secure-scan 1.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (569) hide show
  1. package/README.md +564 -0
  2. package/dist/ai/aiAnalyzer.d.ts +99 -0
  3. package/dist/ai/aiAnalyzer.d.ts.map +1 -0
  4. package/dist/ai/aiAnalyzer.js +669 -0
  5. package/dist/ai/aiAnalyzer.js.map +1 -0
  6. package/dist/ai/index.d.ts +5 -0
  7. package/dist/ai/index.d.ts.map +1 -0
  8. package/dist/ai/index.js +21 -0
  9. package/dist/ai/index.js.map +1 -0
  10. package/dist/analyzers/base/baseAnalyzer.d.ts +44 -0
  11. package/dist/analyzers/base/baseAnalyzer.d.ts.map +1 -0
  12. package/dist/analyzers/base/baseAnalyzer.js +53 -0
  13. package/dist/analyzers/base/baseAnalyzer.js.map +1 -0
  14. package/dist/analyzers/base/index.d.ts +5 -0
  15. package/dist/analyzers/base/index.d.ts.map +1 -0
  16. package/dist/analyzers/base/index.js +21 -0
  17. package/dist/analyzers/base/index.js.map +1 -0
  18. package/dist/analyzers/c-cpp/cppAnalyzer.d.ts +60 -0
  19. package/dist/analyzers/c-cpp/cppAnalyzer.d.ts.map +1 -0
  20. package/dist/analyzers/c-cpp/cppAnalyzer.js +218 -0
  21. package/dist/analyzers/c-cpp/cppAnalyzer.js.map +1 -0
  22. package/dist/analyzers/c-cpp/index.d.ts +5 -0
  23. package/dist/analyzers/c-cpp/index.d.ts.map +1 -0
  24. package/dist/analyzers/c-cpp/index.js +21 -0
  25. package/dist/analyzers/c-cpp/index.js.map +1 -0
  26. package/dist/analyzers/core/engine/index.d.ts +5 -0
  27. package/dist/analyzers/core/engine/index.d.ts.map +1 -0
  28. package/dist/analyzers/core/engine/index.js +21 -0
  29. package/dist/analyzers/core/engine/index.js.map +1 -0
  30. package/dist/analyzers/core/engine/ruleEngine.d.ts +46 -0
  31. package/dist/analyzers/core/engine/ruleEngine.d.ts.map +1 -0
  32. package/dist/analyzers/core/engine/ruleEngine.js +173 -0
  33. package/dist/analyzers/core/engine/ruleEngine.js.map +1 -0
  34. package/dist/analyzers/core/index.d.ts +8 -0
  35. package/dist/analyzers/core/index.d.ts.map +1 -0
  36. package/dist/analyzers/core/index.js +24 -0
  37. package/dist/analyzers/core/index.js.map +1 -0
  38. package/dist/analyzers/core/scanner/fileScanner.d.ts +31 -0
  39. package/dist/analyzers/core/scanner/fileScanner.d.ts.map +1 -0
  40. package/dist/analyzers/core/scanner/fileScanner.js +199 -0
  41. package/dist/analyzers/core/scanner/fileScanner.js.map +1 -0
  42. package/dist/analyzers/core/scanner/index.d.ts +5 -0
  43. package/dist/analyzers/core/scanner/index.d.ts.map +1 -0
  44. package/dist/analyzers/core/scanner/index.js +21 -0
  45. package/dist/analyzers/core/scanner/index.js.map +1 -0
  46. package/dist/analyzers/core/scoring/index.d.ts +5 -0
  47. package/dist/analyzers/core/scoring/index.d.ts.map +1 -0
  48. package/dist/analyzers/core/scoring/index.js +21 -0
  49. package/dist/analyzers/core/scoring/index.js.map +1 -0
  50. package/dist/analyzers/core/scoring/riskScoring.d.ts +49 -0
  51. package/dist/analyzers/core/scoring/riskScoring.d.ts.map +1 -0
  52. package/dist/analyzers/core/scoring/riskScoring.js +180 -0
  53. package/dist/analyzers/core/scoring/riskScoring.js.map +1 -0
  54. package/dist/analyzers/core/securityScanner.d.ts +47 -0
  55. package/dist/analyzers/core/securityScanner.d.ts.map +1 -0
  56. package/dist/analyzers/core/securityScanner.js +298 -0
  57. package/dist/analyzers/core/securityScanner.js.map +1 -0
  58. package/dist/analyzers/csharp/csharpAnalyzer.d.ts +64 -0
  59. package/dist/analyzers/csharp/csharpAnalyzer.d.ts.map +1 -0
  60. package/dist/analyzers/csharp/csharpAnalyzer.js +232 -0
  61. package/dist/analyzers/csharp/csharpAnalyzer.js.map +1 -0
  62. package/dist/analyzers/csharp/index.d.ts +5 -0
  63. package/dist/analyzers/csharp/index.d.ts.map +1 -0
  64. package/dist/analyzers/csharp/index.js +21 -0
  65. package/dist/analyzers/csharp/index.js.map +1 -0
  66. package/dist/analyzers/iac/iacAnalyzer.d.ts +36 -0
  67. package/dist/analyzers/iac/iacAnalyzer.d.ts.map +1 -0
  68. package/dist/analyzers/iac/iacAnalyzer.js +182 -0
  69. package/dist/analyzers/iac/iacAnalyzer.js.map +1 -0
  70. package/dist/analyzers/iac/index.d.ts +5 -0
  71. package/dist/analyzers/iac/index.d.ts.map +1 -0
  72. package/dist/analyzers/iac/index.js +21 -0
  73. package/dist/analyzers/iac/index.js.map +1 -0
  74. package/dist/analyzers/index.d.ts +30 -0
  75. package/dist/analyzers/index.d.ts.map +1 -0
  76. package/dist/analyzers/index.js +80 -0
  77. package/dist/analyzers/index.js.map +1 -0
  78. package/dist/analyzers/java/index.d.ts +5 -0
  79. package/dist/analyzers/java/index.d.ts.map +1 -0
  80. package/dist/analyzers/java/index.js +21 -0
  81. package/dist/analyzers/java/index.js.map +1 -0
  82. package/dist/analyzers/java/javaAnalyzer.d.ts +64 -0
  83. package/dist/analyzers/java/javaAnalyzer.d.ts.map +1 -0
  84. package/dist/analyzers/java/javaAnalyzer.js +224 -0
  85. package/dist/analyzers/java/javaAnalyzer.js.map +1 -0
  86. package/dist/analyzers/javascript/astUtils.d.ts +170 -0
  87. package/dist/analyzers/javascript/astUtils.d.ts.map +1 -0
  88. package/dist/analyzers/javascript/astUtils.js +700 -0
  89. package/dist/analyzers/javascript/astUtils.js.map +1 -0
  90. package/dist/analyzers/javascript/index.d.ts +18 -0
  91. package/dist/analyzers/javascript/index.d.ts.map +1 -0
  92. package/dist/analyzers/javascript/index.js +50 -0
  93. package/dist/analyzers/javascript/index.js.map +1 -0
  94. package/dist/analyzers/javascript/javascriptAnalyzer.d.ts +111 -0
  95. package/dist/analyzers/javascript/javascriptAnalyzer.d.ts.map +1 -0
  96. package/dist/analyzers/javascript/javascriptAnalyzer.js +860 -0
  97. package/dist/analyzers/javascript/javascriptAnalyzer.js.map +1 -0
  98. package/dist/analyzers/javascript/malwareDetector.d.ts +102 -0
  99. package/dist/analyzers/javascript/malwareDetector.d.ts.map +1 -0
  100. package/dist/analyzers/javascript/malwareDetector.js +616 -0
  101. package/dist/analyzers/javascript/malwareDetector.js.map +1 -0
  102. package/dist/analyzers/javascript/packageJsonAnalyzer.d.ts +87 -0
  103. package/dist/analyzers/javascript/packageJsonAnalyzer.d.ts.map +1 -0
  104. package/dist/analyzers/javascript/packageJsonAnalyzer.js +553 -0
  105. package/dist/analyzers/javascript/packageJsonAnalyzer.js.map +1 -0
  106. package/dist/analyzers/javascript/taintAnalyzer.d.ts +120 -0
  107. package/dist/analyzers/javascript/taintAnalyzer.d.ts.map +1 -0
  108. package/dist/analyzers/javascript/taintAnalyzer.js +526 -0
  109. package/dist/analyzers/javascript/taintAnalyzer.js.map +1 -0
  110. package/dist/analyzers/php/index.d.ts +5 -0
  111. package/dist/analyzers/php/index.d.ts.map +1 -0
  112. package/dist/analyzers/php/index.js +21 -0
  113. package/dist/analyzers/php/index.js.map +1 -0
  114. package/dist/analyzers/php/phpAnalyzer.d.ts +56 -0
  115. package/dist/analyzers/php/phpAnalyzer.d.ts.map +1 -0
  116. package/dist/analyzers/php/phpAnalyzer.js +202 -0
  117. package/dist/analyzers/php/phpAnalyzer.js.map +1 -0
  118. package/dist/analyzers/python/index.d.ts +5 -0
  119. package/dist/analyzers/python/index.d.ts.map +1 -0
  120. package/dist/analyzers/python/index.js +21 -0
  121. package/dist/analyzers/python/index.js.map +1 -0
  122. package/dist/analyzers/python/pythonAnalyzer.d.ts +64 -0
  123. package/dist/analyzers/python/pythonAnalyzer.d.ts.map +1 -0
  124. package/dist/analyzers/python/pythonAnalyzer.js +226 -0
  125. package/dist/analyzers/python/pythonAnalyzer.js.map +1 -0
  126. package/dist/cli/index.d.ts +7 -0
  127. package/dist/cli/index.d.ts.map +1 -0
  128. package/dist/cli/index.js +281 -0
  129. package/dist/cli/index.js.map +1 -0
  130. package/dist/core/engine/index.d.ts +5 -0
  131. package/dist/core/engine/index.d.ts.map +1 -0
  132. package/dist/core/engine/index.js +21 -0
  133. package/dist/core/engine/index.js.map +1 -0
  134. package/dist/core/engine/ruleEngine.d.ts +46 -0
  135. package/dist/core/engine/ruleEngine.d.ts.map +1 -0
  136. package/dist/core/engine/ruleEngine.js +173 -0
  137. package/dist/core/engine/ruleEngine.js.map +1 -0
  138. package/dist/core/index.d.ts +8 -0
  139. package/dist/core/index.d.ts.map +1 -0
  140. package/dist/core/index.js +24 -0
  141. package/dist/core/index.js.map +1 -0
  142. package/dist/core/scanner/fileScanner.d.ts +31 -0
  143. package/dist/core/scanner/fileScanner.d.ts.map +1 -0
  144. package/dist/core/scanner/fileScanner.js +199 -0
  145. package/dist/core/scanner/fileScanner.js.map +1 -0
  146. package/dist/core/scanner/index.d.ts +5 -0
  147. package/dist/core/scanner/index.d.ts.map +1 -0
  148. package/dist/core/scanner/index.js +21 -0
  149. package/dist/core/scanner/index.js.map +1 -0
  150. package/dist/core/scoring/index.d.ts +5 -0
  151. package/dist/core/scoring/index.d.ts.map +1 -0
  152. package/dist/core/scoring/index.js +21 -0
  153. package/dist/core/scoring/index.js.map +1 -0
