secure-scan 1.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (569) hide show
  1. package/README.md +564 -0
  2. package/dist/ai/aiAnalyzer.d.ts +99 -0
  3. package/dist/ai/aiAnalyzer.d.ts.map +1 -0
  4. package/dist/ai/aiAnalyzer.js +669 -0
  5. package/dist/ai/aiAnalyzer.js.map +1 -0
  6. package/dist/ai/index.d.ts +5 -0
  7. package/dist/ai/index.d.ts.map +1 -0
  8. package/dist/ai/index.js +21 -0
  9. package/dist/ai/index.js.map +1 -0
  10. package/dist/analyzers/base/baseAnalyzer.d.ts +44 -0
  11. package/dist/analyzers/base/baseAnalyzer.d.ts.map +1 -0
  12. package/dist/analyzers/base/baseAnalyzer.js +53 -0
  13. package/dist/analyzers/base/baseAnalyzer.js.map +1 -0
  14. package/dist/analyzers/base/index.d.ts +5 -0
  15. package/dist/analyzers/base/index.d.ts.map +1 -0
  16. package/dist/analyzers/base/index.js +21 -0
  17. package/dist/analyzers/base/index.js.map +1 -0
  18. package/dist/analyzers/c-cpp/cppAnalyzer.d.ts +60 -0
  19. package/dist/analyzers/c-cpp/cppAnalyzer.d.ts.map +1 -0
  20. package/dist/analyzers/c-cpp/cppAnalyzer.js +218 -0
  21. package/dist/analyzers/c-cpp/cppAnalyzer.js.map +1 -0
  22. package/dist/analyzers/c-cpp/index.d.ts +5 -0
  23. package/dist/analyzers/c-cpp/index.d.ts.map +1 -0
  24. package/dist/analyzers/c-cpp/index.js +21 -0
  25. package/dist/analyzers/c-cpp/index.js.map +1 -0
  26. package/dist/analyzers/core/engine/index.d.ts +5 -0
  27. package/dist/analyzers/core/engine/index.d.ts.map +1 -0
  28. package/dist/analyzers/core/engine/index.js +21 -0
  29. package/dist/analyzers/core/engine/index.js.map +1 -0
  30. package/dist/analyzers/core/engine/ruleEngine.d.ts +46 -0
  31. package/dist/analyzers/core/engine/ruleEngine.d.ts.map +1 -0
  32. package/dist/analyzers/core/engine/ruleEngine.js +173 -0
  33. package/dist/analyzers/core/engine/ruleEngine.js.map +1 -0
  34. package/dist/analyzers/core/index.d.ts +8 -0
  35. package/dist/analyzers/core/index.d.ts.map +1 -0
  36. package/dist/analyzers/core/index.js +24 -0
  37. package/dist/analyzers/core/index.js.map +1 -0
  38. package/dist/analyzers/core/scanner/fileScanner.d.ts +31 -0
  39. package/dist/analyzers/core/scanner/fileScanner.d.ts.map +1 -0
  40. package/dist/analyzers/core/scanner/fileScanner.js +199 -0
  41. package/dist/analyzers/core/scanner/fileScanner.js.map +1 -0
  42. package/dist/analyzers/core/scanner/index.d.ts +5 -0
  43. package/dist/analyzers/core/scanner/index.d.ts.map +1 -0
  44. package/dist/analyzers/core/scanner/index.js +21 -0
  45. package/dist/analyzers/core/scanner/index.js.map +1 -0
  46. package/dist/analyzers/core/scoring/index.d.ts +5 -0
  47. package/dist/analyzers/core/scoring/index.d.ts.map +1 -0
  48. package/dist/analyzers/core/scoring/index.js +21 -0
  49. package/dist/analyzers/core/scoring/index.js.map +1 -0
  50. package/dist/analyzers/core/scoring/riskScoring.d.ts +49 -0
  51. package/dist/analyzers/core/scoring/riskScoring.d.ts.map +1 -0
  52. package/dist/analyzers/core/scoring/riskScoring.js +180 -0
  53. package/dist/analyzers/core/scoring/riskScoring.js.map +1 -0
  54. package/dist/analyzers/core/securityScanner.d.ts +47 -0
  55. package/dist/analyzers/core/securityScanner.d.ts.map +1 -0
  56. package/dist/analyzers/core/securityScanner.js +298 -0
  57. package/dist/analyzers/core/securityScanner.js.map +1 -0
  58. package/dist/analyzers/csharp/csharpAnalyzer.d.ts +64 -0
  59. package/dist/analyzers/csharp/csharpAnalyzer.d.ts.map +1 -0
  60. package/dist/analyzers/csharp/csharpAnalyzer.js +232 -0
  61. package/dist/analyzers/csharp/csharpAnalyzer.js.map +1 -0
  62. package/dist/analyzers/csharp/index.d.ts +5 -0
  63. package/dist/analyzers/csharp/index.d.ts.map +1 -0
  64. package/dist/analyzers/csharp/index.js +21 -0
  65. package/dist/analyzers/csharp/index.js.map +1 -0
  66. package/dist/analyzers/iac/iacAnalyzer.d.ts +36 -0
  67. package/dist/analyzers/iac/iacAnalyzer.d.ts.map +1 -0
  68. package/dist/analyzers/iac/iacAnalyzer.js +182 -0
  69. package/dist/analyzers/iac/iacAnalyzer.js.map +1 -0
  70. package/dist/analyzers/iac/index.d.ts +5 -0
  71. package/dist/analyzers/iac/index.d.ts.map +1 -0
  72. package/dist/analyzers/iac/index.js +21 -0
  73. package/dist/analyzers/iac/index.js.map +1 -0
  74. package/dist/analyzers/index.d.ts +30 -0
  75. package/dist/analyzers/index.d.ts.map +1 -0
  76. package/dist/analyzers/index.js +80 -0
  77. package/dist/analyzers/index.js.map +1 -0
  78. package/dist/analyzers/java/index.d.ts +5 -0
  79. package/dist/analyzers/java/index.d.ts.map +1 -0
  80. package/dist/analyzers/java/index.js +21 -0
  81. package/dist/analyzers/java/index.js.map +1 -0
  82. package/dist/analyzers/java/javaAnalyzer.d.ts +64 -0
  83. package/dist/analyzers/java/javaAnalyzer.d.ts.map +1 -0
  84. package/dist/analyzers/java/javaAnalyzer.js +224 -0
  85. package/dist/analyzers/java/javaAnalyzer.js.map +1 -0
  86. package/dist/analyzers/javascript/astUtils.d.ts +170 -0
  87. package/dist/analyzers/javascript/astUtils.d.ts.map +1 -0
  88. package/dist/analyzers/javascript/astUtils.js +700 -0
  89. package/dist/analyzers/javascript/astUtils.js.map +1 -0
  90. package/dist/analyzers/javascript/index.d.ts +18 -0
  91. package/dist/analyzers/javascript/index.d.ts.map +1 -0
  92. package/dist/analyzers/javascript/index.js +50 -0
  93. package/dist/analyzers/javascript/index.js.map +1 -0
  94. package/dist/analyzers/javascript/javascriptAnalyzer.d.ts +111 -0
  95. package/dist/analyzers/javascript/javascriptAnalyzer.d.ts.map +1 -0
  96. package/dist/analyzers/javascript/javascriptAnalyzer.js +860 -0
  97. package/dist/analyzers/javascript/javascriptAnalyzer.js.map +1 -0
  98. package/dist/analyzers/javascript/malwareDetector.d.ts +102 -0
  99. package/dist/analyzers/javascript/malwareDetector.d.ts.map +1 -0
  100. package/dist/analyzers/javascript/malwareDetector.js +616 -0
  101. package/dist/analyzers/javascript/malwareDetector.js.map +1 -0
  102. package/dist/analyzers/javascript/packageJsonAnalyzer.d.ts +87 -0
  103. package/dist/analyzers/javascript/packageJsonAnalyzer.d.ts.map +1 -0
  104. package/dist/analyzers/javascript/packageJsonAnalyzer.js +553 -0
  105. package/dist/analyzers/javascript/packageJsonAnalyzer.js.map +1 -0
  106. package/dist/analyzers/javascript/taintAnalyzer.d.ts +120 -0
  107. package/dist/analyzers/javascript/taintAnalyzer.d.ts.map +1 -0
  108. package/dist/analyzers/javascript/taintAnalyzer.js +526 -0
  109. package/dist/analyzers/javascript/taintAnalyzer.js.map +1 -0
  110. package/dist/analyzers/php/index.d.ts +5 -0
  111. package/dist/analyzers/php/index.d.ts.map +1 -0
  112. package/dist/analyzers/php/index.js +21 -0
  113. package/dist/analyzers/php/index.js.map +1 -0
  114. package/dist/analyzers/php/phpAnalyzer.d.ts +56 -0
  115. package/dist/analyzers/php/phpAnalyzer.d.ts.map +1 -0
  116. package/dist/analyzers/php/phpAnalyzer.js +202 -0
  117. package/dist/analyzers/php/phpAnalyzer.js.map +1 -0
  118. package/dist/analyzers/python/index.d.ts +5 -0
  119. package/dist/analyzers/python/index.d.ts.map +1 -0
  120. package/dist/analyzers/python/index.js +21 -0
  121. package/dist/analyzers/python/index.js.map +1 -0
  122. package/dist/analyzers/python/pythonAnalyzer.d.ts +64 -0
  123. package/dist/analyzers/python/pythonAnalyzer.d.ts.map +1 -0
  124. package/dist/analyzers/python/pythonAnalyzer.js +226 -0
  125. package/dist/analyzers/python/pythonAnalyzer.js.map +1 -0
  126. package/dist/cli/index.d.ts +7 -0
  127. package/dist/cli/index.d.ts.map +1 -0
  128. package/dist/cli/index.js +281 -0
  129. package/dist/cli/index.js.map +1 -0
  130. package/dist/core/engine/index.d.ts +5 -0
  131. package/dist/core/engine/index.d.ts.map +1 -0
  132. package/dist/core/engine/index.js +21 -0
  133. package/dist/core/engine/index.js.map +1 -0
  134. package/dist/core/engine/ruleEngine.d.ts +46 -0
  135. package/dist/core/engine/ruleEngine.d.ts.map +1 -0
  136. package/dist/core/engine/ruleEngine.js +173 -0
  137. package/dist/core/engine/ruleEngine.js.map +1 -0
  138. package/dist/core/index.d.ts +8 -0
  139. package/dist/core/index.d.ts.map +1 -0
  140. package/dist/core/index.js +24 -0
  141. package/dist/core/index.js.map +1 -0
  142. package/dist/core/scanner/fileScanner.d.ts +31 -0
  143. package/dist/core/scanner/fileScanner.d.ts.map +1 -0
  144. package/dist/core/scanner/fileScanner.js +199 -0
  145. package/dist/core/scanner/fileScanner.js.map +1 -0
  146. package/dist/core/scanner/index.d.ts +5 -0
  147. package/dist/core/scanner/index.d.ts.map +1 -0
