secure-scan 1.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (569) hide show
  1. package/README.md +564 -0
  2. package/dist/ai/aiAnalyzer.d.ts +99 -0
  3. package/dist/ai/aiAnalyzer.d.ts.map +1 -0
  4. package/dist/ai/aiAnalyzer.js +669 -0
  5. package/dist/ai/aiAnalyzer.js.map +1 -0
  6. package/dist/ai/index.d.ts +5 -0
  7. package/dist/ai/index.d.ts.map +1 -0
  8. package/dist/ai/index.js +21 -0
  9. package/dist/ai/index.js.map +1 -0
  10. package/dist/analyzers/base/baseAnalyzer.d.ts +44 -0
  11. package/dist/analyzers/base/baseAnalyzer.d.ts.map +1 -0
  12. package/dist/analyzers/base/baseAnalyzer.js +53 -0
  13. package/dist/analyzers/base/baseAnalyzer.js.map +1 -0
  14. package/dist/analyzers/base/index.d.ts +5 -0
  15. package/dist/analyzers/base/index.d.ts.map +1 -0
  16. package/dist/analyzers/base/index.js +21 -0
  17. package/dist/analyzers/base/index.js.map +1 -0
  18. package/dist/analyzers/c-cpp/cppAnalyzer.d.ts +60 -0
  19. package/dist/analyzers/c-cpp/cppAnalyzer.d.ts.map +1 -0
  20. package/dist/analyzers/c-cpp/cppAnalyzer.js +218 -0
  21. package/dist/analyzers/c-cpp/cppAnalyzer.js.map +1 -0
  22. package/dist/analyzers/c-cpp/index.d.ts +5 -0
  23. package/dist/analyzers/c-cpp/index.d.ts.map +1 -0
  24. package/dist/analyzers/c-cpp/index.js +21 -0
  25. package/dist/analyzers/c-cpp/index.js.map +1 -0
  26. package/dist/analyzers/core/engine/index.d.ts +5 -0
  27. package/dist/analyzers/core/engine/index.d.ts.map +1 -0
  28. package/dist/analyzers/core/engine/index.js +21 -0
  29. package/dist/analyzers/core/engine/index.js.map +1 -0
  30. package/dist/analyzers/core/engine/ruleEngine.d.ts +46 -0
  31. package/dist/analyzers/core/engine/ruleEngine.d.ts.map +1 -0
  32. package/dist/analyzers/core/engine/ruleEngine.js +173 -0
  33. package/dist/analyzers/core/engine/ruleEngine.js.map +1 -0
  34. package/dist/analyzers/core/index.d.ts +8 -0
  35. package/dist/analyzers/core/index.d.ts.map +1 -0
  36. package/dist/analyzers/core/index.js +24 -0
  37. package/dist/analyzers/core/index.js.map +1 -0
  38. package/dist/analyzers/core/scanner/fileScanner.d.ts +31 -0
  39. package/dist/analyzers/core/scanner/fileScanner.d.ts.map +1 -0
  40. package/dist/analyzers/core/scanner/fileScanner.js +199 -0
  41. package/dist/analyzers/core/scanner/fileScanner.js.map +1 -0
  42. package/dist/analyzers/core/scanner/index.d.ts +5 -0
  43. package/dist/analyzers/core/scanner/index.d.ts.map +1 -0
  44. package/dist/analyzers/core/scanner/index.js +21 -0
  45. package/dist/analyzers/core/scanner/index.js.map +1 -0
  46. package/dist/analyzers/core/scoring/index.d.ts +5 -0
  47. package/dist/analyzers/core/scoring/index.d.ts.map +1 -0
  48. package/dist/analyzers/core/scoring/index.js +21 -0
  49. package/dist/analyzers/core/scoring/index.js.map +1 -0
  50. package/dist/analyzers/core/scoring/riskScoring.d.ts +49 -0
  51. package/dist/analyzers/core/scoring/riskScoring.d.ts.map +1 -0
  52. package/dist/analyzers/core/scoring/riskScoring.js +180 -0
  53. package/dist/analyzers/core/scoring/riskScoring.js.map +1 -0
  54. package/dist/analyzers/core/securityScanner.d.ts +47 -0
  55. package/dist/analyzers/core/securityScanner.d.ts.map +1 -0
  56. package/dist/analyzers/core/securityScanner.js +298 -0
  57. package/dist/analyzers/core/securityScanner.js.map +1 -0
  58. package/dist/analyzers/csharp/csharpAnalyzer.d.ts +64 -0
  59. package/dist/analyzers/csharp/csharpAnalyzer.d.ts.map +1 -0
  60. package/dist/analyzers/csharp/csharpAnalyzer.js +232 -0
  61. package/dist/analyzers/csharp/csharpAnalyzer.js.map +1 -0
  62. package/dist/analyzers/csharp/index.d.ts +5 -0
  63. package/dist/analyzers/csharp/index.d.ts.map +1 -0
  64. package/dist/analyzers/csharp/index.js +21 -0
  65. package/dist/analyzers/csharp/index.js.map +1 -0
  66. package/dist/analyzers/iac/iacAnalyzer.d.ts +36 -0
  67. package/dist/analyzers/iac/iacAnalyzer.d.ts.map +1 -0
  68. package/dist/analyzers/iac/iacAnalyzer.js +182 -0
  69. package/dist/analyzers/iac/iacAnalyzer.js.map +1 -0
  70. package/dist/analyzers/iac/index.d.ts +5 -0
  71. package/dist/analyzers/iac/index.d.ts.map +1 -0
  72. package/dist/analyzers/iac/index.js +21 -0
  73. package/dist/analyzers/iac/index.js.map +1 -0
  74. package/dist/analyzers/index.d.ts +30 -0
  75. package/dist/analyzers/index.d.ts.map +1 -0
  76. package/dist/analyzers/index.js +80 -0
  77. package/dist/analyzers/index.js.map +1 -0
  78. package/dist/analyzers/java/index.d.ts +5 -0
  79. package/dist/analyzers/java/index.d.ts.map +1 -0
  80. package/dist/analyzers/java/index.js +21 -0
  81. package/dist/analyzers/java/index.js.map +1 -0
  82. package/dist/analyzers/java/javaAnalyzer.d.ts +64 -0
  83. package/dist/analyzers/java/javaAnalyzer.d.ts.map +1 -0
  84. package/dist/analyzers/java/javaAnalyzer.js +224 -0
  85. package/dist/analyzers/java/javaAnalyzer.js.map +1 -0
  86. package/dist/analyzers/javascript/astUtils.d.ts +170 -0
  87. package/dist/analyzers/javascript/astUtils.d.ts.map +1 -0
  88. package/dist/analyzers/javascript/astUtils.js +700 -0
  89. package/dist/analyzers/javascript/astUtils.js.map +1 -0
  90. package/dist/analyzers/javascript/index.d.ts +18 -0
  91. package/dist/analyzers/javascript/index.d.ts.map +1 -0
  92. package/dist/analyzers/javascript/index.js +50 -0
  93. package/dist/analyzers/javascript/index.js.map +1 -0
  94. package/dist/analyzers/javascript/javascriptAnalyzer.d.ts +111 -0
  95. package/dist/analyzers/javascript/javascriptAnalyzer.d.ts.map +1 -0
  96. package/dist/analyzers/javascript/javascriptAnalyzer.js +860 -0
  97. package/dist/analyzers/javascript/javascriptAnalyzer.js.map +1 -0
  98. package/dist/analyzers/javascript/malwareDetector.d.ts +102 -0
  99. package/dist/analyzers/javascript/malwareDetector.d.ts.map +1 -0
  100. package/dist/analyzers/javascript/malwareDetector.js +616 -0
  101. package/dist/analyzers/javascript/malwareDetector.js.map +1 -0
  102. package/dist/analyzers/javascript/packageJsonAnalyzer.d.ts +87 -0
  103. package/dist/analyzers/javascript/packageJsonAnalyzer.d.ts.map +1 -0
  104. package/dist/analyzers/javascript/packageJsonAnalyzer.js +553 -0
  105. package/dist/analyzers/javascript/packageJsonAnalyzer.js.map +1 -0
  106. package/dist/analyzers/javascript/taintAnalyzer.d.ts +120 -0
  107. package/dist/analyzers/javascript/taintAnalyzer.d.ts.map +1 -0
  108. package/dist/analyzers/javascript/taintAnalyzer.js +526 -0
  109. package/dist/analyzers/javascript/taintAnalyzer.js.map +1 -0
  110. package/dist/analyzers/php/index.d.ts +5 -0
  111. package/dist/analyzers/php/index.d.ts.map +1 -0
  112. package/dist/analyzers/php/index.js +21 -0
  113. package/dist/analyzers/php/index.js.map +1 -0
  114. package/dist/analyzers/php/phpAnalyzer.d.ts +56 -0
  115. package/dist/analyzers/php/phpAnalyzer.d.ts.map +1 -0
  116. package/dist/analyzers/php/phpAnalyzer.js +202 -0
  117. package/dist/analyzers/php/phpAnalyzer.js.map +1 -0
  118. package/dist/analyzers/python/index.d.ts +5 -0
  119. package/dist/analyzers/python/index.d.ts.map +1 -0
  120. package/dist/analyzers/python/index.js +21 -0
  121. package/dist/analyzers/python/index.js.map +1 -0
  122. package/dist/analyzers/python/pythonAnalyzer.d.ts +64 -0
  123. package/dist/analyzers/python/pythonAnalyzer.d.ts.map +1 -0
  124. package/dist/analyzers/python/pythonAnalyzer.js +226 -0
  125. package/dist/analyzers/python/pythonAnalyzer.js.map +1 -0
  126. package/dist/cli/index.d.ts +7 -0