  154. package/dist/core/scoring/riskScoring.d.ts +49 -0
  155. package/dist/core/scoring/riskScoring.d.ts.map +1 -0
  156. package/dist/core/scoring/riskScoring.js +180 -0
  157. package/dist/core/scoring/riskScoring.js.map +1 -0
  158. package/dist/core/securityScanner.d.ts +47 -0
  159. package/dist/core/securityScanner.d.ts.map +1 -0
  160. package/dist/core/securityScanner.js +298 -0
  161. package/dist/core/securityScanner.js.map +1 -0
  162. package/dist/dependencies/aiDependencyAnalyzer.d.ts +96 -0
  163. package/dist/dependencies/aiDependencyAnalyzer.d.ts.map +1 -0
  164. package/dist/dependencies/aiDependencyAnalyzer.js +435 -0
  165. package/dist/dependencies/aiDependencyAnalyzer.js.map +1 -0
  166. package/dist/dependencies/database/cveDatabase.d.ts +32 -0
  167. package/dist/dependencies/database/cveDatabase.d.ts.map +1 -0
  168. package/dist/dependencies/database/cveDatabase.js +393 -0
  169. package/dist/dependencies/database/cveDatabase.js.map +1 -0
  170. package/dist/dependencies/database/index.d.ts +6 -0
  171. package/dist/dependencies/database/index.d.ts.map +1 -0
  172. package/dist/dependencies/database/index.js +22 -0
  173. package/dist/dependencies/database/index.js.map +1 -0
  174. package/dist/dependencies/database/maliciousPackages.d.ts +43 -0
  175. package/dist/dependencies/database/maliciousPackages.d.ts.map +1 -0
  176. package/dist/dependencies/database/maliciousPackages.js +279 -0
  177. package/dist/dependencies/database/maliciousPackages.js.map +1 -0
  178. package/dist/dependencies/dependencyAnalyzer.d.ts +74 -0
  179. package/dist/dependencies/dependencyAnalyzer.d.ts.map +1 -0
  180. package/dist/dependencies/dependencyAnalyzer.js +349 -0
  181. package/dist/dependencies/dependencyAnalyzer.js.map +1 -0
  182. package/dist/dependencies/detectors/index.d.ts +7 -0
  183. package/dist/dependencies/detectors/index.d.ts.map +1 -0
  184. package/dist/dependencies/detectors/index.js +28 -0
  185. package/dist/dependencies/detectors/index.js.map +1 -0
  186. package/dist/dependencies/detectors/securityStandards.d.ts +15 -0
  187. package/dist/dependencies/detectors/securityStandards.d.ts.map +1 -0
  188. package/dist/dependencies/detectors/securityStandards.js +178 -0
  189. package/dist/dependencies/detectors/securityStandards.js.map +1 -0
  190. package/dist/dependencies/detectors/vulnerabilityDetector.d.ts +53 -0
  191. package/dist/dependencies/detectors/vulnerabilityDetector.d.ts.map +1 -0
  192. package/dist/dependencies/detectors/vulnerabilityDetector.js +289 -0
  193. package/dist/dependencies/detectors/vulnerabilityDetector.js.map +1 -0
  194. package/dist/dependencies/index.d.ts +14 -0
  195. package/dist/dependencies/index.d.ts.map +1 -0
  196. package/dist/dependencies/index.js +43 -0
  197. package/dist/dependencies/index.js.map +1 -0
  198. package/dist/dependencies/installed/index.d.ts +8 -0
  199. package/dist/dependencies/installed/index.d.ts.map +1 -0
  200. package/dist/dependencies/installed/index.js +24 -0
  201. package/dist/dependencies/installed/index.js.map +1 -0
  202. package/dist/dependencies/installed/installedScanner.d.ts +91 -0
  203. package/dist/dependencies/installed/installedScanner.d.ts.map +1 -0
  204. package/dist/dependencies/installed/installedScanner.js +766 -0
  205. package/dist/dependencies/installed/installedScanner.js.map +1 -0
  206. package/dist/dependencies/installed/malwarePatterns.d.ts +32 -0
  207. package/dist/dependencies/installed/malwarePatterns.d.ts.map +1 -0
  208. package/dist/dependencies/installed/malwarePatterns.js +480 -0
  209. package/dist/dependencies/installed/malwarePatterns.js.map +1 -0
  210. package/dist/dependencies/installed/types.d.ts +274 -0
  211. package/dist/dependencies/installed/types.d.ts.map +1 -0
  212. package/dist/dependencies/installed/types.js +7 -0
  213. package/dist/dependencies/installed/types.js.map +1 -0
  214. package/dist/dependencies/parsers/base/baseParser.d.ts +44 -0
  215. package/dist/dependencies/parsers/base/baseParser.d.ts.map +1 -0
  216. package/dist/dependencies/parsers/base/baseParser.js +80 -0
  217. package/dist/dependencies/parsers/base/baseParser.js.map +1 -0
  218. package/dist/dependencies/parsers/base/index.d.ts +6 -0
  219. package/dist/dependencies/parsers/base/index.d.ts.map +1 -0
  220. package/dist/dependencies/parsers/base/index.js +27 -0
  221. package/dist/dependencies/parsers/base/index.js.map +1 -0
  222. package/dist/dependencies/parsers/cpp/cppParser.d.ts +36 -0
  223. package/dist/dependencies/parsers/cpp/cppParser.d.ts.map +1 -0
  224. package/dist/dependencies/parsers/cpp/cppParser.js +196 -0
  225. package/dist/dependencies/parsers/cpp/cppParser.js.map +1 -0
  226. package/dist/dependencies/parsers/cpp/index.d.ts +6 -0
  227. package/dist/dependencies/parsers/cpp/index.d.ts.map +1 -0
  228. package/dist/dependencies/parsers/cpp/index.js +27 -0
  229. package/dist/dependencies/parsers/cpp/index.js.map +1 -0
  230. package/dist/dependencies/parsers/csharp/csharpParser.d.ts +32 -0
  231. package/dist/dependencies/parsers/csharp/csharpParser.d.ts.map +1 -0
  232. package/dist/dependencies/parsers/csharp/csharpParser.js +125 -0
  233. package/dist/dependencies/parsers/csharp/csharpParser.js.map +1 -0
  234. package/dist/dependencies/parsers/csharp/index.d.ts +6 -0
  235. package/dist/dependencies/parsers/csharp/index.d.ts.map +1 -0
  236. package/dist/dependencies/parsers/csharp/index.js +27 -0
  237. package/dist/dependencies/parsers/csharp/index.js.map +1 -0
  238. package/dist/dependencies/parsers/index.d.ts +24 -0
  239. package/dist/dependencies/parsers/index.d.ts.map +1 -0
  240. package/dist/dependencies/parsers/index.js +69 -0
  241. package/dist/dependencies/parsers/index.js.map +1 -0
  242. package/dist/dependencies/parsers/java/index.d.ts +6 -0
  243. package/dist/dependencies/parsers/java/index.d.ts.map +1 -0
  244. package/dist/dependencies/parsers/java/index.js +27 -0
  245. package/dist/dependencies/parsers/java/index.js.map +1 -0
  246. package/dist/dependencies/parsers/java/javaParser.d.ts +32 -0
  247. package/dist/dependencies/parsers/java/javaParser.d.ts.map +1 -0
  248. package/dist/dependencies/parsers/java/javaParser.js +168 -0
  249. package/dist/dependencies/parsers/java/javaParser.js.map +1 -0
  250. package/dist/dependencies/parsers/javascript/index.d.ts +6 -0
  251. package/dist/dependencies/parsers/javascript/index.d.ts.map +1 -0
  252. package/dist/dependencies/parsers/javascript/index.js +27 -0
  253. package/dist/dependencies/parsers/javascript/index.js.map +1 -0
  254. package/dist/dependencies/parsers/javascript/javascriptParser.d.ts +55 -0
  255. package/dist/dependencies/parsers/javascript/javascriptParser.d.ts.map +1 -0
  256. package/dist/dependencies/parsers/javascript/javascriptParser.js +266 -0
  257. package/dist/dependencies/parsers/javascript/javascriptParser.js.map +1 -0
  258. package/dist/dependencies/parsers/php/index.d.ts +6 -0
  259. package/dist/dependencies/parsers/php/index.d.ts.map +1 -0
  260. package/dist/dependencies/parsers/php/index.js +27 -0
  261. package/dist/dependencies/parsers/php/index.js.map +1 -0
  262. package/dist/dependencies/parsers/php/phpParser.d.ts +35 -0
  263. package/dist/dependencies/parsers/php/phpParser.d.ts.map +1 -0
  264. package/dist/dependencies/parsers/php/phpParser.js +162 -0
  265. package/dist/dependencies/parsers/php/phpParser.js.map +1 -0
  266. package/dist/dependencies/parsers/python/index.d.ts +6 -0
  267. package/dist/dependencies/parsers/python/index.d.ts.map +1 -0
  268. package/dist/dependencies/parsers/python/index.js +27 -0
  269. package/dist/dependencies/parsers/python/index.js.map +1 -0
  270. package/dist/dependencies/parsers/python/pythonParser.d.ts +60 -0
  271. package/dist/dependencies/parsers/python/pythonParser.d.ts.map +1 -0
  272. package/dist/dependencies/parsers/python/pythonParser.js +336 -0
  273. package/dist/dependencies/parsers/python/pythonParser.js.map +1 -0
  274. package/dist/dependencies/types.d.ts +280 -0
  275. package/dist/dependencies/types.d.ts.map +1 -0
  276. package/dist/dependencies/types.js +59 -0
  277. package/dist/dependencies/types.js.map +1 -0
  278. package/dist/i18n/index.d.ts +2 -0
  279. package/dist/i18n/index.d.ts.map +1 -0
  280. package/dist/i18n/index.js +18 -0
  281. package/dist/i18n/index.js.map +1 -0
  282. package/dist/i18n/translations.d.ts +55 -0
  283. package/dist/i18n/translations.d.ts.map +1 -0
  284. package/dist/i18n/translations.js +119 -0
  285. package/dist/i18n/translations.js.map +1 -0
  286. package/dist/index.d.ts +14 -0
  287. package/dist/index.d.ts.map +1 -0
  288. package/dist/index.js +36 -0
  289. package/dist/index.js.map +1 -0
  290. package/dist/reports/dependencyReportGenerator.d.ts +20 -0