  148. package/dist/core/scanner/index.js +21 -0
  149. package/dist/core/scanner/index.js.map +1 -0
  150. package/dist/core/scoring/index.d.ts +5 -0
  151. package/dist/core/scoring/index.d.ts.map +1 -0
  152. package/dist/core/scoring/index.js +21 -0
  153. package/dist/core/scoring/index.js.map +1 -0
  154. package/dist/core/scoring/riskScoring.d.ts +49 -0
  155. package/dist/core/scoring/riskScoring.d.ts.map +1 -0
  156. package/dist/core/scoring/riskScoring.js +180 -0
  157. package/dist/core/scoring/riskScoring.js.map +1 -0
  158. package/dist/core/securityScanner.d.ts +47 -0
  159. package/dist/core/securityScanner.d.ts.map +1 -0
  160. package/dist/core/securityScanner.js +298 -0
  161. package/dist/core/securityScanner.js.map +1 -0
  162. package/dist/dependencies/aiDependencyAnalyzer.d.ts +96 -0
  163. package/dist/dependencies/aiDependencyAnalyzer.d.ts.map +1 -0
  164. package/dist/dependencies/aiDependencyAnalyzer.js +435 -0
  165. package/dist/dependencies/aiDependencyAnalyzer.js.map +1 -0
  166. package/dist/dependencies/database/cveDatabase.d.ts +32 -0
  167. package/dist/dependencies/database/cveDatabase.d.ts.map +1 -0
  168. package/dist/dependencies/database/cveDatabase.js +393 -0
  169. package/dist/dependencies/database/cveDatabase.js.map +1 -0
  170. package/dist/dependencies/database/index.d.ts +6 -0
  171. package/dist/dependencies/database/index.d.ts.map +1 -0
  172. package/dist/dependencies/database/index.js +22 -0
  173. package/dist/dependencies/database/index.js.map +1 -0
  174. package/dist/dependencies/database/maliciousPackages.d.ts +43 -0
  175. package/dist/dependencies/database/maliciousPackages.d.ts.map +1 -0
  176. package/dist/dependencies/database/maliciousPackages.js +279 -0
  177. package/dist/dependencies/database/maliciousPackages.js.map +1 -0
  178. package/dist/dependencies/dependencyAnalyzer.d.ts +74 -0
  179. package/dist/dependencies/dependencyAnalyzer.d.ts.map +1 -0
  180. package/dist/dependencies/dependencyAnalyzer.js +349 -0
  181. package/dist/dependencies/dependencyAnalyzer.js.map +1 -0
  182. package/dist/dependencies/detectors/index.d.ts +7 -0
  183. package/dist/dependencies/detectors/index.d.ts.map +1 -0
  184. package/dist/dependencies/detectors/index.js +28 -0
  185. package/dist/dependencies/detectors/index.js.map +1 -0
  186. package/dist/dependencies/detectors/securityStandards.d.ts +15 -0
  187. package/dist/dependencies/detectors/securityStandards.d.ts.map +1 -0
  188. package/dist/dependencies/detectors/securityStandards.js +178 -0
  189. package/dist/dependencies/detectors/securityStandards.js.map +1 -0
  190. package/dist/dependencies/detectors/vulnerabilityDetector.d.ts +53 -0
  191. package/dist/dependencies/detectors/vulnerabilityDetector.d.ts.map +1 -0
  192. package/dist/dependencies/detectors/vulnerabilityDetector.js +289 -0
  193. package/dist/dependencies/detectors/vulnerabilityDetector.js.map +1 -0
  194. package/dist/dependencies/index.d.ts +14 -0
  195. package/dist/dependencies/index.d.ts.map +1 -0
  196. package/dist/dependencies/index.js +43 -0
  197. package/dist/dependencies/index.js.map +1 -0
  198. package/dist/dependencies/installed/index.d.ts +8 -0
  199. package/dist/dependencies/installed/index.d.ts.map +1 -0
  200. package/dist/dependencies/installed/index.js +24 -0
  201. package/dist/dependencies/installed/index.js.map +1 -0
  202. package/dist/dependencies/installed/installedScanner.d.ts +91 -0
  203. package/dist/dependencies/installed/installedScanner.d.ts.map +1 -0
  204. package/dist/dependencies/installed/installedScanner.js +766 -0
  205. package/dist/dependencies/installed/installedScanner.js.map +1 -0
  206. package/dist/dependencies/installed/malwarePatterns.d.ts +32 -0
  207. package/dist/dependencies/installed/malwarePatterns.d.ts.map +1 -0
  208. package/dist/dependencies/installed/malwarePatterns.js +480 -0
  209. package/dist/dependencies/installed/malwarePatterns.js.map +1 -0
  210. package/dist/dependencies/installed/types.d.ts +274 -0
  211. package/dist/dependencies/installed/types.d.ts.map +1 -0
  212. package/dist/dependencies/installed/types.js +7 -0
  213. package/dist/dependencies/installed/types.js.map +1 -0
  214. package/dist/dependencies/parsers/base/baseParser.d.ts +44 -0
  215. package/dist/dependencies/parsers/base/baseParser.d.ts.map +1 -0
  216. package/dist/dependencies/parsers/base/baseParser.js +80 -0
  217. package/dist/dependencies/parsers/base/baseParser.js.map +1 -0
  218. package/dist/dependencies/parsers/base/index.d.ts +6 -0
  219. package/dist/dependencies/parsers/base/index.d.ts.map +1 -0
  220. package/dist/dependencies/parsers/base/index.js +27 -0
  221. package/dist/dependencies/parsers/base/index.js.map +1 -0
  222. package/dist/dependencies/parsers/cpp/cppParser.d.ts +36 -0
  223. package/dist/dependencies/parsers/cpp/cppParser.d.ts.map +1 -0
  224. package/dist/dependencies/parsers/cpp/cppParser.js +196 -0
  225. package/dist/dependencies/parsers/cpp/cppParser.js.map +1 -0
  226. package/dist/dependencies/parsers/cpp/index.d.ts +6 -0
  227. package/dist/dependencies/parsers/cpp/index.d.ts.map +1 -0
  228. package/dist/dependencies/parsers/cpp/index.js +27 -0
  229. package/dist/dependencies/parsers/cpp/index.js.map +1 -0
  230. package/dist/dependencies/parsers/csharp/csharpParser.d.ts +32 -0
  231. package/dist/dependencies/parsers/csharp/csharpParser.d.ts.map +1 -0
  232. package/dist/dependencies/parsers/csharp/csharpParser.js +125 -0
  233. package/dist/dependencies/parsers/csharp/csharpParser.js.map +1 -0
  234. package/dist/dependencies/parsers/csharp/index.d.ts +6 -0
  235. package/dist/dependencies/parsers/csharp/index.d.ts.map +1 -0
  236. package/dist/dependencies/parsers/csharp/index.js +27 -0
  237. package/dist/dependencies/parsers/csharp/index.js.map +1 -0
  238. package/dist/dependencies/parsers/index.d.ts +24 -0
  239. package/dist/dependencies/parsers/index.d.ts.map +1 -0
  240. package/dist/dependencies/parsers/index.js +69 -0
  241. package/dist/dependencies/parsers/index.js.map +1 -0
  242. package/dist/dependencies/parsers/java/index.d.ts +6 -0
  243. package/dist/dependencies/parsers/java/index.d.ts.map +1 -0
  244. package/dist/dependencies/parsers/java/index.js +27 -0
  245. package/dist/dependencies/parsers/java/index.js.map +1 -0
  246. package/dist/dependencies/parsers/java/javaParser.d.ts +32 -0
  247. package/dist/dependencies/parsers/java/javaParser.d.ts.map +1 -0
  248. package/dist/dependencies/parsers/java/javaParser.js +168 -0
  249. package/dist/dependencies/parsers/java/javaParser.js.map +1 -0
  250. package/dist/dependencies/parsers/javascript/index.d.ts +6 -0
  251. package/dist/dependencies/parsers/javascript/index.d.ts.map +1 -0
  252. package/dist/dependencies/parsers/javascript/index.js +27 -0
  253. package/dist/dependencies/parsers/javascript/index.js.map +1 -0
  254. package/dist/dependencies/parsers/javascript/javascriptParser.d.ts +55 -0
  255. package/dist/dependencies/parsers/javascript/javascriptParser.d.ts.map +1 -0
  256. package/dist/dependencies/parsers/javascript/javascriptParser.js +266 -0
  257. package/dist/dependencies/parsers/javascript/javascriptParser.js.map +1 -0
  258. package/dist/dependencies/parsers/php/index.d.ts +6 -0
  259. package/dist/dependencies/parsers/php/index.d.ts.map +1 -0
  260. package/dist/dependencies/parsers/php/index.js +27 -0
  261. package/dist/dependencies/parsers/php/index.js.map +1 -0
  262. package/dist/dependencies/parsers/php/phpParser.d.ts +35 -0
  263. package/dist/dependencies/parsers/php/phpParser.d.ts.map +1 -0
  264. package/dist/dependencies/parsers/php/phpParser.js +162 -0
  265. package/dist/dependencies/parsers/php/phpParser.js.map +1 -0
  266. package/dist/dependencies/parsers/python/index.d.ts +6 -0
  267. package/dist/dependencies/parsers/python/index.d.ts.map +1 -0
  268. package/dist/dependencies/parsers/python/index.js +27 -0
  269. package/dist/dependencies/parsers/python/index.js.map +1 -0
  270. package/dist/dependencies/parsers/python/pythonParser.d.ts +60 -0
  271. package/dist/dependencies/parsers/python/pythonParser.d.ts.map +1 -0
  272. package/dist/dependencies/parsers/python/pythonParser.js +336 -0
  273. package/dist/dependencies/parsers/python/pythonParser.js.map +1 -0
  274. package/dist/dependencies/types.d.ts +280 -0
  275. package/dist/dependencies/types.d.ts.map +1 -0
  276. package/dist/dependencies/types.js +59 -0
