secure-scan 1.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (569) hide show
  1. package/README.md +564 -0
  2. package/dist/ai/aiAnalyzer.d.ts +99 -0
  3. package/dist/ai/aiAnalyzer.d.ts.map +1 -0
  4. package/dist/ai/aiAnalyzer.js +669 -0
  5. package/dist/ai/aiAnalyzer.js.map +1 -0
  6. package/dist/ai/index.d.ts +5 -0
  7. package/dist/ai/index.d.ts.map +1 -0
  8. package/dist/ai/index.js +21 -0
  9. package/dist/ai/index.js.map +1 -0
  10. package/dist/analyzers/base/baseAnalyzer.d.ts +44 -0
  11. package/dist/analyzers/base/baseAnalyzer.d.ts.map +1 -0
  12. package/dist/analyzers/base/baseAnalyzer.js +53 -0
  13. package/dist/analyzers/base/baseAnalyzer.js.map +1 -0
  14. package/dist/analyzers/base/index.d.ts +5 -0
  15. package/dist/analyzers/base/index.d.ts.map +1 -0
  16. package/dist/analyzers/base/index.js +21 -0
  17. package/dist/analyzers/base/index.js.map +1 -0
  18. package/dist/analyzers/c-cpp/cppAnalyzer.d.ts +60 -0
  19. package/dist/analyzers/c-cpp/cppAnalyzer.d.ts.map +1 -0
  20. package/dist/analyzers/c-cpp/cppAnalyzer.js +218 -0
  21. package/dist/analyzers/c-cpp/cppAnalyzer.js.map +1 -0
  22. package/dist/analyzers/c-cpp/index.d.ts +5 -0
  23. package/dist/analyzers/c-cpp/index.d.ts.map +1 -0
  24. package/dist/analyzers/c-cpp/index.js +21 -0
  25. package/dist/analyzers/c-cpp/index.js.map +1 -0
  26. package/dist/analyzers/core/engine/index.d.ts +5 -0
  27. package/dist/analyzers/core/engine/index.d.ts.map +1 -0
  28. package/dist/analyzers/core/engine/index.js +21 -0
  29. package/dist/analyzers/core/engine/index.js.map +1 -0
  30. package/dist/analyzers/core/engine/ruleEngine.d.ts +46 -0
  31. package/dist/analyzers/core/engine/ruleEngine.d.ts.map +1 -0
  32. package/dist/analyzers/core/engine/ruleEngine.js +173 -0
  33. package/dist/analyzers/core/engine/ruleEngine.js.map +1 -0
  34. package/dist/analyzers/core/index.d.ts +8 -0
  35. package/dist/analyzers/core/index.d.ts.map +1 -0
  36. package/dist/analyzers/core/index.js +24 -0
  37. package/dist/analyzers/core/index.js.map +1 -0
  38. package/dist/analyzers/core/scanner/fileScanner.d.ts +31 -0
  39. package/dist/analyzers/core/scanner/fileScanner.d.ts.map +1 -0
  40. package/dist/analyzers/core/scanner/fileScanner.js +199 -0
  41. package/dist/analyzers/core/scanner/fileScanner.js.map +1 -0
  42. package/dist/analyzers/core/scanner/index.d.ts +5 -0
  43. package/dist/analyzers/core/scanner/index.d.ts.map +1 -0
  44. package/dist/analyzers/core/scanner/index.js +21 -0
  45. package/dist/analyzers/core/scanner/index.js.map +1 -0
  46. package/dist/analyzers/core/scoring/index.d.ts +5 -0
  47. package/dist/analyzers/core/scoring/index.d.ts.map +1 -0
  48. package/dist/analyzers/core/scoring/index.js +21 -0
  49. package/dist/analyzers/core/scoring/index.js.map +1 -0
  50. package/dist/analyzers/core/scoring/riskScoring.d.ts +49 -0
  51. package/dist/analyzers/core/scoring/riskScoring.d.ts.map +1 -0
  52. package/dist/analyzers/core/scoring/riskScoring.js +180 -0
  53. package/dist/analyzers/core/scoring/riskScoring.js.map +1 -0
  54. package/dist/analyzers/core/securityScanner.d.ts +47 -0
  55. package/dist/analyzers/core/securityScanner.d.ts.map +1 -0
  56. package/dist/analyzers/core/securityScanner.js +298 -0
  57. package/dist/analyzers/core/securityScanner.js.map +1 -0
  58. package/dist/analyzers/csharp/csharpAnalyzer.d.ts +64 -0
  59. package/dist/analyzers/csharp/csharpAnalyzer.d.ts.map +1 -0
  60. package/dist/analyzers/csharp/csharpAnalyzer.js +232 -0
  61. package/dist/analyzers/csharp/csharpAnalyzer.js.map +1 -0
  62. package/dist/analyzers/csharp/index.d.ts +5 -0
  63. package/dist/analyzers/csharp/index.d.ts.map +1 -0
  64. package/dist/analyzers/csharp/index.js +21 -0
  65. package/dist/analyzers/csharp/index.js.map +1 -0
  66. package/dist/analyzers/iac/iacAnalyzer.d.ts +36 -0
  67. package/dist/analyzers/iac/iacAnalyzer.d.ts.map +1 -0
  68. package/dist/analyzers/iac/iacAnalyzer.js +182 -0
  69. package/dist/analyzers/iac/iacAnalyzer.js.map +1 -0
  70. package/dist/analyzers/iac/index.d.ts +5 -0
  71. package/dist/analyzers/iac/index.d.ts.map +1 -0
  72. package/dist/analyzers/iac/index.js +21 -0
  73. package/dist/analyzers/iac/index.js.map +1 -0
  74. package/dist/analyzers/index.d.ts +30 -0
  75. package/dist/analyzers/index.d.ts.map +1 -0
  76. package/dist/analyzers/index.js +80 -0
  77. package/dist/analyzers/index.js.map +1 -0
  78. package/dist/analyzers/java/index.d.ts +5 -0
  79. package/dist/analyzers/java/index.d.ts.map +1 -0
  80. package/dist/analyzers/java/index.js +21 -0
  81. package/dist/analyzers/java/index.js.map +1 -0
  82. package/dist/analyzers/java/javaAnalyzer.d.ts +64 -0
  83. package/dist/analyzers/java/javaAnalyzer.d.ts.map +1 -0
  84. package/dist/analyzers/java/javaAnalyzer.js +224 -0
  85. package/dist/analyzers/java/javaAnalyzer.js.map +1 -0
  86. package/dist/analyzers/javascript/astUtils.d.ts +170 -0
  87. package/dist/analyzers/javascript/astUtils.d.ts.map +1 -0
  88. package/dist/analyzers/javascript/astUtils.js +700 -0
  89. package/dist/analyzers/javascript/astUtils.js.map +1 -0
  90. package/dist/analyzers/javascript/index.d.ts +18 -0
  91. package/dist/analyzers/javascript/index.d.ts.map +1 -0
  92. package/dist/analyzers/javascript/index.js +50 -0
  93. package/dist/analyzers/javascript/index.js.map +1 -0
  94. package/dist/analyzers/javascript/javascriptAnalyzer.d.ts +111 -0
  95. package/dist/analyzers/javascript/javascriptAnalyzer.d.ts.map +1 -0
  96. package/dist/analyzers/javascript/javascriptAnalyzer.js +860 -0
  97. package/dist/analyzers/javascript/javascriptAnalyzer.js.map +1 -0
  98. package/dist/analyzers/javascript/malwareDetector.d.ts +102 -0
  99. package/dist/analyzers/javascript/malwareDetector.d.ts.map +1 -0
  100. package/dist/analyzers/javascript/malwareDetector.js +616 -0
  101. package/dist/analyzers/javascript/malwareDetector.js.map +1 -0
  102. package/dist/analyzers/javascript/packageJsonAnalyzer.d.ts +87 -0
  103. package/dist/analyzers/javascript/packageJsonAnalyzer.d.ts.map +1 -0
  104. package/dist/analyzers/javascript/packageJsonAnalyzer.js +553 -0
  105. package/dist/analyzers/javascript/packageJsonAnalyzer.js.map +1 -0
  106. package/dist/analyzers/javascript/taintAnalyzer.d.ts +120 -0
  107. package/dist/analyzers/javascript/taintAnalyzer.d.ts.map +1 -0
  108. package/dist/analyzers/javascript/taintAnalyzer.js +526 -0
  109. package/dist/analyzers/javascript/taintAnalyzer.js.map +1 -0
  110. package/dist/analyzers/php/index.d.ts +5 -0
  111. package/dist/analyzers/php/index.d.ts.map +1 -0
  112. package/dist/analyzers/php/index.js +21 -0
  113. package/dist/analyzers/php/index.js.map +1 -0
  114. package/dist/analyzers/php/phpAnalyzer.d.ts +56 -0
  115. package/dist/analyzers/php/phpAnalyzer.d.ts.map +1 -0
  116. package/dist/analyzers/php/phpAnalyzer.js +202 -0
  117. package/dist/analyzers/php/phpAnalyzer.js.map +1 -0
  118. package/dist/analyzers/python/index.d.ts +5 -0
  119. package/dist/analyzers/python/index.d.ts.map +1 -0
  120. package/dist/analyzers/python/index.js +21 -0
  121. package/dist/analyzers/python/index.js.map +1 -0
  122. package/dist/analyzers/python/pythonAnalyzer.d.ts +64 -0
  123. package/dist/analyzers/python/pythonAnalyzer.d.ts.map +1 -0
  124. package/dist/analyzers/python/pythonAnalyzer.js +226 -0
  125. package/dist/analyzers/python/pythonAnalyzer.js.map +1 -0
  126. package/dist/cli/index.d.ts +7 -0
  127. package/dist/cli/index.d.ts.map +1 -0
  128. package/dist/cli/index.js +281 -0
  129. package/dist/cli/index.js.map +1 -0
  130. package/dist/core/engine/index.d.ts +5 -0
  131. package/dist/core/engine/index.d.ts.map +1 -0
  132. package/dist/core/engine/index.js +21 -0
  133. package/dist/core/engine/index.js.map +1 -0
  134. package/dist/core/engine/ruleEngine.d.ts +46 -0
  135. package/dist/core/engine/ruleEngine.d.ts.map +1 -0
  136. package/dist/core/engine/ruleEngine.js +173 -0
  137. package/dist/core/engine/ruleEngine.js.map +1 -0
  138. package/dist/core/index.d.ts +8 -0
  139. package/dist/core/index.d.ts.map +1 -0
  140. package/dist/core/index.js +24 -0
  141. package/dist/core/index.js.map +1 -0
  142. package/dist/core/scanner/fileScanner.d.ts +31 -0
  143. package/dist/core/scanner/fileScanner.d.ts.map +1 -0
  144. package/dist/core/scanner/fileScanner.js +199 -0
  145. package/dist/core/scanner/fileScanner.js.map +1 -0
  146. package/dist/core/scanner/index.d.ts +5 -0
  147. package/dist/core/scanner/index.d.ts.map +1 -0
  148. package/dist/core/scanner/index.js +21 -0
  149. package/dist/core/scanner/index.js.map +1 -0
  150. package/dist/core/scoring/index.d.ts +5 -0
  151. package/dist/core/scoring/index.d.ts.map +1 -0
  152. package/dist/core/scoring/index.js +21 -0
  153. package/dist/core/scoring/index.js.map +1 -0
  154. package/dist/core/scoring/riskScoring.d.ts +49 -0
  155. package/dist/core/scoring/riskScoring.d.ts.map +1 -0
  156. package/dist/core/scoring/riskScoring.js +180 -0
  157. package/dist/core/scoring/riskScoring.js.map +1 -0
  158. package/dist/core/securityScanner.d.ts +47 -0
  159. package/dist/core/securityScanner.d.ts.map +1 -0
  160. package/dist/core/securityScanner.js +298 -0
