const currentIndex = body.indexOf(current as TSESTree.Statement);
84
-
85
- // Check previous statements in the same block
86
- for (let i = currentIndex - 1; i >= 0 && i >= currentIndex - 5; i--) {
87
- const stmt = body[i];
88
- const stmtText = sourceCode.getText(stmt);
89
-
90
- if (validationPatterns.some(pattern => pattern.test(stmtText))) {
91
- return true; // Found validation
92
- }
93
- }
94
- }
95
-
96
- current = parent;
97
- depth++;
98
- }
99
-
100
- // No validation found
101
- return false;
102
- }
103
-
104
- export const noInsecureRedirects = createRule<RuleOptions, MessageIds>({
105
- name: 'no-insecure-redirects',
106
- meta: {
107
- type: 'problem',
108
- docs: {
109
- description: 'Detects open redirect vulnerabilities',
110
- },
111
- hasSuggestions: true,
112
- messages: {
113
- insecureRedirect: formatLLMMessage({
114
- icon: MessageIcons.SECURITY,
115
- issueName: 'Open redirect',
116
- cwe: 'CWE-601',
117
- description: 'Unvalidated redirect detected - user-controlled URL',
118
- severity: 'HIGH',
119
- fix: 'Whitelist allowed domains or validate redirect target',
120
- documentationLink: 'https://owasp.org/www-community/vulnerabilities/Unvalidated_Redirects_and_Forwards',
121
- }),
122
- whitelistDomains: formatLLMMessage({
123
- icon: MessageIcons.INFO,
124
- issueName: 'Whitelist Domains',
125
- description: 'Whitelist allowed redirect domains',
126
- severity: 'LOW',
127
- fix: 'if (allowedDomains.includes(url.hostname)) redirect(url)',
128
- documentationLink: 'https://owasp.org/www-community/vulnerabilities/Unvalidated_Redirects_and_Forwards',
129
- }),
130
- validateRedirect: formatLLMMessage({
131
- icon: MessageIcons.INFO,
132
- issueName: 'Validate Redirect',
133
- description: 'Validate redirect URL before use',
134
- severity: 'LOW',
135
- fix: 'validateRedirectUrl(userInput) before redirect',
136
- documentationLink: 'https://owasp.org/www-community/vulnerabilities/Unvalidated_Redirects_and_Forwards',
137
- }),
138
- useRelativeUrl: formatLLMMessage({
139
- icon: MessageIcons.INFO,
140
- issueName: 'Use Relative URL',
141
- description: 'Use relative URLs for internal redirects',
142
- severity: 'LOW',
143
- fix: 'redirect("/internal/path") instead of absolute URLs',
144
- documentationLink: 'https://owasp.org/www-community/vulnerabilities/Unvalidated_Redirects_and_Forwards',
145
- }),
146
- },
147
- schema: [
148
- {
149
- type: 'object',
150
- properties: {
151
- ignoreInTests: {
152
- type: 'boolean',
153
- default: true,
154
- },
155
- allowedDomains: {
156
- type: 'array',
157
- items: { type: 'string' },
158
- default: [],
159
- },
160
- },
161
- additionalProperties: false,
162
- },
163
- ],
164
- },
165
- defaultOptions: [
166
- {
167
- ignoreInTests: true,
168
- allowedDomains: [],
169
- },
170
- ],
171
- create(context: TSESLint.RuleContext<MessageIds, RuleOptions>, [options = {}]) {
172
- const {
173
- ignoreInTests = true
174
- }: Options = options || {};
175
-
176
- const filename = context.getFilename();
177
- const isTestFile = ignoreInTests && /\.(test|spec)\.(ts|tsx|js|jsx)$/.test(filename);
178
-
179
- if (isTestFile) {
180
- return {};
181
- }
182
-
183
- const sourceCode = context.sourceCode || context.sourceCode;
184
-
185
- /**
186
- * Check redirect calls and assignments
187
- */
188
- function checkCallExpression(node: TSESTree.CallExpression) {
189
- // Check for res.redirect, window.location, etc.
