secure-scan 1.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (569) hide show
  1. package/README.md +564 -0
  2. package/dist/ai/aiAnalyzer.d.ts +99 -0
  3. package/dist/ai/aiAnalyzer.d.ts.map +1 -0
  4. package/dist/ai/aiAnalyzer.js +669 -0
  5. package/dist/ai/aiAnalyzer.js.map +1 -0
  6. package/dist/ai/index.d.ts +5 -0
  7. package/dist/ai/index.d.ts.map +1 -0
  8. package/dist/ai/index.js +21 -0
  9. package/dist/ai/index.js.map +1 -0
  10. package/dist/analyzers/base/baseAnalyzer.d.ts +44 -0
  11. package/dist/analyzers/base/baseAnalyzer.d.ts.map +1 -0
  12. package/dist/analyzers/base/baseAnalyzer.js +53 -0
  13. package/dist/analyzers/base/baseAnalyzer.js.map +1 -0
  14. package/dist/analyzers/base/index.d.ts +5 -0
  15. package/dist/analyzers/base/index.d.ts.map +1 -0
  16. package/dist/analyzers/base/index.js +21 -0
  17. package/dist/analyzers/base/index.js.map +1 -0
  18. package/dist/analyzers/c-cpp/cppAnalyzer.d.ts +60 -0
  19. package/dist/analyzers/c-cpp/cppAnalyzer.d.ts.map +1 -0
  20. package/dist/analyzers/c-cpp/cppAnalyzer.js +218 -0
  21. package/dist/analyzers/c-cpp/cppAnalyzer.js.map +1 -0
  22. package/dist/analyzers/c-cpp/index.d.ts +5 -0
  23. package/dist/analyzers/c-cpp/index.d.ts.map +1 -0
  24. package/dist/analyzers/c-cpp/index.js +21 -0
  25. package/dist/analyzers/c-cpp/index.js.map +1 -0
  26. package/dist/analyzers/core/engine/index.d.ts +5 -0
  27. package/dist/analyzers/core/engine/index.d.ts.map +1 -0
  28. package/dist/analyzers/core/engine/index.js +21 -0
  29. package/dist/analyzers/core/engine/index.js.map +1 -0
  30. package/dist/analyzers/core/engine/ruleEngine.d.ts +46 -0
  31. package/dist/analyzers/core/engine/ruleEngine.d.ts.map +1 -0
  32. package/dist/analyzers/core/engine/ruleEngine.js +173 -0
  33. package/dist/analyzers/core/engine/ruleEngine.js.map +1 -0
  34. package/dist/analyzers/core/index.d.ts +8 -0
  35. package/dist/analyzers/core/index.d.ts.map +1 -0
  36. package/dist/analyzers/core/index.js +24 -0
  37. package/dist/analyzers/core/index.js.map +1 -0
  38. package/dist/analyzers/core/scanner/fileScanner.d.ts +31 -0
  39. package/dist/analyzers/core/scanner/fileScanner.d.ts.map +1 -0
  40. package/dist/analyzers/core/scanner/fileScanner.js +199 -0
  41. package/dist/analyzers/core/scanner/fileScanner.js.map +1 -0
  42. package/dist/analyzers/core/scanner/index.d.ts +5 -0
  43. package/dist/analyzers/core/scanner/index.d.ts.map +1 -0
  44. package/dist/analyzers/core/scanner/index.js +21 -0
  45. package/dist/analyzers/core/scanner/index.js.map +1 -0
  46. package/dist/analyzers/core/scoring/index.d.ts +5 -0
  47. package/dist/analyzers/core/scoring/index.d.ts.map +1 -0
  48. package/dist/analyzers/core/scoring/index.js +21 -0
  49. package/dist/analyzers/core/scoring/index.js.map +1 -0
  50. package/dist/analyzers/core/scoring/riskScoring.d.ts +49 -0
  51. package/dist/analyzers/core/scoring/riskScoring.d.ts.map +1 -0
  52. package/dist/analyzers/core/scoring/riskScoring.js +180 -0
  53. package/dist/analyzers/core/scoring/riskScoring.js.map +1 -0
  54. package/dist/analyzers/core/securityScanner.d.ts +47 -0
  55. package/dist/analyzers/core/securityScanner.d.ts.map +1 -0
  56. package/dist/analyzers/core/securityScanner.js +298 -0
  57. package/dist/analyzers/core/securityScanner.js.map +1 -0
  58. package/dist/analyzers/csharp/csharpAnalyzer.d.ts +64 -0
  59. package/dist/analyzers/csharp/csharpAnalyzer.d.ts.map +1 -0
  60. package/dist/analyzers/csharp/csharpAnalyzer.js +232 -0
  61. package/dist/analyzers/csharp/csharpAnalyzer.js.map +1 -0
  62. package/dist/analyzers/csharp/index.d.ts +5 -0
  63. package/dist/analyzers/csharp/index.d.ts.map +1 -0
  64. package/dist/analyzers/csharp/index.js +21 -0
  65. package/dist/analyzers/csharp/index.js.map +1 -0
  66. package/dist/analyzers/iac/iacAnalyzer.d.ts +36 -0
  67. package/dist/analyzers/iac/iacAnalyzer.d.ts.map +1 -0
  68. package/dist/analyzers/iac/iacAnalyzer.js +182 -0
  69. package/dist/analyzers/iac/iacAnalyzer.js.map +1 -0
  70. package/dist/analyzers/iac/index.d.ts +5 -0
  71. package/dist/analyzers/iac/index.d.ts.map +1 -0
  72. package/dist/analyzers/iac/index.js +21 -0
  73. package/dist/analyzers/iac/index.js.map +1 -0
  74. package/dist/analyzers/index.d.ts +30 -0
  75. package/dist/analyzers/index.d.ts.map +1 -0
  76. package/dist/analyzers/index.js +80 -0
  77. package/dist/analyzers/index.js.map +1 -0
  78. package/dist/analyzers/java/index.d.ts +5 -0
  79. package/dist/analyzers/java/index.d.ts.map +1 -0
  80. package/dist/analyzers/java/index.js +21 -0
  81. package/dist/analyzers/java/index.js.map +1 -0
  82. package/dist/analyzers/java/javaAnalyzer.d.ts +64 -0
  83. package/dist/analyzers/java/javaAnalyzer.d.ts.map +1 -0
  84. package/dist/analyzers/java/javaAnalyzer.js +224 -0
  85. package/dist/analyzers/java/javaAnalyzer.js.map +1 -0
  86. package/dist/analyzers/javascript/astUtils.d.ts +170 -0
  87. package/dist/analyzers/javascript/astUtils.d.ts.map +1 -0
  88. package/dist/analyzers/javascript/astUtils.js +700 -0
  89. package/dist/analyzers/javascript/astUtils.js.map +1 -0
  90. package/dist/analyzers/javascript/index.d.ts +18 -0
  91. package/dist/analyzers/javascript/index.d.ts.map +1 -0
  92. package/dist/analyzers/javascript/index.js +50 -0
  93. package/dist/analyzers/javascript/index.js.map +1 -0
  94. package/dist/analyzers/javascript/javascriptAnalyzer.d.ts +111 -0
  95. package/dist/analyzers/javascript/javascriptAnalyzer.d.ts.map +1 -0
  96. package/dist/analyzers/javascript/javascriptAnalyzer.js +860 -0
  97. package/dist/analyzers/javascript/javascriptAnalyzer.js.map +1 -0
  98. package/dist/analyzers/javascript/malwareDetector.d.ts +102 -0
  99. package/dist/analyzers/javascript/malwareDetector.d.ts.map +1 -0
  100. package/dist/analyzers/javascript/malwareDetector.js +616 -0
  101. package/dist/analyzers/javascript/malwareDetector.js.map +1 -0
  102. package/dist/analyzers/javascript/packageJsonAnalyzer.d.ts +87 -0
  103. package/dist/analyzers/javascript/packageJsonAnalyzer.d.ts.map +1 -0
  104. package/dist/analyzers/javascript/packageJsonAnalyzer.js +553 -0
  105. package/dist/analyzers/javascript/packageJsonAnalyzer.js.map +1 -0
  106. package/dist/analyzers/javascript/taintAnalyzer.d.ts +120 -0
  107. package/dist/analyzers/javascript/taintAnalyzer.d.ts.map +1 -0
  108. package/dist/analyzers/javascript/taintAnalyzer.js +526 -0
  109. package/dist/analyzers/javascript/taintAnalyzer.js.map +1 -0
  110. package/dist/analyzers/php/index.d.ts +5 -0
  111. package/dist/analyzers/php/index.d.ts.map +1 -0
  112. package/dist/analyzers/php/index.js +21 -0
  113. package/dist/analyzers/php/index.js.map +1 -0
  114. package/dist/analyzers/php/phpAnalyzer.d.ts +56 -0
  115. package/dist/analyzers/php/phpAnalyzer.d.ts.map +1 -0
  116. package/dist/analyzers/php/phpAnalyzer.js +202 -0
  117. package/dist/analyzers/php/phpAnalyzer.js.map +1 -0
  118. package/dist/analyzers/python/index.d.ts +5 -0
  119. package/dist/analyzers/python/index.d.ts.map +1 -0
  120. package/dist/analyzers/python/index.js +21 -0
  121. package/dist/analyzers/python/index.js.map +1 -0
  122. package/dist/analyzers/python/pythonAnalyzer.d.ts +64 -0
  123. package/dist/analyzers/python/pythonAnalyzer.d.ts.map +1 -0
  124. package/dist/analyzers/python/pythonAnalyzer.js +226 -0
  125. package/dist/analyzers/python/pythonAnalyzer.js.map +1 -0
  126. package/dist/cli/index.d.ts +7 -0
  127. package/dist/cli/index.d.ts.map +1 -0
  128. package/dist/cli/index.js +281 -0
  129. package/dist/cli/index.js.map +1 -0
  130. package/dist/core/engine/index.d.ts +5 -0
  131. package/dist/core/engine/index.d.ts.map +1 -0
  132. package/dist/core/engine/index.js +21 -0