  127. package/dist/cli/index.d.ts.map +1 -0
  128. package/dist/cli/index.js +281 -0
  129. package/dist/cli/index.js.map +1 -0
  130. package/dist/core/engine/index.d.ts +5 -0
  131. package/dist/core/engine/index.d.ts.map +1 -0
  132. package/dist/core/engine/index.js +21 -0
  133. package/dist/core/engine/index.js.map +1 -0
  134. package/dist/core/engine/ruleEngine.d.ts +46 -0
  135. package/dist/core/engine/ruleEngine.d.ts.map +1 -0
  136. package/dist/core/engine/ruleEngine.js +173 -0
  137. package/dist/core/engine/ruleEngine.js.map +1 -0
  138. package/dist/core/index.d.ts +8 -0
  139. package/dist/core/index.d.ts.map +1 -0
  140. package/dist/core/index.js +24 -0
  141. package/dist/core/index.js.map +1 -0
  142. package/dist/core/scanner/fileScanner.d.ts +31 -0
  143. package/dist/core/scanner/fileScanner.d.ts.map +1 -0
  144. package/dist/core/scanner/fileScanner.js +199 -0
  145. package/dist/core/scanner/fileScanner.js.map +1 -0
  146. package/dist/core/scanner/index.d.ts +5 -0
  147. package/dist/core/scanner/index.d.ts.map +1 -0
  148. package/dist/core/scanner/index.js +21 -0
  149. package/dist/core/scanner/index.js.map +1 -0
  150. package/dist/core/scoring/index.d.ts +5 -0
  151. package/dist/core/scoring/index.d.ts.map +1 -0
  152. package/dist/core/scoring/index.js +21 -0
  153. package/dist/core/scoring/index.js.map +1 -0
  154. package/dist/core/scoring/riskScoring.d.ts +49 -0
  155. package/dist/core/scoring/riskScoring.d.ts.map +1 -0
  156. package/dist/core/scoring/riskScoring.js +180 -0
  157. package/dist/core/scoring/riskScoring.js.map +1 -0
  158. package/dist/core/securityScanner.d.ts +47 -0
  159. package/dist/core/securityScanner.d.ts.map +1 -0
  160. package/dist/core/securityScanner.js +298 -0
  161. package/dist/core/securityScanner.js.map +1 -0
  162. package/dist/dependencies/aiDependencyAnalyzer.d.ts +96 -0
  163. package/dist/dependencies/aiDependencyAnalyzer.d.ts.map +1 -0
  164. package/dist/dependencies/aiDependencyAnalyzer.js +435 -0
  165. package/dist/dependencies/aiDependencyAnalyzer.js.map +1 -0
  166. package/dist/dependencies/database/cveDatabase.d.ts +32 -0
  167. package/dist/dependencies/database/cveDatabase.d.ts.map +1 -0
  168. package/dist/dependencies/database/cveDatabase.js +393 -0
  169. package/dist/dependencies/database/cveDatabase.js.map +1 -0
  170. package/dist/dependencies/database/index.d.ts +6 -0
  171. package/dist/dependencies/database/index.d.ts.map +1 -0
  172. package/dist/dependencies/database/index.js +22 -0
  173. package/dist/dependencies/database/index.js.map +1 -0
  174. package/dist/dependencies/database/maliciousPackages.d.ts +43 -0
  175. package/dist/dependencies/database/maliciousPackages.d.ts.map +1 -0
  176. package/dist/dependencies/database/maliciousPackages.js +279 -0
  177. package/dist/dependencies/database/maliciousPackages.js.map +1 -0
  178. package/dist/dependencies/dependencyAnalyzer.d.ts +74 -0
  179. package/dist/dependencies/dependencyAnalyzer.d.ts.map +1 -0
  180. package/dist/dependencies/dependencyAnalyzer.js +349 -0
  181. package/dist/dependencies/dependencyAnalyzer.js.map +1 -0
  182. package/dist/dependencies/detectors/index.d.ts +7 -0
  183. package/dist/dependencies/detectors/index.d.ts.map +1 -0
  184. package/dist/dependencies/detectors/index.js +28 -0
  185. package/dist/dependencies/detectors/index.js.map +1 -0
  186. package/dist/dependencies/detectors/securityStandards.d.ts +15 -0
  187. package/dist/dependencies/detectors/securityStandards.d.ts.map +1 -0
  188. package/dist/dependencies/detectors/securityStandards.js +178 -0
  189. package/dist/dependencies/detectors/securityStandards.js.map +1 -0
  190. package/dist/dependencies/detectors/vulnerabilityDetector.d.ts +53 -0
  191. package/dist/dependencies/detectors/vulnerabilityDetector.d.ts.map +1 -0
  192. package/dist/dependencies/detectors/vulnerabilityDetector.js +289 -0
  193. package/dist/dependencies/detectors/vulnerabilityDetector.js.map +1 -0
  194. package/dist/dependencies/index.d.ts +14 -0
  195. package/dist/dependencies/index.d.ts.map +1 -0
  196. package/dist/dependencies/index.js +43 -0
  197. package/dist/dependencies/index.js.map +1 -0
  198. package/dist/dependencies/installed/index.d.ts +8 -0
  199. package/dist/dependencies/installed/index.d.ts.map +1 -0
  200. package/dist/dependencies/installed/index.js +24 -0
  201. package/dist/dependencies/installed/index.js.map +1 -0
  202. package/dist/dependencies/installed/installedScanner.d.ts +91 -0
  203. package/dist/dependencies/installed/installedScanner.d.ts.map +1 -0
  204. package/dist/dependencies/installed/installedScanner.js +766 -0
  205. package/dist/dependencies/installed/installedScanner.js.map +1 -0
  206. package/dist/dependencies/installed/malwarePatterns.d.ts +32 -0
  207. package/dist/dependencies/installed/malwarePatterns.d.ts.map +1 -0
  208. package/dist/dependencies/installed/malwarePatterns.js +480 -0
  209. package/dist/dependencies/installed/malwarePatterns.js.map +1 -0
  210. package/dist/dependencies/installed/types.d.ts +274 -0
  211. package/dist/dependencies/installed/types.d.ts.map +1 -0
  212. package/dist/dependencies/installed/types.js +7 -0
  213. package/dist/dependencies/installed/types.js.map +1 -0
  214. package/dist/dependencies/parsers/base/baseParser.d.ts +44 -0
  215. package/dist/dependencies/parsers/base/baseParser.d.ts.map +1 -0
  216. package/dist/dependencies/parsers/base/baseParser.js +80 -0
  217. package/dist/dependencies/parsers/base/baseParser.js.map +1 -0
  218. package/dist/dependencies/parsers/base/index.d.ts +6 -0
  219. package/dist/dependencies/parsers/base/index.d.ts.map +1 -0
  220. package/dist/dependencies/parsers/base/index.js +27 -0
  221. package/dist/dependencies/parsers/base/index.js.map +1 -0
  222. package/dist/dependencies/parsers/cpp/cppParser.d.ts +36 -0
  223. package/dist/dependencies/parsers/cpp/cppParser.d.ts.map +1 -0
  224. package/dist/dependencies/parsers/cpp/cppParser.js +196 -0
  225. package/dist/dependencies/parsers/cpp/cppParser.js.map +1 -0
  226. package/dist/dependencies/parsers/cpp/index.d.ts +6 -0
  227. package/dist/dependencies/parsers/cpp/index.d.ts.map +1 -0
  228. package/dist/dependencies/parsers/cpp/index.js +27 -0
  229. package/dist/dependencies/parsers/cpp/index.js.map +1 -0
  230. package/dist/dependencies/parsers/csharp/csharpParser.d.ts +32 -0
  231. package/dist/dependencies/parsers/csharp/csharpParser.d.ts.map +1 -0
  232. package/dist/dependencies/parsers/csharp/csharpParser.js +125 -0
  233. package/dist/dependencies/parsers/csharp/csharpParser.js.map +1 -0
  234. package/dist/dependencies/parsers/csharp/index.d.ts +6 -0
  235. package/dist/dependencies/parsers/csharp/index.d.ts.map +1 -0
  236. package/dist/dependencies/parsers/csharp/index.js +27 -0
  237. package/dist/dependencies/parsers/csharp/index.js.map +1 -0
  238. package/dist/dependencies/parsers/index.d.ts +24 -0
  239. package/dist/dependencies/parsers/index.d.ts.map +1 -0
  240. package/dist/dependencies/parsers/index.js +69 -0
  241. package/dist/dependencies/parsers/index.js.map +1 -0
  242. package/dist/dependencies/parsers/java/index.d.ts +6 -0
  243. package/dist/dependencies/parsers/java/index.d.ts.map +1 -0
  244. package/dist/dependencies/parsers/java/index.js +27 -0
  245. package/dist/dependencies/parsers/java/index.js.map +1 -0
  246. package/dist/dependencies/parsers/java/javaParser.d.ts +32 -0