190
- if (node.callee.type === 'MemberExpression' &&
191
- node.callee.property.type === 'Identifier') {
192
- const methodName = node.callee.property.name;
193
-
194
- if (['redirect', 'replace', 'assign'].includes(methodName)) {
195
- // Check if redirect URL is validated
196
- if (!isRedirectValidated(node, sourceCode)) {
197
- context.report({
198
- node,
199
- messageId: 'insecureRedirect',
200
- suggest: [
201
- {
202
- messageId: 'whitelistDomains',
203
- fix: () => null,
204
- },
205
- {
206
- messageId: 'validateRedirect',
207
- fix: () => null,
208
- },
209
- {
210
- messageId: 'useRelativeUrl',
211
- fix: () => null,
212
- },
213
- ],
214
- });
215
- }
216
- }
217
- }
218
- }
219
-
220
- /**
221
- * Check assignment expressions like window.location.href = ...
222
- */
223
- function checkAssignmentExpression(node: TSESTree.AssignmentExpression) {
224
- // Check for window.location.href assignments
225
- if (node.left.type === 'MemberExpression' &&
226
- node.left.object.type === 'MemberExpression' &&
227
- node.left.object.object.type === 'Identifier' &&
228
- node.left.object.object.name === 'window' &&
229
- node.left.object.property.type === 'Identifier' &&
230
- node.left.object.property.name === 'location' &&
231
- node.left.property.type === 'Identifier' &&
232
- ['href', 'replace', 'assign'].includes(node.left.property.name)) {
233
-
234
- // Check if assignment value comes from user input
235
- const rightText = sourceCode.getText(node.right);
236
- const userInputPattern = /\b(req\.(query|body|params)|window\.location|document\.location)\b/;
237
-
238
- if (userInputPattern.test(rightText)) {
239
- context.report({
240
- node,
241
- messageId: 'insecureRedirect',
242
- suggest: [
243
- {
244
- messageId: 'whitelistDomains',
245
- fix: () => null,
246
- },
247
- {
248
- messageId: 'validateRedirect',
249
- fix: () => null,
250
- },
251
- {
252
- messageId: 'useRelativeUrl',
253
- fix: () => null,
254
- },
255
- ],
256
- });
257
- }
258
- }
259
- }
260
-
261
- return {
262
- CallExpression: checkCallExpression,
263
- AssignmentExpression: checkAssignmentExpression,
264
- };
265
- },
266
- });
267
-
@@ -1,108 +0,0 @@
1
- /**
2
- * Comprehensive tests for no-insecure-redirects rule
3
- * Security: CWE-601 - Detects open redirect vulnerabilities
4
- */
5
- import { RuleTester } from '@typescript-eslint/rule-tester';
6
- import { describe, it, afterAll } from 'vitest';
7
- import parser from '@typescript-eslint/parser';
8
- import { noInsecureRedirects } from './index';
9
-
10
- RuleTester.afterAll = afterAll;
11
- RuleTester.it = it;
12
- RuleTester.itOnly = it.only;
13
- RuleTester.describe = describe;
14
-
15
- const ruleTester = new RuleTester({
16
- languageOptions: {
17
- parser,
18
- ecmaVersion: 2022,
19
- sourceType: 'module',
20
- },
21
- });
22
-
23
- describe('no-insecure-redirects', () => {
24
- describe('Valid Code', () => {
25
- ruleTester.run('valid - validated redirects', noInsecureRedirects, {
26
- valid: [
27
- // Relative redirects
28
- { code: 'res.redirect("/dashboard");' },
29
- { code: 'res.redirect("../home");' },
30
- // Test files (if ignoreInTests is true)
31
- {
32
- code: 'res.redirect(req.query.url);',
33
- filename: 'test.spec.ts',
34
- options: [{ ignoreInTests: true }],
35
- },
36
- // Validated with validateUrl
37
- {
38
- code: `
39
- const url = req.query.url;
40
- validateUrl(url);
41
- res.redirect(url);
42
- `,
43
- },
44
- // Validated with isValidUrl
45
- {
46
- code: `
47
- const redirect = req.query.redirect;
48
- if (isValidUrl(redirect)) {
49
- res.redirect(redirect);
50
- }
51
- `,
52
- },
53
- // Validated with allowedDomains check
54
- {
55
- code: `
56
- const target = req.body.target;
57
- if (allowedDomains.includes(target)) {