  133. package/dist/core/engine/index.js.map +1 -0
  134. package/dist/core/engine/ruleEngine.d.ts +46 -0
  135. package/dist/core/engine/ruleEngine.d.ts.map +1 -0
  136. package/dist/core/engine/ruleEngine.js +173 -0
  137. package/dist/core/engine/ruleEngine.js.map +1 -0
  138. package/dist/core/index.d.ts +8 -0
  139. package/dist/core/index.d.ts.map +1 -0
  140. package/dist/core/index.js +24 -0
  141. package/dist/core/index.js.map +1 -0
  142. package/dist/core/scanner/fileScanner.d.ts +31 -0
  143. package/dist/core/scanner/fileScanner.d.ts.map +1 -0
  144. package/dist/core/scanner/fileScanner.js +199 -0
  145. package/dist/core/scanner/fileScanner.js.map +1 -0
  146. package/dist/core/scanner/index.d.ts +5 -0
  147. package/dist/core/scanner/index.d.ts.map +1 -0
  148. package/dist/core/scanner/index.js +21 -0
  149. package/dist/core/scanner/index.js.map +1 -0
  150. package/dist/core/scoring/index.d.ts +5 -0
  151. package/dist/core/scoring/index.d.ts.map +1 -0
  152. package/dist/core/scoring/index.js +21 -0
  153. package/dist/core/scoring/index.js.map +1 -0
  154. package/dist/core/scoring/riskScoring.d.ts +49 -0
  155. package/dist/core/scoring/riskScoring.d.ts.map +1 -0
  156. package/dist/core/scoring/riskScoring.js +180 -0
  157. package/dist/core/scoring/riskScoring.js.map +1 -0
  158. package/dist/core/securityScanner.d.ts +47 -0
  159. package/dist/core/securityScanner.d.ts.map +1 -0
  160. package/dist/core/securityScanner.js +298 -0
  161. package/dist/core/securityScanner.js.map +1 -0
  162. package/dist/dependencies/aiDependencyAnalyzer.d.ts +96 -0
  163. package/dist/dependencies/aiDependencyAnalyzer.d.ts.map +1 -0
  164. package/dist/dependencies/aiDependencyAnalyzer.js +435 -0
  165. package/dist/dependencies/aiDependencyAnalyzer.js.map +1 -0
  166. package/dist/dependencies/database/cveDatabase.d.ts +32 -0
  167. package/dist/dependencies/database/cveDatabase.d.ts.map +1 -0
  168. package/dist/dependencies/database/cveDatabase.js +393 -0
  169. package/dist/dependencies/database/cveDatabase.js.map +1 -0
  170. package/dist/dependencies/database/index.d.ts +6 -0
  171. package/dist/dependencies/database/index.d.ts.map +1 -0
  172. package/dist/dependencies/database/index.js +22 -0
  173. package/dist/dependencies/database/index.js.map +1 -0
  174. package/dist/dependencies/database/maliciousPackages.d.ts +43 -0
  175. package/dist/dependencies/database/maliciousPackages.d.ts.map +1 -0
  176. package/dist/dependencies/database/maliciousPackages.js +279 -0
  177. package/dist/dependencies/database/maliciousPackages.js.map +1 -0
  178. package/dist/dependencies/dependencyAnalyzer.d.ts +74 -0
  179. package/dist/dependencies/dependencyAnalyzer.d.ts.map +1 -0
  180. package/dist/dependencies/dependencyAnalyzer.js +349 -0
  181. package/dist/dependencies/dependencyAnalyzer.js.map +1 -0
  182. package/dist/dependencies/detectors/index.d.ts +7 -0
  183. package/dist/dependencies/detectors/index.d.ts.map +1 -0
  184. package/dist/dependencies/detectors/index.js +28 -0
  185. package/dist/dependencies/detectors/index.js.map +1 -0
  186. package/dist/dependencies/detectors/securityStandards.d.ts +15 -0
  187. package/dist/dependencies/detectors/securityStandards.d.ts.map +1 -0
  188. package/dist/dependencies/detectors/securityStandards.js +178 -0
  189. package/dist/dependencies/detectors/securityStandards.js.map +1 -0
  190. package/dist/dependencies/detectors/vulnerabilityDetector.d.ts +53 -0
  191. package/dist/dependencies/detectors/vulnerabilityDetector.d.ts.map +1 -0
  192. package/dist/dependencies/detectors/vulnerabilityDetector.js +289 -0
  193. package/dist/dependencies/detectors/vulnerabilityDetector.js.map +1 -0
  194. package/dist/dependencies/index.d.ts +14 -0
  195. package/dist/dependencies/index.d.ts.map +1 -0
  196. package/dist/dependencies/index.js +43 -0
  197. package/dist/dependencies/index.js.map +1 -0
  198. package/dist/dependencies/installed/index.d.ts +8 -0
  199. package/dist/dependencies/installed/index.d.ts.map +1 -0
  200. package/dist/dependencies/installed/index.js +24 -0
  201. package/dist/dependencies/installed/index.js.map +1 -0
  202. package/dist/dependencies/installed/installedScanner.d.ts +91 -0
  203. package/dist/dependencies/installed/installedScanner.d.ts.map +1 -0
  204. package/dist/dependencies/installed/installedScanner.js +766 -0
  205. package/dist/dependencies/installed/installedScanner.js.map +1 -0
  206. package/dist/dependencies/installed/malwarePatterns.d.ts +32 -0
  207. package/dist/dependencies/installed/malwarePatterns.d.ts.map +1 -0
  208. package/dist/dependencies/installed/malwarePatterns.js +480 -0
  209. package/dist/dependencies/installed/malwarePatterns.js.map +1 -0
  210. package/dist/dependencies/installed/types.d.ts +274 -0
  211. package/dist/dependencies/installed/types.d.ts.map +1 -0
  212. package/dist/dependencies/installed/types.js +7 -0
  213. package/dist/dependencies/installed/types.js.map +1 -0
  214. package/dist/dependencies/parsers/base/baseParser.d.ts +44 -0
  215. package/dist/dependencies/parsers/base/baseParser.d.ts.map +1 -0
  216. package/dist/dependencies/parsers/base/baseParser.js +80 -0
  217. package/dist/dependencies/parsers/base/baseParser.js.map +1 -0
  218. package/dist/dependencies/parsers/base/index.d.ts +6 -0
  219. package/dist/dependencies/parsers/base/index.d.ts.map +1 -0
  220. package/dist/dependencies/parsers/base/index.js +27 -0
  221. package/dist/dependencies/parsers/base/index.js.map +1 -0
  222. package/dist/dependencies/parsers/cpp/cppParser.d.ts +36 -0
  223. package/dist/dependencies/parsers/cpp/cppParser.d.ts.map +1 -0
  224. package/dist/dependencies/parsers/cpp/cppParser.js +196 -0
  225. package/dist/dependencies/parsers/cpp/cppParser.js.map +1 -0
  226. package/dist/dependencies/parsers/cpp/index.d.ts +6 -0
  227. package/dist/dependencies/parsers/cpp/index.d.ts.map +1 -0
  228. package/dist/dependencies/parsers/cpp/index.js +27 -0
  229. package/dist/dependencies/parsers/cpp/index.js.map +1 -0
  230. package/dist/dependencies/parsers/csharp/csharpParser.d.ts +32 -0
  231. package/dist/dependencies/parsers/csharp/csharpParser.d.ts.map +1 -0
  232. package/dist/dependencies/parsers/csharp/csharpParser.js +125 -0
  233. package/dist/dependencies/parsers/csharp/csharpParser.js.map +1 -0
  234. package/dist/dependencies/parsers/csharp/index.d.ts +6 -0
  235. package/dist/dependencies/parsers/csharp/index.d.ts.map +1 -0
  236. package/dist/dependencies/parsers/csharp/index.js +27 -0
  237. package/dist/dependencies/parsers/csharp/index.js.map +1 -0
  238. package/dist/dependencies/parsers/index.d.ts +24 -0
  239. package/dist/dependencies/parsers/index.d.ts.map +1 -0
  240. package/dist/dependencies/parsers/index.js +69 -0
  241. package/dist/dependencies/parsers/index.js.map +1 -0
  242. package/dist/dependencies/parsers/java/index.d.ts +6 -0
  243. package/dist/dependencies/parsers/java/index.d.ts.map +1 -0
  244. package/dist/dependencies/parsers/java/index.js +27 -0
  245. package/dist/dependencies/parsers/java/index.js.map +1 -0
  246. package/dist/dependencies/parsers/java/javaParser.d.ts +32 -0
  247. package/dist/dependencies/parsers/java/javaParser.d.ts.map +1 -0
  248. package/dist/dependencies/parsers/java/javaParser.js +168 -0
  249. package/dist/dependencies/parsers/java/javaParser.js.map +1 -0
  250. package/dist/dependencies/parsers/javascript/index.d.ts +6 -0
  251. package/dist/dependencies/parsers/javascript/index.d.ts.map +1 -0
  252. package/dist/dependencies/parsers/javascript/index.js +27 -0
  253. package/dist/dependencies/parsers/javascript/index.js.map +1 -0