  247. package/dist/dependencies/parsers/java/javaParser.d.ts.map +1 -0
  248. package/dist/dependencies/parsers/java/javaParser.js +168 -0
  249. package/dist/dependencies/parsers/java/javaParser.js.map +1 -0
  250. package/dist/dependencies/parsers/javascript/index.d.ts +6 -0
  251. package/dist/dependencies/parsers/javascript/index.d.ts.map +1 -0
  252. package/dist/dependencies/parsers/javascript/index.js +27 -0
  253. package/dist/dependencies/parsers/javascript/index.js.map +1 -0
  254. package/dist/dependencies/parsers/javascript/javascriptParser.d.ts +55 -0
  255. package/dist/dependencies/parsers/javascript/javascriptParser.d.ts.map +1 -0
  256. package/dist/dependencies/parsers/javascript/javascriptParser.js +266 -0
  257. package/dist/dependencies/parsers/javascript/javascriptParser.js.map +1 -0
  258. package/dist/dependencies/parsers/php/index.d.ts +6 -0
  259. package/dist/dependencies/parsers/php/index.d.ts.map +1 -0
  260. package/dist/dependencies/parsers/php/index.js +27 -0
  261. package/dist/dependencies/parsers/php/index.js.map +1 -0
  262. package/dist/dependencies/parsers/php/phpParser.d.ts +35 -0
  263. package/dist/dependencies/parsers/php/phpParser.d.ts.map +1 -0
  264. package/dist/dependencies/parsers/php/phpParser.js +162 -0
  265. package/dist/dependencies/parsers/php/phpParser.js.map +1 -0
  266. package/dist/dependencies/parsers/python/index.d.ts +6 -0
  267. package/dist/dependencies/parsers/python/index.d.ts.map +1 -0
  268. package/dist/dependencies/parsers/python/index.js +27 -0
  269. package/dist/dependencies/parsers/python/index.js.map +1 -0
  270. package/dist/dependencies/parsers/python/pythonParser.d.ts +60 -0
  271. package/dist/dependencies/parsers/python/pythonParser.d.ts.map +1 -0
  272. package/dist/dependencies/parsers/python/pythonParser.js +336 -0
  273. package/dist/dependencies/parsers/python/pythonParser.js.map +1 -0
  274. package/dist/dependencies/types.d.ts +280 -0
  275. package/dist/dependencies/types.d.ts.map +1 -0
  276. package/dist/dependencies/types.js +59 -0
  277. package/dist/dependencies/types.js.map +1 -0
  278. package/dist/i18n/index.d.ts +2 -0
  279. package/dist/i18n/index.d.ts.map +1 -0
  280. package/dist/i18n/index.js +18 -0
  281. package/dist/i18n/index.js.map +1 -0
  282. package/dist/i18n/translations.d.ts +55 -0
  283. package/dist/i18n/translations.d.ts.map +1 -0
  284. package/dist/i18n/translations.js +119 -0
  285. package/dist/i18n/translations.js.map +1 -0
  286. package/dist/index.d.ts +14 -0
  287. package/dist/index.d.ts.map +1 -0
  288. package/dist/index.js +36 -0
  289. package/dist/index.js.map +1 -0
  290. package/dist/reports/dependencyReportGenerator.d.ts +20 -0
  291. package/dist/reports/dependencyReportGenerator.d.ts.map +1 -0
  292. package/dist/reports/dependencyReportGenerator.js +690 -0
  293. package/dist/reports/dependencyReportGenerator.js.map +1 -0
  294. package/dist/reports/htmlReportGenerator.d.ts +43 -0
  295. package/dist/reports/htmlReportGenerator.d.ts.map +1 -0
  296. package/dist/reports/htmlReportGenerator.js +793 -0
  297. package/dist/reports/htmlReportGenerator.js.map +1 -0
  298. package/dist/reports/index.d.ts +7 -0
  299. package/dist/reports/index.d.ts.map +1 -0
  300. package/dist/reports/index.js +23 -0
  301. package/dist/reports/index.js.map +1 -0
  302. package/dist/reports/installedDepsReportGenerator.d.ts +14 -0
  303. package/dist/reports/installedDepsReportGenerator.d.ts.map +1 -0
  304. package/dist/reports/installedDepsReportGenerator.js +872 -0
  305. package/dist/reports/installedDepsReportGenerator.js.map +1 -0
  306. package/dist/rules/index.d.ts +31 -0
  307. package/dist/rules/index.d.ts.map +1 -0
  308. package/dist/rules/index.js +95 -0
  309. package/dist/rules/index.js.map +1 -0
  310. package/dist/rules/malware/categories/backdoors.d.ts +12 -0
  311. package/dist/rules/malware/categories/backdoors.d.ts.map +1 -0
  312. package/dist/rules/malware/categories/backdoors.js +163 -0
  313. package/dist/rules/malware/categories/backdoors.js.map +1 -0
  314. package/dist/rules/malware/categories/cryptominers.d.ts +13 -0
  315. package/dist/rules/malware/categories/cryptominers.d.ts.map +1 -0
  316. package/dist/rules/malware/categories/cryptominers.js +415 -0
  317. package/dist/rules/malware/categories/cryptominers.js.map +1 -0
  318. package/dist/rules/malware/categories/exfiltration.d.ts +20 -0
  319. package/dist/rules/malware/categories/exfiltration.d.ts.map +1 -0
  320. package/dist/rules/malware/categories/exfiltration.js +658 -0
  321. package/dist/rules/malware/categories/exfiltration.js.map +1 -0
  322. package/dist/rules/malware/categories/keyloggers.d.ts +19 -0
  323. package/dist/rules/malware/categories/keyloggers.d.ts.map +1 -0
  324. package/dist/rules/malware/categories/keyloggers.js +763 -0
  325. package/dist/rules/malware/categories/keyloggers.js.map +1 -0
  326. package/dist/rules/malware/categories/loaders.d.ts +20 -0
  327. package/dist/rules/malware/categories/loaders.d.ts.map +1 -0
  328. package/dist/rules/malware/categories/loaders.js +702 -0
  329. package/dist/rules/malware/categories/loaders.js.map +1 -0
  330. package/dist/rules/malware/categories/network.d.ts +19 -0
  331. package/dist/rules/malware/categories/network.d.ts.map +1 -0
  332. package/dist/rules/malware/categories/network.js +622 -0
  333. package/dist/rules/malware/categories/network.js.map +1 -0
  334. package/dist/rules/malware/categories/obfuscation.d.ts +22 -0
  335. package/dist/rules/malware/categories/obfuscation.d.ts.map +1 -0
  336. package/dist/rules/malware/categories/obfuscation.js +766 -0
  337. package/dist/rules/malware/categories/obfuscation.js.map +1 -0
  338. package/dist/rules/malware/constants/index.d.ts +281 -0
  339. package/dist/rules/malware/constants/index.d.ts.map +1 -0
  340. package/dist/rules/malware/constants/index.js +327 -0
  341. package/dist/rules/malware/constants/index.js.map +1 -0
  342. package/dist/rules/malware/engine/index.d.ts +178 -0
  343. package/dist/rules/malware/engine/index.d.ts.map +1 -0
  344. package/dist/rules/malware/engine/index.js +552 -0
  345. package/dist/rules/malware/engine/index.js.map +1 -0
  346. package/dist/rules/malware/index.d.ts +205 -0
  347. package/dist/rules/malware/index.d.ts.map +1 -0
  348. package/dist/rules/malware/index.js +837 -0
  349. package/dist/rules/malware/index.js.map +1 -0
  350. package/dist/rules/malware/scoring/index.d.ts +84 -0
  351. package/dist/rules/malware/scoring/index.d.ts.map +1 -0
  352. package/dist/rules/malware/scoring/index.js +441 -0
  353. package/dist/rules/malware/scoring/index.js.map +1 -0
  354. package/dist/rules/malware/types/index.d.ts +616 -0
  355. package/dist/rules/malware/types/index.d.ts.map +1 -0
  356. package/dist/rules/malware/types/index.js +155 -0
  357. package/dist/rules/malware/types/index.js.map +1 -0
  358. package/dist/rules/malware/utils/index.d.ts +117 -0
  359. package/dist/rules/malware/utils/index.d.ts.map +1 -0
  360. package/dist/rules/malware/utils/index.js +514 -0
  361. package/dist/rules/malware/utils/index.js.map +1 -0
  362. package/dist/rules/standards.d.ts +26 -0
  363. package/dist/rules/standards.d.ts.map +1 -0
  364. package/dist/rules/standards.js +352 -0
  365. package/dist/rules/standards.js.map +1 -0
  366. package/dist/rules/vulnerabilities/constants/index.d.ts +835 -0
  367. package/dist/rules/vulnerabilities/constants/index.d.ts.map +1 -0