  161. package/dist/core/securityScanner.js.map +1 -0
  162. package/dist/dependencies/aiDependencyAnalyzer.d.ts +96 -0
  163. package/dist/dependencies/aiDependencyAnalyzer.d.ts.map +1 -0
  164. package/dist/dependencies/aiDependencyAnalyzer.js +435 -0
  165. package/dist/dependencies/aiDependencyAnalyzer.js.map +1 -0
  166. package/dist/dependencies/database/cveDatabase.d.ts +32 -0
  167. package/dist/dependencies/database/cveDatabase.d.ts.map +1 -0
  168. package/dist/dependencies/database/cveDatabase.js +393 -0
  169. package/dist/dependencies/database/cveDatabase.js.map +1 -0
  170. package/dist/dependencies/database/index.d.ts +6 -0
  171. package/dist/dependencies/database/index.d.ts.map +1 -0
  172. package/dist/dependencies/database/index.js +22 -0
  173. package/dist/dependencies/database/index.js.map +1 -0
  174. package/dist/dependencies/database/maliciousPackages.d.ts +43 -0
  175. package/dist/dependencies/database/maliciousPackages.d.ts.map +1 -0
  176. package/dist/dependencies/database/maliciousPackages.js +279 -0
  177. package/dist/dependencies/database/maliciousPackages.js.map +1 -0
  178. package/dist/dependencies/dependencyAnalyzer.d.ts +74 -0
  179. package/dist/dependencies/dependencyAnalyzer.d.ts.map +1 -0
  180. package/dist/dependencies/dependencyAnalyzer.js +349 -0
  181. package/dist/dependencies/dependencyAnalyzer.js.map +1 -0
  182. package/dist/dependencies/detectors/index.d.ts +7 -0
  183. package/dist/dependencies/detectors/index.d.ts.map +1 -0
  184. package/dist/dependencies/detectors/index.js +28 -0
  185. package/dist/dependencies/detectors/index.js.map +1 -0
  186. package/dist/dependencies/detectors/securityStandards.d.ts +15 -0
  187. package/dist/dependencies/detectors/securityStandards.d.ts.map +1 -0
  188. package/dist/dependencies/detectors/securityStandards.js +178 -0
  189. package/dist/dependencies/detectors/securityStandards.js.map +1 -0
  190. package/dist/dependencies/detectors/vulnerabilityDetector.d.ts +53 -0
  191. package/dist/dependencies/detectors/vulnerabilityDetector.d.ts.map +1 -0
  192. package/dist/dependencies/detectors/vulnerabilityDetector.js +289 -0
  193. package/dist/dependencies/detectors/vulnerabilityDetector.js.map +1 -0
  194. package/dist/dependencies/index.d.ts +14 -0
  195. package/dist/dependencies/index.d.ts.map +1 -0
  196. package/dist/dependencies/index.js +43 -0
  197. package/dist/dependencies/index.js.map +1 -0
  198. package/dist/dependencies/installed/index.d.ts +8 -0
  199. package/dist/dependencies/installed/index.d.ts.map +1 -0
  200. package/dist/dependencies/installed/index.js +24 -0
  201. package/dist/dependencies/installed/index.js.map +1 -0
  202. package/dist/dependencies/installed/installedScanner.d.ts +91 -0
  203. package/dist/dependencies/installed/installedScanner.d.ts.map +1 -0
  204. package/dist/dependencies/installed/installedScanner.js +766 -0
  205. package/dist/dependencies/installed/installedScanner.js.map +1 -0
  206. package/dist/dependencies/installed/malwarePatterns.d.ts +32 -0
  207. package/dist/dependencies/installed/malwarePatterns.d.ts.map +1 -0
  208. package/dist/dependencies/installed/malwarePatterns.js +480 -0
  209. package/dist/dependencies/installed/malwarePatterns.js.map +1 -0
  210. package/dist/dependencies/installed/types.d.ts +274 -0
  211. package/dist/dependencies/installed/types.d.ts.map +1 -0
  212. package/dist/dependencies/installed/types.js +7 -0
  213. package/dist/dependencies/installed/types.js.map +1 -0
  214. package/dist/dependencies/parsers/base/baseParser.d.ts +44 -0
  215. package/dist/dependencies/parsers/base/baseParser.d.ts.map +1 -0
  216. package/dist/dependencies/parsers/base/baseParser.js +80 -0
  217. package/dist/dependencies/parsers/base/baseParser.js.map +1 -0
  218. package/dist/dependencies/parsers/base/index.d.ts +6 -0
  219. package/dist/dependencies/parsers/base/index.d.ts.map +1 -0
  220. package/dist/dependencies/parsers/base/index.js +27 -0
  221. package/dist/dependencies/parsers/base/index.js.map +1 -0
  222. package/dist/dependencies/parsers/cpp/cppParser.d.ts +36 -0
  223. package/dist/dependencies/parsers/cpp/cppParser.d.ts.map +1 -0
  224. package/dist/dependencies/parsers/cpp/cppParser.js +196 -0
  225. package/dist/dependencies/parsers/cpp/cppParser.js.map +1 -0
  226. package/dist/dependencies/parsers/cpp/index.d.ts +6 -0
  227. package/dist/dependencies/parsers/cpp/index.d.ts.map +1 -0
  228. package/dist/dependencies/parsers/cpp/index.js +27 -0
  229. package/dist/dependencies/parsers/cpp/index.js.map +1 -0
  230. package/dist/dependencies/parsers/csharp/csharpParser.d.ts +32 -0
  231. package/dist/dependencies/parsers/csharp/csharpParser.d.ts.map +1 -0
  232. package/dist/dependencies/parsers/csharp/csharpParser.js +125 -0
  233. package/dist/dependencies/parsers/csharp/csharpParser.js.map +1 -0
  234. package/dist/dependencies/parsers/csharp/index.d.ts +6 -0
  235. package/dist/dependencies/parsers/csharp/index.d.ts.map +1 -0
  236. package/dist/dependencies/parsers/csharp/index.js +27 -0
  237. package/dist/dependencies/parsers/csharp/index.js.map +1 -0
  238. package/dist/dependencies/parsers/index.d.ts +24 -0
  239. package/dist/dependencies/parsers/index.d.ts.map +1 -0
  240. package/dist/dependencies/parsers/index.js +69 -0
  241. package/dist/dependencies/parsers/index.js.map +1 -0
  242. package/dist/dependencies/parsers/java/index.d.ts +6 -0
  243. package/dist/dependencies/parsers/java/index.d.ts.map +1 -0
  244. package/dist/dependencies/parsers/java/index.js +27 -0
  245. package/dist/dependencies/parsers/java/index.js.map +1 -0
  246. package/dist/dependencies/parsers/java/javaParser.d.ts +32 -0
  247. package/dist/dependencies/parsers/java/javaParser.d.ts.map +1 -0
  248. package/dist/dependencies/parsers/java/javaParser.js +168 -0
  249. package/dist/dependencies/parsers/java/javaParser.js.map +1 -0
  250. package/dist/dependencies/parsers/javascript/index.d.ts +6 -0
  251. package/dist/dependencies/parsers/javascript/index.d.ts.map +1 -0
  252. package/dist/dependencies/parsers/javascript/index.js +27 -0
  253. package/dist/dependencies/parsers/javascript/index.js.map +1 -0
  254. package/dist/dependencies/parsers/javascript/javascriptParser.d.ts +55 -0
  255. package/dist/dependencies/parsers/javascript/javascriptParser.d.ts.map +1 -0
  256. package/dist/dependencies/parsers/javascript/javascriptParser.js +266 -0
  257. package/dist/dependencies/parsers/javascript/javascriptParser.js.map +1 -0
  258. package/dist/dependencies/parsers/php/index.d.ts +6 -0
  259. package/dist/dependencies/parsers/php/index.d.ts.map +1 -0
  260. package/dist/dependencies/parsers/php/index.js +27 -0
  261. package/dist/dependencies/parsers/php/index.js.map +1 -0
  262. package/dist/dependencies/parsers/php/phpParser.d.ts +35 -0
  263. package/dist/dependencies/parsers/php/phpParser.d.ts.map +1 -0
  264. package/dist/dependencies/parsers/php/phpParser.js +162 -0
  265. package/dist/dependencies/parsers/php/phpParser.js.map +1 -0
  266. package/dist/dependencies/parsers/python/index.d.ts +6 -0
  267. package/dist/dependencies/parsers/python/index.d.ts.map +1 -0
  268. package/dist/dependencies/parsers/python/index.js +27 -0
  269. package/dist/dependencies/parsers/python/index.js.map +1 -0
  270. package/dist/dependencies/parsers/python/pythonParser.d.ts +60 -0
  271. package/dist/dependencies/parsers/python/pythonParser.d.ts.map +1 -0
  272. package/dist/dependencies/parsers/python/pythonParser.js +336 -0
  273. package/dist/dependencies/parsers/python/pythonParser.js.map +1 -0
  274. package/dist/dependencies/types.d.ts +280 -0
  275. package/dist/dependencies/types.d.ts.map +1 -0
  276. package/dist/dependencies/types.js +59 -0
  277. package/dist/dependencies/types.js.map +1 -0
  278. package/dist/i18n/index.d.ts +2 -0
  279. package/dist/i18n/index.d.ts.map +1 -0
  280. package/dist/i18n/index.js +18 -0
  281. package/dist/i18n/index.js.map +1 -0
  282. package/dist/i18n/translations.d.ts +55 -0
  283. package/dist/i18n/translations.d.ts.map +1 -0
  284. package/dist/i18n/translations.js +119 -0
  285. package/dist/i18n/translations.js.map +1 -0
  286. package/dist/index.d.ts +14 -0
  287. package/dist/index.d.ts.map +1 -0
  288. package/dist/index.js +36 -0
  289. package/dist/index.js.map +1 -0
  290. package/dist/reports/dependencyReportGenerator.d.ts +20 -0
  291. package/dist/reports/dependencyReportGenerator.d.ts.map +1 -0
  292. package/dist/reports/dependencyReportGenerator.js +690 -0
  293. package/dist/reports/dependencyReportGenerator.js.map +1 -0
  294. package/dist/reports/htmlReportGenerator.d.ts +43 -0
  295. package/dist/reports/htmlReportGenerator.d.ts.map +1 -0
  296. package/dist/reports/htmlReportGenerator.js +793 -0
  297. package/dist/reports/htmlReportGenerator.js.map +1 -0
  298. package/dist/reports/index.d.ts +7 -0
  299. package/dist/reports/index.d.ts.map +1 -0
  300. package/dist/reports/index.js +23 -0
  301. package/dist/reports/index.js.map +1 -0
  302. package/dist/reports/installedDepsReportGenerator.d.ts +14 -0
  303. package/dist/reports/installedDepsReportGenerator.d.ts.map +1 -0
  304. package/dist/reports/installedDepsReportGenerator.js +872 -0