  277. package/dist/dependencies/types.js.map +1 -0
  278. package/dist/i18n/index.d.ts +2 -0
  279. package/dist/i18n/index.d.ts.map +1 -0
  280. package/dist/i18n/index.js +18 -0
  281. package/dist/i18n/index.js.map +1 -0
  282. package/dist/i18n/translations.d.ts +55 -0
  283. package/dist/i18n/translations.d.ts.map +1 -0
  284. package/dist/i18n/translations.js +119 -0
  285. package/dist/i18n/translations.js.map +1 -0
  286. package/dist/index.d.ts +14 -0
  287. package/dist/index.d.ts.map +1 -0
  288. package/dist/index.js +36 -0
  289. package/dist/index.js.map +1 -0
  290. package/dist/reports/dependencyReportGenerator.d.ts +20 -0
  291. package/dist/reports/dependencyReportGenerator.d.ts.map +1 -0
  292. package/dist/reports/dependencyReportGenerator.js +690 -0
  293. package/dist/reports/dependencyReportGenerator.js.map +1 -0
  294. package/dist/reports/htmlReportGenerator.d.ts +43 -0
  295. package/dist/reports/htmlReportGenerator.d.ts.map +1 -0
  296. package/dist/reports/htmlReportGenerator.js +793 -0
  297. package/dist/reports/htmlReportGenerator.js.map +1 -0
  298. package/dist/reports/index.d.ts +7 -0
  299. package/dist/reports/index.d.ts.map +1 -0
  300. package/dist/reports/index.js +23 -0
  301. package/dist/reports/index.js.map +1 -0
  302. package/dist/reports/installedDepsReportGenerator.d.ts +14 -0
  303. package/dist/reports/installedDepsReportGenerator.d.ts.map +1 -0
  304. package/dist/reports/installedDepsReportGenerator.js +872 -0
  305. package/dist/reports/installedDepsReportGenerator.js.map +1 -0
  306. package/dist/rules/index.d.ts +31 -0
  307. package/dist/rules/index.d.ts.map +1 -0
  308. package/dist/rules/index.js +95 -0
  309. package/dist/rules/index.js.map +1 -0
  310. package/dist/rules/malware/categories/backdoors.d.ts +12 -0
  311. package/dist/rules/malware/categories/backdoors.d.ts.map +1 -0
  312. package/dist/rules/malware/categories/backdoors.js +163 -0
  313. package/dist/rules/malware/categories/backdoors.js.map +1 -0
  314. package/dist/rules/malware/categories/cryptominers.d.ts +13 -0
  315. package/dist/rules/malware/categories/cryptominers.d.ts.map +1 -0
  316. package/dist/rules/malware/categories/cryptominers.js +415 -0
  317. package/dist/rules/malware/categories/cryptominers.js.map +1 -0
  318. package/dist/rules/malware/categories/exfiltration.d.ts +20 -0
  319. package/dist/rules/malware/categories/exfiltration.d.ts.map +1 -0
  320. package/dist/rules/malware/categories/exfiltration.js +658 -0
  321. package/dist/rules/malware/categories/exfiltration.js.map +1 -0
  322. package/dist/rules/malware/categories/keyloggers.d.ts +19 -0
  323. package/dist/rules/malware/categories/keyloggers.d.ts.map +1 -0
  324. package/dist/rules/malware/categories/keyloggers.js +763 -0
  325. package/dist/rules/malware/categories/keyloggers.js.map +1 -0
  326. package/dist/rules/malware/categories/loaders.d.ts +20 -0
  327. package/dist/rules/malware/categories/loaders.d.ts.map +1 -0
  328. package/dist/rules/malware/categories/loaders.js +702 -0
  329. package/dist/rules/malware/categories/loaders.js.map +1 -0
  330. package/dist/rules/malware/categories/network.d.ts +19 -0
  331. package/dist/rules/malware/categories/network.d.ts.map +1 -0
  332. package/dist/rules/malware/categories/network.js +622 -0
  333. package/dist/rules/malware/categories/network.js.map +1 -0
  334. package/dist/rules/malware/categories/obfuscation.d.ts +22 -0
  335. package/dist/rules/malware/categories/obfuscation.d.ts.map +1 -0
  336. package/dist/rules/malware/categories/obfuscation.js +766 -0
  337. package/dist/rules/malware/categories/obfuscation.js.map +1 -0
  338. package/dist/rules/malware/constants/index.d.ts +281 -0
  339. package/dist/rules/malware/constants/index.d.ts.map +1 -0
  340. package/dist/rules/malware/constants/index.js +327 -0
  341. package/dist/rules/malware/constants/index.js.map +1 -0
  342. package/dist/rules/malware/engine/index.d.ts +178 -0
  343. package/dist/rules/malware/engine/index.d.ts.map +1 -0
  344. package/dist/rules/malware/engine/index.js +552 -0
  345. package/dist/rules/malware/engine/index.js.map +1 -0
  346. package/dist/rules/malware/index.d.ts +205 -0
  347. package/dist/rules/malware/index.d.ts.map +1 -0
  348. package/dist/rules/malware/index.js +837 -0
  349. package/dist/rules/malware/index.js.map +1 -0
  350. package/dist/rules/malware/scoring/index.d.ts +84 -0
  351. package/dist/rules/malware/scoring/index.d.ts.map +1 -0
  352. package/dist/rules/malware/scoring/index.js +441 -0
  353. package/dist/rules/malware/scoring/index.js.map +1 -0
  354. package/dist/rules/malware/types/index.d.ts +616 -0
  355. package/dist/rules/malware/types/index.d.ts.map +1 -0
  356. package/dist/rules/malware/types/index.js +155 -0
  357. package/dist/rules/malware/types/index.js.map +1 -0
  358. package/dist/rules/malware/utils/index.d.ts +117 -0
  359. package/dist/rules/malware/utils/index.d.ts.map +1 -0
  360. package/dist/rules/malware/utils/index.js +514 -0
  361. package/dist/rules/malware/utils/index.js.map +1 -0
  362. package/dist/rules/standards.d.ts +26 -0
  363. package/dist/rules/standards.d.ts.map +1 -0
  364. package/dist/rules/standards.js +352 -0
  365. package/dist/rules/standards.js.map +1 -0
  366. package/dist/rules/vulnerabilities/constants/index.d.ts +835 -0
  367. package/dist/rules/vulnerabilities/constants/index.d.ts.map +1 -0
  368. package/dist/rules/vulnerabilities/constants/index.js +544 -0
  369. package/dist/rules/vulnerabilities/constants/index.js.map +1 -0
  370. package/dist/rules/vulnerabilities/engine/index.d.ts +145 -0
  371. package/dist/rules/vulnerabilities/engine/index.d.ts.map +1 -0
  372. package/dist/rules/vulnerabilities/engine/index.js +581 -0
  373. package/dist/rules/vulnerabilities/engine/index.js.map +1 -0
  374. package/dist/rules/vulnerabilities/index.d.ts +148 -0
  375. package/dist/rules/vulnerabilities/index.d.ts.map +1 -0
  376. package/dist/rules/vulnerabilities/index.js +252 -0
  377. package/dist/rules/vulnerabilities/index.js.map +1 -0
  378. package/dist/rules/vulnerabilities/rules/authentication.d.ts +8 -0
  379. package/dist/rules/vulnerabilities/rules/authentication.d.ts.map +1 -0
  380. package/dist/rules/vulnerabilities/rules/authentication.js +419 -0
  381. package/dist/rules/vulnerabilities/rules/authentication.js.map +1 -0
  382. package/dist/rules/vulnerabilities/rules/commandInjection.d.ts +8 -0
  383. package/dist/rules/vulnerabilities/rules/commandInjection.d.ts.map +1 -0
  384. package/dist/rules/vulnerabilities/rules/commandInjection.js +300 -0
  385. package/dist/rules/vulnerabilities/rules/commandInjection.js.map +1 -0
  386. package/dist/rules/vulnerabilities/rules/csrf.d.ts +8 -0
  387. package/dist/rules/vulnerabilities/rules/csrf.d.ts.map +1 -0
  388. package/dist/rules/vulnerabilities/rules/csrf.js +261 -0
  389. package/dist/rules/vulnerabilities/rules/csrf.js.map +1 -0
  390. package/dist/rules/vulnerabilities/rules/deserialization.d.ts +8 -0
  391. package/dist/rules/vulnerabilities/rules/deserialization.d.ts.map +1 -0
  392. package/dist/rules/vulnerabilities/rules/deserialization.js +336 -0
  393. package/dist/rules/vulnerabilities/rules/deserialization.js.map +1 -0
  394. package/dist/rules/vulnerabilities/rules/fileUpload.d.ts +8 -0
  395. package/dist/rules/vulnerabilities/rules/fileUpload.d.ts.map +1 -0
  396. package/dist/rules/vulnerabilities/rules/fileUpload.js +325 -0
  397. package/dist/rules/vulnerabilities/rules/fileUpload.js.map +1 -0
  398. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.d.ts +8 -0
  399. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.d.ts.map +1 -0
  400. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.js +446 -0
  401. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.js.map +1 -0
  402. package/dist/rules/vulnerabilities/rules/index.d.ts +17 -0
  403. package/dist/rules/vulnerabilities/rules/index.d.ts.map +1 -0
  404. package/dist/rules/vulnerabilities/rules/index.js +47 -0
  405. package/dist/rules/vulnerabilities/rules/index.js.map +1 -0
  406. package/dist/rules/vulnerabilities/rules/pathTraversal.d.ts +8 -0
  407. package/dist/rules/vulnerabilities/rules/pathTraversal.d.ts.map +1 -0
  408. package/dist/rules/vulnerabilities/rules/pathTraversal.js +351 -0
  409. package/dist/rules/vulnerabilities/rules/pathTraversal.js.map +1 -0
  410. package/dist/rules/vulnerabilities/rules/prototypePollution.d.ts +8 -0
  411. package/dist/rules/vulnerabilities/rules/prototypePollution.d.ts.map +1 -0