  368. package/dist/rules/vulnerabilities/constants/index.js +544 -0
  369. package/dist/rules/vulnerabilities/constants/index.js.map +1 -0
  370. package/dist/rules/vulnerabilities/engine/index.d.ts +145 -0
  371. package/dist/rules/vulnerabilities/engine/index.d.ts.map +1 -0
  372. package/dist/rules/vulnerabilities/engine/index.js +581 -0
  373. package/dist/rules/vulnerabilities/engine/index.js.map +1 -0
  374. package/dist/rules/vulnerabilities/index.d.ts +148 -0
  375. package/dist/rules/vulnerabilities/index.d.ts.map +1 -0
  376. package/dist/rules/vulnerabilities/index.js +252 -0
  377. package/dist/rules/vulnerabilities/index.js.map +1 -0
  378. package/dist/rules/vulnerabilities/rules/authentication.d.ts +8 -0
  379. package/dist/rules/vulnerabilities/rules/authentication.d.ts.map +1 -0
  380. package/dist/rules/vulnerabilities/rules/authentication.js +419 -0
  381. package/dist/rules/vulnerabilities/rules/authentication.js.map +1 -0
  382. package/dist/rules/vulnerabilities/rules/commandInjection.d.ts +8 -0
  383. package/dist/rules/vulnerabilities/rules/commandInjection.d.ts.map +1 -0
  384. package/dist/rules/vulnerabilities/rules/commandInjection.js +300 -0
  385. package/dist/rules/vulnerabilities/rules/commandInjection.js.map +1 -0
  386. package/dist/rules/vulnerabilities/rules/csrf.d.ts +8 -0
  387. package/dist/rules/vulnerabilities/rules/csrf.d.ts.map +1 -0
  388. package/dist/rules/vulnerabilities/rules/csrf.js +261 -0
  389. package/dist/rules/vulnerabilities/rules/csrf.js.map +1 -0
  390. package/dist/rules/vulnerabilities/rules/deserialization.d.ts +8 -0
  391. package/dist/rules/vulnerabilities/rules/deserialization.d.ts.map +1 -0
  392. package/dist/rules/vulnerabilities/rules/deserialization.js +336 -0
  393. package/dist/rules/vulnerabilities/rules/deserialization.js.map +1 -0
  394. package/dist/rules/vulnerabilities/rules/fileUpload.d.ts +8 -0
  395. package/dist/rules/vulnerabilities/rules/fileUpload.d.ts.map +1 -0
  396. package/dist/rules/vulnerabilities/rules/fileUpload.js +325 -0
  397. package/dist/rules/vulnerabilities/rules/fileUpload.js.map +1 -0
  398. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.d.ts +8 -0
  399. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.d.ts.map +1 -0
  400. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.js +446 -0
  401. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.js.map +1 -0
  402. package/dist/rules/vulnerabilities/rules/index.d.ts +17 -0
  403. package/dist/rules/vulnerabilities/rules/index.d.ts.map +1 -0
  404. package/dist/rules/vulnerabilities/rules/index.js +47 -0
  405. package/dist/rules/vulnerabilities/rules/index.js.map +1 -0
  406. package/dist/rules/vulnerabilities/rules/pathTraversal.d.ts +8 -0
  407. package/dist/rules/vulnerabilities/rules/pathTraversal.d.ts.map +1 -0
  408. package/dist/rules/vulnerabilities/rules/pathTraversal.js +351 -0
  409. package/dist/rules/vulnerabilities/rules/pathTraversal.js.map +1 -0
  410. package/dist/rules/vulnerabilities/rules/prototypePollution.d.ts +8 -0
  411. package/dist/rules/vulnerabilities/rules/prototypePollution.d.ts.map +1 -0
  412. package/dist/rules/vulnerabilities/rules/prototypePollution.js +272 -0
  413. package/dist/rules/vulnerabilities/rules/prototypePollution.js.map +1 -0
  414. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.d.ts +8 -0
  415. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.d.ts.map +1 -0
  416. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.js +438 -0
  417. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.js.map +1 -0
  418. package/dist/rules/vulnerabilities/rules/sqlInjection.d.ts +12 -0
  419. package/dist/rules/vulnerabilities/rules/sqlInjection.d.ts.map +1 -0
  420. package/dist/rules/vulnerabilities/rules/sqlInjection.js +636 -0
  421. package/dist/rules/vulnerabilities/rules/sqlInjection.js.map +1 -0
  422. package/dist/rules/vulnerabilities/rules/ssrf.d.ts +8 -0
  423. package/dist/rules/vulnerabilities/rules/ssrf.d.ts.map +1 -0
  424. package/dist/rules/vulnerabilities/rules/ssrf.js +401 -0
  425. package/dist/rules/vulnerabilities/rules/ssrf.js.map +1 -0
  426. package/dist/rules/vulnerabilities/rules/xss.d.ts +11 -0
  427. package/dist/rules/vulnerabilities/rules/xss.d.ts.map +1 -0
  428. package/dist/rules/vulnerabilities/rules/xss.js +724 -0
  429. package/dist/rules/vulnerabilities/rules/xss.js.map +1 -0
  430. package/dist/rules/vulnerabilities/scoring/index.d.ts +80 -0
  431. package/dist/rules/vulnerabilities/scoring/index.d.ts.map +1 -0
  432. package/dist/rules/vulnerabilities/scoring/index.js +414 -0
  433. package/dist/rules/vulnerabilities/scoring/index.js.map +1 -0
  434. package/dist/rules/vulnerabilities/types/index.d.ts +830 -0
  435. package/dist/rules/vulnerabilities/types/index.d.ts.map +1 -0
  436. package/dist/rules/vulnerabilities/types/index.js +164 -0
  437. package/dist/rules/vulnerabilities/types/index.js.map +1 -0
  438. package/dist/rules/vulnerabilities/utils/index.d.ts +206 -0
  439. package/dist/rules/vulnerabilities/utils/index.d.ts.map +1 -0
  440. package/dist/rules/vulnerabilities/utils/index.js +615 -0
  441. package/dist/rules/vulnerabilities/utils/index.js.map +1 -0
  442. package/dist/types/index.d.ts +359 -0
  443. package/dist/types/index.d.ts.map +1 -0
  444. package/dist/types/index.js +61 -0
  445. package/dist/types/index.js.map +1 -0
  446. package/dist/utils/index.d.ts +82 -0
  447. package/dist/utils/index.d.ts.map +1 -0
  448. package/dist/utils/index.js +326 -0
  449. package/dist/utils/index.js.map +1 -0
  450. package/dist/utils/logger.d.ts +40 -0
  451. package/dist/utils/logger.d.ts.map +1 -0
  452. package/dist/utils/logger.js +139 -0
  453. package/dist/utils/logger.js.map +1 -0
  454. package/docs/ARCHITECTURE.md +320 -0
  455. package/docs/V1.2.1-IA_Performances.md +116 -0
  456. package/docs/images/WIN_Defender.png +0 -0
  457. package/package.json +68 -0
  458. package/secure-scan.config.json +134 -0
  459. package/secure-scan.sln +29 -0
  460. package/src/ai/aiAnalyzer.ts +714 -0
  461. package/src/ai/index.ts +5 -0
  462. package/src/analyzers/base/baseAnalyzer.ts +66 -0
  463. package/src/analyzers/base/index.ts +5 -0
  464. package/src/analyzers/c-cpp/cppAnalyzer.ts +308 -0
  465. package/src/analyzers/c-cpp/index.ts +5 -0
  466. package/src/analyzers/core/engine/index.ts +5 -0
  467. package/src/analyzers/core/engine/ruleEngine.ts +221 -0
  468. package/src/analyzers/core/index.ts +8 -0
  469. package/src/analyzers/core/scanner/fileScanner.ts +204 -0
  470. package/src/analyzers/core/scanner/index.ts +5 -0
  471. package/src/analyzers/core/scoring/index.ts +5 -0
  472. package/src/analyzers/core/scoring/riskScoring.ts +198 -0
  473. package/src/analyzers/core/securityScanner.ts +321 -0
  474. package/src/analyzers/csharp/csharpAnalyzer.ts +328 -0
  475. package/src/analyzers/csharp/index.ts +5 -0
  476. package/src/analyzers/iac/iacAnalyzer.ts +318 -0
  477. package/src/analyzers/iac/index.ts +5 -0
  478. package/src/analyzers/index.ts +67 -0
  479. package/src/analyzers/java/index.ts +5 -0
  480. package/src/analyzers/java/javaAnalyzer.ts +320 -0
  481. package/src/analyzers/javascript/PROMPT_JS_ANALYZER.md +267 -0
  482. package/src/analyzers/javascript/astUtils.ts +789 -0
  483. package/src/analyzers/javascript/index.ts +50 -0
  484. package/src/analyzers/javascript/javascriptAnalyzer.ts +984 -0