  291. package/dist/reports/dependencyReportGenerator.d.ts.map +1 -0
  292. package/dist/reports/dependencyReportGenerator.js +690 -0
  293. package/dist/reports/dependencyReportGenerator.js.map +1 -0
  294. package/dist/reports/htmlReportGenerator.d.ts +43 -0
  295. package/dist/reports/htmlReportGenerator.d.ts.map +1 -0
  296. package/dist/reports/htmlReportGenerator.js +793 -0
  297. package/dist/reports/htmlReportGenerator.js.map +1 -0
  298. package/dist/reports/index.d.ts +7 -0
  299. package/dist/reports/index.d.ts.map +1 -0
  300. package/dist/reports/index.js +23 -0
  301. package/dist/reports/index.js.map +1 -0
  302. package/dist/reports/installedDepsReportGenerator.d.ts +14 -0
  303. package/dist/reports/installedDepsReportGenerator.d.ts.map +1 -0
  304. package/dist/reports/installedDepsReportGenerator.js +872 -0
  305. package/dist/reports/installedDepsReportGenerator.js.map +1 -0
  306. package/dist/rules/index.d.ts +31 -0
  307. package/dist/rules/index.d.ts.map +1 -0
  308. package/dist/rules/index.js +95 -0
  309. package/dist/rules/index.js.map +1 -0
  310. package/dist/rules/malware/categories/backdoors.d.ts +12 -0
  311. package/dist/rules/malware/categories/backdoors.d.ts.map +1 -0
  312. package/dist/rules/malware/categories/backdoors.js +163 -0
  313. package/dist/rules/malware/categories/backdoors.js.map +1 -0
  314. package/dist/rules/malware/categories/cryptominers.d.ts +13 -0
  315. package/dist/rules/malware/categories/cryptominers.d.ts.map +1 -0
  316. package/dist/rules/malware/categories/cryptominers.js +415 -0
  317. package/dist/rules/malware/categories/cryptominers.js.map +1 -0
  318. package/dist/rules/malware/categories/exfiltration.d.ts +20 -0
  319. package/dist/rules/malware/categories/exfiltration.d.ts.map +1 -0
  320. package/dist/rules/malware/categories/exfiltration.js +658 -0
  321. package/dist/rules/malware/categories/exfiltration.js.map +1 -0
  322. package/dist/rules/malware/categories/keyloggers.d.ts +19 -0
  323. package/dist/rules/malware/categories/keyloggers.d.ts.map +1 -0
  324. package/dist/rules/malware/categories/keyloggers.js +763 -0
  325. package/dist/rules/malware/categories/keyloggers.js.map +1 -0
  326. package/dist/rules/malware/categories/loaders.d.ts +20 -0
  327. package/dist/rules/malware/categories/loaders.d.ts.map +1 -0
  328. package/dist/rules/malware/categories/loaders.js +702 -0
  329. package/dist/rules/malware/categories/loaders.js.map +1 -0
  330. package/dist/rules/malware/categories/network.d.ts +19 -0
  331. package/dist/rules/malware/categories/network.d.ts.map +1 -0
  332. package/dist/rules/malware/categories/network.js +622 -0
  333. package/dist/rules/malware/categories/network.js.map +1 -0
  334. package/dist/rules/malware/categories/obfuscation.d.ts +22 -0
  335. package/dist/rules/malware/categories/obfuscation.d.ts.map +1 -0
  336. package/dist/rules/malware/categories/obfuscation.js +766 -0
  337. package/dist/rules/malware/categories/obfuscation.js.map +1 -0
  338. package/dist/rules/malware/constants/index.d.ts +281 -0
  339. package/dist/rules/malware/constants/index.d.ts.map +1 -0
  340. package/dist/rules/malware/constants/index.js +327 -0
  341. package/dist/rules/malware/constants/index.js.map +1 -0
  342. package/dist/rules/malware/engine/index.d.ts +178 -0
  343. package/dist/rules/malware/engine/index.d.ts.map +1 -0
  344. package/dist/rules/malware/engine/index.js +552 -0
  345. package/dist/rules/malware/engine/index.js.map +1 -0
  346. package/dist/rules/malware/index.d.ts +205 -0
  347. package/dist/rules/malware/index.d.ts.map +1 -0
  348. package/dist/rules/malware/index.js +837 -0
  349. package/dist/rules/malware/index.js.map +1 -0
  350. package/dist/rules/malware/scoring/index.d.ts +84 -0
  351. package/dist/rules/malware/scoring/index.d.ts.map +1 -0
  352. package/dist/rules/malware/scoring/index.js +441 -0
  353. package/dist/rules/malware/scoring/index.js.map +1 -0
  354. package/dist/rules/malware/types/index.d.ts +616 -0
  355. package/dist/rules/malware/types/index.d.ts.map +1 -0
  356. package/dist/rules/malware/types/index.js +155 -0
  357. package/dist/rules/malware/types/index.js.map +1 -0
  358. package/dist/rules/malware/utils/index.d.ts +117 -0
  359. package/dist/rules/malware/utils/index.d.ts.map +1 -0
  360. package/dist/rules/malware/utils/index.js +514 -0
  361. package/dist/rules/malware/utils/index.js.map +1 -0
  362. package/dist/rules/standards.d.ts +26 -0
  363. package/dist/rules/standards.d.ts.map +1 -0
  364. package/dist/rules/standards.js +352 -0
  365. package/dist/rules/standards.js.map +1 -0
  366. package/dist/rules/vulnerabilities/constants/index.d.ts +835 -0
  367. package/dist/rules/vulnerabilities/constants/index.d.ts.map +1 -0
  368. package/dist/rules/vulnerabilities/constants/index.js +544 -0
  369. package/dist/rules/vulnerabilities/constants/index.js.map +1 -0
  370. package/dist/rules/vulnerabilities/engine/index.d.ts +145 -0
  371. package/dist/rules/vulnerabilities/engine/index.d.ts.map +1 -0
  372. package/dist/rules/vulnerabilities/engine/index.js +581 -0
  373. package/dist/rules/vulnerabilities/engine/index.js.map +1 -0
  374. package/dist/rules/vulnerabilities/index.d.ts +148 -0
  375. package/dist/rules/vulnerabilities/index.d.ts.map +1 -0
  376. package/dist/rules/vulnerabilities/index.js +252 -0
  377. package/dist/rules/vulnerabilities/index.js.map +1 -0
  378. package/dist/rules/vulnerabilities/rules/authentication.d.ts +8 -0
  379. package/dist/rules/vulnerabilities/rules/authentication.d.ts.map +1 -0
  380. package/dist/rules/vulnerabilities/rules/authentication.js +419 -0
  381. package/dist/rules/vulnerabilities/rules/authentication.js.map +1 -0
  382. package/dist/rules/vulnerabilities/rules/commandInjection.d.ts +8 -0
  383. package/dist/rules/vulnerabilities/rules/commandInjection.d.ts.map +1 -0
  384. package/dist/rules/vulnerabilities/rules/commandInjection.js +300 -0
  385. package/dist/rules/vulnerabilities/rules/commandInjection.js.map +1 -0
  386. package/dist/rules/vulnerabilities/rules/csrf.d.ts +8 -0
  387. package/dist/rules/vulnerabilities/rules/csrf.d.ts.map +1 -0
  388. package/dist/rules/vulnerabilities/rules/csrf.js +261 -0
  389. package/dist/rules/vulnerabilities/rules/csrf.js.map +1 -0
  390. package/dist/rules/vulnerabilities/rules/deserialization.d.ts +8 -0
  391. package/dist/rules/vulnerabilities/rules/deserialization.d.ts.map +1 -0
  392. package/dist/rules/vulnerabilities/rules/deserialization.js +336 -0
  393. package/dist/rules/vulnerabilities/rules/deserialization.js.map +1 -0
  394. package/dist/rules/vulnerabilities/rules/fileUpload.d.ts +8 -0
  395. package/dist/rules/vulnerabilities/rules/fileUpload.d.ts.map +1 -0
  396. package/dist/rules/vulnerabilities/rules/fileUpload.js +325 -0
  397. package/dist/rules/vulnerabilities/rules/fileUpload.js.map +1 -0
  398. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.d.ts +8 -0
  399. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.d.ts.map +1 -0
  400. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.js +446 -0
  401. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.js.map +1 -0
  402. package/dist/rules/vulnerabilities/rules/index.d.ts +17 -0
  403. package/dist/rules/vulnerabilities/rules/index.d.ts.map +1 -0
  404. package/dist/rules/vulnerabilities/rules/index.js +47 -0
  405. package/dist/rules/vulnerabilities/rules/index.js.map +1 -0
  406. package/dist/rules/vulnerabilities/rules/pathTraversal.d.ts +8 -0
  407. package/dist/rules/vulnerabilities/rules/pathTraversal.d.ts.map +1 -0
  408. package/dist/rules/vulnerabilities/rules/pathTraversal.js +351 -0
  409. package/dist/rules/vulnerabilities/rules/pathTraversal.js.map +1 -0
  410. package/dist/rules/vulnerabilities/rules/prototypePollution.d.ts +8 -0
  411. package/dist/rules/vulnerabilities/rules/prototypePollution.d.ts.map +1 -0
  412. package/dist/rules/vulnerabilities/rules/prototypePollution.js +272 -0
  413. package/dist/rules/vulnerabilities/rules/prototypePollution.js.map +1 -0
  414. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.d.ts +8 -0
  415. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.d.ts.map +1 -0
  416. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.js +438 -0
  417. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.js.map +1 -0
  418. package/dist/rules/vulnerabilities/rules/sqlInjection.d.ts +12 -0
  419. package/dist/rules/vulnerabilities/rules/sqlInjection.d.ts.map +1 -0
  420. package/dist/rules/vulnerabilities/rules/sqlInjection.js +636 -0
  421. package/dist/rules/vulnerabilities/rules/sqlInjection.js.map +1 -0
  422. package/dist/rules/vulnerabilities/rules/ssrf.d.ts +8 -0
  423. package/dist/rules/vulnerabilities/rules/ssrf.d.ts.map +1 -0