  412. package/dist/rules/vulnerabilities/rules/prototypePollution.js +272 -0
  413. package/dist/rules/vulnerabilities/rules/prototypePollution.js.map +1 -0
  414. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.d.ts +8 -0
  415. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.d.ts.map +1 -0
  416. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.js +438 -0
  417. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.js.map +1 -0
  418. package/dist/rules/vulnerabilities/rules/sqlInjection.d.ts +12 -0
  419. package/dist/rules/vulnerabilities/rules/sqlInjection.d.ts.map +1 -0
  420. package/dist/rules/vulnerabilities/rules/sqlInjection.js +636 -0
  421. package/dist/rules/vulnerabilities/rules/sqlInjection.js.map +1 -0
  422. package/dist/rules/vulnerabilities/rules/ssrf.d.ts +8 -0
  423. package/dist/rules/vulnerabilities/rules/ssrf.d.ts.map +1 -0
  424. package/dist/rules/vulnerabilities/rules/ssrf.js +401 -0
  425. package/dist/rules/vulnerabilities/rules/ssrf.js.map +1 -0
  426. package/dist/rules/vulnerabilities/rules/xss.d.ts +11 -0
  427. package/dist/rules/vulnerabilities/rules/xss.d.ts.map +1 -0
  428. package/dist/rules/vulnerabilities/rules/xss.js +724 -0
  429. package/dist/rules/vulnerabilities/rules/xss.js.map +1 -0
  430. package/dist/rules/vulnerabilities/scoring/index.d.ts +80 -0
  431. package/dist/rules/vulnerabilities/scoring/index.d.ts.map +1 -0
  432. package/dist/rules/vulnerabilities/scoring/index.js +414 -0
  433. package/dist/rules/vulnerabilities/scoring/index.js.map +1 -0
  434. package/dist/rules/vulnerabilities/types/index.d.ts +830 -0
  435. package/dist/rules/vulnerabilities/types/index.d.ts.map +1 -0
  436. package/dist/rules/vulnerabilities/types/index.js +164 -0
  437. package/dist/rules/vulnerabilities/types/index.js.map +1 -0
  438. package/dist/rules/vulnerabilities/utils/index.d.ts +206 -0
  439. package/dist/rules/vulnerabilities/utils/index.d.ts.map +1 -0
  440. package/dist/rules/vulnerabilities/utils/index.js +615 -0
  441. package/dist/rules/vulnerabilities/utils/index.js.map +1 -0
  442. package/dist/types/index.d.ts +359 -0
  443. package/dist/types/index.d.ts.map +1 -0
  444. package/dist/types/index.js +61 -0
  445. package/dist/types/index.js.map +1 -0
  446. package/dist/utils/index.d.ts +82 -0
  447. package/dist/utils/index.d.ts.map +1 -0
  448. package/dist/utils/index.js +326 -0
  449. package/dist/utils/index.js.map +1 -0
  450. package/dist/utils/logger.d.ts +40 -0
  451. package/dist/utils/logger.d.ts.map +1 -0
  452. package/dist/utils/logger.js +139 -0
  453. package/dist/utils/logger.js.map +1 -0
  454. package/docs/ARCHITECTURE.md +320 -0
  455. package/docs/V1.2.1-IA_Performances.md +116 -0
  456. package/docs/images/WIN_Defender.png +0 -0
  457. package/package.json +68 -0
  458. package/secure-scan.config.json +134 -0
  459. package/secure-scan.sln +29 -0
  460. package/src/ai/aiAnalyzer.ts +714 -0
  461. package/src/ai/index.ts +5 -0
  462. package/src/analyzers/base/baseAnalyzer.ts +66 -0
  463. package/src/analyzers/base/index.ts +5 -0
  464. package/src/analyzers/c-cpp/cppAnalyzer.ts +308 -0
  465. package/src/analyzers/c-cpp/index.ts +5 -0
  466. package/src/analyzers/core/engine/index.ts +5 -0
  467. package/src/analyzers/core/engine/ruleEngine.ts +221 -0
  468. package/src/analyzers/core/index.ts +8 -0
  469. package/src/analyzers/core/scanner/fileScanner.ts +204 -0
  470. package/src/analyzers/core/scanner/index.ts +5 -0
  471. package/src/analyzers/core/scoring/index.ts +5 -0
  472. package/src/analyzers/core/scoring/riskScoring.ts +198 -0
  473. package/src/analyzers/core/securityScanner.ts +321 -0
  474. package/src/analyzers/csharp/csharpAnalyzer.ts +328 -0
  475. package/src/analyzers/csharp/index.ts +5 -0
  476. package/src/analyzers/iac/iacAnalyzer.ts +318 -0
  477. package/src/analyzers/iac/index.ts +5 -0
  478. package/src/analyzers/index.ts +67 -0
  479. package/src/analyzers/java/index.ts +5 -0
  480. package/src/analyzers/java/javaAnalyzer.ts +320 -0
  481. package/src/analyzers/javascript/PROMPT_JS_ANALYZER.md +267 -0
  482. package/src/analyzers/javascript/astUtils.ts +789 -0
  483. package/src/analyzers/javascript/index.ts +50 -0
  484. package/src/analyzers/javascript/javascriptAnalyzer.ts +984 -0
  485. package/src/analyzers/javascript/malwareDetector.ts +697 -0
  486. package/src/analyzers/javascript/packageJsonAnalyzer.ts +626 -0
  487. package/src/analyzers/javascript/taintAnalyzer.ts +630 -0
  488. package/src/analyzers/php/index.ts +5 -0
  489. package/src/analyzers/php/phpAnalyzer.ts +280 -0
  490. package/src/analyzers/python/index.ts +5 -0
  491. package/src/analyzers/python/pythonAnalyzer.ts +319 -0
  492. package/src/cli/index.ts +276 -0
  493. package/src/dependencies/aiDependencyAnalyzer.ts +496 -0
  494. package/src/dependencies/database/cveDatabase.ts +426 -0
  495. package/src/dependencies/database/index.ts +6 -0
  496. package/src/dependencies/database/maliciousPackages.ts +286 -0
  497. package/src/dependencies/dependencyAnalyzer.ts +394 -0
  498. package/src/dependencies/detectors/index.ts +7 -0
  499. package/src/dependencies/detectors/securityStandards.ts +200 -0
  500. package/src/dependencies/detectors/vulnerabilityDetector.ts +343 -0
  501. package/src/dependencies/index.ts +27 -0
  502. package/src/dependencies/installed/index.ts +8 -0
  503. package/src/dependencies/installed/installedScanner.ts +821 -0
  504. package/src/dependencies/installed/malwarePatterns.ts +492 -0
  505. package/src/dependencies/installed/types.ts +287 -0
  506. package/src/dependencies/parsers/base/baseParser.ts +108 -0
  507. package/src/dependencies/parsers/base/index.ts +6 -0
  508. package/src/dependencies/parsers/cpp/cppParser.ts +245 -0
  509. package/src/dependencies/parsers/cpp/index.ts +6 -0
  510. package/src/dependencies/parsers/csharp/csharpParser.ts +151 -0
  511. package/src/dependencies/parsers/csharp/index.ts +6 -0
  512. package/src/dependencies/parsers/index.ts +56 -0
  513. package/src/dependencies/parsers/java/index.ts +6 -0
  514. package/src/dependencies/parsers/java/javaParser.ts +203 -0
  515. package/src/dependencies/parsers/javascript/index.ts +6 -0
  516. package/src/dependencies/parsers/javascript/javascriptParser.ts +362 -0
  517. package/src/dependencies/parsers/php/index.ts +6 -0
  518. package/src/dependencies/parsers/php/phpParser.ts +208 -0
  519. package/src/dependencies/parsers/python/index.ts +6 -0
  520. package/src/dependencies/parsers/python/pythonParser.ts +437 -0
  521. package/src/dependencies/types.ts +330 -0
  522. package/src/i18n/index.ts +1 -0
  523. package/src/i18n/translations.ts +194 -0
  524. package/src/index.ts +16 -0
  525. package/src/reports/dependencyReportGenerator.ts +717 -0
  526. package/src/reports/htmlReportGenerator.ts +781 -0
  527. package/src/reports/index.ts +7 -0
  528. package/src/reports/installedDepsReportGenerator.ts +899 -0
  529. package/src/rules/index.ts +58 -0
  530. package/src/rules/malware/INFO.md +287 -0
  531. package/src/rules/malware/categories/backdoors.ts +174 -0
  532. package/src/rules/malware/categories/cryptominers.ts +434 -0
  533. package/src/rules/malware/categories/exfiltration.ts +677 -0
  534. package/src/rules/malware/categories/keyloggers.ts +780 -0
  535. package/src/rules/malware/categories/loaders.ts +721 -0
  536. package/src/rules/malware/categories/network.ts +639 -0
  537. package/src/rules/malware/categories/obfuscation.ts +788 -0
  538. package/src/rules/malware/constants/index.ts +358 -0
  539. package/src/rules/malware/engine/index.ts +758 -0
  540. package/src/rules/malware/index.ts +928 -0
  541. package/src/rules/malware/scoring/index.ts +549 -0
  542. package/src/rules/malware/types/index.ts +752 -0
  543. package/src/rules/malware/utils/index.ts +643 -0
  544. package/src/rules/standards.ts +372 -0
  545. package/src/rules/vulnerabilities/PROMPT_VULNERABILITIES.md +226 -0
  546. package/src/rules/vulnerabilities/constants/index.ts +625 -0
  547. package/src/rules/vulnerabilities/engine/index.ts +831 -0
  548. package/src/rules/vulnerabilities/index.ts +312 -0
  549. package/src/rules/vulnerabilities/rules/authentication.ts +426 -0
  550. package/src/rules/vulnerabilities/rules/commandInjection.ts +307 -0
  551. package/src/rules/vulnerabilities/rules/csrf.ts +268 -0
  552. package/src/rules/vulnerabilities/rules/deserialization.ts +343 -0
  553. package/src/rules/vulnerabilities/rules/fileUpload.ts +332 -0