  254. package/dist/dependencies/parsers/javascript/javascriptParser.d.ts +55 -0
  255. package/dist/dependencies/parsers/javascript/javascriptParser.d.ts.map +1 -0
  256. package/dist/dependencies/parsers/javascript/javascriptParser.js +266 -0
  257. package/dist/dependencies/parsers/javascript/javascriptParser.js.map +1 -0
  258. package/dist/dependencies/parsers/php/index.d.ts +6 -0
  259. package/dist/dependencies/parsers/php/index.d.ts.map +1 -0
  260. package/dist/dependencies/parsers/php/index.js +27 -0
  261. package/dist/dependencies/parsers/php/index.js.map +1 -0
  262. package/dist/dependencies/parsers/php/phpParser.d.ts +35 -0
  263. package/dist/dependencies/parsers/php/phpParser.d.ts.map +1 -0
  264. package/dist/dependencies/parsers/php/phpParser.js +162 -0
  265. package/dist/dependencies/parsers/php/phpParser.js.map +1 -0
  266. package/dist/dependencies/parsers/python/index.d.ts +6 -0
  267. package/dist/dependencies/parsers/python/index.d.ts.map +1 -0
  268. package/dist/dependencies/parsers/python/index.js +27 -0
  269. package/dist/dependencies/parsers/python/index.js.map +1 -0
  270. package/dist/dependencies/parsers/python/pythonParser.d.ts +60 -0
  271. package/dist/dependencies/parsers/python/pythonParser.d.ts.map +1 -0
  272. package/dist/dependencies/parsers/python/pythonParser.js +336 -0
  273. package/dist/dependencies/parsers/python/pythonParser.js.map +1 -0
  274. package/dist/dependencies/types.d.ts +280 -0
  275. package/dist/dependencies/types.d.ts.map +1 -0
  276. package/dist/dependencies/types.js +59 -0
  277. package/dist/dependencies/types.js.map +1 -0
  278. package/dist/i18n/index.d.ts +2 -0
  279. package/dist/i18n/index.d.ts.map +1 -0
  280. package/dist/i18n/index.js +18 -0
  281. package/dist/i18n/index.js.map +1 -0
  282. package/dist/i18n/translations.d.ts +55 -0
  283. package/dist/i18n/translations.d.ts.map +1 -0
  284. package/dist/i18n/translations.js +119 -0
  285. package/dist/i18n/translations.js.map +1 -0
  286. package/dist/index.d.ts +14 -0
  287. package/dist/index.d.ts.map +1 -0
  288. package/dist/index.js +36 -0
  289. package/dist/index.js.map +1 -0
  290. package/dist/reports/dependencyReportGenerator.d.ts +20 -0
  291. package/dist/reports/dependencyReportGenerator.d.ts.map +1 -0
  292. package/dist/reports/dependencyReportGenerator.js +690 -0
  293. package/dist/reports/dependencyReportGenerator.js.map +1 -0
  294. package/dist/reports/htmlReportGenerator.d.ts +43 -0
  295. package/dist/reports/htmlReportGenerator.d.ts.map +1 -0
  296. package/dist/reports/htmlReportGenerator.js +793 -0
  297. package/dist/reports/htmlReportGenerator.js.map +1 -0
  298. package/dist/reports/index.d.ts +7 -0
  299. package/dist/reports/index.d.ts.map +1 -0
  300. package/dist/reports/index.js +23 -0
  301. package/dist/reports/index.js.map +1 -0
  302. package/dist/reports/installedDepsReportGenerator.d.ts +14 -0
  303. package/dist/reports/installedDepsReportGenerator.d.ts.map +1 -0
  304. package/dist/reports/installedDepsReportGenerator.js +872 -0
  305. package/dist/reports/installedDepsReportGenerator.js.map +1 -0
  306. package/dist/rules/index.d.ts +31 -0
  307. package/dist/rules/index.d.ts.map +1 -0
  308. package/dist/rules/index.js +95 -0
  309. package/dist/rules/index.js.map +1 -0
  310. package/dist/rules/malware/categories/backdoors.d.ts +12 -0
  311. package/dist/rules/malware/categories/backdoors.d.ts.map +1 -0
  312. package/dist/rules/malware/categories/backdoors.js +163 -0
  313. package/dist/rules/malware/categories/backdoors.js.map +1 -0
  314. package/dist/rules/malware/categories/cryptominers.d.ts +13 -0
  315. package/dist/rules/malware/categories/cryptominers.d.ts.map +1 -0
  316. package/dist/rules/malware/categories/cryptominers.js +415 -0
  317. package/dist/rules/malware/categories/cryptominers.js.map +1 -0
  318. package/dist/rules/malware/categories/exfiltration.d.ts +20 -0
  319. package/dist/rules/malware/categories/exfiltration.d.ts.map +1 -0
  320. package/dist/rules/malware/categories/exfiltration.js +658 -0
  321. package/dist/rules/malware/categories/exfiltration.js.map +1 -0
  322. package/dist/rules/malware/categories/keyloggers.d.ts +19 -0
  323. package/dist/rules/malware/categories/keyloggers.d.ts.map +1 -0
  324. package/dist/rules/malware/categories/keyloggers.js +763 -0
  325. package/dist/rules/malware/categories/keyloggers.js.map +1 -0
  326. package/dist/rules/malware/categories/loaders.d.ts +20 -0
  327. package/dist/rules/malware/categories/loaders.d.ts.map +1 -0
  328. package/dist/rules/malware/categories/loaders.js +702 -0
  329. package/dist/rules/malware/categories/loaders.js.map +1 -0
  330. package/dist/rules/malware/categories/network.d.ts +19 -0
  331. package/dist/rules/malware/categories/network.d.ts.map +1 -0
  332. package/dist/rules/malware/categories/network.js +622 -0
  333. package/dist/rules/malware/categories/network.js.map +1 -0
  334. package/dist/rules/malware/categories/obfuscation.d.ts +22 -0
  335. package/dist/rules/malware/categories/obfuscation.d.ts.map +1 -0
  336. package/dist/rules/malware/categories/obfuscation.js +766 -0
  337. package/dist/rules/malware/categories/obfuscation.js.map +1 -0
  338. package/dist/rules/malware/constants/index.d.ts +281 -0
  339. package/dist/rules/malware/constants/index.d.ts.map +1 -0
  340. package/dist/rules/malware/constants/index.js +327 -0
  341. package/dist/rules/malware/constants/index.js.map +1 -0
  342. package/dist/rules/malware/engine/index.d.ts +178 -0
  343. package/dist/rules/malware/engine/index.d.ts.map +1 -0
  344. package/dist/rules/malware/engine/index.js +552 -0
  345. package/dist/rules/malware/engine/index.js.map +1 -0
  346. package/dist/rules/malware/index.d.ts +205 -0
  347. package/dist/rules/malware/index.d.ts.map +1 -0
  348. package/dist/rules/malware/index.js +837 -0
  349. package/dist/rules/malware/index.js.map +1 -0
  350. package/dist/rules/malware/scoring/index.d.ts +84 -0
  351. package/dist/rules/malware/scoring/index.d.ts.map +1 -0
  352. package/dist/rules/malware/scoring/index.js +441 -0
  353. package/dist/rules/malware/scoring/index.js.map +1 -0
  354. package/dist/rules/malware/types/index.d.ts +616 -0
  355. package/dist/rules/malware/types/index.d.ts.map +1 -0
  356. package/dist/rules/malware/types/index.js +155 -0
  357. package/dist/rules/malware/types/index.js.map +1 -0
  358. package/dist/rules/malware/utils/index.d.ts +117 -0
  359. package/dist/rules/malware/utils/index.d.ts.map +1 -0
  360. package/dist/rules/malware/utils/index.js +514 -0
  361. package/dist/rules/malware/utils/index.js.map +1 -0
  362. package/dist/rules/standards.d.ts +26 -0
  363. package/dist/rules/standards.d.ts.map +1 -0
  364. package/dist/rules/standards.js +352 -0
  365. package/dist/rules/standards.js.map +1 -0
  366. package/dist/rules/vulnerabilities/constants/index.d.ts +835 -0
  367. package/dist/rules/vulnerabilities/constants/index.d.ts.map +1 -0
  368. package/dist/rules/vulnerabilities/constants/index.js +544 -0
  369. package/dist/rules/vulnerabilities/constants/index.js.map +1 -0
  370. package/dist/rules/vulnerabilities/engine/index.d.ts +145 -0
  371. package/dist/rules/vulnerabilities/engine/index.d.ts.map +1 -0
  372. package/dist/rules/vulnerabilities/engine/index.js +581 -0
  373. package/dist/rules/vulnerabilities/engine/index.js.map +1 -0
  374. package/dist/rules/vulnerabilities/index.d.ts +148 -0
  375. package/dist/rules/vulnerabilities/index.d.ts.map +1 -0
  376. package/dist/rules/vulnerabilities/index.js +252 -0
  377. package/dist/rules/vulnerabilities/index.js.map +1 -0
  378. package/dist/rules/vulnerabilities/rules/authentication.d.ts +8 -0
  379. package/dist/rules/vulnerabilities/rules/authentication.d.ts.map +1 -0