  424. package/dist/rules/vulnerabilities/rules/ssrf.js +401 -0
  425. package/dist/rules/vulnerabilities/rules/ssrf.js.map +1 -0
  426. package/dist/rules/vulnerabilities/rules/xss.d.ts +11 -0
  427. package/dist/rules/vulnerabilities/rules/xss.d.ts.map +1 -0
  428. package/dist/rules/vulnerabilities/rules/xss.js +724 -0
  429. package/dist/rules/vulnerabilities/rules/xss.js.map +1 -0
  430. package/dist/rules/vulnerabilities/scoring/index.d.ts +80 -0
  431. package/dist/rules/vulnerabilities/scoring/index.d.ts.map +1 -0
  432. package/dist/rules/vulnerabilities/scoring/index.js +414 -0
  433. package/dist/rules/vulnerabilities/scoring/index.js.map +1 -0
  434. package/dist/rules/vulnerabilities/types/index.d.ts +830 -0
  435. package/dist/rules/vulnerabilities/types/index.d.ts.map +1 -0
  436. package/dist/rules/vulnerabilities/types/index.js +164 -0
  437. package/dist/rules/vulnerabilities/types/index.js.map +1 -0
  438. package/dist/rules/vulnerabilities/utils/index.d.ts +206 -0
  439. package/dist/rules/vulnerabilities/utils/index.d.ts.map +1 -0
  440. package/dist/rules/vulnerabilities/utils/index.js +615 -0
  441. package/dist/rules/vulnerabilities/utils/index.js.map +1 -0
  442. package/dist/types/index.d.ts +359 -0
  443. package/dist/types/index.d.ts.map +1 -0
  444. package/dist/types/index.js +61 -0
  445. package/dist/types/index.js.map +1 -0
  446. package/dist/utils/index.d.ts +82 -0
  447. package/dist/utils/index.d.ts.map +1 -0
  448. package/dist/utils/index.js +326 -0
  449. package/dist/utils/index.js.map +1 -0
  450. package/dist/utils/logger.d.ts +40 -0
  451. package/dist/utils/logger.d.ts.map +1 -0
  452. package/dist/utils/logger.js +139 -0
  453. package/dist/utils/logger.js.map +1 -0
  454. package/docs/ARCHITECTURE.md +320 -0
  455. package/docs/V1.2.1-IA_Performances.md +116 -0
  456. package/docs/images/WIN_Defender.png +0 -0
  457. package/package.json +68 -0
  458. package/secure-scan.config.json +134 -0
  459. package/secure-scan.sln +29 -0
  460. package/src/ai/aiAnalyzer.ts +714 -0
  461. package/src/ai/index.ts +5 -0
  462. package/src/analyzers/base/baseAnalyzer.ts +66 -0
  463. package/src/analyzers/base/index.ts +5 -0
  464. package/src/analyzers/c-cpp/cppAnalyzer.ts +308 -0
  465. package/src/analyzers/c-cpp/index.ts +5 -0
  466. package/src/analyzers/core/engine/index.ts +5 -0
  467. package/src/analyzers/core/engine/ruleEngine.ts +221 -0
  468. package/src/analyzers/core/index.ts +8 -0
  469. package/src/analyzers/core/scanner/fileScanner.ts +204 -0
  470. package/src/analyzers/core/scanner/index.ts +5 -0
  471. package/src/analyzers/core/scoring/index.ts +5 -0
  472. package/src/analyzers/core/scoring/riskScoring.ts +198 -0
  473. package/src/analyzers/core/securityScanner.ts +321 -0
  474. package/src/analyzers/csharp/csharpAnalyzer.ts +328 -0
  475. package/src/analyzers/csharp/index.ts +5 -0
  476. package/src/analyzers/iac/iacAnalyzer.ts +318 -0
  477. package/src/analyzers/iac/index.ts +5 -0
  478. package/src/analyzers/index.ts +67 -0
  479. package/src/analyzers/java/index.ts +5 -0
  480. package/src/analyzers/java/javaAnalyzer.ts +320 -0
  481. package/src/analyzers/javascript/PROMPT_JS_ANALYZER.md +267 -0
  482. package/src/analyzers/javascript/astUtils.ts +789 -0
  483. package/src/analyzers/javascript/index.ts +50 -0
  484. package/src/analyzers/javascript/javascriptAnalyzer.ts +984 -0
  485. package/src/analyzers/javascript/malwareDetector.ts +697 -0
  486. package/src/analyzers/javascript/packageJsonAnalyzer.ts +626 -0
  487. package/src/analyzers/javascript/taintAnalyzer.ts +630 -0
  488. package/src/analyzers/php/index.ts +5 -0
  489. package/src/analyzers/php/phpAnalyzer.ts +280 -0
  490. package/src/analyzers/python/index.ts +5 -0
  491. package/src/analyzers/python/pythonAnalyzer.ts +319 -0
  492. package/src/cli/index.ts +276 -0
  493. package/src/dependencies/aiDependencyAnalyzer.ts +496 -0
  494. package/src/dependencies/database/cveDatabase.ts +426 -0
  495. package/src/dependencies/database/index.ts +6 -0
  496. package/src/dependencies/database/maliciousPackages.ts +286 -0
  497. package/src/dependencies/dependencyAnalyzer.ts +394 -0
  498. package/src/dependencies/detectors/index.ts +7 -0
  499. package/src/dependencies/detectors/securityStandards.ts +200 -0
  500. package/src/dependencies/detectors/vulnerabilityDetector.ts +343 -0
  501. package/src/dependencies/index.ts +27 -0
  502. package/src/dependencies/installed/index.ts +8 -0
  503. package/src/dependencies/installed/installedScanner.ts +821 -0
  504. package/src/dependencies/installed/malwarePatterns.ts +492 -0
  505. package/src/dependencies/installed/types.ts +287 -0
  506. package/src/dependencies/parsers/base/baseParser.ts +108 -0
  507. package/src/dependencies/parsers/base/index.ts +6 -0
  508. package/src/dependencies/parsers/cpp/cppParser.ts +245 -0
  509. package/src/dependencies/parsers/cpp/index.ts +6 -0
  510. package/src/dependencies/parsers/csharp/csharpParser.ts +151 -0
  511. package/src/dependencies/parsers/csharp/index.ts +6 -0
  512. package/src/dependencies/parsers/index.ts +56 -0
  513. package/src/dependencies/parsers/java/index.ts +6 -0
  514. package/src/dependencies/parsers/java/javaParser.ts +203 -0
  515. package/src/dependencies/parsers/javascript/index.ts +6 -0
  516. package/src/dependencies/parsers/javascript/javascriptParser.ts +362 -0
  517. package/src/dependencies/parsers/php/index.ts +6 -0
  518. package/src/dependencies/parsers/php/phpParser.ts +208 -0
  519. package/src/dependencies/parsers/python/index.ts +6 -0
  520. package/src/dependencies/parsers/python/pythonParser.ts +437 -0
  521. package/src/dependencies/types.ts +330 -0
  522. package/src/i18n/index.ts +1 -0
  523. package/src/i18n/translations.ts +194 -0
  524. package/src/index.ts +16 -0
  525. package/src/reports/dependencyReportGenerator.ts +717 -0
  526. package/src/reports/htmlReportGenerator.ts +781 -0
  527. package/src/reports/index.ts +7 -0
  528. package/src/reports/installedDepsReportGenerator.ts +899 -0
  529. package/src/rules/index.ts +58 -0
  530. package/src/rules/malware/INFO.md +287 -0
  531. package/src/rules/malware/categories/backdoors.ts +174 -0
  532. package/src/rules/malware/categories/cryptominers.ts +434 -0
  533. package/src/rules/malware/categories/exfiltration.ts +677 -0
  534. package/src/rules/malware/categories/keyloggers.ts +780 -0
  535. package/src/rules/malware/categories/loaders.ts +721 -0
  536. package/src/rules/malware/categories/network.ts +639 -0
  537. package/src/rules/malware/categories/obfuscation.ts +788 -0
  538. package/src/rules/malware/constants/index.ts +358 -0
  539. package/src/rules/malware/engine/index.ts +758 -0
  540. package/src/rules/malware/index.ts +928 -0
  541. package/src/rules/malware/scoring/index.ts +549 -0
  542. package/src/rules/malware/types/index.ts +752 -0
  543. package/src/rules/malware/utils/index.ts +643 -0
  544. package/src/rules/standards.ts +372 -0
  545. package/src/rules/vulnerabilities/PROMPT_VULNERABILITIES.md +226 -0
  546. package/src/rules/vulnerabilities/constants/index.ts +625 -0
  547. package/src/rules/vulnerabilities/engine/index.ts +831 -0
  548. package/src/rules/vulnerabilities/index.ts +312 -0
  549. package/src/rules/vulnerabilities/rules/authentication.ts +426 -0
  550. package/src/rules/vulnerabilities/rules/commandInjection.ts +307 -0
  551. package/src/rules/vulnerabilities/rules/csrf.ts +268 -0
  552. package/src/rules/vulnerabilities/rules/deserialization.ts +343 -0
  553. package/src/rules/vulnerabilities/rules/fileUpload.ts +332 -0
  554. package/src/rules/vulnerabilities/rules/hardcodedSecrets.ts +453 -0
  555. package/src/rules/vulnerabilities/rules/index.ts +17 -0
  556. package/src/rules/vulnerabilities/rules/pathTraversal.ts +358 -0
  557. package/src/rules/vulnerabilities/rules/prototypePollution.ts +279 -0
  558. package/src/rules/vulnerabilities/rules/securityMisconfiguration.ts +445 -0
  559. package/src/rules/vulnerabilities/rules/sqlInjection.ts +669 -0
  560. package/src/rules/vulnerabilities/rules/ssrf.ts +408 -0
  561. package/src/rules/vulnerabilities/rules/xss.ts +753 -0
  562. package/src/rules/vulnerabilities/scoring/index.ts +543 -0
  563. package/src/rules/vulnerabilities/types/index.ts +1004 -0
  564. package/src/rules/vulnerabilities/utils/index.ts +709 -0
  565. package/src/types/index.ts +391 -0
  566. package/src/utils/index.ts +306 -0
  567. package/src/utils/logger.ts +150 -0
  568. package/test-installed-scanner.ts +136 -0
  569. package/tsconfig.json +30 -0
@@ -0,0 +1,753 @@
1
+ /**
2
+ * @fileoverview Cross-Site Scripting (XSS) Detection Rules
3
+ * @module rules/vulnerabilities/rules/xss
4
+ *
5
+ * Comprehensive XSS detection for DOM-based, Reflected, and Stored XSS.