  485. package/src/analyzers/javascript/malwareDetector.ts +697 -0
  486. package/src/analyzers/javascript/packageJsonAnalyzer.ts +626 -0
  487. package/src/analyzers/javascript/taintAnalyzer.ts +630 -0
  488. package/src/analyzers/php/index.ts +5 -0
  489. package/src/analyzers/php/phpAnalyzer.ts +280 -0
  490. package/src/analyzers/python/index.ts +5 -0
  491. package/src/analyzers/python/pythonAnalyzer.ts +319 -0
  492. package/src/cli/index.ts +276 -0
  493. package/src/dependencies/aiDependencyAnalyzer.ts +496 -0
  494. package/src/dependencies/database/cveDatabase.ts +426 -0
  495. package/src/dependencies/database/index.ts +6 -0
  496. package/src/dependencies/database/maliciousPackages.ts +286 -0
  497. package/src/dependencies/dependencyAnalyzer.ts +394 -0
  498. package/src/dependencies/detectors/index.ts +7 -0
  499. package/src/dependencies/detectors/securityStandards.ts +200 -0
  500. package/src/dependencies/detectors/vulnerabilityDetector.ts +343 -0
  501. package/src/dependencies/index.ts +27 -0
  502. package/src/dependencies/installed/index.ts +8 -0
  503. package/src/dependencies/installed/installedScanner.ts +821 -0
  504. package/src/dependencies/installed/malwarePatterns.ts +492 -0
  505. package/src/dependencies/installed/types.ts +287 -0
  506. package/src/dependencies/parsers/base/baseParser.ts +108 -0
  507. package/src/dependencies/parsers/base/index.ts +6 -0
  508. package/src/dependencies/parsers/cpp/cppParser.ts +245 -0
  509. package/src/dependencies/parsers/cpp/index.ts +6 -0
  510. package/src/dependencies/parsers/csharp/csharpParser.ts +151 -0
  511. package/src/dependencies/parsers/csharp/index.ts +6 -0
  512. package/src/dependencies/parsers/index.ts +56 -0
  513. package/src/dependencies/parsers/java/index.ts +6 -0
  514. package/src/dependencies/parsers/java/javaParser.ts +203 -0
  515. package/src/dependencies/parsers/javascript/index.ts +6 -0
  516. package/src/dependencies/parsers/javascript/javascriptParser.ts +362 -0
  517. package/src/dependencies/parsers/php/index.ts +6 -0
  518. package/src/dependencies/parsers/php/phpParser.ts +208 -0
  519. package/src/dependencies/parsers/python/index.ts +6 -0
  520. package/src/dependencies/parsers/python/pythonParser.ts +437 -0
  521. package/src/dependencies/types.ts +330 -0
  522. package/src/i18n/index.ts +1 -0
  523. package/src/i18n/translations.ts +194 -0
  524. package/src/index.ts +16 -0
  525. package/src/reports/dependencyReportGenerator.ts +717 -0
  526. package/src/reports/htmlReportGenerator.ts +781 -0
  527. package/src/reports/index.ts +7 -0
  528. package/src/reports/installedDepsReportGenerator.ts +899 -0
  529. package/src/rules/index.ts +58 -0
  530. package/src/rules/malware/INFO.md +287 -0
  531. package/src/rules/malware/categories/backdoors.ts +174 -0
  532. package/src/rules/malware/categories/cryptominers.ts +434 -0
  533. package/src/rules/malware/categories/exfiltration.ts +677 -0
  534. package/src/rules/malware/categories/keyloggers.ts +780 -0
  535. package/src/rules/malware/categories/loaders.ts +721 -0
  536. package/src/rules/malware/categories/network.ts +639 -0
  537. package/src/rules/malware/categories/obfuscation.ts +788 -0
  538. package/src/rules/malware/constants/index.ts +358 -0
  539. package/src/rules/malware/engine/index.ts +758 -0
  540. package/src/rules/malware/index.ts +928 -0
  541. package/src/rules/malware/scoring/index.ts +549 -0
  542. package/src/rules/malware/types/index.ts +752 -0
  543. package/src/rules/malware/utils/index.ts +643 -0
  544. package/src/rules/standards.ts +372 -0
  545. package/src/rules/vulnerabilities/PROMPT_VULNERABILITIES.md +226 -0
  546. package/src/rules/vulnerabilities/constants/index.ts +625 -0
  547. package/src/rules/vulnerabilities/engine/index.ts +831 -0
  548. package/src/rules/vulnerabilities/index.ts +312 -0
  549. package/src/rules/vulnerabilities/rules/authentication.ts +426 -0
  550. package/src/rules/vulnerabilities/rules/commandInjection.ts +307 -0
  551. package/src/rules/vulnerabilities/rules/csrf.ts +268 -0
  552. package/src/rules/vulnerabilities/rules/deserialization.ts +343 -0
  553. package/src/rules/vulnerabilities/rules/fileUpload.ts +332 -0
  554. package/src/rules/vulnerabilities/rules/hardcodedSecrets.ts +453 -0
  555. package/src/rules/vulnerabilities/rules/index.ts +17 -0
  556. package/src/rules/vulnerabilities/rules/pathTraversal.ts +358 -0
  557. package/src/rules/vulnerabilities/rules/prototypePollution.ts +279 -0
  558. package/src/rules/vulnerabilities/rules/securityMisconfiguration.ts +445 -0
  559. package/src/rules/vulnerabilities/rules/sqlInjection.ts +669 -0
  560. package/src/rules/vulnerabilities/rules/ssrf.ts +408 -0
  561. package/src/rules/vulnerabilities/rules/xss.ts +753 -0
  562. package/src/rules/vulnerabilities/scoring/index.ts +543 -0
  563. package/src/rules/vulnerabilities/types/index.ts +1004 -0
  564. package/src/rules/vulnerabilities/utils/index.ts +709 -0
  565. package/src/types/index.ts +391 -0
  566. package/src/utils/index.ts +306 -0
  567. package/src/utils/logger.ts +150 -0
  568. package/test-installed-scanner.ts +136 -0
  569. package/tsconfig.json +30 -0
@@ -0,0 +1,351 @@
1
+ "use strict";
2
+ /**
3
+ * @fileoverview Path Traversal Detection Rules
4
+ * @module rules/vulnerabilities/rules/pathTraversal
5
+ */
6
+ Object.defineProperty(exports, "__esModule", { value: true });
7
+ exports.pathTraversalRules = void 0;
8
+ const types_1 = require("../types");
9
+ const constants_1 = require("../constants");
10
+ exports.pathTraversalRules = [
11
+ {
12
+ id: 'VUL-PATH-001',
13
+ name: 'Path Traversal - Node.js fs with User Input',
14
+ description: 'Detects file system operations using unsanitized user input.',
15
+ version: '1.0.0',
16
+ vulnerabilityType: types_1.VulnerabilityType.PATH_TRAVERSAL,
17
+ category: types_1.VulnerabilityCategory.INJECTION,
18
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
19
+ severity: types_1.VulnerabilitySeverity.HIGH,
20
+ confidence: types_1.ConfidenceLevel.HIGH,
21
+ baseScore: 80,
22
+ patterns: [
23
+ {
24
+ type: types_1.PatternType.REGEX,
25
+ patternId: 'path-fs-req',
26
+ pattern: '(?:fs\\.(?:readFile|writeFile|unlink|readdir|mkdir|rmdir|stat|access)|require\\s*\\()\\s*(?:Sync)?\\s*\\([^)]*(?:req\\.|params\\.|query\\.)',
27
+ flags: 'gi',
28
+ weight: 1.0,
29
+ description: 'fs operation with request data'
30
+ },
31
+ {
32
+ type: types_1.PatternType.REGEX,
33
+ patternId: 'path-join-req',
34
+ pattern: 'path\\.(?:join|resolve)\\s*\\([^)]*(?:req\\.|params\\.|query\\.)',
35
+ flags: 'gi',
36
+ weight: 0.85,
37
+ description: 'path.join with user input'
38
+ },
39
+ {
40
+ type: types_1.PatternType.REGEX,
41
+ patternId: 'path-traversal-pattern',
42
+ pattern: '(?:\\.\\.\\/|\\.\\.\\.\\\\)',
43
+ flags: 'g',
44
+ weight: 0.70,
45
+ description: 'Literal path traversal pattern'
46
+ }
47
+ ],
48
+ taintAnalysis: {
49
+ sources: ['req.params', 'req.query', 'req.body', 'process.argv'],
50
+ sinks: ['fs.readFile', 'fs.writeFile', 'fs.createReadStream', 'fs.createWriteStream', 'require'],
51
+ sanitizers: ['path.basename', 'path.normalize', '.includes("..")', '.startsWith(allowedDir)']
52
+ },
53
+ impact: {
54
+ confidentiality: 'high',
55
+ integrity: 'medium',
56
+ availability: 'low',
57
+ technicalImpact: 'Read or write arbitrary files on the server.',
58
+ businessImpact: 'Sensitive data exposure, configuration disclosure, code execution via file overwrite.'