  380. package/dist/rules/vulnerabilities/rules/authentication.js +419 -0
  381. package/dist/rules/vulnerabilities/rules/authentication.js.map +1 -0
  382. package/dist/rules/vulnerabilities/rules/commandInjection.d.ts +8 -0
  383. package/dist/rules/vulnerabilities/rules/commandInjection.d.ts.map +1 -0
  384. package/dist/rules/vulnerabilities/rules/commandInjection.js +300 -0
  385. package/dist/rules/vulnerabilities/rules/commandInjection.js.map +1 -0
  386. package/dist/rules/vulnerabilities/rules/csrf.d.ts +8 -0
  387. package/dist/rules/vulnerabilities/rules/csrf.d.ts.map +1 -0
  388. package/dist/rules/vulnerabilities/rules/csrf.js +261 -0
  389. package/dist/rules/vulnerabilities/rules/csrf.js.map +1 -0
  390. package/dist/rules/vulnerabilities/rules/deserialization.d.ts +8 -0
  391. package/dist/rules/vulnerabilities/rules/deserialization.d.ts.map +1 -0
  392. package/dist/rules/vulnerabilities/rules/deserialization.js +336 -0
  393. package/dist/rules/vulnerabilities/rules/deserialization.js.map +1 -0
  394. package/dist/rules/vulnerabilities/rules/fileUpload.d.ts +8 -0
  395. package/dist/rules/vulnerabilities/rules/fileUpload.d.ts.map +1 -0
  396. package/dist/rules/vulnerabilities/rules/fileUpload.js +325 -0
  397. package/dist/rules/vulnerabilities/rules/fileUpload.js.map +1 -0
  398. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.d.ts +8 -0
  399. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.d.ts.map +1 -0
  400. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.js +446 -0
  401. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.js.map +1 -0
  402. package/dist/rules/vulnerabilities/rules/index.d.ts +17 -0
  403. package/dist/rules/vulnerabilities/rules/index.d.ts.map +1 -0
  404. package/dist/rules/vulnerabilities/rules/index.js +47 -0
  405. package/dist/rules/vulnerabilities/rules/index.js.map +1 -0
  406. package/dist/rules/vulnerabilities/rules/pathTraversal.d.ts +8 -0
  407. package/dist/rules/vulnerabilities/rules/pathTraversal.d.ts.map +1 -0
  408. package/dist/rules/vulnerabilities/rules/pathTraversal.js +351 -0
  409. package/dist/rules/vulnerabilities/rules/pathTraversal.js.map +1 -0
  410. package/dist/rules/vulnerabilities/rules/prototypePollution.d.ts +8 -0
  411. package/dist/rules/vulnerabilities/rules/prototypePollution.d.ts.map +1 -0
  412. package/dist/rules/vulnerabilities/rules/prototypePollution.js +272 -0
  413. package/dist/rules/vulnerabilities/rules/prototypePollution.js.map +1 -0
  414. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.d.ts +8 -0
  415. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.d.ts.map +1 -0
  416. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.js +438 -0
  417. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.js.map +1 -0
  418. package/dist/rules/vulnerabilities/rules/sqlInjection.d.ts +12 -0
  419. package/dist/rules/vulnerabilities/rules/sqlInjection.d.ts.map +1 -0
  420. package/dist/rules/vulnerabilities/rules/sqlInjection.js +636 -0
  421. package/dist/rules/vulnerabilities/rules/sqlInjection.js.map +1 -0
  422. package/dist/rules/vulnerabilities/rules/ssrf.d.ts +8 -0
  423. package/dist/rules/vulnerabilities/rules/ssrf.d.ts.map +1 -0
  424. package/dist/rules/vulnerabilities/rules/ssrf.js +401 -0
  425. package/dist/rules/vulnerabilities/rules/ssrf.js.map +1 -0
  426. package/dist/rules/vulnerabilities/rules/xss.d.ts +11 -0
  427. package/dist/rules/vulnerabilities/rules/xss.d.ts.map +1 -0
  428. package/dist/rules/vulnerabilities/rules/xss.js +724 -0
  429. package/dist/rules/vulnerabilities/rules/xss.js.map +1 -0
  430. package/dist/rules/vulnerabilities/scoring/index.d.ts +80 -0
  431. package/dist/rules/vulnerabilities/scoring/index.d.ts.map +1 -0
  432. package/dist/rules/vulnerabilities/scoring/index.js +414 -0
  433. package/dist/rules/vulnerabilities/scoring/index.js.map +1 -0
  434. package/dist/rules/vulnerabilities/types/index.d.ts +830 -0
  435. package/dist/rules/vulnerabilities/types/index.d.ts.map +1 -0
  436. package/dist/rules/vulnerabilities/types/index.js +164 -0
  437. package/dist/rules/vulnerabilities/types/index.js.map +1 -0
  438. package/dist/rules/vulnerabilities/utils/index.d.ts +206 -0
  439. package/dist/rules/vulnerabilities/utils/index.d.ts.map +1 -0
  440. package/dist/rules/vulnerabilities/utils/index.js +615 -0
  441. package/dist/rules/vulnerabilities/utils/index.js.map +1 -0
  442. package/dist/types/index.d.ts +359 -0
  443. package/dist/types/index.d.ts.map +1 -0
  444. package/dist/types/index.js +61 -0
  445. package/dist/types/index.js.map +1 -0
  446. package/dist/utils/index.d.ts +82 -0
  447. package/dist/utils/index.d.ts.map +1 -0
  448. package/dist/utils/index.js +326 -0
  449. package/dist/utils/index.js.map +1 -0
  450. package/dist/utils/logger.d.ts +40 -0
  451. package/dist/utils/logger.d.ts.map +1 -0
  452. package/dist/utils/logger.js +139 -0
  453. package/dist/utils/logger.js.map +1 -0
  454. package/docs/ARCHITECTURE.md +320 -0
  455. package/docs/V1.2.1-IA_Performances.md +116 -0
  456. package/docs/images/WIN_Defender.png +0 -0
  457. package/package.json +68 -0
  458. package/secure-scan.config.json +134 -0
  459. package/secure-scan.sln +29 -0
  460. package/src/ai/aiAnalyzer.ts +714 -0
  461. package/src/ai/index.ts +5 -0
  462. package/src/analyzers/base/baseAnalyzer.ts +66 -0
  463. package/src/analyzers/base/index.ts +5 -0
  464. package/src/analyzers/c-cpp/cppAnalyzer.ts +308 -0
  465. package/src/analyzers/c-cpp/index.ts +5 -0
  466. package/src/analyzers/core/engine/index.ts +5 -0
  467. package/src/analyzers/core/engine/ruleEngine.ts +221 -0
  468. package/src/analyzers/core/index.ts +8 -0
  469. package/src/analyzers/core/scanner/fileScanner.ts +204 -0
  470. package/src/analyzers/core/scanner/index.ts +5 -0
  471. package/src/analyzers/core/scoring/index.ts +5 -0
  472. package/src/analyzers/core/scoring/riskScoring.ts +198 -0
  473. package/src/analyzers/core/securityScanner.ts +321 -0
  474. package/src/analyzers/csharp/csharpAnalyzer.ts +328 -0
  475. package/src/analyzers/csharp/index.ts +5 -0
  476. package/src/analyzers/iac/iacAnalyzer.ts +318 -0
  477. package/src/analyzers/iac/index.ts +5 -0
  478. package/src/analyzers/index.ts +67 -0
  479. package/src/analyzers/java/index.ts +5 -0
  480. package/src/analyzers/java/javaAnalyzer.ts +320 -0
  481. package/src/analyzers/javascript/PROMPT_JS_ANALYZER.md +267 -0
  482. package/src/analyzers/javascript/astUtils.ts +789 -0
  483. package/src/analyzers/javascript/index.ts +50 -0
  484. package/src/analyzers/javascript/javascriptAnalyzer.ts +984 -0
  485. package/src/analyzers/javascript/malwareDetector.ts +697 -0
  486. package/src/analyzers/javascript/packageJsonAnalyzer.ts +626 -0
  487. package/src/analyzers/javascript/taintAnalyzer.ts +630 -0
  488. package/src/analyzers/php/index.ts +5 -0
  489. package/src/analyzers/php/phpAnalyzer.ts +280 -0
  490. package/src/analyzers/python/index.ts +5 -0
  491. package/src/analyzers/python/pythonAnalyzer.ts +319 -0
  492. package/src/cli/index.ts +276 -0
  493. package/src/dependencies/aiDependencyAnalyzer.ts +496 -0
  494. package/src/dependencies/database/cveDatabase.ts +426 -0
  495. package/src/dependencies/database/index.ts +6 -0
  496. package/src/dependencies/database/maliciousPackages.ts +286 -0
  497. package/src/dependencies/dependencyAnalyzer.ts +394 -0
  498. package/src/dependencies/detectors/index.ts +7 -0
  499. package/src/dependencies/detectors/securityStandards.ts +200 -0
  500. package/src/dependencies/detectors/vulnerabilityDetector.ts +343 -0
  501. package/src/dependencies/index.ts +27 -0
  502. package/src/dependencies/installed/index.ts +8 -0