6
+ * Covers multiple languages and frameworks.
7
+ */
8
+
9
+ import {
10
+ VulnerabilityRule,
11
+ VulnerabilityType,
12
+ VulnerabilityCategory,
13
+ VulnerabilitySeverity,
14
+ ConfidenceLevel,
15
+ SupportedLanguage,
16
+ PatternType,
17
+ TaintSource,
18
+ TaintSink,
19
+ TaintSanitizer
20
+ } from '../types';
21
+ import { OWASP_TOP_10_2021, CWE_REFERENCES } from '../constants';
22
+
23
+ // ============================================================================
24
+ // TAINT DEFINITIONS FOR XSS
25
+ // ============================================================================
26
+
27
+ const xssSources: TaintSource[] = [
28
+ // DOM Sources
29
+ { id: 'dom-location', name: 'location', pattern: /(?:window\.)?location\.(?:search|hash|href|pathname)/g, languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT], category: 'user_input' },
30
+ { id: 'dom-referrer', name: 'document.referrer', pattern: /document\.referrer/g, languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT], category: 'user_input' },
31
+ { id: 'dom-url', name: 'document.URL', pattern: /document\.(?:URL|documentURI)/g, languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT], category: 'user_input' },
32
+ { id: 'dom-cookie', name: 'document.cookie', pattern: /document\.cookie/g, languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT], category: 'user_input' },
33
+ { id: 'dom-storage', name: 'localStorage/sessionStorage', pattern: /(?:local|session)Storage\.getItem\s*\(/g, languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT], category: 'user_input' },
34
+
35
+ // Server Sources
36
+ { id: 'js-req', name: 'req.body/query/params', pattern: /req\.(?:body|query|params)(?:\.\w+|\[\s*['"`]\w+['"`]\s*\])?/g, languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT], category: 'user_input' },
37
+ { id: 'php-superglobals', name: '$_GET/$_POST', pattern: /\$_(?:GET|POST|REQUEST)\s*\[\s*['"`][^'"`]+['"`]\s*\]/g, languages: [SupportedLanguage.PHP], category: 'user_input' },
38
+ { id: 'py-request', name: 'request.args/form', pattern: /request\.(?:args|form)\.get\s*\([^)]+\)/g, languages: [SupportedLanguage.PYTHON], category: 'user_input' },
39
+ { id: 'java-param', name: 'getParameter', pattern: /(?:request\.)?getParameter\s*\([^)]+\)/g, languages: [SupportedLanguage.JAVA], category: 'user_input' }
40
+ ];
41
+
42
+ const xssSinks: TaintSink[] = [
43
+ // DOM Sinks
44
+ { id: 'dom-innerhtml', name: 'innerHTML', pattern: /\.innerHTML\s*=(?!=)/g, languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT], vulnerabilityType: VulnerabilityType.XSS_DOM, dangerousArgs: [0] },
45
+ { id: 'dom-outerhtml', name: 'outerHTML', pattern: /\.outerHTML\s*=(?!=)/g, languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT], vulnerabilityType: VulnerabilityType.XSS_DOM },
46
+ { id: 'dom-write', name: 'document.write', pattern: /document\s*\.\s*write(?:ln)?\s*\(/g, languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT], vulnerabilityType: VulnerabilityType.XSS_DOM },
47
+ { id: 'dom-inserthtml', name: 'insertAdjacentHTML', pattern: /\.insertAdjacentHTML\s*\(/g, languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT], vulnerabilityType: VulnerabilityType.XSS_DOM },
48
+
49
+ // jQuery Sinks
50
+ { id: 'jquery-html', name: '$.html()', pattern: /\$\([^)]*\)\s*\.\s*html\s*\([^)]+\)/g, languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT], vulnerabilityType: VulnerabilityType.XSS_DOM },
51
+ { id: 'jquery-append', name: '$.append()', pattern: /\$\([^)]*\)\s*\.\s*(?:append|prepend|after|before)\s*\([^)]+\)/g, languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT], vulnerabilityType: VulnerabilityType.XSS_DOM },
52
+
53
+ // React Sinks
54
+ { id: 'react-dangerous', name: 'dangerouslySetInnerHTML', pattern: /dangerouslySetInnerHTML\s*=\s*\{/g, languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT], vulnerabilityType: VulnerabilityType.XSS_DOM },
55
+
56
+ // Angular Sinks
57
+ { id: 'angular-bypass', name: 'bypassSecurityTrust', pattern: /bypassSecurityTrust(?:Html|Script|Url|ResourceUrl|Style)\s*\(/g, languages: [SupportedLanguage.TYPESCRIPT], vulnerabilityType: VulnerabilityType.XSS_DOM },
58
+
59
+ // Vue Sinks
60
+ { id: 'vue-vhtml', name: 'v-html', pattern: /v-html\s*=\s*['"`]/g, languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT], vulnerabilityType: VulnerabilityType.XSS_DOM },
61
+
62
+ // Server-side template sinks
63
+ { id: 'php-echo', name: 'echo $_', pattern: /echo\s+\$_(?:GET|POST|REQUEST)/g, languages: [SupportedLanguage.PHP], vulnerabilityType: VulnerabilityType.XSS_REFLECTED },
64
+ { id: 'php-print', name: 'print $_', pattern: /print\s+\$_(?:GET|POST|REQUEST)/g, languages: [SupportedLanguage.PHP], vulnerabilityType: VulnerabilityType.XSS_REFLECTED }
65
+ ];
66
+
67
+ const xssSanitizers: TaintSanitizer[] = [
68
+ { id: 'dompurify', name: 'DOMPurify', pattern: /DOMPurify\s*\.\s*sanitize\s*\(/g, protectsAgainst: [VulnerabilityType.XSS_DOM, VulnerabilityType.XSS_REFLECTED, VulnerabilityType.XSS_STORED], effectiveness: 98 },
69
+ { id: 'textcontent', name: 'textContent', pattern: /\.textContent\s*=/g, protectsAgainst: [VulnerabilityType.XSS_DOM], effectiveness: 100 },
70
+ { id: 'createtextnode', name: 'createTextNode', pattern: /createTextNode\s*\(/g, protectsAgainst: [VulnerabilityType.XSS_DOM], effectiveness: 100 },
71
+ { id: 'encodeuri', name: 'encodeURIComponent', pattern: /encodeURIComponent\s*\(/g, protectsAgainst: [VulnerabilityType.XSS_DOM, VulnerabilityType.XSS_REFLECTED], effectiveness: 90 },
72
+ { id: 'htmlspecialchars', name: 'htmlspecialchars', pattern: /htmlspecialchars\s*\(/g, languages: [SupportedLanguage.PHP], protectsAgainst: [VulnerabilityType.XSS_REFLECTED, VulnerabilityType.XSS_STORED], effectiveness: 95 },
73
+ { id: 'htmlentities', name: 'htmlentities', pattern: /htmlentities\s*\(/g, languages: [SupportedLanguage.PHP], protectsAgainst: [VulnerabilityType.XSS_REFLECTED, VulnerabilityType.XSS_STORED], effectiveness: 95 },
74
+ { id: 'strip-tags', name: 'strip_tags', pattern: /strip_tags\s*\(/g, languages: [SupportedLanguage.PHP], protectsAgainst: [VulnerabilityType.XSS_REFLECTED], effectiveness: 70 },
75
+ { id: 'bleach', name: 'bleach.clean', pattern: /bleach\s*\.\s*clean\s*\(/g, languages: [SupportedLanguage.PYTHON], protectsAgainst: [VulnerabilityType.XSS_REFLECTED, VulnerabilityType.XSS_STORED], effectiveness: 95 },
76
+ { id: 'escape', name: 'escape()', pattern: /\bescape\s*\(|markupsafe\.escape/g, protectsAgainst: [VulnerabilityType.XSS_REFLECTED, VulnerabilityType.XSS_STORED], effectiveness: 90 }
77
+ ];
78
+
79
+ // ============================================================================
80
+ // XSS RULES
81
+ // ============================================================================
82
+
83
+ export const xssRules: VulnerabilityRule[] = [
84
+ // ==========================================================================
85
+ // DOM-based XSS Rules
86
+ // ==========================================================================
87
+ {
88
+ id: 'VUL-XSS-001',
89
+ name: 'DOM XSS - innerHTML with User Input',
90
+ description: 'Detects assignment of user-controlled data to innerHTML, which can execute arbitrary JavaScript.',
91
+ version: '1.0.0',
92
+ vulnerabilityType: VulnerabilityType.XSS_DOM,
93
+ category: VulnerabilityCategory.XSS,
94
+ languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT],
95