  554. package/src/rules/vulnerabilities/rules/hardcodedSecrets.ts +453 -0
  555. package/src/rules/vulnerabilities/rules/index.ts +17 -0
  556. package/src/rules/vulnerabilities/rules/pathTraversal.ts +358 -0
  557. package/src/rules/vulnerabilities/rules/prototypePollution.ts +279 -0
  558. package/src/rules/vulnerabilities/rules/securityMisconfiguration.ts +445 -0
  559. package/src/rules/vulnerabilities/rules/sqlInjection.ts +669 -0
  560. package/src/rules/vulnerabilities/rules/ssrf.ts +408 -0
  561. package/src/rules/vulnerabilities/rules/xss.ts +753 -0
  562. package/src/rules/vulnerabilities/scoring/index.ts +543 -0
  563. package/src/rules/vulnerabilities/types/index.ts +1004 -0
  564. package/src/rules/vulnerabilities/utils/index.ts +709 -0
  565. package/src/types/index.ts +391 -0
  566. package/src/utils/index.ts +306 -0
  567. package/src/utils/logger.ts +150 -0
  568. package/test-installed-scanner.ts +136 -0
  569. package/tsconfig.json +30 -0
@@ -0,0 +1,336 @@
1
+ "use strict";
2
+ /**
3
+ * @fileoverview Insecure Deserialization Detection Rules
4
+ * @module rules/vulnerabilities/rules/deserialization
5
+ */
6
+ Object.defineProperty(exports, "__esModule", { value: true });
7
+ exports.deserializationRules = void 0;
8
+ const types_1 = require("../types");
9
+ const constants_1 = require("../constants");
10
+ exports.deserializationRules = [
11
+ {
12
+ id: 'VUL-DESER-001',
13
+ name: 'Insecure Deserialization - Python pickle',
14
+ description: 'Detects use of Python pickle module with untrusted data.',
15
+ version: '1.0.0',
16
+ vulnerabilityType: types_1.VulnerabilityType.INSECURE_DESERIALIZATION,
17
+ category: types_1.VulnerabilityCategory.INJECTION,
18
+ languages: [types_1.SupportedLanguage.PYTHON],
19
+ severity: types_1.VulnerabilitySeverity.CRITICAL,
20
+ confidence: types_1.ConfidenceLevel.HIGH,
21
+ baseScore: 95,
22
+ patterns: [
23
+ {
24
+ type: types_1.PatternType.REGEX,
25
+ patternId: 'deser-pickle-load',
26
+ pattern: 'pickle\\.loads?\\s*\\([^)]*(?:request\\.|input\\(|open\\(|socket)',
27
+ flags: 'gi',
28
+ weight: 1.0,
29
+ description: 'pickle.load with untrusted input'
30
+ },
31
+ {
32
+ type: types_1.PatternType.REGEX,
33
+ patternId: 'deser-pickle-import',
34
+ pattern: 'import\\s+pickle|from\\s+pickle\\s+import',
35
+ flags: 'g',
36
+ weight: 0.50,
37
+ description: 'pickle import (needs review)'
38
+ },
39
+ {
40
+ type: types_1.PatternType.REGEX,
41
+ patternId: 'deser-yaml-load',
42
+ pattern: 'yaml\\.(?:load|unsafe_load)\\s*\\([^)]*(?!Loader\\s*=\\s*yaml\\.SafeLoader)',
43
+ flags: 'gi',
44
+ weight: 0.95,
45
+ description: 'yaml.load without SafeLoader'
46
+ },
47
+ {
48
+ type: types_1.PatternType.REGEX,
49
+ patternId: 'deser-marshal-load',
50
+ pattern: 'marshal\\.loads?\\s*\\(',
51
+ flags: 'gi',
52
+ weight: 0.90,
53
+ description: 'marshal.load usage'
54
+ }
55
+ ],
56
+ impact: {
57
+ confidentiality: 'high',
58
+ integrity: 'high',
59
+ availability: 'high',
60
+ technicalImpact: 'Arbitrary code execution via crafted pickle payload.',
61
+ businessImpact: 'Complete server compromise, RCE.'
62
+ },
63
+ exploitability: {
64
+ attackVector: 'network',
65
+ attackComplexity: 'low',
66
+ privilegesRequired: 'none',
67
+ userInteraction: 'none',
68
+ knownExploits: true
69
+ },
70
+ remediation: {
71
+ summary: 'Never unpickle untrusted data. Use JSON or other safe formats.',
72
+ steps: [
73
+ 'Replace pickle with JSON for data serialization',
74
+ 'If pickle is required, use hmac to verify data integrity',
75
+ 'Use yaml.safe_load() instead of yaml.load()',
76
+ 'Restrict deserialization to known safe classes'
77
+ ],
78
+ secureCodeExample: `import json
79
+ import hmac
80
+ import hashlib
81
+
82
+ # Secure: Use JSON instead
83
+ data = json.loads(request.data)
84
+
85
+ # If pickle is absolutely required, verify integrity
86
+ def verify_and_load(data, signature, secret_key):
87
+ expected_sig = hmac.new(secret_key, data, hashlib.sha256).hexdigest()
88
+ if not hmac.compare_digest(signature, expected_sig):
89
+ raise ValueError("Data integrity check failed")
90
+ return pickle.loads(data) # Still risky, prefer JSON
91
+
92
+ # Secure YAML loading
93
+ import yaml
94
+ data = yaml.safe_load(yaml_content)`,
95
+ effort: 'medium',
96
+ priority: 'immediate'
97
+ },
98
+ standards: {
99
+ owasp: [constants_1.OWASP_TOP_10_2021.A08],
100
+ cwe: [constants_1.CWE_REFERENCES.CWE_502]
101
+ },
102
+ tags: ['deserialization', 'rce', 'python', 'pickle', 'critical'],
103
+ enabled: true
104
+ },
105
+ {
106
+ id: 'VUL-DESER-002',
107
+ name: 'Insecure Deserialization - PHP unserialize',
108
+ description: 'Detects use of PHP unserialize() with user-controlled data.',
109
+ version: '1.0.0',
110
+ vulnerabilityType: types_1.VulnerabilityType.INSECURE_DESERIALIZATION,
111
+ category: types_1.VulnerabilityCategory.INJECTION,
112
+ languages: [types_1.SupportedLanguage.PHP],
113
+ severity: types_1.VulnerabilitySeverity.CRITICAL,
114
+ confidence: types_1.ConfidenceLevel.HIGH,
115
+ baseScore: 95,
116
+ patterns: [
117
+ {
118
+ type: types_1.PatternType.REGEX,
119
+ patternId: 'deser-php-unserialize',
120
+ pattern: 'unserialize\\s*\\([^)]*\\$_(?:GET|POST|REQUEST|COOKIE)',
121
+ flags: 'gi',
122
+ weight: 1.0,
123
+ description: 'unserialize with superglobal'
124
+ },
125
+ {
126
+ type: types_1.PatternType.REGEX,
127
+ patternId: 'deser-php-unserialize-var',
128
+ pattern: 'unserialize\\s*\\(\\s*\\$[a-zA-Z_]',
129
+ flags: 'g',
130
+ weight: 0.80,
131
+ description: 'unserialize with variable'
132
+ }
133
+ ],
134
+ impact: {
135
+ confidentiality: 'high',
136
+ integrity: 'high',
137
+ availability: 'high',
138
+ technicalImpact: 'Object injection leading to RCE via magic methods (__wakeup, __destruct).',
139
+ businessImpact: 'Complete server compromise.'
140
+ },
141
+ exploitability: {
142
+ attackVector: 'network',
143
+ attackComplexity: 'medium',
144
+ privilegesRequired: 'none',
145
+ userInteraction: 'none',
146
+ knownExploits: true
147
+ },
148
+ remediation: {
149
+ summary: 'Never unserialize user data. Use JSON or specify allowed_classes.',
150
+ steps: [
151
+ 'Replace unserialize() with json_decode()',
152
+ 'If unserialize is required, use allowed_classes option',
153
+ 'Remove dangerous magic methods from classes',
154
+ 'Validate data structure after deserialization'
155
+ ],
156
+ secureCodeExample: `<?php
157
+ // Secure: Use JSON
158
+ $data = json_decode($_POST['data'], true);
159
+
160
+ // If unserialize required, restrict classes
161
+ $data = unserialize($serialized, ['allowed_classes' => ['SafeClass']]);
162
+
163
+ // Best: Avoid deserialization of user input entirely
164
+ ?>`,
165
+ effort: 'medium',
166
+ priority: 'immediate'
167
+ },
168
+ standards: {
169
+ owasp: [constants_1.OWASP_TOP_10_2021.A08],
170
+ cwe: [constants_1.CWE_REFERENCES.CWE_502]
171
+ },
172
+ tags: ['deserialization', 'php', 'object-injection', 'critical'],
173
+ enabled: true
174
+ },
175
+ {
176
+ id: 'VUL-DESER-003',
177
+ name: 'Insecure Deserialization - Java ObjectInputStream',
178
+ description: 'Detects Java ObjectInputStream usage with untrusted data.',
179
+ version: '1.0.0',
180
+ vulnerabilityType: types_1.VulnerabilityType.INSECURE_DESERIALIZATION,
181
+ category: types_1.VulnerabilityCategory.INJECTION,
182
+ languages: [types_1.SupportedLanguage.JAVA],
183
+ severity: types_1.VulnerabilitySeverity.CRITICAL,
184
+ confidence: types_1.ConfidenceLevel.HIGH,
185
+ baseScore: 95,
186
+ patterns: [
187
+ {
188
+ type: types_1.PatternType.REGEX,
189
+ patternId: 'deser-java-ois',
190
+ pattern: 'new\\s+ObjectInputStream\\s*\\([^)]*(?:request|socket|input)',
191
+ flags: 'gi',
192
+ weight: 1.0,
193
+ description: 'ObjectInputStream with external input'
194
+ },
195
+ {
196
+ type: types_1.PatternType.REGEX,
197
+ patternId: 'deser-java-readobject',
198
+ pattern: '\\.readObject\\s*\\(',
199
+ flags: 'g',
200
+ weight: 0.70,
201
+ description: 'readObject call'
202
+ },
203
+ {
204
+ type: types_1.PatternType.REGEX,
205
+ patternId: 'deser-java-xmldecoder',
206
+ pattern: 'new\\s+XMLDecoder\\s*\\(',
207
+ flags: 'gi',
208
+ weight: 0.95,
209
+ description: 'XMLDecoder usage (dangerous)'
210
+ }
211
+ ],
212
+ impact: {
213
+ confidentiality: 'high',
214
+ integrity: 'high',
215
+ availability: 'high',
216
+ technicalImpact: 'RCE via gadget chains (Commons Collections, etc.).',
217
+ businessImpact: 'Complete system compromise, lateral movement.'