59
+ },
60
+ exploitability: {
61
+ attackVector: 'network',
62
+ attackComplexity: 'low',
63
+ privilegesRequired: 'none',
64
+ userInteraction: 'none'
65
+ },
66
+ remediation: {
67
+ summary: 'Validate file paths against allowed directories. Use path.basename() and verify the resolved path.',
68
+ steps: [
69
+ 'Use path.basename() to extract filename only',
70
+ 'Resolve the full path and verify it starts with allowed directory',
71
+ 'Reject paths containing ".." or null bytes',
72
+ 'Use chroot or sandboxed file access'
73
+ ],
74
+ secureCodeExample: `const path = require('path');
75
+ const fs = require('fs');
76
+
77
+ const ALLOWED_DIR = '/app/uploads';
78
+
79
+ function readSafeFile(userPath) {
80
+ const filename = path.basename(userPath);
81
+ const fullPath = path.resolve(ALLOWED_DIR, filename);
82
+
83
+ // Ensure path is within allowed directory
84
+ if (!fullPath.startsWith(ALLOWED_DIR)) {
85
+ throw new Error('Invalid path');
86
+ }
87
+
88
+ return fs.readFileSync(fullPath);
89
+ }`,
90
+ effort: 'medium',
91
+ priority: 'high'
92
+ },
93
+ standards: {
94
+ owasp: [constants_1.OWASP_TOP_10_2021.A01],
95
+ cwe: [constants_1.CWE_REFERENCES.CWE_22]
96
+ },
97
+ tags: ['path-traversal', 'lfi', 'file-access', 'nodejs'],
98
+ enabled: true
99
+ },
100
+ {
101
+ id: 'VUL-PATH-002',
102
+ name: 'Path Traversal - Python open() with User Input',
103
+ description: 'Detects Python file operations with user-controlled paths.',
104
+ version: '1.0.0',
105
+ vulnerabilityType: types_1.VulnerabilityType.PATH_TRAVERSAL,
106
+ category: types_1.VulnerabilityCategory.INJECTION,
107
+ languages: [types_1.SupportedLanguage.PYTHON],
108
+ severity: types_1.VulnerabilitySeverity.HIGH,
109
+ confidence: types_1.ConfidenceLevel.HIGH,
110
+ baseScore: 80,
111
+ patterns: [
112
+ {
113
+ type: types_1.PatternType.REGEX,
114
+ patternId: 'path-python-open',
115
+ pattern: 'open\\s*\\([^)]*(?:request\\.|input\\(|sys\\.argv|f[\'"])',
116
+ flags: 'gi',
117
+ weight: 0.95,
118
+ description: 'open() with user input'
119
+ },
120
+ {
121
+ type: types_1.PatternType.REGEX,
122
+ patternId: 'path-python-pathlib',
123
+ pattern: 'Path\\s*\\([^)]*(?:request\\.|input\\()',
124
+ flags: 'gi',
125
+ weight: 0.90,
126
+ description: 'pathlib.Path with user input'
127
+ },
128
+ {
129
+ type: types_1.PatternType.REGEX,
130
+ patternId: 'path-python-send-file',
131
+ pattern: 'send_file\\s*\\([^)]*(?:request\\.|\\+)',
132
+ flags: 'gi',
133
+ weight: 1.0,
134
+ description: 'Flask send_file with user input'
135
+ }
136
+ ],
137
+ taintAnalysis: {
138
+ sources: ['request.args', 'request.form', 'request.files', 'sys.argv', 'input()'],
139
+ sinks: ['open(', 'Path(', 'send_file(', 'send_from_directory('],
140
+ sanitizers: ['os.path.basename', 'secure_filename', 'Path.resolve().is_relative_to']
141
+ },
142
+ impact: {
143
+ confidentiality: 'high',
144
+ integrity: 'medium',
145
+ availability: 'low',
146
+ technicalImpact: 'Arbitrary file read/write access.',
147
+ businessImpact: 'Data breach, source code disclosure.'
148
+ },
149
+ exploitability: {
150
+ attackVector: 'network',
151
+ attackComplexity: 'low',
152
+ privilegesRequired: 'none',
153
+ userInteraction: 'none'
154
+ },
155
+ remediation: {
156
+ summary: 'Use os.path.basename() or werkzeug.secure_filename(). Validate resolved paths.',
157
+ steps: [
158
+ 'Extract basename from user input',
159
+ 'Use secure_filename() for uploads',
160
+ 'Verify resolved path is within allowed directory',
161
+ 'Use pathlib for safer path operations'
162
+ ],
163
+ secureCodeExample: `from pathlib import Path
164
+ from werkzeug.utils import secure_filename
165
+
166
+ UPLOAD_DIR = Path('/app/uploads')
167
+
168
+ def read_safe_file(user_path: str) -> bytes:
169
+ filename = secure_filename(user_path)
170
+ full_path = (UPLOAD_DIR / filename).resolve()
171
+
172
+ if not full_path.is_relative_to(UPLOAD_DIR):
173
+ raise ValueError('Invalid path')
174
+
175
+ return full_path.read_bytes()`,
176
+ effort: 'low',
177
+ priority: 'high'
178
+ },
179
+ standards: {
180
+ owasp: [constants_1.OWASP_TOP_10_2021.A01],
181
+ cwe: [constants_1.CWE_REFERENCES.CWE_22]
182
+ },
183
+ tags: ['path-traversal', 'python', 'file-access'],
184
+ enabled: true
185
+ },
186
+ {
187
+ id: 'VUL-PATH-003',
188
+ name: 'Path Traversal - PHP file_get_contents/include',
189
+ description: 'Detects PHP file operations with user-controlled paths (LFI/RFI).',
190
+ version: '1.0.0',
191
+ vulnerabilityType: types_1.VulnerabilityType.PATH_TRAVERSAL,
192
+ category: types_1.VulnerabilityCategory.INJECTION,
193
+ languages: [types_1.SupportedLanguage.PHP],
194
+ severity: types_1.VulnerabilitySeverity.CRITICAL,
195
+ confidence: types_1.ConfidenceLevel.HIGH,
196
+ baseScore: 90,
197
+ patterns: [
198
+ {
199
+ type: types_1.PatternType.REGEX,
200
+ patternId: 'path-php-include',
201
+ pattern: '(?:include|require)(?:_once)?\\s*\\(?\\s*\\$_(?:GET|POST|REQUEST)',
202
+ flags: 'gi',
203
+ weight: 1.0,
204
+ description: 'include/require with superglobal'
205
+ },
206
+ {
207
+ type: types_1.PatternType.REGEX,
208
+ patternId: 'path-php-file-get',
209
+ pattern: 'file_get_contents\\s*\\([^)]*\\$_(?:GET|POST|REQUEST)',
210
+ flags: 'gi',
211
+ weight: 0.95,
212
+ description: 'file_get_contents with user input'
213
+ },
214
+ {
215
+ type: types_1.PatternType.REGEX,
216
+ patternId: 'path-php-fopen',
217
+ pattern: 'fopen\\s*\\([^)]*\\$_(?:GET|POST|REQUEST)',
218
+ flags: 'gi',
219
+ weight: 0.95,
220
+ description: 'fopen with user input'
221
+ }
222
+ ],
223
+ impact: {
224
+ confidentiality: 'high',
225
+ integrity: 'high',
226
+ availability: 'medium',
227
+ technicalImpact: 'LFI can lead to RCE via log poisoning or wrapper exploitation. RFI allows direct code execution.',
228
+ businessImpact: 'Complete server compromise.'
229
+ },
230
+ exploitability: {
231
+ attackVector: 'network',
232
+ attackComplexity: 'low',
233
+ privilegesRequired: 'none',
234
+ userInteraction: 'none',
235
+ knownExploits: true
236
+ },
237
+ remediation: {
238
+ summary: 'Never include files based on user input. Use allowlist and basename().',
239
+ steps: [
240
+ 'Use allowlist of permitted files',
241
+ 'Use basename() to strip directory components',
242
+ 'Disable allow_url_include in php.ini',
243
+ 'Use realpath() and verify prefix'
244
+ ],
245
+ secureCodeExample: `<?php
246
+ $allowed_pages = ['home', 'about', 'contact'];
247
+ $page = basename($_GET['page'] ?? 'home');
248
+
249
+ if (!in_array($page, $allowed_pages, true)) {
250
+ $page = 'home';
251
+ }
252
+
253
+ include __DIR__ . '/pages/' . $page . '.php';
254
+ ?>`,
255
+ effort: 'medium',
256
+ priority: 'immediate'
257
+ },
258
+ standards: {
259
+ owasp: [constants_1.OWASP_TOP_10_2021.A01, constants_1.OWASP_TOP_10_2021.A03],
260
+ cwe: [constants_1.CWE_REFERENCES.CWE_22, constants_1.CWE_REFERENCES.CWE_98]
261
+ },
262
+ tags: ['path-traversal', 'lfi', 'rfi', 'php', 'critical'],
263
+ enabled: true
264
+ },
265
+ {
266
+ id: 'VUL-PATH-004',
267
+ name: 'Path Traversal - Java File/Path with User Input',
268
+ description: 'Detects Java file operations with user-controlled paths.',
269
+ version: '1.0.0',
270
+ vulnerabilityType: types_1.VulnerabilityType.PATH_TRAVERSAL,
271
+ category: types_1.VulnerabilityCategory.INJECTION,
272
+ languages: [types_1.SupportedLanguage.JAVA],
273
+ severity: types_1.VulnerabilitySeverity.HIGH,
274
+ confidence: types_1.ConfidenceLevel.HIGH,
275
+ baseScore: 80,
276
+ patterns: [
277
+ {
278
+ type: types_1.PatternType.REGEX,
279
+ patternId: 'path-java-new-file',
280
+ pattern: 'new\\s+File\\s*\\([^)]*(?:request\\.getParameter|\\+)',
281
+ flags: 'gi',
282
+ weight: 0.95,
283
+ description: 'new File with user input'
284
+ },
285
+ {
286
+ type: types_1.PatternType.REGEX,
287
+ patternId: 'path-java-paths-get',
288
+ pattern: 'Paths\\.get\\s*\\([^)]*(?:request\\.getParameter|\\+)',
289
+ flags: 'gi',
290
+ weight: 0.95,
291
+ description: 'Paths.get with user input'
292
+ },
293
+ {
294
+ type: types_1.PatternType.REGEX,
295
+ patternId: 'path-java-fileinputstream',
296
+ pattern: 'new\\s+FileInputStream\\s*\\([^)]*(?:request|\\+)',
297
+ flags: 'gi',
298
+ weight: 0.90,
299
+ description: 'FileInputStream with dynamic path'
300
+ }
301
+ ],
302
+ impact: {
303
+ confidentiality: 'high',
304
+ integrity: 'medium',
305
+ availability: 'low',
306
+ technicalImpact: 'Read or write files outside intended directory.',
307
+ businessImpact: 'Data disclosure, configuration exposure.'