+ severity: VulnerabilitySeverity.HIGH,
96
+ confidence: ConfidenceLevel.HIGH,
97
+ baseScore: 80,
98
+ patterns: [
99
+ {
100
+ type: PatternType.REGEX,
101
+ patternId: 'xss-innerhtml-location',
102
+ pattern: '\\.innerHTML\\s*=\\s*(?:.*location\\.|.*document\\.(?:URL|referrer|cookie))',
103
+ flags: 'gi',
104
+ weight: 1.0,
105
+ description: 'innerHTML with DOM-based source'
106
+ },
107
+ {
108
+ type: PatternType.REGEX,
109
+ patternId: 'xss-innerhtml-var',
110
+ pattern: '\\.innerHTML\\s*=\\s*[^;]*(?:\\+|`\\$\\{)',
111
+ flags: 'gi',
112
+ weight: 0.85,
113
+ description: 'innerHTML with variable concatenation'
114
+ },
115
+ {
116
+ type: PatternType.REGEX,
117
+ patternId: 'xss-outerhtml',
118
+ pattern: '\\.outerHTML\\s*=\\s*[^;]*(?:\\+|`\\$\\{)',
119
+ flags: 'gi',
120
+ weight: 0.85,
121
+ description: 'outerHTML with variable'
122
+ }
123
+ ],
124
+ taintSources: xssSources.filter(s => s.languages?.includes(SupportedLanguage.JAVASCRIPT)),
125
+ taintSinks: xssSinks.filter(s => s.id.startsWith('dom-')),
126
+ taintSanitizers: xssSanitizers,
127
+ impact: {
128
+ confidentiality: 'high',
129
+ integrity: 'high',
130
+ availability: 'low',
131
+ technicalImpact: 'Arbitrary JavaScript execution in user browser. Session hijacking, credential theft, keylogging.',
132
+ businessImpact: 'Account takeover, defacement, malware distribution.',
133
+ affectedAssets: ['User Browser', 'User Session', 'User Credentials'],
134
+ dataAtRisk: ['Session Tokens', 'Cookies', 'User Input']
135
+ },
136
+ exploitability: {
137
+ attackVector: 'network',
138
+ attackComplexity: 'low',
139
+ privilegesRequired: 'none',
140
+ userInteraction: 'required',
141
+ knownExploits: true
142
+ },
143
+ vulnerableExamples: [
144
+ {
145
+ code: `const name = new URLSearchParams(location.search).get('name');
146
+ document.getElementById('greeting').innerHTML = 'Hello, ' + name;`,
147
+ language: SupportedLanguage.JAVASCRIPT,
148
+ isVulnerable: true,
149
+ description: 'User input from URL directly assigned to innerHTML'
150
+ }
151
+ ],
152
+ secureExamples: [
153
+ {
154
+ code: `const name = new URLSearchParams(location.search).get('name');
155
+ document.getElementById('greeting').textContent = 'Hello, ' + name;`,
156
+ language: SupportedLanguage.JAVASCRIPT,
157
+ isVulnerable: false,
158
+ description: 'Using textContent instead of innerHTML',
159
+ safetyExplanation: 'textContent does not parse HTML, treating input as plain text'
160
+ }
161
+ ],
162
+ remediation: {
163
+ summary: 'Use textContent, DOMPurify, or framework-safe methods instead of innerHTML.',
164
+ steps: [
165
+ 'Replace innerHTML with textContent for plain text',
166
+ 'Use DOMPurify.sanitize() when HTML is required',
167
+ 'Use framework methods like React JSX or Angular templates',
168
+ 'Implement Content Security Policy (CSP)'
169
+ ],
170
+ secureCodeExample: `// Secure: Using textContent
171
+ element.textContent = userInput;
172
+
173
+ // Secure: Using DOMPurify when HTML needed
174
+ element.innerHTML = DOMPurify.sanitize(userInput);
175
+
176
+ // Secure: Using DOM APIs
177
+ const text = document.createTextNode(userInput);
178
+ element.appendChild(text);`,
179
+ references: [
180
+ 'https://cheatsheetseries.owasp.org/cheatsheets/DOM_based_XSS_Prevention_Cheat_Sheet.html',
181
+ 'https://github.com/cure53/DOMPurify'
182
+ ],
183
+ effort: 'low',
184
+ priority: 'high'
185
+ },
186
+ standards: {
187
+ owasp: [OWASP_TOP_10_2021.A03],
188
+ cwe: [CWE_REFERENCES.CWE_79],
189
+ sans: [{ rank: 2, cweId: 'CWE-79', category: 'XSS' }]
190
+ },
191
+ tags: ['xss', 'dom-xss', 'javascript', 'client-side', 'high'],
192
+ enabled: true
193
+ },
194
+
195
+ {
196
+ id: 'VUL-XSS-002',
197
+ name: 'DOM XSS - document.write with User Input',
198
+ description: 'Detects document.write() with user-controlled data, which can inject malicious scripts.',
199
+ version: '1.0.0',
200
+ vulnerabilityType: VulnerabilityType.XSS_DOM,
201
+ category: VulnerabilityCategory.XSS,
202
+ languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT],
203
+ severity: VulnerabilitySeverity.HIGH,
204
+ confidence: ConfidenceLevel.HIGH,
205
+ baseScore: 82,
206
+ patterns: [
207
+ {
208
+ type: PatternType.REGEX,
209
+ patternId: 'xss-docwrite-location',
210
+ pattern: 'document\\.write(?:ln)?\\s*\\([^)]*(?:location|document\\.(?:URL|referrer))',
211
+ flags: 'gi',
212
+ weight: 1.0,
213
+ description: 'document.write with DOM source'
214
+ },
215
+ {
216
+ type: PatternType.REGEX,
217
+ patternId: 'xss-docwrite-concat',
218
+ pattern: 'document\\.write(?:ln)?\\s*\\([^)]*\\+',
219
+ flags: 'gi',
220
+ weight: 0.80,
221
+ description: 'document.write with concatenation'
222
+ }
223
+ ],
224
+ taintSources: xssSources,
225
+ taintSinks: [{ id: 'dom-write', name: 'document.write', pattern: /document\.write/g, vulnerabilityType: VulnerabilityType.XSS_DOM }],
226
+ taintSanitizers: xssSanitizers,
227
+ impact: {
228
+ confidentiality: 'high',
229
+ integrity: 'high',
230
+ availability: 'low',
231
+ technicalImpact: 'Full page content manipulation, script injection.',
232
+ businessImpact: 'Complete page takeover possible.'
233
+ },
234
+ exploitability: {
235
+ attackVector: 'network',
236
+ attackComplexity: 'low',
237
+ privilegesRequired: 'none',
238
+ userInteraction: 'required'
239
+ },
240
+ remediation: {
241
+ summary: 'Avoid document.write entirely. Use DOM manipulation methods instead.',
242
+ steps: [
243
+ 'Replace document.write with DOM APIs',
244
+ 'Use createElement and appendChild',
245
+ 'Implement CSP to block inline scripts'
246
+ ],
247
+ secureCodeExample: `// Instead of document.write, use:
248
+ const element = document.createElement('div');
249
+ element.textContent = sanitizedContent;
250
+ document.body.appendChild(element);`,
251
+ effort: 'medium',
252
+ priority: 'high'
253
+ },
254
+ standards: {
255
+ owasp: [OWASP_TOP_10_2021.A03],
256
+ cwe: [CWE_REFERENCES.CWE_79]
257
+ },
258
+ tags: ['xss', 'dom-xss', 'document-write', 'deprecated'],
259
+ enabled: true
260
+ },
261
+
262
+ {
263
+ id: 'VUL-XSS-003',
264
+ name: 'DOM XSS - jQuery html() with User Input',
265
+ description: 'Detects jQuery .html() method with user-controlled data.',
266
+ version: '1.0.0',
267
+ vulnerabilityType: VulnerabilityType.XSS_DOM,
268
+ category: VulnerabilityCategory.XSS,
269
+ languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT],
270
+ severity: VulnerabilitySeverity.HIGH,
271
+ confidence: ConfidenceLevel.MEDIUM,
272
+ baseScore: 75,
273
+ patterns: [
274
+ {
275
+ type: PatternType.REGEX,
276
+ patternId: 'xss-jquery-html',
277
+ pattern: '\\$\\([^)]+\\)\\.html\\s*\\([^)]*(?:location|document\\.|\\+|`\\$\\{)',
278
+ flags: 'gi',
279
+ weight: 0.90,
280
+ description: 'jQuery .html() with dynamic content'
281
+ },
282
+ {
283
+ type: PatternType.REGEX,
284
+ patternId: 'xss-jquery-append',
285
+ pattern: '\\$\\([^)]+\\)\\.(?:append|prepend|after|before)\\s*\\([^)]*(?:<|\\+.*<)',
286
+ flags: 'gi',
287
+ weight: 0.85,
288
+ description: 'jQuery DOM insertion with HTML'
289
+ }
290
+ ],
291
+ taintSources: xssSources,
292
+ taintSinks: xssSinks.filter(s => s.id.startsWith('jquery-')),
293
+ taintSanitizers: xssSanitizers,
294
+ impact: {
295
+ confidentiality: 'high',
296
+ integrity: 'high',
297
+ availability: 'low',
298
+ technicalImpact: 'Script execution in user context.',
299
+ businessImpact: 'Session theft, phishing attacks.'