  503. package/src/dependencies/installed/installedScanner.ts +821 -0
  504. package/src/dependencies/installed/malwarePatterns.ts +492 -0
  505. package/src/dependencies/installed/types.ts +287 -0
  506. package/src/dependencies/parsers/base/baseParser.ts +108 -0
  507. package/src/dependencies/parsers/base/index.ts +6 -0
  508. package/src/dependencies/parsers/cpp/cppParser.ts +245 -0
  509. package/src/dependencies/parsers/cpp/index.ts +6 -0
  510. package/src/dependencies/parsers/csharp/csharpParser.ts +151 -0
  511. package/src/dependencies/parsers/csharp/index.ts +6 -0
  512. package/src/dependencies/parsers/index.ts +56 -0
  513. package/src/dependencies/parsers/java/index.ts +6 -0
  514. package/src/dependencies/parsers/java/javaParser.ts +203 -0
  515. package/src/dependencies/parsers/javascript/index.ts +6 -0
  516. package/src/dependencies/parsers/javascript/javascriptParser.ts +362 -0
  517. package/src/dependencies/parsers/php/index.ts +6 -0
  518. package/src/dependencies/parsers/php/phpParser.ts +208 -0
  519. package/src/dependencies/parsers/python/index.ts +6 -0
  520. package/src/dependencies/parsers/python/pythonParser.ts +437 -0
  521. package/src/dependencies/types.ts +330 -0
  522. package/src/i18n/index.ts +1 -0
  523. package/src/i18n/translations.ts +194 -0
  524. package/src/index.ts +16 -0
  525. package/src/reports/dependencyReportGenerator.ts +717 -0
  526. package/src/reports/htmlReportGenerator.ts +781 -0
  527. package/src/reports/index.ts +7 -0
  528. package/src/reports/installedDepsReportGenerator.ts +899 -0
  529. package/src/rules/index.ts +58 -0
  530. package/src/rules/malware/INFO.md +287 -0
  531. package/src/rules/malware/categories/backdoors.ts +174 -0
  532. package/src/rules/malware/categories/cryptominers.ts +434 -0
  533. package/src/rules/malware/categories/exfiltration.ts +677 -0
  534. package/src/rules/malware/categories/keyloggers.ts +780 -0
  535. package/src/rules/malware/categories/loaders.ts +721 -0
  536. package/src/rules/malware/categories/network.ts +639 -0
  537. package/src/rules/malware/categories/obfuscation.ts +788 -0
  538. package/src/rules/malware/constants/index.ts +358 -0
  539. package/src/rules/malware/engine/index.ts +758 -0
  540. package/src/rules/malware/index.ts +928 -0
  541. package/src/rules/malware/scoring/index.ts +549 -0
  542. package/src/rules/malware/types/index.ts +752 -0
  543. package/src/rules/malware/utils/index.ts +643 -0
  544. package/src/rules/standards.ts +372 -0
  545. package/src/rules/vulnerabilities/PROMPT_VULNERABILITIES.md +226 -0
  546. package/src/rules/vulnerabilities/constants/index.ts +625 -0
  547. package/src/rules/vulnerabilities/engine/index.ts +831 -0
  548. package/src/rules/vulnerabilities/index.ts +312 -0
  549. package/src/rules/vulnerabilities/rules/authentication.ts +426 -0
  550. package/src/rules/vulnerabilities/rules/commandInjection.ts +307 -0
  551. package/src/rules/vulnerabilities/rules/csrf.ts +268 -0
  552. package/src/rules/vulnerabilities/rules/deserialization.ts +343 -0
  553. package/src/rules/vulnerabilities/rules/fileUpload.ts +332 -0
  554. package/src/rules/vulnerabilities/rules/hardcodedSecrets.ts +453 -0
  555. package/src/rules/vulnerabilities/rules/index.ts +17 -0
  556. package/src/rules/vulnerabilities/rules/pathTraversal.ts +358 -0
  557. package/src/rules/vulnerabilities/rules/prototypePollution.ts +279 -0
  558. package/src/rules/vulnerabilities/rules/securityMisconfiguration.ts +445 -0
  559. package/src/rules/vulnerabilities/rules/sqlInjection.ts +669 -0
  560. package/src/rules/vulnerabilities/rules/ssrf.ts +408 -0
  561. package/src/rules/vulnerabilities/rules/xss.ts +753 -0
  562. package/src/rules/vulnerabilities/scoring/index.ts +543 -0
  563. package/src/rules/vulnerabilities/types/index.ts +1004 -0
  564. package/src/rules/vulnerabilities/utils/index.ts +709 -0
  565. package/src/types/index.ts +391 -0
  566. package/src/utils/index.ts +306 -0
  567. package/src/utils/logger.ts +150 -0
  568. package/test-installed-scanner.ts +136 -0
  569. package/tsconfig.json +30 -0
@@ -0,0 +1,766 @@
1
+ "use strict";
2
+ /**
3
+ * @fileoverview Obfuscation and Evasion Detection Rules
4
+ * @module rules/malware/categories/obfuscation
5
+ *
6
+ * Comprehensive rules for detecting obfuscated code including:
7
+ * - Base64 + eval patterns
8
+ * - String splitting obfuscation
9
+ * - Hex/Unicode encoding
10
+ * - Packer detection
11
+ * - Anti-debugging techniques
12
+ * - Dead code insertion
13
+ */
14
+ Object.defineProperty(exports, "__esModule", { value: true });
15
+ exports.obfuscationRules = exports.deadCodeRules = exports.antiDebuggingRules = exports.packerDetectionRules = exports.hexUnicodeRules = exports.stringObfuscationRules = exports.base64ObfuscationRules = void 0;
16
+ const types_1 = require("../types");
17
+ // ============================================================================
18
+ // BASE64 OBFUSCATION RULES
19
+ // ============================================================================
20
+ exports.base64ObfuscationRules = [
21
+ {
22
+ id: 'MAL-OBF-001',
23
+ name: 'Obfuscation - Base64 Encoded Eval',
24
+ description: 'Detects base64-encoded strings passed to eval or similar execution functions.',
25
+ version: '2.0.0',
26
+ threatType: types_1.MalwareThreatType.OBFUSCATED_CODE,
27
+ category: types_1.MalwareCategory.OBFUSCATION,
28
+ languages: [
29
+ types_1.SupportedLanguage.JAVASCRIPT,
30
+ types_1.SupportedLanguage.TYPESCRIPT,
31
+ types_1.SupportedLanguage.PYTHON,
32
+ types_1.SupportedLanguage.PHP
33
+ ],
34
+ severity: types_1.MalwareSeverity.HIGH,
35
+ confidence: types_1.ConfidenceLevel.HIGH,
36
+ baseScore: 80,
37
+ patterns: [
38
+ {
39
+ type: types_1.PatternType.REGEX,
40
+ patternId: 'js-atob-eval',
41
+ pattern: 'eval\\s*\\(\\s*atob\\s*\\([\'"][A-Za-z0-9+/=]{20,}[\'"]\\s*\\)',
42
+ flags: 'gi',
43
+ weight: 1.0,
44
+ description: 'JavaScript atob + eval'
45
+ },
46
+ {
47
+ type: types_1.PatternType.REGEX,
48
+ patternId: 'buffer-from-eval',
49
+ pattern: 'eval\\s*\\(\\s*Buffer\\.from\\s*\\([\'"][A-Za-z0-9+/=]{20,}[\'"]\\s*,\\s*[\'"]base64[\'"]',
50
+ flags: 'gi',
51
+ weight: 1.0,
52
+ description: 'Node.js Buffer.from base64 + eval'
53
+ },
54
+ {
55
+ type: types_1.PatternType.REGEX,
56
+ patternId: 'php-base64-eval',
57
+ pattern: 'eval\\s*\\(\\s*base64_decode\\s*\\([\'"][A-Za-z0-9+/=]{20,}[\'"]',
58
+ flags: 'gi',
59
+ weight: 1.0,
60
+ description: 'PHP base64_decode + eval'
61
+ },
62
+ {
63
+ type: types_1.PatternType.REGEX,
64
+ patternId: 'python-b64-exec',
65
+ pattern: 'exec\\s*\\(\\s*base64\\.(?:b64decode|decodebytes)\\s*\\([\'"][A-Za-z0-9+/=]{20,}',
66
+ flags: 'gi',
67
+ weight: 1.0,
68
+ description: 'Python base64 decode + exec'
69
+ },
70
+ {
71
+ type: types_1.PatternType.REGEX,
72
+ patternId: 'function-constructor-b64',
73
+ pattern: 'Function\\s*\\(\\s*atob\\s*\\([\'"][A-Za-z0-9+/=]{20,}',
74
+ flags: 'gi',
75
+ weight: 1.0,
76
+ description: 'Function constructor with base64'
77
+ }
78
+ ],
79
+ amplifyingPatterns: [
80
+ {
81
+ type: types_1.PatternType.REGEX,
82
+ patternId: 'long-b64-string',
83
+ pattern: '[\'"][A-Za-z0-9+/=]{100,}[\'"]',
84
+ flags: 'g',
85
+ weight: 0.3,
86
+ description: 'Long base64 string present'
87
+ }
88
+ ],
89
+ maliciousExamples: [
90
+ {
91
+ code: `eval(atob("dmFyIHg9ZG9jdW1lbnQuY29va2llOw=="));`,
92
+ language: types_1.SupportedLanguage.JAVASCRIPT,
93
+ isMalicious: true,
94
+ description: 'Base64 encoded eval payload'
95
+ },
96
+ {
97
+ code: `<?php eval(base64_decode("c3lzdGVtKCRfR0VUWydjbWQnXSk7")); ?>`,
98
+ language: types_1.SupportedLanguage.PHP,
99
+ isMalicious: true,
100
+ description: 'PHP base64 web shell'