  305. package/dist/reports/installedDepsReportGenerator.js.map +1 -0
  306. package/dist/rules/index.d.ts +31 -0
  307. package/dist/rules/index.d.ts.map +1 -0
  308. package/dist/rules/index.js +95 -0
  309. package/dist/rules/index.js.map +1 -0
  310. package/dist/rules/malware/categories/backdoors.d.ts +12 -0
  311. package/dist/rules/malware/categories/backdoors.d.ts.map +1 -0
  312. package/dist/rules/malware/categories/backdoors.js +163 -0
  313. package/dist/rules/malware/categories/backdoors.js.map +1 -0
  314. package/dist/rules/malware/categories/cryptominers.d.ts +13 -0
  315. package/dist/rules/malware/categories/cryptominers.d.ts.map +1 -0
  316. package/dist/rules/malware/categories/cryptominers.js +415 -0
  317. package/dist/rules/malware/categories/cryptominers.js.map +1 -0
  318. package/dist/rules/malware/categories/exfiltration.d.ts +20 -0
  319. package/dist/rules/malware/categories/exfiltration.d.ts.map +1 -0
  320. package/dist/rules/malware/categories/exfiltration.js +658 -0
  321. package/dist/rules/malware/categories/exfiltration.js.map +1 -0
  322. package/dist/rules/malware/categories/keyloggers.d.ts +19 -0
  323. package/dist/rules/malware/categories/keyloggers.d.ts.map +1 -0
  324. package/dist/rules/malware/categories/keyloggers.js +763 -0
  325. package/dist/rules/malware/categories/keyloggers.js.map +1 -0
  326. package/dist/rules/malware/categories/loaders.d.ts +20 -0
  327. package/dist/rules/malware/categories/loaders.d.ts.map +1 -0
  328. package/dist/rules/malware/categories/loaders.js +702 -0
  329. package/dist/rules/malware/categories/loaders.js.map +1 -0
  330. package/dist/rules/malware/categories/network.d.ts +19 -0
  331. package/dist/rules/malware/categories/network.d.ts.map +1 -0
  332. package/dist/rules/malware/categories/network.js +622 -0
  333. package/dist/rules/malware/categories/network.js.map +1 -0
  334. package/dist/rules/malware/categories/obfuscation.d.ts +22 -0
  335. package/dist/rules/malware/categories/obfuscation.d.ts.map +1 -0
  336. package/dist/rules/malware/categories/obfuscation.js +766 -0
  337. package/dist/rules/malware/categories/obfuscation.js.map +1 -0
  338. package/dist/rules/malware/constants/index.d.ts +281 -0
  339. package/dist/rules/malware/constants/index.d.ts.map +1 -0
  340. package/dist/rules/malware/constants/index.js +327 -0
  341. package/dist/rules/malware/constants/index.js.map +1 -0
  342. package/dist/rules/malware/engine/index.d.ts +178 -0
  343. package/dist/rules/malware/engine/index.d.ts.map +1 -0
  344. package/dist/rules/malware/engine/index.js +552 -0
  345. package/dist/rules/malware/engine/index.js.map +1 -0
  346. package/dist/rules/malware/index.d.ts +205 -0
  347. package/dist/rules/malware/index.d.ts.map +1 -0
  348. package/dist/rules/malware/index.js +837 -0
  349. package/dist/rules/malware/index.js.map +1 -0
  350. package/dist/rules/malware/scoring/index.d.ts +84 -0
  351. package/dist/rules/malware/scoring/index.d.ts.map +1 -0
  352. package/dist/rules/malware/scoring/index.js +441 -0
  353. package/dist/rules/malware/scoring/index.js.map +1 -0
  354. package/dist/rules/malware/types/index.d.ts +616 -0
  355. package/dist/rules/malware/types/index.d.ts.map +1 -0
  356. package/dist/rules/malware/types/index.js +155 -0
  357. package/dist/rules/malware/types/index.js.map +1 -0
  358. package/dist/rules/malware/utils/index.d.ts +117 -0
  359. package/dist/rules/malware/utils/index.d.ts.map +1 -0
  360. package/dist/rules/malware/utils/index.js +514 -0
  361. package/dist/rules/malware/utils/index.js.map +1 -0
  362. package/dist/rules/standards.d.ts +26 -0
  363. package/dist/rules/standards.d.ts.map +1 -0
  364. package/dist/rules/standards.js +352 -0
  365. package/dist/rules/standards.js.map +1 -0
  366. package/dist/rules/vulnerabilities/constants/index.d.ts +835 -0
  367. package/dist/rules/vulnerabilities/constants/index.d.ts.map +1 -0
  368. package/dist/rules/vulnerabilities/constants/index.js +544 -0
  369. package/dist/rules/vulnerabilities/constants/index.js.map +1 -0
  370. package/dist/rules/vulnerabilities/engine/index.d.ts +145 -0
  371. package/dist/rules/vulnerabilities/engine/index.d.ts.map +1 -0
  372. package/dist/rules/vulnerabilities/engine/index.js +581 -0
  373. package/dist/rules/vulnerabilities/engine/index.js.map +1 -0
  374. package/dist/rules/vulnerabilities/index.d.ts +148 -0
  375. package/dist/rules/vulnerabilities/index.d.ts.map +1 -0
  376. package/dist/rules/vulnerabilities/index.js +252 -0
  377. package/dist/rules/vulnerabilities/index.js.map +1 -0
  378. package/dist/rules/vulnerabilities/rules/authentication.d.ts +8 -0
  379. package/dist/rules/vulnerabilities/rules/authentication.d.ts.map +1 -0
  380. package/dist/rules/vulnerabilities/rules/authentication.js +419 -0
  381. package/dist/rules/vulnerabilities/rules/authentication.js.map +1 -0
  382. package/dist/rules/vulnerabilities/rules/commandInjection.d.ts +8 -0
  383. package/dist/rules/vulnerabilities/rules/commandInjection.d.ts.map +1 -0
  384. package/dist/rules/vulnerabilities/rules/commandInjection.js +300 -0
  385. package/dist/rules/vulnerabilities/rules/commandInjection.js.map +1 -0
  386. package/dist/rules/vulnerabilities/rules/csrf.d.ts +8 -0
  387. package/dist/rules/vulnerabilities/rules/csrf.d.ts.map +1 -0
  388. package/dist/rules/vulnerabilities/rules/csrf.js +261 -0
  389. package/dist/rules/vulnerabilities/rules/csrf.js.map +1 -0
  390. package/dist/rules/vulnerabilities/rules/deserialization.d.ts +8 -0
  391. package/dist/rules/vulnerabilities/rules/deserialization.d.ts.map +1 -0
  392. package/dist/rules/vulnerabilities/rules/deserialization.js +336 -0
  393. package/dist/rules/vulnerabilities/rules/deserialization.js.map +1 -0
  394. package/dist/rules/vulnerabilities/rules/fileUpload.d.ts +8 -0
  395. package/dist/rules/vulnerabilities/rules/fileUpload.d.ts.map +1 -0
  396. package/dist/rules/vulnerabilities/rules/fileUpload.js +325 -0
  397. package/dist/rules/vulnerabilities/rules/fileUpload.js.map +1 -0
  398. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.d.ts +8 -0
  399. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.d.ts.map +1 -0
  400. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.js +446 -0
  401. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.js.map +1 -0
  402. package/dist/rules/vulnerabilities/rules/index.d.ts +17 -0
  403. package/dist/rules/vulnerabilities/rules/index.d.ts.map +1 -0
  404. package/dist/rules/vulnerabilities/rules/index.js +47 -0
  405. package/dist/rules/vulnerabilities/rules/index.js.map +1 -0
  406. package/dist/rules/vulnerabilities/rules/pathTraversal.d.ts +8 -0
  407. package/dist/rules/vulnerabilities/rules/pathTraversal.d.ts.map +1 -0
  408. package/dist/rules/vulnerabilities/rules/pathTraversal.js +351 -0
  409. package/dist/rules/vulnerabilities/rules/pathTraversal.js.map +1 -0
  410. package/dist/rules/vulnerabilities/rules/prototypePollution.d.ts +8 -0
  411. package/dist/rules/vulnerabilities/rules/prototypePollution.d.ts.map +1 -0
  412. package/dist/rules/vulnerabilities/rules/prototypePollution.js +272 -0
  413. package/dist/rules/vulnerabilities/rules/prototypePollution.js.map +1 -0
  414. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.d.ts +8 -0
  415. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.d.ts.map +1 -0
  416. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.js +438 -0
  417. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.js.map +1 -0
  418. package/dist/rules/vulnerabilities/rules/sqlInjection.d.ts +12 -0
  419. package/dist/rules/vulnerabilities/rules/sqlInjection.d.ts.map +1 -0
  420. package/dist/rules/vulnerabilities/rules/sqlInjection.js +636 -0
  421. package/dist/rules/vulnerabilities/rules/sqlInjection.js.map +1 -0
  422. package/dist/rules/vulnerabilities/rules/ssrf.d.ts +8 -0
  423. package/dist/rules/vulnerabilities/rules/ssrf.d.ts.map +1 -0
  424. package/dist/rules/vulnerabilities/rules/ssrf.js +401 -0
  425. package/dist/rules/vulnerabilities/rules/ssrf.js.map +1 -0
  426. package/dist/rules/vulnerabilities/rules/xss.d.ts +11 -0
  427. package/dist/rules/vulnerabilities/rules/xss.d.ts.map +1 -0
  428. package/dist/rules/vulnerabilities/rules/xss.js +724 -0
  429. package/dist/rules/vulnerabilities/rules/xss.js.map +1 -0
  430. package/dist/rules/vulnerabilities/scoring/index.d.ts +80 -0
  431. package/dist/rules/vulnerabilities/scoring/index.d.ts.map +1 -0
  432. package/dist/rules/vulnerabilities/scoring/index.js +414 -0
  433. package/dist/rules/vulnerabilities/scoring/index.js.map +1 -0
  434. package/dist/rules/vulnerabilities/types/index.d.ts +830 -0
  435. package/dist/rules/vulnerabilities/types/index.d.ts.map +1 -0
  436. package/dist/rules/vulnerabilities/types/index.js +164 -0
  437. package/dist/rules/vulnerabilities/types/index.js.map +1 -0
  438. package/dist/rules/vulnerabilities/utils/index.d.ts +206 -0
  439. package/dist/rules/vulnerabilities/utils/index.d.ts.map +1 -0
  440. package/dist/rules/vulnerabilities/utils/index.js +615 -0
  441. package/dist/rules/vulnerabilities/utils/index.js.map +1 -0
  442. package/dist/types/index.d.ts +359 -0
  443. package/dist/types/index.d.ts.map +1 -0