300
+ },
301
+ exploitability: {
302
+ attackVector: 'network',
303
+ attackComplexity: 'low',
304
+ privilegesRequired: 'none',
305
+ userInteraction: 'required'
306
+ },
307
+ remediation: {
308
+ summary: 'Use .text() instead of .html(), or sanitize with DOMPurify.',
309
+ steps: [
310
+ 'Replace .html() with .text() for plain text',
311
+ 'Sanitize HTML with DOMPurify before using .html()',
312
+ 'Use .attr() carefully for attributes'
313
+ ],
314
+ secureCodeExample: `// Secure: Use .text() for plain text
315
+ $('#element').text(userInput);
316
+
317
+ // Secure: Sanitize if HTML is needed
318
+ $('#element').html(DOMPurify.sanitize(userInput));`,
319
+ effort: 'low',
320
+ priority: 'high'
321
+ },
322
+ standards: {
323
+ owasp: [OWASP_TOP_10_2021.A03],
324
+ cwe: [CWE_REFERENCES.CWE_79]
325
+ },
326
+ tags: ['xss', 'dom-xss', 'jquery', 'high'],
327
+ enabled: true
328
+ },
329
+
330
+ // ==========================================================================
331
+ // React/Angular/Vue XSS Rules
332
+ // ==========================================================================
333
+ {
334
+ id: 'VUL-XSS-004',
335
+ name: 'React XSS - dangerouslySetInnerHTML',
336
+ description: 'Detects use of dangerouslySetInnerHTML with potentially unsafe content.',
337
+ version: '1.0.0',
338
+ vulnerabilityType: VulnerabilityType.XSS_DOM,
339
+ category: VulnerabilityCategory.XSS,
340
+ languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT],
341
+ severity: VulnerabilitySeverity.HIGH,
342
+ confidence: ConfidenceLevel.MEDIUM,
343
+ baseScore: 70,
344
+ patterns: [
345
+ {
346
+ type: PatternType.REGEX,
347
+ patternId: 'xss-react-dangerous',
348
+ pattern: 'dangerouslySetInnerHTML\\s*=\\s*\\{\\s*\\{\\s*__html\\s*:',
349
+ flags: 'gi',
350
+ weight: 0.85,
351
+ description: 'dangerouslySetInnerHTML usage'
352
+ },
353
+ {
354
+ type: PatternType.REGEX,
355
+ patternId: 'xss-react-dangerous-prop',
356
+ pattern: 'dangerouslySetInnerHTML\\s*=\\s*\\{[^}]*props\\.',
357
+ flags: 'gi',
358
+ weight: 0.95,
359
+ description: 'dangerouslySetInnerHTML with props'
360
+ }
361
+ ],
362
+ falsePositivePatterns: [
363
+ {
364
+ type: PatternType.REGEX,
365
+ patternId: 'xss-react-sanitized',
366
+ pattern: 'dangerouslySetInnerHTML.*DOMPurify\\.sanitize',
367
+ flags: 'gis',
368
+ description: 'Content is sanitized with DOMPurify'
369
+ }
370
+ ],
371
+ impact: {
372
+ confidentiality: 'high',
373
+ integrity: 'high',
374
+ availability: 'low',
375
+ technicalImpact: 'XSS in React application context.',
376
+ businessImpact: 'Component-level attack surface.'
377
+ },
378
+ exploitability: {
379
+ attackVector: 'network',
380
+ attackComplexity: 'low',
381
+ privilegesRequired: 'none',
382
+ userInteraction: 'required'
383
+ },
384
+ remediation: {
385
+ summary: 'Avoid dangerouslySetInnerHTML. If required, always sanitize with DOMPurify.',
386
+ steps: [
387
+ 'Use JSX for dynamic content instead',
388
+ 'If HTML is required, sanitize with DOMPurify',
389
+ 'Review all uses of dangerouslySetInnerHTML'
390
+ ],
391
+ secureCodeExample: `// Avoid: dangerouslySetInnerHTML
392
+ // <div dangerouslySetInnerHTML={{__html: userContent}} />
393
+
394
+ // Secure: Use JSX
395
+ <div>{userContent}</div>
396
+
397
+ // Secure: Sanitize if HTML needed
398
+ import DOMPurify from 'dompurify';
399
+ <div dangerouslySetInnerHTML={{__html: DOMPurify.sanitize(userContent)}} />`,
400
+ effort: 'low',
401
+ priority: 'high'
402
+ },
403
+ standards: {
404
+ owasp: [OWASP_TOP_10_2021.A03],
405
+ cwe: [CWE_REFERENCES.CWE_79]
406
+ },
407
+ tags: ['xss', 'react', 'dangerously-set-inner-html', 'high'],
408
+ enabled: true
409
+ },
410
+
411
+ {
412
+ id: 'VUL-XSS-005',
413
+ name: 'Angular XSS - bypassSecurityTrust',
414
+ description: 'Detects use of Angular DomSanitizer bypass methods without proper validation.',
415
+ version: '1.0.0',
416
+ vulnerabilityType: VulnerabilityType.XSS_DOM,
417
+ category: VulnerabilityCategory.XSS,
418
+ languages: [SupportedLanguage.TYPESCRIPT],
419
+ severity: VulnerabilitySeverity.HIGH,
420
+ confidence: ConfidenceLevel.HIGH,
421
+ baseScore: 78,
422
+ patterns: [
423
+ {
424
+ type: PatternType.REGEX,
425
+ patternId: 'xss-angular-bypass-html',
426
+ pattern: 'bypassSecurityTrustHtml\\s*\\(',
427
+ flags: 'gi',
428
+ weight: 0.95,
429
+ description: 'bypassSecurityTrustHtml usage'
430
+ },
431
+ {
432
+ type: PatternType.REGEX,
433
+ patternId: 'xss-angular-bypass-script',
434
+ pattern: 'bypassSecurityTrustScript\\s*\\(',
435
+ flags: 'gi',
436
+ weight: 1.0,
437
+ description: 'bypassSecurityTrustScript usage'
438
+ },
439
+ {
440
+ type: PatternType.REGEX,
441
+ patternId: 'xss-angular-bypass-url',
442
+ pattern: 'bypassSecurityTrust(?:Url|ResourceUrl)\\s*\\(',
443
+ flags: 'gi',
444
+ weight: 0.85,
445
+ description: 'bypassSecurityTrustUrl usage'
446
+ }
447
+ ],
448
+ impact: {
449
+ confidentiality: 'high',
450
+ integrity: 'high',
451
+ availability: 'low',
452
+ technicalImpact: 'Bypasses Angular built-in XSS protection.',
453
+ businessImpact: 'Security control bypass.'
454
+ },
455
+ exploitability: {
456
+ attackVector: 'network',
457
+ attackComplexity: 'low',
458
+ privilegesRequired: 'none',
459
+ userInteraction: 'required'
460
+ },
461
+ remediation: {
462
+ summary: 'Avoid bypass methods. If needed, validate and sanitize content first.',
463
+ steps: [
464
+ 'Review necessity of bypassing sanitization',
465
+ 'Use DOMPurify before bypassing',
466
+ 'Implement strict input validation'
467
+ ],
468
+ secureCodeExample: `// Validate before bypassing
469
+ import DOMPurify from 'dompurify';
470
+
471
+ sanitizeAndTrust(html: string): SafeHtml {
472
+ const clean = DOMPurify.sanitize(html);
473
+ return this.sanitizer.bypassSecurityTrustHtml(clean);
474
+ }`,
475
+ effort: 'medium',
476
+ priority: 'high'
477
+ },
478
+ standards: {
479
+ owasp: [OWASP_TOP_10_2021.A03],
480
+ cwe: [CWE_REFERENCES.CWE_79]
481
+ },
482
+ tags: ['xss', 'angular', 'security-bypass', 'high'],
483
+ enabled: true
484
+ },
485
+
486
+ // ==========================================================================
487
+ // Reflected XSS Rules
488
+ // ==========================================================================
489
+ {
490
+ id: 'VUL-XSS-006',
491
+ name: 'Reflected XSS - PHP Echo User Input',
492
+ description: 'Detects PHP code that echoes user input without proper escaping.',
493
+ version: '1.0.0',
494
+ vulnerabilityType: VulnerabilityType.XSS_REFLECTED,
495
+ category: VulnerabilityCategory.XSS,
496
+ languages: [SupportedLanguage.PHP],
497
+ severity: VulnerabilitySeverity.HIGH,
498
+ confidence: ConfidenceLevel.HIGH,
499
+ baseScore: 80,
500
+ patterns: [
501
+ {
502
+ type: PatternType.REGEX,
503
+ patternId: 'xss-php-echo-get',
504
+ pattern: 'echo\\s+\\$_GET\\s*\\[',
505
+ flags: 'gi',
506
+ weight: 1.0,
507
+ description: 'Direct echo of $_GET'
508
+ },
509
+ {
510
+ type: PatternType.REGEX,
511
+ patternId: 'xss-php-echo-post',
512
+ pattern: 'echo\\s+\\$_POST\\s*\\[',
513
+ flags: 'gi',
514
+ weight: 1.0,
515
+ description: 'Direct echo of $_POST'
516
+ },
517
+ {
518
+ type: PatternType.REGEX,
519
+ patternId: 'xss-php-echo-request',
520
+ pattern: 'echo\\s+\\$_REQUEST\\s*\\[',
521
+ flags: 'gi',
522
+ weight: 1.0,
523
+ description: 'Direct echo of $_REQUEST'
524
+ },
525
+ {
526
+ type: PatternType.REGEX,
527
+ patternId: 'xss-php-print',
528
+ pattern: 'print\\s+\\$_(?:GET|POST|REQUEST)\\s*\\[',
529
+ flags: 'gi',
530
+ weight: 1.0,
531
+ description: 'Direct print of superglobal'
532
+ },
533
+ {
534
+ type: PatternType.REGEX,
535
+ patternId: 'xss-php-shortecho',
536
+ pattern: '\\<\\?=\\s*\\$_(?:GET|POST|REQUEST)\\s*\\[',
537
+ flags: 'gi',
538
+ weight: 1.0,
539
+ description: 'Short echo tag with superglobal'
540
+ }
541
+ ],
542
+ taintSources: xssSources.filter(s => s.languages?.includes(SupportedLanguage.PHP)),
543
+ taintSinks: xssSinks.filter(s => s.languages?.includes(SupportedLanguage.PHP)),
544
+ taintSanitizers: xssSanitizers.filter(s => !s.languages || s.languages.includes(SupportedLanguage.PHP)),
545
+ impact: {
546
+ confidentiality: 'high',
547
+ integrity: 'high',
548
+ availability: 'low',
549
+ technicalImpact: 'Script injection in response, session hijacking.',
550
+ businessImpact: 'Account compromise, phishing.'