101
+ }
102
+ ],
103
+ impact: {
104
+ technical: 'Hides malicious code using base64 encoding.',
105
+ business: 'Code obfuscation to evade detection.',
106
+ affectedAssets: ['Application code'],
107
+ dataAtRisk: ['Depends on hidden payload']
108
+ },
109
+ remediation: {
110
+ summary: 'Decode and analyze the base64 payload. Remove if malicious.',
111
+ steps: [
112
+ 'Decode the base64 string (safely, without execution)',
113
+ 'Analyze the decoded content for malicious patterns',
114
+ 'Remove the obfuscated code',
115
+ 'Implement code review processes'
116
+ ]
117
+ },
118
+ mitreAttack: [
119
+ {
120
+ tacticId: types_1.MitreTactic.DEFENSE_EVASION,
121
+ tacticName: 'Defense Evasion',
122
+ techniqueId: 'T1027',
123
+ techniqueName: 'Obfuscated Files or Information',
124
+ url: 'https://attack.mitre.org/techniques/T1027/'
125
+ },
126
+ {
127
+ tacticId: types_1.MitreTactic.DEFENSE_EVASION,
128
+ tacticName: 'Defense Evasion',
129
+ techniqueId: 'T1140',
130
+ techniqueName: 'Deobfuscate/Decode Files or Information',
131
+ url: 'https://attack.mitre.org/techniques/T1140/'
132
+ }
133
+ ],
134
+ tags: ['obfuscation', 'base64', 'eval', 'evasion'],
135
+ enabled: true
136
+ },
137
+ {
138
+ id: 'MAL-OBF-002',
139
+ name: 'Obfuscation - Multiple Encoding Layers',
140
+ description: 'Detects multiple layers of encoding (base64, gzip, rot13, etc.).',
141
+ version: '2.0.0',
142
+ threatType: types_1.MalwareThreatType.OBFUSCATED_CODE,
143
+ category: types_1.MalwareCategory.OBFUSCATION,
144
+ languages: [types_1.SupportedLanguage.PHP, types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.PYTHON],
145
+ severity: types_1.MalwareSeverity.HIGH,
146
+ confidence: types_1.ConfidenceLevel.HIGH,
147
+ baseScore: 85,
148
+ patterns: [
149
+ {
150
+ type: types_1.PatternType.REGEX,
151
+ patternId: 'php-multi-decode',
152
+ pattern: '(?:gzinflate|gzuncompress|str_rot13|base64_decode)\\s*\\(\\s*(?:gzinflate|gzuncompress|str_rot13|base64_decode)',
153
+ flags: 'gi',
154
+ weight: 1.0,
155
+ description: 'PHP nested decoding functions'
156
+ },
157
+ {
158
+ type: types_1.PatternType.REGEX,
159
+ patternId: 'js-multi-decode',
160
+ pattern: 'atob\\s*\\([^)]*atob\\s*\\(',
161
+ flags: 'gi',
162
+ weight: 1.0,
163
+ description: 'Nested atob calls'
164
+ },
165
+ {
166
+ type: types_1.PatternType.REGEX,
167
+ patternId: 'eval-chain',
168
+ pattern: 'eval\\s*\\([^)]*eval\\s*\\(',
169
+ flags: 'gi',
170
+ weight: 1.0,
171
+ description: 'Nested eval calls'
172
+ }
173
+ ],
174
+ maliciousExamples: [
175
+ {
176
+ code: `<?php eval(gzinflate(base64_decode(str_rot13($payload)))); ?>`,
177
+ language: types_1.SupportedLanguage.PHP,
178
+ isMalicious: true,
179
+ description: 'Triple-encoded PHP payload'
180
+ }
181
+ ],
182
+ impact: {
183
+ technical: 'Multiple encoding layers to evade static analysis.',
184
+ business: 'Advanced evasion indicating sophisticated attack.',
185
+ affectedAssets: ['Application code'],
186
+ dataAtRisk: ['Depends on payload']
187
+ },
188
+ remediation: {
189
+ summary: 'Decode all layers and analyze the final payload.',
190
+ steps: [
191
+ 'Recursively decode all layers',
192
+ 'Analyze final payload',
193
+ 'Remove malicious code',
194
+ 'Investigate how it was introduced'
195
+ ]
196
+ },
197
+ tags: ['obfuscation', 'multi-layer', 'encoding', 'evasion'],
198
+ enabled: true
199
+ }
200
+ ];
201
+ // ============================================================================
202
+ // STRING OBFUSCATION RULES
203
+ // ============================================================================
204
+ exports.stringObfuscationRules = [
205
+ {
206
+ id: 'MAL-OBF-010',
207
+ name: 'Obfuscation - String Concatenation',
208
+ description: 'Detects obfuscation using string concatenation to hide keywords.',
209
+ version: '2.0.0',
210
+ threatType: types_1.MalwareThreatType.OBFUSCATED_CODE,
211
+ category: types_1.MalwareCategory.OBFUSCATION,
212
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
213
+ severity: types_1.MalwareSeverity.MEDIUM,
214
+ confidence: types_1.ConfidenceLevel.MEDIUM,
215
+ baseScore: 60,
216
+ patterns: [
217
+ {
218
+ type: types_1.PatternType.REGEX,
219
+ patternId: 'char-concat',
220
+ pattern: '([\'"]\\w[\'"]\\s*\\+\\s*){4,}[\'"]\\w[\'"]',
221
+ flags: 'gi',
222
+ weight: 0.8,
223
+ description: 'Character-by-character concatenation'
224
+ },
225
+ {
226
+ type: types_1.PatternType.REGEX,
227
+ patternId: 'eval-concat',
228
+ pattern: '[\'"]e[\'"]\\s*\\+\\s*[\'"]v[\'"]\\s*\\+\\s*[\'"]a[\'"]\\s*\\+\\s*[\'"]l[\'"]',
229
+ flags: 'gi',
230
+ weight: 1.0,
231
+ description: 'eval string concatenation'
232
+ },
233
+ {
234
+ type: types_1.PatternType.REGEX,
235
+ patternId: 'window-concat',
236
+ pattern: '[\'"]w[\'"]\\s*\\+\\s*[\'"]i[\'"]\\s*\\+\\s*[\'"]n[\'"]\\s*\\+\\s*[\'"]d[\'"]\\s*\\+\\s*[\'"]o[\'"]\\s*\\+\\s*[\'"]w[\'"]',
237
+ flags: 'gi',
238
+ weight: 0.9,
239
+ description: 'window string concatenation'
240
+ }
241
+ ],
242
+ maliciousExamples: [
243
+ {
244
+ code: `var fn = 'e' + 'v' + 'a' + 'l';
245
+ window[fn]('malicious code');`,
246
+ language: types_1.SupportedLanguage.JAVASCRIPT,
247
+ isMalicious: true,
248
+ description: 'Eval obfuscation via string splitting'
249
+ }
250
+ ],
251
+ impact: {
252
+ technical: 'String splitting to hide dangerous function names.',
253
+ business: 'Evasion technique to bypass static analysis.',
254
+ affectedAssets: ['Application code'],
255
+ dataAtRisk: ['Depends on hidden functionality']
256
+ },
257
+ remediation: {
258
+ summary: 'Normalize string concatenations and analyze the result.',
259
+ steps: [
260
+ 'Reconstruct the concatenated strings',
261
+ 'Identify the actual function being called',
262
+ 'Remove if malicious'
263
+ ]
264
+ },
265
+ tags: ['obfuscation', 'string-splitting', 'concatenation'],
266
+ enabled: true
267
+ },
268
+ {
269
+ id: 'MAL-OBF-011',
270
+ name: 'Obfuscation - String.fromCharCode',
271
+ description: 'Detects obfuscation using String.fromCharCode to construct strings.',
272
+ version: '2.0.0',
273
+ threatType: types_1.MalwareThreatType.OBFUSCATED_CODE,
274
+ category: types_1.MalwareCategory.OBFUSCATION,
275
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
276
+ severity: types_1.MalwareSeverity.HIGH,
277
+ confidence: types_1.ConfidenceLevel.HIGH,
278
+ baseScore: 75,
279
+ patterns: [
280
+ {
281
+ type: types_1.PatternType.REGEX,
282
+ patternId: 'fromcharcode-long',
283
+ pattern: 'String\\.fromCharCode\\s*\\([^)]{50,}\\)',
284
+ flags: 'gi',
285
+ weight: 1.0,
286
+ description: 'Long fromCharCode sequence'
287
+ },
288
+ {
289
+ type: types_1.PatternType.REGEX,
290
+ patternId: 'fromcharcode-eval',
291
+ pattern: 'eval\\s*\\([^)]*String\\.fromCharCode',
292
+ flags: 'gis',
293
+ weight: 1.0,
294
+ description: 'fromCharCode + eval'
295
+ },
296
+ {
297
+ type: types_1.PatternType.REGEX,
298
+ patternId: 'charcodeat-reverse',
299
+ pattern: '\\.charCodeAt\\s*\\([^)]*\\)[\\s\\S]*?String\\.fromCharCode',
300
+ flags: 'gis',
301
+ weight: 0.8,
302
+ description: 'charCodeAt encoding pattern'
303
+ }
304
+ ],
305
+ maliciousExamples: [
306
+ {
307
+ code: `eval(String.fromCharCode(100,111,99,117,109,101,110,116,46,99,111,111,107,105,101));`,
308
+ language: types_1.SupportedLanguage.JAVASCRIPT,
309
+ isMalicious: true,
310
+ description: 'CharCode obfuscated eval'
311
+ }
312
+ ],
313
+ impact: {
314
+ technical: 'Character code encoding to hide string literals.',
315
+ business: 'Advanced obfuscation indicating malicious intent.',
316
+ affectedAssets: ['Application code'],
317
+ dataAtRisk: ['Depends on decoded content']
318
+ },
319
+ remediation: {
320
+ summary: 'Decode character codes and analyze the resulting string.',