218
+ },
219
+ exploitability: {
220
+ attackVector: 'network',
221
+ attackComplexity: 'low',
222
+ privilegesRequired: 'none',
223
+ userInteraction: 'none',
224
+ knownExploits: true
225
+ },
226
+ remediation: {
227
+ summary: 'Avoid Java serialization. Use JSON with Jackson. If required, use look-ahead deserialization.',
228
+ steps: [
229
+ 'Replace Java serialization with JSON (Jackson, Gson)',
230
+ 'Use ValidatingObjectInputStream from Apache Commons IO',
231
+ 'Remove vulnerable libraries (old Commons Collections)',
232
+ 'Implement ObjectInputFilter (Java 9+)'
233
+ ],
234
+ secureCodeExample: `// Secure: Use JSON instead
235
+ ObjectMapper mapper = new ObjectMapper();
236
+ MyClass obj = mapper.readValue(jsonString, MyClass.class);
237
+
238
+ // If serialization required, use ObjectInputFilter (Java 9+)
239
+ ObjectInputFilter filter = ObjectInputFilter.Config.createFilter(
240
+ "com.myapp.SafeClass;!*"
241
+ );
242
+ ObjectInputStream ois = new ObjectInputStream(inputStream);
243
+ ois.setObjectInputFilter(filter);`,
244
+ effort: 'high',
245
+ priority: 'immediate'
246
+ },
247
+ standards: {
248
+ owasp: [constants_1.OWASP_TOP_10_2021.A08],
249
+ cwe: [constants_1.CWE_REFERENCES.CWE_502]
250
+ },
251
+ tags: ['deserialization', 'java', 'rce', 'gadget-chain', 'critical'],
252
+ enabled: true
253
+ },
254
+ {
255
+ id: 'VUL-DESER-004',
256
+ name: 'Insecure Deserialization - Node.js node-serialize',
257
+ description: 'Detects use of dangerous Node.js serialization libraries.',
258
+ version: '1.0.0',
259
+ vulnerabilityType: types_1.VulnerabilityType.INSECURE_DESERIALIZATION,
260
+ category: types_1.VulnerabilityCategory.INJECTION,
261
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
262
+ severity: types_1.VulnerabilitySeverity.CRITICAL,
263
+ confidence: types_1.ConfidenceLevel.HIGH,
264
+ baseScore: 95,
265
+ patterns: [
266
+ {
267
+ type: types_1.PatternType.REGEX,
268
+ patternId: 'deser-node-serialize',
269
+ pattern: 'require\\s*\\([\'"]node-serialize[\'"]\\)',
270
+ flags: 'g',
271
+ weight: 0.95,
272
+ description: 'node-serialize import (vulnerable)'
273
+ },
274
+ {
275
+ type: types_1.PatternType.REGEX,
276
+ patternId: 'deser-serialize-unserialize',
277
+ pattern: '\\.unserialize\\s*\\([^)]*(?:req\\.|body|cookie)',
278
+ flags: 'gi',
279
+ weight: 1.0,
280
+ description: 'unserialize with user data'
281
+ },
282
+ {
283
+ type: types_1.PatternType.REGEX,
284
+ patternId: 'deser-js-yaml-unsafe',
285
+ pattern: 'js-yaml.*\\.load\\s*\\([^)]*(?!\\{[^}]*schema)',
286
+ flags: 'gi',
287
+ weight: 0.85,
288
+ description: 'js-yaml without safe schema'
289
+ }
290
+ ],
291
+ impact: {
292
+ confidentiality: 'high',
293
+ integrity: 'high',
294
+ availability: 'high',
295
+ technicalImpact: 'RCE via IIFE (Immediately Invoked Function Expression) in serialized data.',
296
+ businessImpact: 'Complete server compromise.'
297
+ },
298
+ exploitability: {
299
+ attackVector: 'network',
300
+ attackComplexity: 'low',
301
+ privilegesRequired: 'none',
302
+ userInteraction: 'none',
303
+ knownExploits: true
304
+ },
305
+ remediation: {
306
+ summary: 'Remove node-serialize. Use JSON.parse() for data exchange.',
307
+ steps: [
308
+ 'Remove node-serialize package',
309
+ 'Use native JSON.parse() and JSON.stringify()',
310
+ 'Use safe YAML parser with safeLoad',
311
+ 'Validate structure after parsing'
312
+ ],
313
+ secureCodeExample: `// Secure: Use native JSON
314
+ const data = JSON.parse(req.body.data);
315
+
316
+ // Validate structure
317
+ if (typeof data.name !== 'string' || typeof data.age !== 'number') {
318
+ throw new Error('Invalid data structure');
319
+ }
320
+
321
+ // Safe YAML
322
+ const yaml = require('js-yaml');
323
+ const data = yaml.load(content, { schema: yaml.SAFE_SCHEMA });`,
324
+ effort: 'low',
325
+ priority: 'immediate'
326
+ },
327
+ standards: {
328
+ owasp: [constants_1.OWASP_TOP_10_2021.A08],
329
+ cwe: [constants_1.CWE_REFERENCES.CWE_502]
330
+ },
331
+ tags: ['deserialization', 'nodejs', 'rce', 'critical'],
332
+ enabled: true
333
+ }
334
+ ];
335
+ exports.default = exports.deserializationRules;
336
+ //# sourceMappingURL=deserialization.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"deserialization.js","sourceRoot":"","sources":["../../../../src/rules/vulnerabilities/rules/deserialization.ts"],"names":[],"mappings":";AAAA;;;GAGG;;;AAEH,oCAQkB;AAClB,4CAAiE;AAEpD,QAAA,oBAAoB,GAAwB;IACvD;QACE,EAAE,EAAE,eAAe;QACnB,IAAI,EAAE,0CAA0C;QAChD,WAAW,EAAE,0DAA0D;QACvE,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,wBAAwB;QAC7D,QAAQ,EAAE,6BAAqB,CAAC,SAAS;QACzC,SAAS,EAAE,CAAC,yBAAiB,CAAC,MAAM,CAAC;QACrC,QAAQ,EAAE,6BAAqB,CAAC,QAAQ;QACxC,UAAU,EAAE,uBAAe,CAAC,IAAI;QAChC,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,mBAAmB;gBAC9B,OAAO,EAAE,mEAAmE;gBAC5E,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,GAAG;gBACX,WAAW,EAAE,kCAAkC;aAChD;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,qBAAqB;gBAChC,OAAO,EAAE,2CAA2C;gBACpD,KAAK,EAAE,GAAG;gBACV,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,8BAA8B;aAC5C;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,iBAAiB;gBAC5B,OAAO,EAAE,6EAA6E;gBACtF,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,8BAA8B;aAC5C;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,oBAAoB;gBAC/B,OAAO,EAAE,yBAAyB;gBAClC,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,oBAAoB;aAClC;SACF;QACD,MAAM,EAAE;YACN,eAAe,EAAE,MAAM;YACvB,SAAS,EAAE,MAAM;YACjB,YAAY,EAAE,MAAM;YACpB,eAAe,EAAE,sDAAsD;YACvE,cAAc,EAAE,kCAAkC;SACnD;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,KAAK;YACvB,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,MAAM;YACvB,aAAa,EAAE,IAAI;SACpB;QACD,WAAW,EAAE;YACX,OAAO,EAAE,gEAAgE;YACzE,KAAK,EAAE;gBACL,iDAAiD;gBACjD,0DAA0D;gBAC1D,6CAA6C;gBAC7C,gDAAgD;aACjD;YACD,iBAAiB,EAAE;;;;;;;;;;;;;;;;oCAgBW;YAC9B,MAAM,EAAE,QAAQ;YAChB,QAAQ,EAAE,WAAW;SACtB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,CAAC;YAC9B,GAAG,EAAE,CAAC,0BAAc,CAAC,OAAO,CAAC;SAC9B;QACD,IAAI,EAAE,CAAC,iBAAiB,EAAE,KAAK,EAAE,QAAQ,EAAE,QAAQ,EAAE,UAAU,CAAC;QAChE,OAAO,EAAE,IAAI;KACd;IACD;QACE,EAAE,EAAE,eAAe;QACnB,IAAI,EAAE,4CAA4C;QAClD,WAAW,EAAE,6DAA6D;QAC1E,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,wBAAwB;QAC7D,QAAQ,EAAE,6BAAqB,CAAC,SAAS;QACzC,SAAS,EAAE,CAAC,yBAAiB,CAAC,GAAG,CAAC;QAClC,QAAQ,EAAE,6BAAqB,CAAC,QAAQ;QACxC,UAAU,EAAE,uBAAe,CAAC,IAAI;QAChC,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,uBAAuB;gBAClC,OAAO,EAAE,wDAAwD;gBACjE,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