  444. package/dist/types/index.js +61 -0
  445. package/dist/types/index.js.map +1 -0
  446. package/dist/utils/index.d.ts +82 -0
  447. package/dist/utils/index.d.ts.map +1 -0
  448. package/dist/utils/index.js +326 -0
  449. package/dist/utils/index.js.map +1 -0
  450. package/dist/utils/logger.d.ts +40 -0
  451. package/dist/utils/logger.d.ts.map +1 -0
  452. package/dist/utils/logger.js +139 -0
  453. package/dist/utils/logger.js.map +1 -0
  454. package/docs/ARCHITECTURE.md +320 -0
  455. package/docs/V1.2.1-IA_Performances.md +116 -0
  456. package/docs/images/WIN_Defender.png +0 -0
  457. package/package.json +68 -0
  458. package/secure-scan.config.json +134 -0
  459. package/secure-scan.sln +29 -0
  460. package/src/ai/aiAnalyzer.ts +714 -0
  461. package/src/ai/index.ts +5 -0
  462. package/src/analyzers/base/baseAnalyzer.ts +66 -0
  463. package/src/analyzers/base/index.ts +5 -0
  464. package/src/analyzers/c-cpp/cppAnalyzer.ts +308 -0
  465. package/src/analyzers/c-cpp/index.ts +5 -0
  466. package/src/analyzers/core/engine/index.ts +5 -0
  467. package/src/analyzers/core/engine/ruleEngine.ts +221 -0
  468. package/src/analyzers/core/index.ts +8 -0
  469. package/src/analyzers/core/scanner/fileScanner.ts +204 -0
  470. package/src/analyzers/core/scanner/index.ts +5 -0
  471. package/src/analyzers/core/scoring/index.ts +5 -0
  472. package/src/analyzers/core/scoring/riskScoring.ts +198 -0
  473. package/src/analyzers/core/securityScanner.ts +321 -0
  474. package/src/analyzers/csharp/csharpAnalyzer.ts +328 -0
  475. package/src/analyzers/csharp/index.ts +5 -0
  476. package/src/analyzers/iac/iacAnalyzer.ts +318 -0
  477. package/src/analyzers/iac/index.ts +5 -0
  478. package/src/analyzers/index.ts +67 -0
  479. package/src/analyzers/java/index.ts +5 -0
  480. package/src/analyzers/java/javaAnalyzer.ts +320 -0
  481. package/src/analyzers/javascript/PROMPT_JS_ANALYZER.md +267 -0
  482. package/src/analyzers/javascript/astUtils.ts +789 -0
  483. package/src/analyzers/javascript/index.ts +50 -0
  484. package/src/analyzers/javascript/javascriptAnalyzer.ts +984 -0
  485. package/src/analyzers/javascript/malwareDetector.ts +697 -0
  486. package/src/analyzers/javascript/packageJsonAnalyzer.ts +626 -0
  487. package/src/analyzers/javascript/taintAnalyzer.ts +630 -0
  488. package/src/analyzers/php/index.ts +5 -0
  489. package/src/analyzers/php/phpAnalyzer.ts +280 -0
  490. package/src/analyzers/python/index.ts +5 -0
  491. package/src/analyzers/python/pythonAnalyzer.ts +319 -0
  492. package/src/cli/index.ts +276 -0
  493. package/src/dependencies/aiDependencyAnalyzer.ts +496 -0
  494. package/src/dependencies/database/cveDatabase.ts +426 -0
  495. package/src/dependencies/database/index.ts +6 -0
  496. package/src/dependencies/database/maliciousPackages.ts +286 -0
  497. package/src/dependencies/dependencyAnalyzer.ts +394 -0
  498. package/src/dependencies/detectors/index.ts +7 -0
  499. package/src/dependencies/detectors/securityStandards.ts +200 -0
  500. package/src/dependencies/detectors/vulnerabilityDetector.ts +343 -0
  501. package/src/dependencies/index.ts +27 -0
  502. package/src/dependencies/installed/index.ts +8 -0
  503. package/src/dependencies/installed/installedScanner.ts +821 -0
  504. package/src/dependencies/installed/malwarePatterns.ts +492 -0
  505. package/src/dependencies/installed/types.ts +287 -0
  506. package/src/dependencies/parsers/base/baseParser.ts +108 -0
  507. package/src/dependencies/parsers/base/index.ts +6 -0
  508. package/src/dependencies/parsers/cpp/cppParser.ts +245 -0
  509. package/src/dependencies/parsers/cpp/index.ts +6 -0
  510. package/src/dependencies/parsers/csharp/csharpParser.ts +151 -0
  511. package/src/dependencies/parsers/csharp/index.ts +6 -0
  512. package/src/dependencies/parsers/index.ts +56 -0
  513. package/src/dependencies/parsers/java/index.ts +6 -0
  514. package/src/dependencies/parsers/java/javaParser.ts +203 -0
  515. package/src/dependencies/parsers/javascript/index.ts +6 -0
  516. package/src/dependencies/parsers/javascript/javascriptParser.ts +362 -0
  517. package/src/dependencies/parsers/php/index.ts +6 -0
  518. package/src/dependencies/parsers/php/phpParser.ts +208 -0
  519. package/src/dependencies/parsers/python/index.ts +6 -0
  520. package/src/dependencies/parsers/python/pythonParser.ts +437 -0
  521. package/src/dependencies/types.ts +330 -0
  522. package/src/i18n/index.ts +1 -0
  523. package/src/i18n/translations.ts +194 -0
  524. package/src/index.ts +16 -0
  525. package/src/reports/dependencyReportGenerator.ts +717 -0
  526. package/src/reports/htmlReportGenerator.ts +781 -0
  527. package/src/reports/index.ts +7 -0
  528. package/src/reports/installedDepsReportGenerator.ts +899 -0
  529. package/src/rules/index.ts +58 -0
  530. package/src/rules/malware/INFO.md +287 -0
  531. package/src/rules/malware/categories/backdoors.ts +174 -0
  532. package/src/rules/malware/categories/cryptominers.ts +434 -0
  533. package/src/rules/malware/categories/exfiltration.ts +677 -0
  534. package/src/rules/malware/categories/keyloggers.ts +780 -0
  535. package/src/rules/malware/categories/loaders.ts +721 -0
  536. package/src/rules/malware/categories/network.ts +639 -0
  537. package/src/rules/malware/categories/obfuscation.ts +788 -0
  538. package/src/rules/malware/constants/index.ts +358 -0
  539. package/src/rules/malware/engine/index.ts +758 -0
  540. package/src/rules/malware/index.ts +928 -0
  541. package/src/rules/malware/scoring/index.ts +549 -0
  542. package/src/rules/malware/types/index.ts +752 -0
  543. package/src/rules/malware/utils/index.ts +643 -0
  544. package/src/rules/standards.ts +372 -0
  545. package/src/rules/vulnerabilities/PROMPT_VULNERABILITIES.md +226 -0
  546. package/src/rules/vulnerabilities/constants/index.ts +625 -0
  547. package/src/rules/vulnerabilities/engine/index.ts +831 -0
  548. package/src/rules/vulnerabilities/index.ts +312 -0
  549. package/src/rules/vulnerabilities/rules/authentication.ts +426 -0
  550. package/src/rules/vulnerabilities/rules/commandInjection.ts +307 -0
  551. package/src/rules/vulnerabilities/rules/csrf.ts +268 -0
  552. package/src/rules/vulnerabilities/rules/deserialization.ts +343 -0
  553. package/src/rules/vulnerabilities/rules/fileUpload.ts +332 -0
  554. package/src/rules/vulnerabilities/rules/hardcodedSecrets.ts +453 -0
  555. package/src/rules/vulnerabilities/rules/index.ts +17 -0
  556. package/src/rules/vulnerabilities/rules/pathTraversal.ts +358 -0
  557. package/src/rules/vulnerabilities/rules/prototypePollution.ts +279 -0
  558. package/src/rules/vulnerabilities/rules/securityMisconfiguration.ts +445 -0
  559. package/src/rules/vulnerabilities/rules/sqlInjection.ts +669 -0
  560. package/src/rules/vulnerabilities/rules/ssrf.ts +408 -0
  561. package/src/rules/vulnerabilities/rules/xss.ts +753 -0
  562. package/src/rules/vulnerabilities/scoring/index.ts +543 -0
  563. package/src/rules/vulnerabilities/types/index.ts +1004 -0
  564. package/src/rules/vulnerabilities/utils/index.ts +709 -0
  565. package/src/types/index.ts +391 -0
  566. package/src/utils/index.ts +306 -0
  567. package/src/utils/logger.ts +150 -0
  568. package/test-installed-scanner.ts +136 -0
  569. package/tsconfig.json +30 -0
@@ -0,0 +1,300 @@
1
+ "use strict";
2
+ /**
3
+ * @fileoverview Command Injection Detection Rules
4
+ * @module rules/vulnerabilities/rules/commandInjection
5
+ */
6
+ Object.defineProperty(exports, "__esModule", { value: true });
7
+ exports.commandInjectionRules = void 0;
8
+ const types_1 = require("../types");
9
+ const constants_1 = require("../constants");
10
+ exports.commandInjectionRules = [
11
+ {
12
+ id: 'VUL-CMDI-001',
13
+ name: 'Command Injection - exec() with User Input',
14
+ description: 'Detects execution of shell commands with user-controlled input in Node.js.',
15
+ version: '1.0.0',
16
+ vulnerabilityType: types_1.VulnerabilityType.COMMAND_INJECTION,
17
+ category: types_1.VulnerabilityCategory.INJECTION,
18
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
19
+ severity: types_1.VulnerabilitySeverity.CRITICAL,
20
+ confidence: types_1.ConfidenceLevel.HIGH,
21
+ baseScore: 95,
22
+ patterns: [
23
+ {
24
+ type: types_1.PatternType.REGEX,
25
+ patternId: 'cmdi-exec-req',
26
+ pattern: '(?:child_process\\.)?exec(?:Sync)?\\s*\\([^)]*req\\.',
27
+ flags: 'gi',
28
+ weight: 1.0,
29
+ description: 'exec with request data'
30
+ },
31
+ {
32
+ type: types_1.PatternType.REGEX,
33
+ patternId: 'cmdi-exec-concat',
34
+ pattern: '(?:child_process\\.)?exec(?:Sync)?\\s*\\([^)]*\\+',
35
+ flags: 'gi',
36
+ weight: 0.90,
37
+ description: 'exec with string concatenation'
38
+ },
39
+ {
40
+ type: types_1.PatternType.REGEX,
41
+ patternId: 'cmdi-exec-template',
42
+ pattern: '(?:child_process\\.)?exec(?:Sync)?\\s*\\(\\s*`[^`]*\\$\\{',
43
+ flags: 'gi',
44
+ weight: 0.95,
45
+ description: 'exec with template literal'
46
+ }
47
+ ],
48
+ impact: {
49
+ confidentiality: 'high',
50
+ integrity: 'high',
51
+ availability: 'high',
52
+ technicalImpact: 'Arbitrary command execution on the server. Full system compromise.',
53
+ businessImpact: 'Complete server takeover, data breach, lateral movement.'