321
+ steps: [
322
+ 'Convert character codes back to strings',
323
+ 'Analyze the decoded content',
324
+ 'Remove if malicious'
325
+ ]
326
+ },
327
+ tags: ['obfuscation', 'fromcharcode', 'encoding'],
328
+ enabled: true
329
+ }
330
+ ];
331
+ // ============================================================================
332
+ // HEX/UNICODE OBFUSCATION RULES
333
+ // ============================================================================
334
+ exports.hexUnicodeRules = [
335
+ {
336
+ id: 'MAL-OBF-020',
337
+ name: 'Obfuscation - Heavy Hex/Unicode Encoding',
338
+ description: 'Detects excessive use of hex or unicode escape sequences indicating obfuscation.',
339
+ version: '2.0.0',
340
+ threatType: types_1.MalwareThreatType.OBFUSCATED_CODE,
341
+ category: types_1.MalwareCategory.OBFUSCATION,
342
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT, types_1.SupportedLanguage.PYTHON],
343
+ severity: types_1.MalwareSeverity.HIGH,
344
+ confidence: types_1.ConfidenceLevel.HIGH,
345
+ baseScore: 78,
346
+ patterns: [
347
+ {
348
+ type: types_1.PatternType.REGEX,
349
+ patternId: 'heavy-hex-escapes',
350
+ pattern: '(?:\\\\x[0-9a-fA-F]{2}){20,}',
351
+ flags: 'g',
352
+ weight: 1.0,
353
+ description: 'Long sequence of hex escapes'
354
+ },
355
+ {
356
+ type: types_1.PatternType.REGEX,
357
+ patternId: 'heavy-unicode-escapes',
358
+ pattern: '(?:\\\\u[0-9a-fA-F]{4}){15,}',
359
+ flags: 'g',
360
+ weight: 1.0,
361
+ description: 'Long sequence of unicode escapes'
362
+ },
363
+ {
364
+ type: types_1.PatternType.REGEX,
365
+ patternId: 'hex-eval',
366
+ pattern: 'eval\\s*\\([^)]*\\\\x',
367
+ flags: 'gi',
368
+ weight: 1.0,
369
+ description: 'Hex escapes with eval'
370
+ }
371
+ ],
372
+ amplifyingPatterns: [
373
+ {
374
+ type: types_1.PatternType.HEURISTIC,
375
+ patternId: 'high-entropy',
376
+ heuristicName: 'calculateEntropy',
377
+ threshold: 6.5,
378
+ weight: 0.5,
379
+ description: 'High entropy content'
380
+ }
381
+ ],
382
+ maliciousExamples: [
383
+ {
384
+ code: `eval("\\x64\\x6f\\x63\\x75\\x6d\\x65\\x6e\\x74\\x2e\\x63\\x6f\\x6f\\x6b\\x69\\x65");`,
385
+ language: types_1.SupportedLanguage.JAVASCRIPT,
386
+ isMalicious: true,
387
+ description: 'Hex-encoded eval payload'
388
+ }
389
+ ],
390
+ impact: {
391
+ technical: 'Hex/Unicode encoding to evade pattern matching.',
392
+ business: 'Obfuscation technique for malware delivery.',
393
+ affectedAssets: ['Application code'],
394
+ dataAtRisk: ['Depends on decoded payload']
395
+ },
396
+ remediation: {
397
+ summary: 'Decode escape sequences and analyze the result.',
398
+ steps: [
399
+ 'Decode all escape sequences',
400
+ 'Analyze decoded content',
401
+ 'Remove if malicious'
402
+ ]
403
+ },
404
+ tags: ['obfuscation', 'hex', 'unicode', 'encoding'],
405
+ enabled: true
406
+ }
407
+ ];
408
+ // ============================================================================
409
+ // PACKER DETECTION RULES
410
+ // ============================================================================
411
+ exports.packerDetectionRules = [
412
+ {
413
+ id: 'MAL-OBF-030',
414
+ name: 'Obfuscation - JavaScript Packer',
415
+ description: 'Detects code packed with common JavaScript packers (Dean Edwards, etc.).',
416
+ version: '2.0.0',
417
+ threatType: types_1.MalwareThreatType.OBFUSCATED_CODE,
418
+ category: types_1.MalwareCategory.OBFUSCATION,
419
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
420
+ severity: types_1.MalwareSeverity.HIGH,
421
+ confidence: types_1.ConfidenceLevel.CONFIRMED,
422
+ baseScore: 82,
423
+ patterns: [
424
+ {
425
+ type: types_1.PatternType.REGEX,
426
+ patternId: 'dean-edwards-packer',
427
+ pattern: 'eval\\s*\\(\\s*function\\s*\\(\\s*p\\s*,\\s*a\\s*,\\s*c\\s*,\\s*k\\s*,\\s*e\\s*,\\s*[dr]\\s*\\)',
428
+ flags: 'gi',
429
+ weight: 1.0,
430
+ description: 'Dean Edwards packer signature'
431
+ },
432
+ {
433
+ type: types_1.PatternType.REGEX,
434
+ patternId: 'packed-split',
435
+ pattern: '\\.split\\s*\\([\'"]\\|[\'"]\\)\\s*,\\s*0\\s*,\\s*\\{\\s*\\}',
436
+ flags: 'gi',
437
+ weight: 0.9,
438
+ description: 'Packer split pattern'
439
+ },
440
+ {
441
+ type: types_1.PatternType.REGEX,
442
+ patternId: 'base62-dictionary',
443
+ pattern: 'while\\s*\\([^)]*--\\s*\\)[^{]*\\{[^}]*\\[[^\\]]*\\]\\s*=',
444
+ flags: 'gis',
445
+ weight: 0.7,
446
+ description: 'Base62 dictionary unpacking'
447
+ }
448
+ ],
449
+ maliciousExamples: [
450
+ {
451
+ code: `eval(function(p,a,c,k,e,d){e=function(c){return c};if(!''.replace(/^/,String)){while(c--){d[c]=k[c]||c}k=[function(e){return d[e]}];e=function(){return'\\\\w+'};c=1};while(c--){if(k[c]){p=p.replace(new RegExp('\\\\b'+e(c)+'\\\\b','g'),k[c])}}return p}('0.1(2.3)',4,4,'document|write|alert|cookie'.split('|'),0,{}))`,
452
+ language: types_1.SupportedLanguage.JAVASCRIPT,
453
+ isMalicious: true,
454
+ description: 'Packed JavaScript code'
455
+ }
456
+ ],
457
+ impact: {
458
+ technical: 'Code compression and obfuscation using packer tools.',
459
+ business: 'Hides malicious functionality from analysis.',
460
+ affectedAssets: ['Application code'],
461
+ dataAtRisk: ['Depends on unpacked payload']
462
+ },
463
+ remediation: {
464
+ summary: 'Unpack the code and analyze the original source.',
465
+ steps: [
466
+ 'Use unpacking tools to restore original code',
467
+ 'Analyze unpacked content for malicious patterns',
468
+ 'Remove packed code',
469
+ 'Investigate source of packed file'
470
+ ]
471
+ },
472
+ tags: ['obfuscation', 'packer', 'compression', 'evasion'],
473
+ enabled: true
474
+ },
475
+ {
476
+ id: 'MAL-OBF-031',
477
+ name: 'Obfuscation - Obfuscator.io Patterns',
478
+ description: 'Detects code obfuscated with obfuscator.io or similar tools.',
479
+ version: '2.0.0',
480
+ threatType: types_1.MalwareThreatType.OBFUSCATED_CODE,
481
+ category: types_1.MalwareCategory.OBFUSCATION,
482
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
483
+ severity: types_1.MalwareSeverity.MEDIUM,
484
+ confidence: types_1.ConfidenceLevel.HIGH,
485
+ baseScore: 65,
486
+ patterns: [
487
+ {
488
+ type: types_1.PatternType.REGEX,
489
+ patternId: 'obfuscator-vars',
490
+ pattern: '_0x[a-f0-9]{4,}',
491
+ flags: 'gi',
492
+ weight: 0.8,
493
+ description: 'Obfuscator.io variable naming'
494
+ },
495
+ {
496
+ type: types_1.PatternType.REGEX,
497
+ patternId: 'obfuscator-array',
498
+ pattern: 'var\\s+_0x[a-f0-9]+\\s*=\\s*\\[[^\\]]{100,}\\];',
499
+ flags: 'gi',
500
+ weight: 0.9,
501
+ description: 'Obfuscator.io string array'
502
+ },
503
+ {
504
+ type: types_1.PatternType.REGEX,
505
+ patternId: 'obfuscator-shift',
506
+ pattern: '_0x[a-f0-9]+\\s*=\\s*_0x[a-f0-9]+\\s*>>\\s*0x',
507
+ flags: 'gi',
508
+ weight: 0.7,
509
+ description: 'Obfuscator bit shifting'
510
+ }
511
+ ],
512
+ maliciousExamples: [
513
+ {
514
+ code: `var _0x4f2e=['cookie','write'];(function(_0x5b0c3e,_0x4f2e75){var _0x3d7d6e=function(_0x3f8b4d){while(--_0x3f8b4d){_0x5b0c3e['push'](_0x5b0c3e['shift']());}};_0x3d7d6e(++_0x4f2e75);}(_0x4f2e,0x1f4));`,
515
+ language: types_1.SupportedLanguage.JAVASCRIPT,
516
+ isMalicious: true,
517
+ description: 'Obfuscator.io pattern'
518
+ }
519
+ ],
520
+ falsePositivePatterns: [
521
+ {
522
+ type: types_1.PatternType.REGEX,
523
+ patternId: 'webpack-chunk',
524
+ pattern: 'webpackChunk|__webpack_require__',
525
+ flags: 'gi',
526
+ weight: 0.3,
527
+ description: 'Webpack bundled code (not obfuscation)'
528
+ }
529
+ ],
530
+ impact: {
531
+ technical: 'Professional obfuscation tool usage.',
532
+ business: 'Intentional code hiding, requires investigation.',
533
+ affectedAssets: ['Application code'],
534
+ dataAtRisk: ['Depends on hidden functionality']
535
+ },
536
+ remediation: {
537