551
+ },
552
+ exploitability: {
553
+ attackVector: 'network',
554
+ attackComplexity: 'low',
555
+ privilegesRequired: 'none',
556
+ userInteraction: 'required',
557
+ knownExploits: true
558
+ },
559
+ vulnerableExamples: [
560
+ {
561
+ code: `<?php
562
+ echo "Hello, " . $_GET['name'];
563
+ ?>`,
564
+ language: SupportedLanguage.PHP,
565
+ isVulnerable: true,
566
+ description: 'Direct output of user input'
567
+ }
568
+ ],
569
+ remediation: {
570
+ summary: 'Always use htmlspecialchars() or htmlentities() when outputting user data.',
571
+ steps: [
572
+ 'Wrap all user output with htmlspecialchars()',
573
+ 'Use ENT_QUOTES flag for attribute contexts',
574
+ 'Consider using template engines with auto-escaping'
575
+ ],
576
+ secureCodeExample: `<?php
577
+ // Secure: Using htmlspecialchars
578
+ echo "Hello, " . htmlspecialchars($_GET['name'], ENT_QUOTES, 'UTF-8');
579
+
580
+ // Secure: Using htmlentities
581
+ echo "Hello, " . htmlentities($_GET['name'], ENT_QUOTES, 'UTF-8');
582
+ ?>`,
583
+ effort: 'low',
584
+ priority: 'high'
585
+ },
586
+ standards: {
587
+ owasp: [OWASP_TOP_10_2021.A03],
588
+ cwe: [CWE_REFERENCES.CWE_79]
589
+ },
590
+ tags: ['xss', 'reflected-xss', 'php', 'high'],
591
+ enabled: true
592
+ },
593
+
594
+ // ==========================================================================
595
+ // Stored XSS Detection
596
+ // ==========================================================================
597
+ {
598
+ id: 'VUL-XSS-007',
599
+ name: 'Potential Stored XSS - Database to HTML',
600
+ description: 'Detects patterns where database content is rendered to HTML without escaping.',
601
+ version: '1.0.0',
602
+ vulnerabilityType: VulnerabilityType.XSS_STORED,
603
+ category: VulnerabilityCategory.XSS,
604
+ languages: [SupportedLanguage.JAVASCRIPT, SupportedLanguage.TYPESCRIPT, SupportedLanguage.PHP, SupportedLanguage.PYTHON],
605
+ severity: VulnerabilitySeverity.CRITICAL,
606
+ confidence: ConfidenceLevel.MEDIUM,
607
+ baseScore: 85,
608
+ patterns: [
609
+ {
610
+ type: PatternType.REGEX,
611
+ patternId: 'xss-stored-db-html-js',
612
+ pattern: '\\.innerHTML\\s*=\\s*(?:data|result|row|record|item)(?:\\.|\\[)',
613
+ flags: 'gi',
614
+ weight: 0.80,
615
+ description: 'Database result to innerHTML'
616
+ },
617
+ {
618
+ type: PatternType.REGEX,
619
+ patternId: 'xss-stored-render-body',
620
+ pattern: '\\.(?:render|send)\\s*\\([^)]*\\{[^}]*(?:content|body|message|text)\\s*:',
621
+ flags: 'gi',
622
+ weight: 0.70,
623
+ description: 'Rendering database content'
624
+ }
625
+ ],
626
+ impact: {
627
+ confidentiality: 'high',
628
+ integrity: 'high',
629
+ availability: 'low',
630
+ scope: 'changed',
631
+ technicalImpact: 'Persistent XSS affecting all users viewing the content.',
632
+ businessImpact: 'Mass user compromise, worm propagation.',
633
+ affectedAssets: ['All Users', 'Database Content'],
634
+ dataAtRisk: ['All User Sessions', 'Stored Data']
635
+ },
636
+ exploitability: {
637
+ attackVector: 'network',
638
+ attackComplexity: 'low',
639
+ privilegesRequired: 'low',
640
+ userInteraction: 'required',
641
+ knownExploits: true
642
+ },
643
+ remediation: {
644
+ summary: 'Always sanitize content before storing and escape when rendering.',
645
+ steps: [
646
+ 'Sanitize user input before storing in database',
647
+ 'Escape content when rendering to HTML',
648
+ 'Use Content Security Policy (CSP)',
649
+ 'Implement defense in depth with both input and output controls'
650
+ ],
651
+ secureCodeExample: `// Secure: Sanitize on input
652
+ const sanitized = DOMPurify.sanitize(userContent);
653
+ await db.save({ content: sanitized });
654
+
655
+ // Secure: Escape on output
656
+ element.textContent = dbContent;`,
657
+ effort: 'medium',
658
+ priority: 'immediate'
659
+ },
660
+ standards: {
661
+ owasp: [OWASP_TOP_10_2021.A03],
662
+ cwe: [CWE_REFERENCES.CWE_79]
663
+ },
664
+ tags: ['xss', 'stored-xss', 'persistent', 'critical'],
665
+ enabled: true
666
+ },
667
+
668
+ // ==========================================================================
669
+ // Template Injection XSS
670
+ // ==========================================================================
671
+ {
672
+ id: 'VUL-XSS-008',
673
+ name: 'Server-Side Template Injection Leading to XSS',
674
+ description: 'Detects server-side template rendering with user input that may cause XSS.',
675
+ version: '1.0.0',
676
+ vulnerabilityType: VulnerabilityType.TEMPLATE_INJECTION,
677
+ category: VulnerabilityCategory.XSS,
678
+ languages: [SupportedLanguage.PYTHON, SupportedLanguage.JAVASCRIPT],
679
+ severity: VulnerabilitySeverity.CRITICAL,
680
+ confidence: ConfidenceLevel.HIGH,
681
+ baseScore: 88,
682
+ patterns: [
683
+ {
684
+ type: PatternType.REGEX,
685
+ patternId: 'xss-ssti-python',
686
+ pattern: 'render_template_string\\s*\\([^)]*request\\.',
687
+ flags: 'gi',
688
+ weight: 1.0,
689
+ description: 'Flask render_template_string with request data'
690
+ },
691
+ {
692
+ type: PatternType.REGEX,
693
+ patternId: 'xss-ssti-jinja',
694
+ pattern: 'Template\\s*\\([^)]*\\)\\.render\\s*\\(',
695
+ flags: 'gi',
696
+ weight: 0.90,
697
+ description: 'Jinja2 Template render'
698
+ },
699
+ {
700
+ type: PatternType.REGEX,
701
+ patternId: 'xss-ssti-ejs',
702
+ pattern: 'ejs\\.render\\s*\\([^,]+,\\s*\\{[^}]*req\\.',
703
+ flags: 'gi',
704
+ weight: 0.85,
705
+ description: 'EJS render with request data'
706
+ }
707
+ ],
708
+ impact: {
709
+ confidentiality: 'high',
710
+ integrity: 'high',
711
+ availability: 'high',
712
+ scope: 'changed',
713
+ technicalImpact: 'Server-side code execution, not just XSS.',
714
+ businessImpact: 'Complete server compromise.'
715
+ },
716
+ exploitability: {
717
+ attackVector: 'network',
718
+ attackComplexity: 'low',
719
+ privilegesRequired: 'none',
720
+ userInteraction: 'none',
721
+ knownExploits: true
722
+ },
723
+ remediation: {
724
+ summary: 'Never pass user input directly to template rendering. Use predefined templates.',
725
+ steps: [
726
+ 'Use render_template with separate template files',
727
+ 'Pass user input as template variables, not template content',
728
+ 'Enable template auto-escaping'
729
+ ],
730
+ secureCodeExample: `# Secure: Use template files, not string rendering
731
+ from flask import render_template
732
+
733
+ @app.route('/hello')
734
+ def hello():
735
+ name = request.args.get('name', '')
736
+ return render_template('hello.html', name=name)`,
737
+ effort: 'medium',
738
+ priority: 'immediate'
739
+ },
740
+ standards: {
741
+ owasp: [OWASP_TOP_10_2021.A03],
742
+ cwe: [CWE_REFERENCES.CWE_79, CWE_REFERENCES.CWE_94]
743
+ },
744
+ tags: ['xss', 'ssti', 'template-injection', 'rce', 'critical'],
745
+ enabled: true
746
+ }
747
+ ];
748
+
749
+ // ============================================================================
750
+ // EXPORTS
751
+ // ============================================================================
752
+
753
+ export default xssRules;