54
+ },
55
+ exploitability: {
56
+ attackVector: 'network',
57
+ attackComplexity: 'low',
58
+ privilegesRequired: 'none',
59
+ userInteraction: 'none',
60
+ knownExploits: true
61
+ },
62
+ remediation: {
63
+ summary: 'Use execFile() or spawn() with arguments array. Never pass user input to shell commands.',
64
+ steps: [
65
+ 'Replace exec() with execFile() or spawn()',
66
+ 'Pass command arguments as array, not concatenated string',
67
+ 'Validate and sanitize user input',
68
+ 'Use allowlist for permitted commands'
69
+ ],
70
+ secureCodeExample: `// Secure: Using execFile with arguments array
71
+ const { execFile } = require('child_process');
72
+ execFile('ls', ['-la', sanitizedPath], (error, stdout) => {
73
+ // handle output
74
+ });
75
+
76
+ // Secure: Using spawn with arguments
77
+ const { spawn } = require('child_process');
78
+ const ls = spawn('ls', ['-la', userDir]);`,
79
+ effort: 'medium',
80
+ priority: 'immediate'
81
+ },
82
+ standards: {
83
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
84
+ cwe: [constants_1.CWE_REFERENCES.CWE_78],
85
+ sans: [{ rank: 3, cweId: 'CWE-78', category: 'OS Command Injection' }]
86
+ },
87
+ tags: ['command-injection', 'rce', 'nodejs', 'critical'],
88
+ enabled: true
89
+ },
90
+ {
91
+ id: 'VUL-CMDI-002',
92
+ name: 'Command Injection - Python os.system/subprocess',
93
+ description: 'Detects Python os.system() or subprocess calls with user input.',
94
+ version: '1.0.0',
95
+ vulnerabilityType: types_1.VulnerabilityType.COMMAND_INJECTION,
96
+ category: types_1.VulnerabilityCategory.INJECTION,
97
+ languages: [types_1.SupportedLanguage.PYTHON],
98
+ severity: types_1.VulnerabilitySeverity.CRITICAL,
99
+ confidence: types_1.ConfidenceLevel.HIGH,
100
+ baseScore: 95,
101
+ patterns: [
102
+ {
103
+ type: types_1.PatternType.REGEX,
104
+ patternId: 'cmdi-os-system',
105
+ pattern: 'os\\.system\\s*\\(\\s*(?:f[\'"]|[\'"].*%|[\'"].*\\.format|.*\\+)',
106
+ flags: 'gi',
107
+ weight: 1.0,
108
+ description: 'os.system with formatted string'
109
+ },
110
+ {
111
+ type: types_1.PatternType.REGEX,
112
+ patternId: 'cmdi-subprocess-shell',
113
+ pattern: 'subprocess\\.(?:call|run|Popen)\\s*\\([^)]*shell\\s*=\\s*True',
114
+ flags: 'gi',
115
+ weight: 0.95,
116
+ description: 'subprocess with shell=True'
117
+ },
118
+ {
119
+ type: types_1.PatternType.REGEX,
120
+ patternId: 'cmdi-os-popen',
121
+ pattern: 'os\\.popen\\s*\\(',
122
+ flags: 'gi',
123
+ weight: 0.90,
124
+ description: 'os.popen usage'
125
+ }
126
+ ],
127
+ impact: {
128
+ confidentiality: 'high',
129
+ integrity: 'high',
130
+ availability: 'high',
131
+ technicalImpact: 'Full server compromise via shell command execution.',
132
+ businessImpact: 'System takeover, data exfiltration.'
133
+ },
134
+ exploitability: {
135
+ attackVector: 'network',
136
+ attackComplexity: 'low',
137
+ privilegesRequired: 'none',
138
+ userInteraction: 'none'
139
+ },
140
+ remediation: {
141
+ summary: 'Use subprocess with shell=False and command list. Use shlex.quote() for any user input.',
142
+ steps: [
143
+ 'Replace os.system() with subprocess.run()',
144
+ 'Use shell=False with command as list',
145
+ 'Quote user input with shlex.quote()',
146
+ 'Consider using high-level libraries instead'
147
+ ],
148
+ secureCodeExample: `import subprocess
149
+ import shlex
150
+
151
+ # Secure: Using list form without shell
152
+ subprocess.run(['ls', '-la', user_path], shell=False)
153
+
154
+ # If shell is needed, quote the input
155
+ safe_input = shlex.quote(user_input)
156
+ subprocess.run(f'echo {safe_input}', shell=True)`,
157
+ effort: 'low',
158
+ priority: 'immediate'
159
+ },
160
+ standards: {
161
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
162
+ cwe: [constants_1.CWE_REFERENCES.CWE_78]
163
+ },
164
+ tags: ['command-injection', 'python', 'subprocess', 'critical'],
165
+ enabled: true
166
+ },
167
+ {
168
+ id: 'VUL-CMDI-003',
169
+ name: 'Command Injection - PHP system/exec/shell_exec',
170
+ description: 'Detects PHP command execution functions with user input.',
171
+ version: '1.0.0',
172
+ vulnerabilityType: types_1.VulnerabilityType.COMMAND_INJECTION,
173
+ category: types_1.VulnerabilityCategory.INJECTION,
174
+ languages: [types_1.SupportedLanguage.PHP],
175
+ severity: types_1.VulnerabilitySeverity.CRITICAL,
176
+ confidence: types_1.ConfidenceLevel.HIGH,
177
+ baseScore: 95,
178
+ patterns: [
179
+ {
180
+ type: types_1.PatternType.REGEX,
181
+ patternId: 'cmdi-php-system',
182
+ pattern: '(?:system|exec|shell_exec|passthru|popen|proc_open)\\s*\\([^)]*\\$_(?:GET|POST|REQUEST)',
183
+ flags: 'gi',
184
+ weight: 1.0,
185
+ description: 'Command function with superglobal'
186
+ },
187
+ {
188
+ type: types_1.PatternType.REGEX,
189
+ patternId: 'cmdi-php-backtick',
190
+ pattern: '`[^`]*\\$[^`]*`',
191
+ flags: 'g',
192
+ weight: 0.95,
193
+ description: 'Backtick operator with variable'
194
+ }
195
+ ],
196
+ impact: {
197
+ confidentiality: 'high',
198
+ integrity: 'high',
199
+ availability: 'high',
200
+ technicalImpact: 'Complete server compromise.',
201
+ businessImpact: 'Full system access to attacker.'