,GAAG;gBACX,WAAW,EAAE,8BAA8B;aAC5C;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,2BAA2B;gBACtC,OAAO,EAAE,oCAAoC;gBAC7C,KAAK,EAAE,GAAG;gBACV,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,2BAA2B;aACzC;SACF;QACD,MAAM,EAAE;YACN,eAAe,EAAE,MAAM;YACvB,SAAS,EAAE,MAAM;YACjB,YAAY,EAAE,MAAM;YACpB,eAAe,EAAE,2EAA2E;YAC5F,cAAc,EAAE,6BAA6B;SAC9C;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,QAAQ;YAC1B,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,MAAM;YACvB,aAAa,EAAE,IAAI;SACpB;QACD,WAAW,EAAE;YACX,OAAO,EAAE,mEAAmE;YAC5E,KAAK,EAAE;gBACL,0CAA0C;gBAC1C,wDAAwD;gBACxD,6CAA6C;gBAC7C,+CAA+C;aAChD;YACD,iBAAiB,EAAE;;;;;;;;GAQtB;YACG,MAAM,EAAE,QAAQ;YAChB,QAAQ,EAAE,WAAW;SACtB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,CAAC;YAC9B,GAAG,EAAE,CAAC,0BAAc,CAAC,OAAO,CAAC;SAC9B;QACD,IAAI,EAAE,CAAC,iBAAiB,EAAE,KAAK,EAAE,kBAAkB,EAAE,UAAU,CAAC;QAChE,OAAO,EAAE,IAAI;KACd;IACD;QACE,EAAE,EAAE,eAAe;QACnB,IAAI,EAAE,mDAAmD;QACzD,WAAW,EAAE,2DAA2D;QACxE,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,wBAAwB;QAC7D,QAAQ,EAAE,6BAAqB,CAAC,SAAS;QACzC,SAAS,EAAE,CAAC,yBAAiB,CAAC,IAAI,CAAC;QACnC,QAAQ,EAAE,6BAAqB,CAAC,QAAQ;QACxC,UAAU,EAAE,uBAAe,CAAC,IAAI;QAChC,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,gBAAgB;gBAC3B,OAAO,EAAE,8DAA8D;gBACvE,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,GAAG;gBACX,WAAW,EAAE,uCAAuC;aACrD;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,uBAAuB;gBAClC,OAAO,EAAE,sBAAsB;gBAC/B,KAAK,EAAE,GAAG;gBACV,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,iBAAiB;aAC/B;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,uBAAuB;gBAClC,OAAO,EAAE,0BAA0B;gBACnC,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,8BAA8B;aAC5C;SACF;QACD,MAAM,EAAE;YACN,eAAe,EAAE,MAAM;YACvB,SAAS,EAAE,MAAM;YACjB,YAAY,EAAE,MAAM;YACpB,eAAe,EAAE,oDAAoD;YACrE,cAAc,EAAE,+CAA+C;SAChE;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,KAAK;YACvB,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,MAAM;YACvB,aAAa,EAAE,IAAI;SACpB;QACD,WAAW,EAAE;YACX,OAAO,EAAE,+FAA+F;YACxG,KAAK,EAAE;gBACL,sDAAsD;gBACtD,wDAAwD;gBACxD,uDAAuD;gBACvD,uCAAuC;aACxC;YACD,iBAAiB,EAAE;;;;;;;;;kCASS;YAC5B,MAAM,EAAE,MAAM;YACd,QAAQ,EAAE,WAAW;SACtB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,CAAC;YAC9B,GAAG,EAAE,CAAC,0BAAc,CAAC,OAAO,CAAC;SAC9B;QACD,IAAI,EAAE,CAAC,iBAAiB,EAAE,MAAM,EAAE,KAAK,EAAE,cAAc,EAAE,UAAU,CAAC;QACpE,OAAO,EAAE,IAAI;KACd;IACD;QACE,EAAE,EAAE,eAAe;QACnB,IAAI,EAAE,mDAAmD;QACzD,WAAW,EAAE,2DAA2D;QACxE,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,wBAAwB;QAC7D,QAAQ,EAAE,6BAAqB,CAAC,SAAS;QACzC,SAAS,EAAE,CAAC,yBAAiB,CAAC,UAAU,EAAE,yBAAiB,CAAC,UAAU,CAAC;QACvE,QAAQ,EAAE,6BAAqB,CAAC,QAAQ;QACxC,UAAU,EAAE,uBAAe,CAAC,IAAI;QAChC,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,sBAAsB;gBACjC,OAAO,EAAE,2CAA2C;gBACpD,KAAK,EAAE,GAAG;gBACV,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,oCAAoC;aAClD;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,6BAA6B;gBACxC,OAAO,EAAE,kDAAkD;gBAC3D,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,GAAG;gBACX,WAAW,EAAE,4BAA4B;aAC1C;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,sBAAsB;gBACjC,OAAO,EAAE,gDAAgD;gBACzD,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,6BAA6B;aAC3C;SACF;QACD,MAAM,EAAE;YACN,eAAe,EAAE,MAAM;YACvB,SAAS,EAAE,MAAM;YACjB,YAAY,EAAE,MAAM;YACpB,eAAe,EAAE,4EAA4E;YAC7F,cAAc,EAAE,6BAA6B;SAC9C;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,KAAK;YACvB,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,MAAM;YACvB,aAAa,EAAE,IAAI;SACpB;QACD,WAAW,EAAE;YACX,OAAO,EAAE,4DAA4D;YACrE,KAAK,EAAE;gBACL,+BAA+B;gBAC/B,8CAA8C;gBAC9C,oCAAoC;gBACpC,kCAAkC;aACnC;YACD,iBAAiB,EAAE;;;;;;;;;;+DAUsC;YACzD,MAAM,EAAE,KAAK;YACb,QAAQ,EAAE,WAAW;SACtB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,CAAC;YAC9B,GAAG,EAAE,CAAC,0BAAc,CAAC,OAAO,CAAC;SAC9B;QACD,IAAI,EAAE,CAAC,iBAAiB,EAAE,QAAQ,EAAE,KAAK,EAAE,UAAU,CAAC;QACtD,OAAO,EAAE,IAAI;KACd;CACF,CAAC;AAEF,kBAAe,4BAAoB,CAAC"}
@@ -0,0 +1,8 @@
1
+ /**
2
+ * @fileoverview File Upload Vulnerabilities Detection Rules
3
+ * @module rules/vulnerabilities/rules/fileUpload
4
+ */
5
+ import { VulnerabilityRule } from '../types';
6
+ export declare const fileUploadRules: VulnerabilityRule[];
7
+ export default fileUploadRules;
8
+ //# sourceMappingURL=fileUpload.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"fileUpload.d.ts","sourceRoot":"","sources":["../../../../src/rules/vulnerabilities/rules/fileUpload.ts"],"names":[],"mappings":"AAAA;;;GAGG;AAEH,OAAO,EACL,iBAAiB,EAOlB,MAAM,UAAU,CAAC;AAGlB,eAAO,MAAM,eAAe,EAAE,iBAAiB,EAyT9C,CAAC;AAEF,eAAe,eAAe,CAAC"}
@@ -0,0 +1,325 @@
1
+ "use strict";
2
+ /**
3
+ * @fileoverview File Upload Vulnerabilities Detection Rules
4
+ * @module rules/vulnerabilities/rules/fileUpload
5
+ */
6
+ Object.defineProperty(exports, "__esModule", { value: true });
7
+ exports.fileUploadRules = void 0;
8
+ const types_1 = require("../types");
9
+ const constants_1 = require("../constants");
10
+ exports.fileUploadRules = [
11
+ {
12
+ id: 'VUL-UPLOAD-001',
13
+ name: 'Unrestricted File Upload - No Extension Validation',
14
+ description: 'Detects file upload handling without proper extension validation.',
15
+ version: '1.0.0',
16
+ vulnerabilityType: types_1.VulnerabilityType.FILE_UPLOAD,
17
+ category: types_1.VulnerabilityCategory.INJECTION,
18
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
19
+ severity: types_1.VulnerabilitySeverity.HIGH,
20
+ confidence: types_1.ConfidenceLevel.MEDIUM,
21
+ baseScore: 80,
22
+ patterns: [
23
+ {
24
+ type: types_1.PatternType.REGEX,
25
+ patternId: 'upload-multer-no-filter',
26
+ pattern: 'multer\\s*\\([^)]*\\)(?![\\s\\S]{0,100}fileFilter)',
27
+ flags: 'gi',
28
+ weight: 0.85,
29
+ description: 'Multer without fileFilter'
30
+ },
31
+ {
32
+ type: types_1.PatternType.REGEX,
33
+ patternId: 'upload-original-name',
34
+ pattern: '\\.originalname|file\\.name[^\\s]*path',
35
+ flags: 'gi',
36
+ weight: 0.75,
37
+ description: 'Using original filename in path'
38
+ },
39
+ {
40
+ type: types_1.PatternType.REGEX,
41
+ patternId: 'upload-write-file',
42
+ pattern: 'fs\\.writeFile(?:Sync)?\\s*\\([^)]*req\\.files?',
43
+ flags: 'gi',
44
+ weight: 0.90,
45
+ description: 'Writing uploaded file without validation'
46
+ }
47
+ ],
48
+ impact: {
49
+ confidentiality: 'high',
50
+ integrity: 'high',
51
+ availability: 'high',
52
+ technicalImpact: 'Upload and execute malicious scripts. Web shell installation.',
53
+ businessImpact: 'Complete server compromise via uploaded web shell.'