+ summary: 'Deobfuscate and analyze the original code.',
538
+ steps: [
539
+ 'Use deobfuscation tools',
540
+ 'Analyze original functionality',
541
+ 'Remove if unauthorized or malicious'
542
+ ]
543
+ },
544
+ tags: ['obfuscation', 'obfuscator-io', 'evasion'],
545
+ enabled: true
546
+ }
547
+ ];
548
+ // ============================================================================
549
+ // ANTI-DEBUGGING RULES
550
+ // ============================================================================
551
+ exports.antiDebuggingRules = [
552
+ {
553
+ id: 'MAL-OBF-040',
554
+ name: 'Anti-Debugging - DevTools Detection',
555
+ description: 'Detects code that checks for browser developer tools.',
556
+ version: '2.0.0',
557
+ threatType: types_1.MalwareThreatType.ANTI_DEBUGGING,
558
+ category: types_1.MalwareCategory.EVASION,
559
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
560
+ severity: types_1.MalwareSeverity.MEDIUM,
561
+ confidence: types_1.ConfidenceLevel.MEDIUM,
562
+ baseScore: 55,
563
+ patterns: [
564
+ {
565
+ type: types_1.PatternType.REGEX,
566
+ patternId: 'debugger-statement',
567
+ pattern: '\\bdebugger\\b\\s*;',
568
+ flags: 'gi',
569
+ weight: 0.6,
570
+ description: 'Debugger statement'
571
+ },
572
+ {
573
+ type: types_1.PatternType.REGEX,
574
+ patternId: 'console-detect',
575
+ pattern: 'console\\s*\\.\\s*(?:log|warn|error)\\s*\\.\\s*toString\\s*\\(\\s*\\)',
576
+ flags: 'gi',
577
+ weight: 0.8,
578
+ description: 'Console object manipulation'
579
+ },
580
+ {
581
+ type: types_1.PatternType.REGEX,
582
+ patternId: 'devtools-detect',
583
+ pattern: '(?:devtools|firebug)\\s*\\.|/devtools/detect',
584
+ flags: 'gi',
585
+ weight: 0.9,
586
+ description: 'DevTools detection library'
587
+ },
588
+ {
589
+ type: types_1.PatternType.REGEX,
590
+ patternId: 'performance-timing',
591
+ pattern: 'performance\\.now\\s*\\(\\s*\\)[\\s\\S]{0,50}performance\\.now\\s*\\(\\s*\\)',
592
+ flags: 'gis',
593
+ weight: 0.7,
594
+ description: 'Timing check (debugger detection)'
595
+ }
596
+ ],
597
+ maliciousExamples: [
598
+ {
599
+ code: `setInterval(() => {
600
+ const before = performance.now();
601
+ debugger;
602
+ const after = performance.now();
603
+ if (after - before > 100) {
604
+ // Debugger detected
605
+ window.location = 'about:blank';
606
+ }
607
+ }, 1000);`,
608
+ language: types_1.SupportedLanguage.JAVASCRIPT,
609
+ isMalicious: true,
610
+ description: 'DevTools timing detection'
611
+ }
612
+ ],
613
+ falsePositivePatterns: [
614
+ {
615
+ type: types_1.PatternType.REGEX,
616
+ patternId: 'dev-environment',
617
+ pattern: 'NODE_ENV.*development|process\\.env\\.NODE_ENV',
618
+ flags: 'gi',
619
+ weight: 0.3,
620
+ description: 'Development environment check'
621
+ }
622
+ ],
623
+ impact: {
624
+ technical: 'Attempts to detect and prevent debugging.',
625
+ business: 'Anti-analysis technique indicating malicious intent.',
626
+ affectedAssets: ['Application behavior'],
627
+ dataAtRisk: ['Analysis prevention']
628
+ },
629
+ remediation: {
630
+ summary: 'Remove anti-debugging code and analyze hidden functionality.',
631
+ steps: [
632
+ 'Remove debugger detection code',
633
+ 'Analyze what the code is trying to hide',
634
+ 'Investigate the source'
635
+ ]
636
+ },
637
+ tags: ['anti-debugging', 'evasion', 'devtools'],
638
+ enabled: true
639
+ },
640
+ {
641
+ id: 'MAL-OBF-041',
642
+ name: 'Anti-Debugging - Function Integrity Check',
643
+ description: 'Detects checks for modified or hooked functions.',
644
+ version: '2.0.0',
645
+ threatType: types_1.MalwareThreatType.ANTI_DEBUGGING,
646
+ category: types_1.MalwareCategory.EVASION,
647
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
648
+ severity: types_1.MalwareSeverity.MEDIUM,
649
+ confidence: types_1.ConfidenceLevel.MEDIUM,
650
+ baseScore: 58,
651
+ patterns: [
652
+ {
653
+ type: types_1.PatternType.REGEX,
654
+ patternId: 'tostring-check',
655
+ pattern: '\\.toString\\s*\\(\\s*\\)\\s*\\.(?:indexOf|includes|match)\\s*\\([^)]*(?:native|function)',
656
+ flags: 'gis',
657
+ weight: 0.8,
658
+ description: 'Function.toString integrity check'
659
+ },
660
+ {
661
+ type: types_1.PatternType.REGEX,
662
+ patternId: 'constructor-check',
663
+ pattern: '\\.constructor\\s*\\.\\s*constructor\\s*===',
664
+ flags: 'gi',
665
+ weight: 0.7,
666
+ description: 'Constructor integrity check'
667
+ }
668
+ ],
669
+ maliciousExamples: [
670
+ {
671
+ code: `if (!/native code/.test(XMLHttpRequest.toString())) {
672
+ throw new Error('Function hook detected');
673
+ }`,
674
+ language: types_1.SupportedLanguage.JAVASCRIPT,
675
+ isMalicious: true,
676
+ description: 'Native function integrity check'
677
+ }
678
+ ],
679
+ impact: {
680
+ technical: 'Detects function hooking and instrumentation.',
681
+ business: 'Anti-analysis technique.',
682
+ affectedAssets: ['Runtime environment'],
683
+ dataAtRisk: ['Analysis prevention']
684
+ },
685
+ remediation: {
686
+ summary: 'Remove function integrity checks.',
687
+ steps: [
688
+ 'Remove anti-hook code',
689
+ 'Investigate purpose'
690
+ ]
691
+ },
692
+ tags: ['anti-debugging', 'integrity-check', 'evasion'],
693
+ enabled: true
694
+ }
695
+ ];
696
+ // ============================================================================
697
+ // DEAD CODE INSERTION RULES
698
+ // ============================================================================
699
+ exports.deadCodeRules = [
700
+ {
701
+ id: 'MAL-OBF-050',
702
+ name: 'Obfuscation - Excessive Dead Code',
703
+ description: 'Detects unusual amounts of unreachable or meaningless code.',
704
+ version: '2.0.0',
705
+ threatType: types_1.MalwareThreatType.OBFUSCATED_CODE,
706
+ category: types_1.MalwareCategory.OBFUSCATION,
707
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
708
+ severity: types_1.MalwareSeverity.LOW,
709
+ confidence: types_1.ConfidenceLevel.MEDIUM,
710
+ baseScore: 40,
711
+ patterns: [
712
+ {
713
+ type: types_1.PatternType.REGEX,
714
+ patternId: 'return-dead-code',
715
+ pattern: 'return[^;]+;[\\s\\S]{100,}\\}',
716
+ flags: 'gis',
717
+ weight: 0.5,
718
+ description: 'Code after return statement'
719
+ },
720
+ {
721
+ type: types_1.PatternType.REGEX,
722
+ patternId: 'false-condition',
723
+ pattern: 'if\\s*\\(\\s*(?:false|0)\\s*\\)\\s*\\{[^}]{50,}\\}',
724
+ flags: 'gis',
725
+ weight: 0.6,
726
+ description: 'Always-false condition with code'
727
+ },
728
+ {
729
+ type: types_1.PatternType.HEURISTIC,
730
+ patternId: 'code-complexity',
731
+ heuristicName: 'detectObfuscationLevel',
732
+ threshold: 0.7,
733
+ weight: 0.7,
734
+ description: 'High code complexity'
735
+ }
736
+ ],
737
+ impact: {
738
+ technical: 'Dead code insertion to confuse analysis.',
739
+ business: 'Code bloat and potential hidden functionality.',
740
+ affectedAssets: ['Code quality'],
741
+ dataAtRisk: ['Low risk']
742
+ },
743
+ remediation: {
744
+ summary: 'Remove dead code and analyze remaining functionality.',
745
+ steps: [
746
+ 'Identify and remove unreachable code',
747
+ 'Analyze remaining code for malicious patterns'
748
+ ]
749
+ },
750
+ tags: ['obfuscation', 'dead-code', 'code-quality'],
751
+ enabled: true
752
+ }
753
+ ];
754
+ // ============================================================================
755
+ // EXPORT ALL OBFUSCATION RULES
756
+ // ============================================================================
757
+ exports.obfuscationRules = [
758
+ ...exports.base64ObfuscationRules,
759
+ ...exports.stringObfuscationRules,
760
+ ...exports.hexUnicodeRules,
761
+ ...exports.packerDetectionRules,
762
+ ...exports.antiDebuggingRules,
763
+ ...exports.deadCodeRules
764
+ ];
765
+ exports.default = exports.obfuscationRules;
766
+ //# sourceMappingURL=obfuscation.js.map