202
+ },
203
+ exploitability: {
204
+ attackVector: 'network',
205
+ attackComplexity: 'low',
206
+ privilegesRequired: 'none',
207
+ userInteraction: 'none',
208
+ knownExploits: true
209
+ },
210
+ remediation: {
211
+ summary: 'Use escapeshellarg() and escapeshellcmd(). Avoid command execution when possible.',
212
+ steps: [
213
+ 'Escape all user input with escapeshellarg()',
214
+ 'Use escapeshellcmd() for entire command strings',
215
+ 'Consider PHP native functions instead of shell commands',
216
+ 'Disable dangerous functions in php.ini'
217
+ ],
218
+ secureCodeExample: `<?php
219
+ // Secure: Using escapeshellarg
220
+ $safe_input = escapeshellarg($_GET['filename']);
221
+ system("cat " . $safe_input);
222
+
223
+ // Better: Use PHP functions instead
224
+ $content = file_get_contents($validated_path);
225
+ ?>`,
226
+ effort: 'low',
227
+ priority: 'immediate'
228
+ },
229
+ standards: {
230
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
231
+ cwe: [constants_1.CWE_REFERENCES.CWE_78]
232
+ },
233
+ tags: ['command-injection', 'php', 'rce', 'critical'],
234
+ enabled: true
235
+ },
236
+ {
237
+ id: 'VUL-CMDI-004',
238
+ name: 'Command Injection - Java Runtime.exec',
239
+ description: 'Detects Java Runtime.exec() with concatenated user input.',
240
+ version: '1.0.0',
241
+ vulnerabilityType: types_1.VulnerabilityType.COMMAND_INJECTION,
242
+ category: types_1.VulnerabilityCategory.INJECTION,
243
+ languages: [types_1.SupportedLanguage.JAVA],
244
+ severity: types_1.VulnerabilitySeverity.CRITICAL,
245
+ confidence: types_1.ConfidenceLevel.HIGH,
246
+ baseScore: 95,
247
+ patterns: [
248
+ {
249
+ type: types_1.PatternType.REGEX,
250
+ patternId: 'cmdi-java-runtime',
251
+ pattern: 'Runtime\\.getRuntime\\(\\)\\.exec\\s*\\([^)]*\\+',
252
+ flags: 'gi',
253
+ weight: 1.0,
254
+ description: 'Runtime.exec with concatenation'
255
+ },
256
+ {
257
+ type: types_1.PatternType.REGEX,
258
+ patternId: 'cmdi-java-processbuilder',
259
+ pattern: 'new\\s+ProcessBuilder\\s*\\([^)]*\\+',
260
+ flags: 'gi',
261
+ weight: 0.90,
262
+ description: 'ProcessBuilder with concatenation'
263
+ }
264
+ ],
265
+ impact: {
266
+ confidentiality: 'high',
267
+ integrity: 'high',
268
+ availability: 'high',
269
+ technicalImpact: 'Arbitrary command execution on server.',
270
+ businessImpact: 'Complete system compromise.'
271
+ },
272
+ exploitability: {
273
+ attackVector: 'network',
274
+ attackComplexity: 'low',
275
+ privilegesRequired: 'none',
276
+ userInteraction: 'none'
277
+ },
278
+ remediation: {
279
+ summary: 'Use ProcessBuilder with String array. Never concatenate user input into commands.',
280
+ steps: [
281
+ 'Use ProcessBuilder with command array',
282
+ 'Validate input against allowlist',
283
+ 'Avoid shell interpretation by not using /bin/sh -c'
284
+ ],
285
+ secureCodeExample: `// Secure: Using ProcessBuilder with array
286
+ ProcessBuilder pb = new ProcessBuilder("ls", "-la", sanitizedPath);
287
+ Process p = pb.start();`,
288
+ effort: 'medium',
289
+ priority: 'immediate'
290
+ },
291
+ standards: {
292
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
293
+ cwe: [constants_1.CWE_REFERENCES.CWE_78]
294
+ },
295
+ tags: ['command-injection', 'java', 'runtime-exec', 'critical'],
296
+ enabled: true
297
+ }
298
+ ];
299
+ exports.default = exports.commandInjectionRules;
300
+ //# sourceMappingURL=commandInjection.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"commandInjection.js","sourceRoot":"","sources":["../../../../src/rules/vulnerabilities/rules/commandInjection.ts"],"names":[],"mappings":";AAAA;;;GAGG;;;AAEH,oCAQkB;AAClB,4CAAiE;AAEpD,QAAA,qBAAqB,GAAwB;IACxD;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,4CAA4C;QAClD,WAAW,EAAE,4EAA4E;QACzF,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,iBAAiB;QACtD,QAAQ,EAAE,6BAAqB,CAAC,SAAS;QACzC,SAAS,EAAE,CAAC,yBAAiB,CAAC,UAAU,EAAE,yBAAiB,CAAC,UAAU,CAAC;QACvE,QAAQ,EAAE,6BAAqB,CAAC,QAAQ;QACxC,UAAU,EAAE,uBAAe,CAAC,IAAI;QAChC,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,eAAe;gBAC1B,OAAO,EAAE,sDAAsD;gBAC/D,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,GAAG;gBACX,WAAW,EAAE,wBAAwB;aACtC;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,kBAAkB;gBAC7B,OAAO,EAAE,mDAAmD;gBAC5D,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,gCAAgC;aAC9C;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,oBAAoB;gBAC/B,OAAO,EAAE,2DAA2D;gBACpE,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,4BAA4B;aAC1C;SACF;QACD,MAAM,EAAE;YACN,eAAe,EAAE,MAAM;YACvB,SAAS,EAAE,MAAM;YACjB,YAAY,EAAE,MAAM;YACpB,eAAe,EAAE,oEAAoE;YACrF,cAAc,EAAE,0DAA0D;SAC3E;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,KAAK;YACvB,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,MAAM;YACvB,aAAa,EAAE,IAAI;SACpB;QACD,WAAW,EAAE;YACX,OAAO,EAAE,0FAA0F;YACnG,KAAK,EAAE;gBACL,2CAA2C;gBAC3C,0DAA0D;gBAC1D,kCAAkC;gBAClC,sCAAsC;aACvC;YACD,iBAAiB,EAAE;;;;;;;;0CAQiB;YACpC,MAAM,EAAE,QAAQ;YAChB,QAAQ,EAAE,WAAW;SACtB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,CAAC;YAC9B,GAAG,EAAE,CAAC,0BAAc,CAAC,MAAM,CAAC;YAC5B,IAAI,EAAE,CAAC,EAAE,IAAI,EAAE,CAAC,EAAE,KAAK,EAAE,QAAQ,EAAE,QAAQ,EAAE,sBAAsB,EAAE,CAAC;SACvE;QACD,IAAI,EAAE,CAAC,mBAAmB,EAAE,KAAK,EAAE,QAAQ,EAAE,UAAU,CAAC;QACxD,OAAO,EAAE,IAAI;KACd;IACD;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,iDAAiD;QACvD,WAAW,EAAE,iEAAiE;QAC9E,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,iBAAiB;QACtD,QAAQ,EAAE,6BAAqB,CAAC,SAAS;QACzC,SAAS,EAAE,CAAC,yBAAiB,CAAC,MAAM,CAAC;QACrC,QAAQ,EAAE,6BAAqB,CAAC,QAAQ;QACxC,UAAU,EAAE,uBAAe,CAAC,IAAI;QAChC,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,gBAAgB;gBAC3B,OAAO,EAAE,kEAAkE;gBAC3E,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,GAAG;gBACX,WAAW,EAAE,iCAAiC;aAC/C;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,uBAAuB;gBAClC,OAAO,EAAE,+DAA+D;gBACxE,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,4BAA4B;aAC1C;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,eAAe;gBAC1B,OAAO,EAAE,mBAAmB;gBAC5B,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,gBAAgB;aAC9B;SACF;QACD,MAAM,EAAE;YACN,eAAe,EAAE,MAAM;YACvB,SAAS,EAAE,MAAM;YACjB,YAAY,EAAE,MAAM;YACpB,eAAe,EAAE,qDAAqD;YACtE,cAAc,EAAE,qCAAqC;SACtD;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,KAAK;YACvB,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,MAAM;SACxB;QACD,WAAW,EAAE;YACX,OAAO,EAAE,yFAAyF;YAClG,KAAK,EAAE;gBACL,2CAA2C;gBAC3C,sCAAsC;gBACtC,qCAAqC;gBACrC,6CAA6C;aAC9C;YACD,iBAAiB,EAAE;;;;;;;;iDAQwB;YAC3C,MAAM,EAAE,KAAK;YACb,QAAQ,EAAE,WAAW;SACtB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,CAAC;YAC9B,GAAG,EAAE,CAAC,0BAAc,CAAC,MAAM,CAAC;SAC7B;QACD,IAAI,EAAE,CAAC,mBAAmB,EAAE,QAAQ,EAAE,YAAY,EAAE,UAAU,CAAC;QAC/D,OAAO,EAAE,IAAI;KACd;IACD;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,gDAAgD;QACtD,WAAW,EAAE,0DAA0D;QACvE,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,iBAAiB;QACtD,QAAQ,EAAE,6BAAqB,CAAC,SAAS;QACzC,SAAS,EAAE,CAAC,yBAAiB,CAAC,GAAG,CAAC;QAClC,QAAQ,EAAE,6BAAqB,CAAC,QAAQ;QACxC,UAAU,EAAE,uBAAe,CAAC,IAAI;QAChC,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,iBAAiB;gBAC5B,OAAO,EAAE,yFAAyF;gBAClG,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,GAAG;gBACX,WAAW,EAAE,mCAAmC;aACjD;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,mBAAmB;gBAC9B,OAAO,EAAE,iBAAiB;gBAC1B,KAAK,EAAE,GAAG;gBACV,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,iCAAiC;aAC/C;SACF;QACD,MAAM,EAAE;YACN,eAAe,EAAE,MAAM;YACvB,SAAS,EAAE,MAAM;YACjB,YAAY,EAAE,MAAM;YACpB,eAAe,EAAE,6BAA6B;YAC9C,cAAc,EAAE,iCAAiC;SAClD;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,KAAK;YACvB,