58
- res.redirect(target);
59
- }
60
- `,
61
- },
62
- // Validated with startsWith check
63
- {
64
- code: `
65
- const url = req.params.url;
66
- url.startsWith('https://');
67
- res.redirect(url);
68
- `,
69
- },
70
- ],
71
- invalid: [],
72
- });
73
- });
74
-
75
- describe('Invalid Code - Insecure Redirects', () => {
76
- ruleTester.run('invalid - unvalidated redirects', noInsecureRedirects, {
77
- valid: [],
78
- invalid: [
79
- { code: 'res.redirect(req.query.url);', errors: [{ messageId: 'insecureRedirect' }] },
80
- { code: 'res.redirect(req.body.redirectUrl);', errors: [{ messageId: 'insecureRedirect' }] },
81
- { code: 'window.location.href = req.params.url;', errors: [{ messageId: 'insecureRedirect' }] },
82
- // Using location.replace
83
- { code: 'location.replace(req.query.url);', errors: [{ messageId: 'insecureRedirect' }] },
84
- { code: 'location.assign(req.body.next);', errors: [{ messageId: 'insecureRedirect' }] },
85
- ],
86
- });
87
- });
88
-
89
- describe('Options', () => {
90
- ruleTester.run('options - ignoreInTests', noInsecureRedirects, {
91
- valid: [
92
- {
93
- code: 'res.redirect(req.query.url);',
94
- filename: 'test.spec.ts',
95
- options: [{ ignoreInTests: true }],
96
- },
97
- ],
98
- invalid: [
99
- {
100
- code: 'res.redirect(req.query.url);',
101
- filename: 'test.spec.ts',
102
- options: [{ ignoreInTests: false }],
103
- errors: [{ messageId: 'insecureRedirect' }],
104
- },
105
- ],
106
- });
107
- });
108
- });
@@ -1,72 +0,0 @@
1
- /**
2
- * @fileoverview Require secure WebSocket connections (wss://)
3
- */
4
-
5
- import { createRule, formatLLMMessage, MessageIcons } from '@interlace/eslint-devkit';
6
- import type { TSESTree } from '@interlace/eslint-devkit';
7
-
8
- type MessageIds = 'violationDetected';
9
-
10
- // eslint-disable-next-line @typescript-eslint/no-empty-object-type, @typescript-eslint/no-empty-interface -- Rule has no configurable options
11
- export interface Options {}
12
-
13
- type RuleOptions = [Options?];
14
-
15
- export const noInsecureWebsocket = createRule<RuleOptions, MessageIds>({
16
- name: 'no-insecure-websocket',
17
- meta: {
18
- type: 'problem',
19
- docs: {
20
- description: 'Require secure WebSocket connections (wss://)',
21
- },
22
- messages: {
23
- violationDetected: formatLLMMessage({
24
- icon: MessageIcons.SECURITY,
25
- issueName: 'Insecure WebSocket',
26
- cwe: 'CWE-319',
27
- description: 'Insecure WebSocket connection (ws://) - data transmitted in clear text',
28
- severity: 'HIGH',
29
- fix: 'Use wss:// instead of ws:// for secure WebSocket connections',
30
- documentationLink: 'https://cwe.mitre.org/data/definitions/319.html',
31
- })
32
- },
33
- schema: [],
34
- },
35
- defaultOptions: [],
36
- create(context) {
37
- function report(node: TSESTree.Node) {
38
- context.report({ node, messageId: 'violationDetected' });
39
- }
40
-
41
- return {
42
- NewExpression(node: TSESTree.NewExpression) {
43
- // Check for new WebSocket('ws://...')
44
- if (node.callee.type === 'Identifier' && node.callee.name === 'WebSocket') {
45
- const urlArg = node.arguments[0];
46
-
47
- // Check literal string
48
- if (urlArg && urlArg.type === 'Literal' &&
49
- typeof urlArg.value === 'string' &&
50
- urlArg.value.startsWith('ws://')) {
51
- report(node);
52
- }
53
-
54
- // Check template literal
55
- if (urlArg && urlArg.type === 'TemplateLiteral') {
56
- const text = context.sourceCode.getText(urlArg);
57
- if (text.includes('ws://')) {
58
- report(node);
59
- }
60
- }
61
- }
62
- },
63
-
64
- Literal(node: TSESTree.Literal) {
65
- // Check for ws:// URLs in string literals
66
- if (typeof node.value === 'string' && node.value.startsWith('ws://')) {
67
- report(node);
68
- }
69
- },
70
- };
71
- },
72
- });