54
+ },
55
+ exploitability: {
56
+ attackVector: 'network',
57
+ attackComplexity: 'low',
58
+ privilegesRequired: 'low',
59
+ userInteraction: 'none',
60
+ knownExploits: true
61
+ },
62
+ remediation: {
63
+ summary: 'Validate file extensions, MIME types, and content. Store outside webroot.',
64
+ steps: [
65
+ 'Validate file extension against allowlist',
66
+ 'Verify MIME type matches extension',
67
+ 'Check file content (magic bytes)',
68
+ 'Generate random filename for storage',
69
+ 'Store files outside webroot or use CDN',
70
+ 'Set Content-Disposition: attachment for downloads'
71
+ ],
72
+ secureCodeExample: `const multer = require('multer');
73
+ const path = require('path');
74
+ const crypto = require('crypto');
75
+
76
+ const ALLOWED_EXTENSIONS = ['.jpg', '.jpeg', '.png', '.gif', '.pdf'];
77
+ const ALLOWED_MIMES = ['image/jpeg', 'image/png', 'image/gif', 'application/pdf'];
78
+
79
+ const storage = multer.diskStorage({
80
+ destination: './uploads/', // Outside webroot
81
+ filename: (req, file, cb) => {
82
+ // Generate random filename
83
+ const ext = path.extname(file.originalname).toLowerCase();
84
+ const name = crypto.randomBytes(16).toString('hex');
85
+ cb(null, \`\${name}\${ext}\`);
86
+ }
87
+ });
88
+
89
+ const fileFilter = (req, file, cb) => {
90
+ const ext = path.extname(file.originalname).toLowerCase();
91
+
92
+ if (!ALLOWED_EXTENSIONS.includes(ext)) {
93
+ return cb(new Error('Invalid file type'), false);
94
+ }
95
+
96
+ if (!ALLOWED_MIMES.includes(file.mimetype)) {
97
+ return cb(new Error('Invalid MIME type'), false);
98
+ }
99
+
100
+ cb(null, true);
101
+ };
102
+
103
+ const upload = multer({
104
+ storage,
105
+ fileFilter,
106
+ limits: { fileSize: 5 * 1024 * 1024 } // 5MB
107
+ });`,
108
+ effort: 'medium',
109
+ priority: 'high'
110
+ },
111
+ standards: {
112
+ owasp: [constants_1.OWASP_TOP_10_2021.A04],
113
+ cwe: [constants_1.CWE_REFERENCES.CWE_434]
114
+ },
115
+ tags: ['file-upload', 'rce', 'webshell'],
116
+ enabled: true
117
+ },
118
+ {
119
+ id: 'VUL-UPLOAD-002',
120
+ name: 'Unrestricted File Upload - PHP',
121
+ description: 'Detects PHP file upload handling without proper validation.',
122
+ version: '1.0.0',
123
+ vulnerabilityType: types_1.VulnerabilityType.FILE_UPLOAD,
124
+ category: types_1.VulnerabilityCategory.INJECTION,
125
+ languages: [types_1.SupportedLanguage.PHP],
126
+ severity: types_1.VulnerabilitySeverity.CRITICAL,
127
+ confidence: types_1.ConfidenceLevel.HIGH,
128
+ baseScore: 90,
129
+ patterns: [
130
+ {
131
+ type: types_1.PatternType.REGEX,
132
+ patternId: 'upload-php-move-uploaded',
133
+ pattern: 'move_uploaded_file\\s*\\([^,]+,\\s*[^)]*\\$_FILES',
134
+ flags: 'gi',
135
+ weight: 0.85,
136
+ description: 'move_uploaded_file with user filename'
137
+ },
138
+ {
139
+ type: types_1.PatternType.REGEX,
140
+ patternId: 'upload-php-copy',
141
+ pattern: 'copy\\s*\\(\\s*\\$_FILES\\[[\'"][^\'"]+[\'"]\\]\\[[\'"]tmp_name[\'"]\\]',
142
+ flags: 'gi',
143
+ weight: 0.80,
144
+ description: 'copy uploaded file'
145
+ },
146
+ {
147
+ type: types_1.PatternType.REGEX,
148
+ patternId: 'upload-php-no-ext-check',
149
+ pattern: '\\$_FILES\\[[\'"][^\'"]+[\'"]\\]\\[[\'"]name[\'"]\\](?![\\s\\S]{0,50}(?:pathinfo|preg_match|extension))',
150
+ flags: 'gi',
151
+ weight: 0.70,
152
+ description: 'Using filename without extension check'
153
+ }
154
+ ],
155
+ impact: {
156
+ confidentiality: 'high',
157
+ integrity: 'high',
158
+ availability: 'high',
159
+ technicalImpact: 'Upload PHP scripts for remote code execution.',
160
+ businessImpact: 'Complete server takeover.'
161
+ },
162
+ exploitability: {
163
+ attackVector: 'network',
164
+ attackComplexity: 'low',
165
+ privilegesRequired: 'low',
166
+ userInteraction: 'none',
167
+ knownExploits: true
168
+ },
169
+ remediation: {
170
+ summary: 'Validate extensions with allowlist. Store outside webroot. Disable PHP in upload directory.',
171
+ steps: [
172
+ 'Validate extension against strict allowlist',
173
+ 'Check MIME type with finfo_file()',
174
+ 'Store files outside webroot',
175
+ 'Disable PHP execution in upload directory via .htaccess',
176
+ 'Generate random filenames'
177
+ ],
178
+ secureCodeExample: `<?php
179
+ $allowed_extensions = ['jpg', 'jpeg', 'png', 'gif', 'pdf'];
180
+ $allowed_mimes = ['image/jpeg', 'image/png', 'image/gif', 'application/pdf'];
181
+ $upload_dir = '/var/uploads/'; // Outside webroot
182
+
183
+ function validateUpload($file) {
184
+ global $allowed_extensions, $allowed_mimes;
185
+
186
+ // Get extension
187
+ $ext = strtolower(pathinfo($file['name'], PATHINFO_EXTENSION));
188
+ if (!in_array($ext, $allowed_extensions, true)) {
189
+ return false;
190
+ }
191
+
192
+ // Verify MIME type
193
+ $finfo = finfo_open(FILEINFO_MIME_TYPE);
194
+ $mime = finfo_file($finfo, $file['tmp_name']);
195
+ if (!in_array($mime, $allowed_mimes, true)) {
196
+ return false;
197
+ }
198
+
199
+ return true;
200
+ }
201
+
202
+ if (validateUpload($_FILES['upload'])) {
203
+ $ext = pathinfo($_FILES['upload']['name'], PATHINFO_EXTENSION);
204
+ $newname = bin2hex(random_bytes(16)) . '.' . $ext;
205
+ move_uploaded_file($_FILES['upload']['tmp_name'], $upload_dir . $newname);
206
+ }
207
+
208
+ // .htaccess in upload directory
209
+ // php_flag engine off
210
+ ?>`,
211
+ effort: 'medium',
212
+ priority: 'immediate'
213
+ },
214
+ standards: {
215
+ owasp: [constants_1.OWASP_TOP_10_2021.A04],
216
+ cwe: [constants_1.CWE_REFERENCES.CWE_434]
217
+ },
218
+ tags: ['file-upload', 'php', 'rce', 'critical'],
219
+ enabled: true
220
+ },
221
+ {
222
+ id: 'VUL-UPLOAD-003',
223
+ name: 'Unrestricted File Upload - Python/Flask',
224
+ description: 'Detects Flask/Django file upload handling without proper validation.',
225
+ version: '1.0.0',
226
+ vulnerabilityType: types_1.VulnerabilityType.FILE_UPLOAD,
227
+ category: types_1.VulnerabilityCategory.INJECTION,
228
+ languages: [types_1.SupportedLanguage.PYTHON],
229
+ severity: types_1.VulnerabilitySeverity.HIGH,
230
+ confidence: types_1.ConfidenceLevel.MEDIUM,
231
+ baseScore: 75,
232
+ patterns: [
233
+ {
234
+ type: types_1.PatternType.REGEX,
235
+ patternId: 'upload-flask-save',
236
+ pattern: 'request\\.files\\[[\'"][^\'"]+[\'"]\\]\\.save\\s*\\([^)]*filename',
237
+ flags: 'gi',
238
+ weight: 0.85,
239
+ description: 'Flask file.save with user filename'
240
+ },
241
+ {
242
+ type: types_1.PatternType.REGEX,
243
+ patternId: 'upload-no-secure-filename',
244
+ pattern: '\\.filename(?![\\s\\S]{0,50}secure_filename)',
245
+ flags: 'gi',
246
+ weight: 0.75,
247
+ description: 'Using filename without secure_filename'
248
+ },
249
+ {
250
+ type: types_1.PatternType.REGEX,
251
+ patternId: 'upload-django-chunks',
252
+ pattern: '\\.chunks\\(\\)(?![\\s\\S]{0,50}(?:allowed|extension))',
253
+ flags: 'gi',
254
+ weight: 0.70,
255
+ description: 'Django file upload without extension check'
256
+ }
257
+ ],
258
+ impact: {
259
+ confidentiality: 'high',
260
+ integrity: 'high',
261
+ availability: 'medium',
262
+ technicalImpact: 'File overwrite, path traversal, potential code execution.',
263
+ businessImpact: 'Data manipulation, possible RCE.'
264
+ },
265
+ exploitability: {
266
+ attackVector: 'network',
267
+ attackComplexity: 'low',
268
+ privilegesRequired: 'low',
269
+ userInteraction: 'none'
270
+ },
271
+ remediation: {
272
+ summary: 'Use secure_filename(). Validate extensions. Store safely.',
273
+ steps: [
274
+ 'Use werkzeug.utils.secure_filename()',
275
+ 'Validate extension against allowlist',
276
+ 'Check MIME type with python-magic',
277
+ 'Generate random filenames',
278
+ 'Store outside webroot'
279
+ ],
280
+ secureCodeExample: `from flask import Flask, request
281
+ from werkzeug.utils import secure_filename
282
+ import os
283
+ import uuid
284
+ import magic
285
+
286
+ ALLOWED_EXTENSIONS = {'jpg', 'jpeg', 'png', 'gif', 'pdf'}
287
+ ALLOWED_MIMES = {'image/jpeg', 'image/png', 'image/gif', 'application/pdf'}
288
+ UPLOAD_FOLDER = '/var/uploads' # Outside webroot
289
+
290
+ def allowed_file(file):
291
+ filename = secure_filename(file.filename)
292
+ ext = filename.rsplit('.', 1)[-1].lower() if '.' in filename else ''
293
+
294
+ if ext not in ALLOWED_EXTENSIONS:
295
+ return False
296
+
297
+ # Check actual MIME type
298
+ mime = magic.from_buffer(file.read(2048), mime=True)
299
+ file.seek(0) # Reset file position
300
+
301
+ return mime in ALLOWED_MIMES
302
+
303
+ @app.route('/upload', methods=['POST'])
304
+ def upload_file():
305
+ file = request.files.get('file')
306
+ if not file or not allowed_file(file):
307
+ return 'Invalid file', 400
308
+
309
+ ext = secure_filename(file.filename).rsplit('.', 1)[-1]
310
+ new_filename = f'{uuid.uuid4().hex}.{ext}'
311
+ file.save(os.path.join(UPLOAD_FOLDER, new_filename))
312
+ return 'Upload successful'`,
313
+ effort: 'medium',
314
+ priority: 'high'
315
+ },
316
+ standards: {
317
+ owasp: [constants_1.OWASP_TOP_10_2021.A04],
318
+ cwe: [constants_1.CWE_REFERENCES.CWE_434]
319
+ },
320
+ tags: ['file-upload', 'python', 'flask', 'django'],
321
+ enabled: true
322
+ }
323
+ ];
324
+ exports.default = exports.fileUploadRules;
325
+ //# sourceMappingURL=fileUpload.js.map