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,MAAM;YACvB,aAAa,EAAE,IAAI;SACpB;QACD,WAAW,EAAE;YACX,OAAO,EAAE,mFAAmF;YAC5F,KAAK,EAAE;gBACL,6CAA6C;gBAC7C,iDAAiD;gBACjD,yDAAyD;gBACzD,wCAAwC;aACzC;YACD,iBAAiB,EAAE;;;;;;;GAOtB;YACG,MAAM,EAAE,KAAK;YACb,QAAQ,EAAE,WAAW;SACtB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,CAAC;YAC9B,GAAG,EAAE,CAAC,0BAAc,CAAC,MAAM,CAAC;SAC7B;QACD,IAAI,EAAE,CAAC,mBAAmB,EAAE,KAAK,EAAE,KAAK,EAAE,UAAU,CAAC;QACrD,OAAO,EAAE,IAAI;KACd;IACD;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,uCAAuC;QAC7C,WAAW,EAAE,2DAA2D;QACxE,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,iBAAiB;QACtD,QAAQ,EAAE,6BAAqB,CAAC,SAAS;QACzC,SAAS,EAAE,CAAC,yBAAiB,CAAC,IAAI,CAAC;QACnC,QAAQ,EAAE,6BAAqB,CAAC,QAAQ;QACxC,UAAU,EAAE,uBAAe,CAAC,IAAI;QAChC,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,mBAAmB;gBAC9B,OAAO,EAAE,kDAAkD;gBAC3D,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,GAAG;gBACX,WAAW,EAAE,iCAAiC;aAC/C;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,0BAA0B;gBACrC,OAAO,EAAE,sCAAsC;gBAC/C,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,mCAAmC;aACjD;SACF;QACD,MAAM,EAAE;YACN,eAAe,EAAE,MAAM;YACvB,SAAS,EAAE,MAAM;YACjB,YAAY,EAAE,MAAM;YACpB,eAAe,EAAE,wCAAwC;YACzD,cAAc,EAAE,6BAA6B;SAC9C;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,KAAK;YACvB,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,MAAM;SACxB;QACD,WAAW,EAAE;YACX,OAAO,EAAE,mFAAmF;YAC5F,KAAK,EAAE;gBACL,uCAAuC;gBACvC,kCAAkC;gBAClC,oDAAoD;aACrD;YACD,iBAAiB,EAAE;;wBAED;YAClB,MAAM,EAAE,QAAQ;YAChB,QAAQ,EAAE,WAAW;SACtB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,CAAC;YAC9B,GAAG,EAAE,CAAC,0BAAc,CAAC,MAAM,CAAC;SAC7B;QACD,IAAI,EAAE,CAAC,mBAAmB,EAAE,MAAM,EAAE,cAAc,EAAE,UAAU,CAAC;QAC/D,OAAO,EAAE,IAAI;KACd;CACF,CAAC;AAEF,kBAAe,6BAAqB,CAAC"}
@@ -0,0 +1,8 @@
1
+ /**
2
+ * @fileoverview CSRF (Cross-Site Request Forgery) Detection Rules
3
+ * @module rules/vulnerabilities/rules/csrf
4
+ */
5
+ import { VulnerabilityRule } from '../types';
6
+ export declare const csrfRules: VulnerabilityRule[];
7
+ export default csrfRules;
8
+ //# sourceMappingURL=csrf.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"csrf.d.ts","sourceRoot":"","sources":["../../../../src/rules/vulnerabilities/rules/csrf.ts"],"names":[],"mappings":"AAAA;;;GAGG;AAEH,OAAO,EACL,iBAAiB,EAOlB,MAAM,UAAU,CAAC;AAGlB,eAAO,MAAM,SAAS,EAAE,iBAAiB,EAyPxC,CAAC;AAEF,eAAe,SAAS,CAAC"}
@@ -0,0 +1,261 @@
1
+ "use strict";
2
+ /**
3
+ * @fileoverview CSRF (Cross-Site Request Forgery) Detection Rules
4
+ * @module rules/vulnerabilities/rules/csrf
5
+ */
6
+ Object.defineProperty(exports, "__esModule", { value: true });
7
+ exports.csrfRules = void 0;
8
+ const types_1 = require("../types");
9
+ const constants_1 = require("../constants");
10
+ exports.csrfRules = [
11
+ {
12
+ id: 'VUL-CSRF-001',
13
+ name: 'Missing CSRF Protection - Express',
14
+ description: 'Detects state-changing routes without CSRF protection in Express.',
15
+ version: '1.0.0',
16
+ vulnerabilityType: types_1.VulnerabilityType.CSRF,
17
+ category: types_1.VulnerabilityCategory.BROKEN_ACCESS_CONTROL,
18
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
19
+ severity: types_1.VulnerabilitySeverity.MEDIUM,
20
+ confidence: types_1.ConfidenceLevel.MEDIUM,
21
+ baseScore: 60,
22
+ patterns: [
23
+ {
24
+ type: types_1.PatternType.REGEX,
25
+ patternId: 'csrf-no-csurf',
26
+ pattern: 'app\\.(?:post|put|patch|delete)\\s*\\([^)]+\\)(?![\\s\\S]*csrf)',
27
+ flags: 'gi',
28
+ weight: 0.70,
29
+ description: 'State-changing route without CSRF mention'
30
+ },
31
+ {
32
+ type: types_1.PatternType.REGEX,
33
+ patternId: 'csrf-disabled',
34
+ pattern: 'csrf\\s*[({][^}]*ignoreMethods\\s*:\\s*\\[[^\\]]*(?:POST|PUT|DELETE)',
35
+ flags: 'gi',
36
+ weight: 0.95,
37
+ description: 'CSRF protection disabled for state-changing methods'
38
+ }
39
+ ],
40
+ impact: {
41
+ confidentiality: 'low',
42
+ integrity: 'high',
43
+ availability: 'low',
44
+ technicalImpact: 'Attacker can perform actions on behalf of authenticated users.',
45
+ businessImpact: 'Unauthorized transactions, account changes.'
46
+ },
47
+ exploitability: {
48
+ attackVector: 'network',
49
+ attackComplexity: 'low',
50
+ privilegesRequired: 'none',
51
+ userInteraction: 'required'
52
+ },
53
+ remediation: {
54
+ summary: 'Implement CSRF tokens for all state-changing requests.',
55
+ steps: [
56
+ 'Use csurf or csrf-csrf middleware',
57
+ 'Include CSRF token in forms and AJAX headers',
58
+ 'Validate token on all POST/PUT/PATCH/DELETE',
59
+ 'Use SameSite=Strict cookies as defense in depth'
60
+ ],
61
+ secureCodeExample: `const csrf = require('csurf');
62
+ const csrfProtection = csrf({ cookie: { sameSite: 'strict', httpOnly: true } });
63
+
64
+ // Apply to all routes
65
+ app.use(csrfProtection);
66
+
67
+ // Expose token to views
68
+ app.get('/form', (req, res) => {
69
+ res.render('form', { csrfToken: req.csrfToken() });
70
+ });
71
+
72
+ // In form: <input type="hidden" name="_csrf" value="<%= csrfToken %>">
73
+
74
+ // For AJAX, set header:
75
+ // 'CSRF-Token': csrfToken`,
76
+ effort: 'medium',
77
+ priority: 'high'
78
+ },
79
+ standards: {
80
+ owasp: [constants_1.OWASP_TOP_10_2021.A01],
81
+ cwe: [constants_1.CWE_REFERENCES.CWE_352]
82
+ },
83
+ tags: ['csrf', 'session', 'express'],
84
+ enabled: true
85
+ },
86
+ {
87
+ id: 'VUL-CSRF-002',
88
+ name: 'Missing CSRF Protection - Django',
89
+ description: 'Detects views or forms without CSRF protection in Django.',
90
+ version: '1.0.0',
91
+ vulnerabilityType: types_1.VulnerabilityType.CSRF,
92
+ category: types_1.VulnerabilityCategory.BROKEN_ACCESS_CONTROL,
93
+ languages: [types_1.SupportedLanguage.PYTHON],
94
+ severity: types_1.VulnerabilitySeverity.MEDIUM,
95
+ confidence: types_1.ConfidenceLevel.HIGH,
96
+ baseScore: 65,
97
+ patterns: [
98
+ {
99
+ type: types_1.PatternType.REGEX,
100
+ patternId: 'csrf-django-exempt',
101
+ pattern: '@csrf_exempt',
102
+ flags: 'g',
103
+ weight: 0.95,
104
+ description: 'CSRF protection exempted'
105
+ },
106
+ {
107
+ type: types_1.PatternType.REGEX,
108
+ patternId: 'csrf-django-disabled',
109
+ pattern: 'CSRF_COOKIE_SECURE\\s*=\\s*False',
110
+ flags: 'gi',
111
+ weight: 0.80,
112
+ description: 'CSRF cookie not secure'
113
+ },
114
+ {
115
+ type: types_1.PatternType.REGEX,
116
+ patternId: 'csrf-middleware-removed',
117
+ pattern: '#.*CsrfViewMiddleware',
118
+ flags: 'gi',
119
+ weight: 1.0,
120
+ description: 'CSRF middleware commented out'
121
+ }
122
+ ],
123
+ impact: {
124
+ confidentiality: 'low',
125
+ integrity: 'high',
126
+ availability: 'low',
127
+ technicalImpact: 'Cross-site request forgery attacks possible.',
128
+ businessImpact: 'Unauthorized actions on behalf of users.'
129
+ },
130
+ exploitability: {
131
+ attackVector: 'network',
132
+ attackComplexity: 'low',
133
+ privilegesRequired: 'none',
134
+ userInteraction: 'required'
135
+ },
136
+ remediation: {
137
+ summary: 'Enable CSRF middleware. Avoid @csrf_exempt except for APIs with token auth.',
138
+ steps: [
139
+ 'Ensure CsrfViewMiddleware is in MIDDLEWARE',
140
+ 'Remove unnecessary @csrf_exempt decorators',
141
+ 'Use {% csrf_token %} in all forms',
142
+ 'For APIs, use token-based auth instead of session'
143
+ ],
144
+ secureCodeExample: `# settings.py
145
+ MIDDLEWARE = [
146
+ 'django.middleware.csrf.CsrfViewMiddleware',
147
+ # ...
148
+ ]
149
+
150
+ CSRF_COOKIE_SECURE = True
151
+ CSRF_COOKIE_HTTPONLY = True
152
+ CSRF_COOKIE_SAMESITE = 'Strict'
153
+
154
+ # In templates
155
+ <form method="post">
156
+ {% csrf_token %}
157
+ ...
158
+ </form>
159
+
160
+ # For API views with proper token auth, csrf_exempt is acceptable
161
+ from rest_framework.decorators import api_view, authentication_classes
162
+ @api_view(['POST'])
163
+ @authentication_classes([TokenAuthentication])
164
+ def api_endpoint(request):
165
+ pass`,
166
+ effort: 'low',
167
+ priority: 'high'
168
+ },
169
+ standards: {
170
+ owasp: [constants_1.OWASP_TOP_10_2021.A01],
171
+ cwe: [constants_1.CWE_REFERENCES.CWE_352]
172
+ },
173
+ tags: ['csrf', 'django', 'python'],
174
+ enabled: true
175
+ },
176
+ {
177
+ id: 'VUL-CSRF-003',
178
+ name: 'Missing CSRF Protection - PHP',
179
+ description: 'Detects PHP forms without CSRF token validation.',
180
+ version: '1.0.0',
181
+ vulnerabilityType: types_1.VulnerabilityType.CSRF,
182
+ category: types_1.VulnerabilityCategory.BROKEN_ACCESS_CONTROL,
183
+ languages: [types_1.SupportedLanguage.PHP],
184
+ severity: types_1.VulnerabilitySeverity.MEDIUM,
185
+ confidence: types_1.ConfidenceLevel.LOW,
186
+ baseScore: 55,
187
+ patterns: [
188
+ {
189
+ type: types_1.PatternType.REGEX,
190
+ patternId: 'csrf-php-post-no-token',
191
+ pattern: '\\$_POST\\s*\\[[\'"][^\'"]+[\'"]\\](?![\\s\\S]{0,200}(?:csrf|token|_token))',
192
+ flags: 'gi',
193
+ weight: 0.60,
194
+ description: 'POST processing without token check nearby'
195
+ },
196
+ {
197
+ type: types_1.PatternType.REGEX,
198
+ patternId: 'csrf-php-form-no-token',
199
+ pattern: '<form[^>]*method\\s*=\\s*[\'"]post[\'"][^>]*>(?![\\s\\S]{0,500}(?:csrf|token|_token))',
200
+ flags: 'gi',
201
+ weight: 0.50,
202
+ description: 'Form without CSRF token'
203
+ }
204
+ ],
205
+ impact: {
206
+ confidentiality: 'low',
207
+ integrity: 'high',
208
+ availability: 'low',
209
+ technicalImpact: 'State-changing actions can be triggered by malicious sites.',
210
+ businessImpact: 'Unauthorized transactions.'
211
+ },
212
+ exploitability: {
213
+ attackVector: 'network',
214
+ attackComplexity: 'low',
215
+ privilegesRequired: 'none',
216
+ userInteraction: 'required'
217
+ },
218
+ remediation: {
219
+ summary: 'Generate and validate CSRF tokens for all forms.',
220
+ steps: [
221
+ 'Generate token in session and embed in forms',
222
+ 'Validate token on every POST request',
223
+ 'Regenerate token after use (one-time tokens)',
224
+ 'Use framework CSRF protection if available'
225
+ ],
226
+ secureCodeExample: `<?php
227
+ // Generate token
228
+ session_start();
229
+ if (empty($_SESSION['csrf_token'])) {
230
+ $_SESSION['csrf_token'] = bin2hex(random_bytes(32));
231
+ }
232
+
233
+ // In form
234
+ ?>
235
+ <form method="post">
236
+ <input type="hidden" name="csrf_token" value="<?= htmlspecialchars($_SESSION['csrf_token']) ?>">
237
+ ...
238
+ </form>
239
+
240
+ <?php
241
+ // Validate on submit
242
+ if ($_SERVER['REQUEST_METHOD'] === 'POST') {
243
+ if (!hash_equals($_SESSION['csrf_token'], $_POST['csrf_token'] ?? '')) {
244
+ die('CSRF validation failed');
245
+ }
246
+ // Process form...
247
+ }
248
+ ?>`,
249
+ effort: 'medium',
250
+ priority: 'high'
251
+ },
252
+ standards: {
253
+ owasp: [constants_1.OWASP_TOP_10_2021.A01],
254
+ cwe: [constants_1.CWE_REFERENCES.CWE_352]
255
+ },
256
+ tags: ['csrf', 'php', 'forms'],
257
+ enabled: true
258
+ }
259
+ ];
260
+ exports.default = exports.csrfRules;
261
+ //# sourceMappingURL=csrf.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"csrf.js","sourceRoot":"","sources":["../../../../src/rules/vulnerabilities/rules/csrf.ts"],"names":[],"mappings":";AAAA;;;GAGG;;;AAEH,oCAQkB;AAClB,4CAAiE;AAEpD,QAAA,SAAS,GAAwB;IAC5C;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,mCAAmC;QACzC,WAAW,EAAE,mEAAmE;QAChF,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,IAAI;QACzC,QAAQ,EAAE,6BAAqB,CAAC,qBAAqB;QACrD,SAAS,EAAE,CAAC,yBAAiB,CAAC,UAAU,EAAE,yBAAiB,CAAC,UAAU,CAAC;QACvE,QAAQ,EAAE,6BAAqB,CAAC,MAAM;QACtC,UAAU,EAAE,uBAAe,CAAC,MAAM;QAClC,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,eAAe;gBAC1B,OAAO,EAAE,iEAAiE;gBAC1E,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,2CAA2C;aACzD;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,eAAe;gBAC1B,OAAO,EAAE,sEAAsE;gBAC/E,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,qDAAqD;aACnE;SACF;QACD,MAAM,EAAE;YACN,eAAe,EAAE,KAAK;YACtB,SAAS,EAAE,MAAM;YACjB,YAAY,EAAE,KAAK;YACnB,eAAe,EAAE,gEAAgE;YACjF,cAAc,EAAE,6CAA6C;SAC9D;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,KAAK;YACvB,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,UAAU;SAC5B;QACD,WAAW,EAAE;YACX,OAAO,EAAE,wDAAwD;YACjE,KAAK,EAAE;gBACL,mCAAmC;gBACnC,8CAA8C;gBAC9C,6CAA6C;gBAC7C,iDAAiD;aAClD;YACD,iBAAiB,EAAE;;;;;;;;;;;;;;2BAcE;YACrB,MAAM,EAAE,QAAQ;YAChB,QAAQ,EAAE,MAAM;SACjB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,CAAC;YAC9B,GAAG,EAAE,CAAC,0BAAc,CAAC,OAAO,CAAC;SAC9B;QACD,IAAI,EAAE,CAAC,MAAM,EAAE,SAAS,EAAE,SAAS,CAAC;QACpC,OAAO,EAAE,IAAI;KACd;IACD;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,kCAAkC;QACxC,WAAW,EAAE,2DAA2D;QACxE,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,IAAI;QACzC,QAAQ,EAAE,6BAAqB,CAAC,qBAAqB;QACrD,SAAS,EAAE,CAAC,yBAAiB,CAAC,MAAM,CAAC;QACrC,QAAQ,EAAE,6BAAqB,CAAC,MAAM;QACtC,UAAU,EAAE,uBAAe,CAAC,IAAI;QAChC,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,oBAAoB;gBAC/B,OAAO,EAAE,cAAc;gBACvB,KAAK,EAAE,GAAG;gBACV,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,0BAA0B;aACxC;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,sBAAsB;gBACjC,OAAO,EAAE,kCAAkC;gBAC3C,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,wBAAwB;aACtC;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,yBAAyB;gBACpC,OAAO,EAAE,uBAAuB;gBAChC,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,GAAG;gBACX,WAAW,EAAE,+BAA+B;aAC7C;SACF;QACD,MAAM,EAAE;YACN,eAAe,EAAE,KAAK;YACtB,SAAS,EAAE,MAAM;YACjB,YAAY,EAAE,KAAK;YACnB,eAAe,EAAE,8CAA8C;YAC/D,cAAc,EAAE,0CAA0C;SAC3D;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,KAAK;YACvB,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,UAAU;SAC5B;QACD,WAAW,EAAE;YACX,OAAO,EAAE,6EAA6E;YACtF,KAAK,EAAE;gBACL,4CAA4C;gBAC5C,4CAA4C;gBAC5C,mCAAmC;gBACnC,mDAAmD;aACpD;YACD,iBAAiB,EAAE;;;;;;;;;;;;;;;;;;;;;SAqBhB;YACH,MAAM,EAAE,KAAK;YACb,QAAQ,EAAE,MAAM;SACjB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,CAAC;YAC9B,GAAG,EAAE,CAAC,0BAAc,CAAC,OAAO,CAAC;SAC9B;QACD,IAAI,EAAE,CAAC,MAAM,EAAE,QAAQ,EAAE,QAAQ,CAAC;QAClC,OAAO,EAAE,IAAI;KACd;IACD;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,+BAA+B;QACrC,WAAW,EAAE,kDAAkD;QAC/D,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,IAAI;QACzC,QAAQ,EAAE,6BAAqB,CAAC,qBAAqB;QACrD,SAAS,EAAE,CAAC,yBAAiB,CAAC,GAAG,CAAC;QAClC,QAAQ,EAAE,6BAAqB,CAAC,MAAM;QACtC,UAAU,EAAE,uBAAe,CAAC,GAAG;QAC/B,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,wBAAwB;gBACnC,OAAO,EAAE,6EAA6E;gBACtF,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,4CAA4C;aAC1D;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,wBAAwB;gBACnC,OAAO,EAAE,uFAAuF;gBAChG,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,yBAAyB;aACvC;SACF;QACD,MAAM,EAAE;YACN,eAAe,EAAE,KAAK;YACtB,SAAS,EAAE,MAAM;YACjB,YAAY,EAAE,KAAK;YACnB,eAAe,EAAE,6DAA6D;YAC9E,cAAc,EAAE,4BAA4B;SAC7C;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,KAAK;YACvB,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,UAAU;SAC5B;QACD,WAAW,EAAE;YACX,OAAO,EAAE,kDAAkD;YAC3D,KAAK,EAAE;gBACL,8CAA8C;gBAC9C,sCAAsC;gBACtC,8CAA8C;gBAC9C,4CAA4C;aAC7C;YACD,iBAAiB,EAAE;;;;;;;;;;;;;;;;;;;;;;GAsBtB;YACG,MAAM,EAAE,QAAQ;YAChB,QAAQ,EAAE,MAAM;SACjB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,CAAC;YAC9B,GAAG,EAAE,CAAC,0BAAc,CAAC,OAAO,CAAC;SAC9B;QACD,IAAI,EAAE,CAAC,MAAM,EAAE,KAAK,EAAE,OAAO,CAAC;QAC9B,OAAO,EAAE,IAAI;KACd;CACF,CAAC;AAEF,kBAAe,iBAAS,CAAC"}
@@ -0,0 +1,8 @@
1
+ /**
2
+ * @fileoverview Insecure Deserialization Detection Rules
3
+ * @module rules/vulnerabilities/rules/deserialization
4
+ */
5
+ import { VulnerabilityRule } from '../types';
6
+ export declare const deserializationRules: VulnerabilityRule[];
7
+ export default deserializationRules;
8
+ //# sourceMappingURL=deserialization.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"deserialization.d.ts","sourceRoot":"","sources":["../../../../src/rules/vulnerabilities/rules/deserialization.ts"],"names":[],"mappings":"AAAA;;;GAGG;AAEH,OAAO,EACL,iBAAiB,EAOlB,MAAM,UAAU,CAAC;AAGlB,eAAO,MAAM,oBAAoB,EAAE,iBAAiB,EAoUnD,CAAC;AAEF,eAAe,oBAAoB,CAAC"}