308
+ },
309
+ exploitability: {
310
+ attackVector: 'network',
311
+ attackComplexity: 'low',
312
+ privilegesRequired: 'none',
313
+ userInteraction: 'none'
314
+ },
315
+ remediation: {
316
+ summary: 'Use Path.normalize() and verify canonical path starts with allowed directory.',
317
+ steps: [
318
+ 'Normalize the path using Path.normalize()',
319
+ 'Get canonical path and verify it starts with base directory',
320
+ 'Use FilenameUtils.getName() for basename extraction',
321
+ 'Implement file access through a secure abstraction layer'
322
+ ],
323
+ secureCodeExample: `import java.nio.file.Path;
324
+ import java.nio.file.Paths;
325
+
326
+ public class SecureFileAccess {
327
+ private static final Path BASE_DIR = Paths.get("/app/uploads").toAbsolutePath();
328
+
329
+ public Path resolvePath(String userInput) throws SecurityException {
330
+ Path resolved = BASE_DIR.resolve(userInput).normalize().toAbsolutePath();
331
+
332
+ if (!resolved.startsWith(BASE_DIR)) {
333
+ throw new SecurityException("Path traversal attempt detected");
334
+ }
335
+
336
+ return resolved;
337
+ }
338
+ }`,
339
+ effort: 'medium',
340
+ priority: 'high'
341
+ },
342
+ standards: {
343
+ owasp: [constants_1.OWASP_TOP_10_2021.A01],
344
+ cwe: [constants_1.CWE_REFERENCES.CWE_22]
345
+ },
346
+ tags: ['path-traversal', 'java', 'file-access'],
347
+ enabled: true
348
+ }
349
+ ];
350
+ exports.default = exports.pathTraversalRules;
351
+ //# sourceMappingURL=pathTraversal.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"pathTraversal.js","sourceRoot":"","sources":["../../../../src/rules/vulnerabilities/rules/pathTraversal.ts"],"names":[],"mappings":";AAAA;;;GAGG;;;AAEH,oCAQkB;AAClB,4CAAiE;AAEpD,QAAA,kBAAkB,GAAwB;IACrD;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,6CAA6C;QACnD,WAAW,EAAE,8DAA8D;QAC3E,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,cAAc;QACnD,QAAQ,EAAE,6BAAqB,CAAC,SAAS;QACzC,SAAS,EAAE,CAAC,yBAAiB,CAAC,UAAU,EAAE,yBAAiB,CAAC,UAAU,CAAC;QACvE,QAAQ,EAAE,6BAAqB,CAAC,IAAI;QACpC,UAAU,EAAE,uBAAe,CAAC,IAAI;QAChC,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,aAAa;gBACxB,OAAO,EAAE,6IAA6I;gBACtJ,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,GAAG;gBACX,WAAW,EAAE,gCAAgC;aAC9C;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,eAAe;gBAC1B,OAAO,EAAE,kEAAkE;gBAC3E,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,2BAA2B;aACzC;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,wBAAwB;gBACnC,OAAO,EAAE,6BAA6B;gBACtC,KAAK,EAAE,GAAG;gBACV,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,gCAAgC;aAC9C;SACF;QACD,aAAa,EAAE;YACb,OAAO,EAAE,CAAC,YAAY,EAAE,WAAW,EAAE,UAAU,EAAE,cAAc,CAAC;YAChE,KAAK,EAAE,CAAC,aAAa,EAAE,cAAc,EAAE,qBAAqB,EAAE,sBAAsB,EAAE,SAAS,CAAC;YAChG,UAAU,EAAE,CAAC,eAAe,EAAE,gBAAgB,EAAE,iBAAiB,EAAE,yBAAyB,CAAC;SAC9F;QACD,MAAM,EAAE;YACN,eAAe,EAAE,MAAM;YACvB,SAAS,EAAE,QAAQ;YACnB,YAAY,EAAE,KAAK;YACnB,eAAe,EAAE,8CAA8C;YAC/D,cAAc,EAAE,uFAAuF;SACxG;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,KAAK;YACvB,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,MAAM;SACxB;QACD,WAAW,EAAE;YACX,OAAO,EAAE,oGAAoG;YAC7G,KAAK,EAAE;gBACL,8CAA8C;gBAC9C,mEAAmE;gBACnE,4CAA4C;gBAC5C,qCAAqC;aACtC;YACD,iBAAiB,EAAE;;;;;;;;;;;;;;;EAevB;YACI,MAAM,EAAE,QAAQ;YAChB,QAAQ,EAAE,MAAM;SACjB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,CAAC;YAC9B,GAAG,EAAE,CAAC,0BAAc,CAAC,MAAM,CAAC;SAC7B;QACD,IAAI,EAAE,CAAC,gBAAgB,EAAE,KAAK,EAAE,aAAa,EAAE,QAAQ,CAAC;QACxD,OAAO,EAAE,IAAI;KACd;IACD;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,gDAAgD;QACtD,WAAW,EAAE,4DAA4D;QACzE,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,cAAc;QACnD,QAAQ,EAAE,6BAAqB,CAAC,SAAS;QACzC,SAAS,EAAE,CAAC,yBAAiB,CAAC,MAAM,CAAC;QACrC,QAAQ,EAAE,6BAAqB,CAAC,IAAI;QACpC,UAAU,EAAE,uBAAe,CAAC,IAAI;QAChC,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,kBAAkB;gBAC7B,OAAO,EAAE,2DAA2D;gBACpE,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,wBAAwB;aACtC;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,qBAAqB;gBAChC,OAAO,EAAE,yCAAyC;gBAClD,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,8BAA8B;aAC5C;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,uBAAuB;gBAClC,OAAO,EAAE,yCAAyC;gBAClD,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,GAAG;gBACX,WAAW,EAAE,iCAAiC;aAC/C;SACF;QACD,aAAa,EAAE;YACb,OAAO,EAAE,CAAC,cAAc,EAAE,cAAc,EAAE,eAAe,EAAE,UAAU,EAAE,SAAS,CAAC;YACjF,KAAK,EAAE,CAAC,OAAO,EAAE,OAAO,EAAE,YAAY,EAAE,sBAAsB,CAAC;YAC/D,UAAU,EAAE,CAAC,kBAAkB,EAAE,iBAAiB,EAAE,+BAA+B,CAAC;SACrF;QACD,MAAM,EAAE;YACN,eAAe,EAAE,MAAM;YACvB,SAAS,EAAE,QAAQ;YACnB,YAAY,EAAE,KAAK;YACnB,eAAe,EAAE,mCAAmC;YACpD,cAAc,EAAE,sCAAsC;SACvD;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,KAAK;YACvB,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,MAAM;SACxB;QACD,WAAW,EAAE;YACX,OAAO,EAAE,gFAAgF;YACzF,KAAK,EAAE;gBACL,kCAAkC;gBAClC,mCAAmC;gBACnC,kDAAkD;gBAClD,uCAAuC;aACxC;YACD,iBAAiB,EAAE;;;;;;;;;;;;kCAYS;YAC5B,MAAM,EAAE,KAAK;YACb,QAAQ,EAAE,MAAM;SACjB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,CAAC;YAC9B,GAAG,EAAE,CAAC,0BAAc,CAAC,MAAM,CAAC;SAC7B;QACD,IAAI,EAAE,CAAC,gBAAgB,EAAE,QAAQ,EAAE,aAAa,CAAC;QACjD,OAAO,EAAE,IAAI;KACd;IACD;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,gDAAgD;QACtD,WAAW,EAAE,mEAAmE;QAChF,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,cAAc;QACnD,QAAQ,EAAE,6BAAqB,CAAC,SAAS;QACzC,SAAS,EAAE,CAAC,yBAAiB,CAAC,GAAG,CAAC;QAClC,QAAQ,EAAE,6BAAqB,CAAC,QAAQ;QACxC,UAAU,EAAE,uBAAe,CAAC,IAAI;QAChC,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,kBAAkB;gBAC7B,OAAO,EAAE,mEAAmE;gBAC5E,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,GAAG;gBACX,WAAW,EAAE,kCAAkC;aAChD;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,mBAAmB;gBAC9B,OAAO,EAAE,uDAAuD;gBAChE,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,mCAAmC;aACjD;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,gBAAgB;gBAC3B,OAAO,EAAE,2CAA2C;gBACpD,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,uBAAuB;aACrC;SACF;QACD,MAAM,EAAE;YACN,eAAe,EAAE,MAAM;YACvB,SAAS,EAAE,MAAM;YACjB,YAAY,EAAE,QAAQ;YACtB,eAAe,EAAE,kGAAkG;YACnH,cAAc,EAAE,6BAA6B;SAC9C;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,KAAK;YACvB,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,MAAM;YACvB,aAAa,EAAE,IAAI;SACpB;QACD,WAAW,EAAE;YACX,OAAO,EAAE,wEAAwE;YACjF,KAAK,EAAE;gBACL,kCAAkC;gBAClC,8CAA8C;gBAC9C,sCAAsC;gBACtC,kCAAkC;aACnC;YACD,iBAAiB,EAAE;;;;;;;;;GAStB;YACG,MAAM,EAAE,QAAQ;YAChB,QAAQ,EAAE,WAAW;SACtB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,EAAE,6BAAiB,CAAC,GAAG,CAAC;YACrD,GAAG,EAAE,CAAC,0BAAc,CAAC,MAAM,EAAE,0BAAc,CAAC,MAAM,CAAC;SACpD;QACD,IAAI,EAAE,CAAC,gBAAgB,EAAE,KAAK,EAAE,KAAK,EAAE,KAAK,EAAE,UAAU,CAAC;QACzD,OAAO,EAAE,IAAI;KACd;IACD;QACE,EAAE,EAAE,cAAc;QAClB,IAAI,EAAE,iDAAiD;QACvD,WAAW,EAAE,0DAA0D;QACvE,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,cAAc;QACnD,QAAQ,EAAE,6BAAqB,CAAC,SAAS;QACzC,SAAS,EAAE,CAAC,yBAAiB,CAAC,IAAI,CAAC;QACnC,QAAQ,EAAE,6BAAqB,CAAC,IAAI;QACpC,UAAU,EAAE,uBAAe,CAAC,IAAI;QAChC,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,oBAAoB;gBAC/B,OAAO,EAAE,uDAAuD;gBAChE,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,0BAA0B;aACxC;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,qBAAqB;gBAChC,OAAO,EAAE,uDAAuD;gBAChE,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,2BAA2B;aACzC;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,2BAA2B;gBACtC,OAAO,EAAE,mDAAmD;gBAC5D,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,mCAAmC;aACjD;SACF;QACD,MAAM,EAAE;YACN,eAAe,EAAE,MAAM;YACvB,SAAS,EAAE,QAAQ;YACnB,YAAY,EAAE,KAAK;YACnB,eAAe,EAAE,iDAAiD;YAClE,cAAc,EAAE,0CAA0C;SAC3D;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,KAAK;YACvB,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,MAAM;SACxB;QACD,WAAW,EAAE;YACX,OAAO,EAAE,+EAA+E;YACxF,KAAK,EAAE;gBACL,2CAA2C;gBAC3C,6DAA6D;gBAC7D,qDAAqD;gBACrD,0DAA0D;aAC3D;YACD,iBAAiB,EAAE;;;;;;;;;;;;;;;EAevB;YACI,MAAM,EAAE,QAAQ;YAChB,QAAQ,EAAE,MAAM;SACjB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,CAAC;YAC9B,GAAG,EAAE,CAAC,0BAAc,CAAC,MAAM,CAAC;SAC7B;QACD,IAAI,EAAE,CAAC,gBAAgB,EAAE,MAAM,EAAE,aAAa,CAAC;QAC/C,OAAO,EAAE,IAAI;KACd;CACF,CAAC;AAEF,kBAAe,0BAAkB,CAAC"}
@@ -0,0 +1,8 @@
1
+ /**
2
+ * @fileoverview Prototype Pollution Detection Rules
3
+ * @module rules/vulnerabilities/rules/prototypePollution
4
+ */
5
+ import { VulnerabilityRule } from '../types';
6
+ export declare const prototypePollutionRules: VulnerabilityRule[];
7
+ export default prototypePollutionRules;
8
+ //# sourceMappingURL=prototypePollution.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"prototypePollution.d.ts","sourceRoot":"","sources":["../../../../src/rules/vulnerabilities/rules/prototypePollution.ts"],"names":[],"mappings":"AAAA;;;GAGG;AAEH,OAAO,EACL,iBAAiB,EAOlB,MAAM,UAAU,CAAC;AAGlB,eAAO,MAAM,uBAAuB,EAAE,iBAAiB,EAoQtD,CAAC;AAEF,eAAe,uBAAuB,CAAC"}
@@ -0,0 +1,272 @@
1
+ "use strict";
2
+ /**
3
+ * @fileoverview Prototype Pollution Detection Rules
4
+ * @module rules/vulnerabilities/rules/prototypePollution
5
+ */
6
+ Object.defineProperty(exports, "__esModule", { value: true });
7
+ exports.prototypePollutionRules = void 0;
8
+ const types_1 = require("../types");
9
+ const constants_1 = require("../constants");
10
+ exports.prototypePollutionRules = [
11
+ {
12
+ id: 'VUL-PROTO-001',
13
+ name: 'Prototype Pollution - Unsafe Object Merge',
14
+ description: 'Detects unsafe object merging that may lead to prototype pollution.',
15
+ version: '1.0.0',
16
+ vulnerabilityType: types_1.VulnerabilityType.PROTOTYPE_POLLUTION,
17
+ category: types_1.VulnerabilityCategory.INJECTION,
18
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
19
+ severity: types_1.VulnerabilitySeverity.HIGH,
20
+ confidence: types_1.ConfidenceLevel.MEDIUM,
21
+ baseScore: 75,
22
+ patterns: [
23
+ {
24
+ type: types_1.PatternType.REGEX,
25
+ patternId: 'proto-object-assign-req',
26
+ pattern: 'Object\\.assign\\s*\\([^,]*,\\s*(?:req\\.|body|params|query)',
27
+ flags: 'gi',
28
+ weight: 0.90,
29
+ description: 'Object.assign with user input'
30
+ },
31
+ {
32
+ type: types_1.PatternType.REGEX,
33
+ patternId: 'proto-spread-req',
34
+ pattern: '\\{\\s*\\.\\.\\.(?:req\\.|body|params)',
35
+ flags: 'gi',
36
+ weight: 0.85,
37
+ description: 'Spread operator with user input'
38
+ },
39
+ {
40
+ type: types_1.PatternType.REGEX,
41
+ patternId: 'proto-lodash-merge',
42
+ pattern: '(?:_|lodash)\\.(?:merge|defaultsDeep|set)\\s*\\([^)]*(?:req\\.|body)',
43
+ flags: 'gi',
44
+ weight: 0.95,
45
+ description: 'lodash merge/set with user input'
46
+ },
47
+ {
48
+ type: types_1.PatternType.REGEX,
49
+ patternId: 'proto-bracket-proto',
50
+ pattern: '\\[[\'"]__proto__[\'"]\\]|\\[[\'"]constructor[\'"]\\]\\s*\\[[\'"]prototype[\'"]\\]',
51
+ flags: 'g',
52
+ weight: 1.0,
53
+ description: 'Direct __proto__ or constructor.prototype access'
54
+ }
55
+ ],
56
+ taintAnalysis: {
57
+ sources: ['req.body', 'req.query', 'req.params', 'JSON.parse'],
58
+ sinks: ['Object.assign', 'Object.defineProperty', '_.merge', '_.set', '_.defaultsDeep'],
59
+ sanitizers: ['Object.create(null)', 'Object.freeze', 'hasOwnProperty']
60
+ },
61
+ impact: {
62
+ confidentiality: 'medium',
63
+ integrity: 'high',
64
+ availability: 'medium',
65
+ technicalImpact: 'Modify Object.prototype properties affecting all objects. May lead to RCE.',
66
+ businessImpact: 'Denial of service, authentication bypass, RCE in some cases.'
67
+ },
68
+ exploitability: {
69
+ attackVector: 'network',
70
+ attackComplexity: 'medium',
71
+ privilegesRequired: 'none',
72
+ userInteraction: 'none',
73
+ knownExploits: true
74
+ },
75
+ remediation: {
76
+ summary: 'Validate object keys. Use Object.create(null) for dictionaries. Block __proto__ keys.',
77
+ steps: [
78
+ 'Filter __proto__, constructor, prototype from user input',
79
+ 'Use Object.create(null) for user-controlled objects',
80
+ 'Freeze prototypes if possible',
81
+ 'Update vulnerable libraries (lodash < 4.17.12)',
82
+ 'Use Map instead of plain objects for dictionaries'
83
+ ],
84
+ secureCodeExample: `// Filter dangerous keys
85
+ function safeMerge(target, source) {
86
+ const dangerous = ['__proto__', 'constructor', 'prototype'];
87
+
88
+ for (const key of Object.keys(source)) {
89
+ if (dangerous.includes(key)) continue;
90
+ if (typeof source[key] === 'object' && source[key] !== null) {
91
+ target[key] = safeMerge(target[key] || {}, source[key]);
92
+ } else {
93
+ target[key] = source[key];
94
+ }
95
+ }
96
+ return target;
97
+ }
98
+
99
+ // Use Map for user-controlled data
100
+ const userSettings = new Map();
101
+ userSettings.set(req.body.key, req.body.value);
102
+
103
+ // Use Object.create(null)
104
+ const dict = Object.create(null);
105
+ dict[userKey] = userValue;`,
106
+ effort: 'medium',
107
+ priority: 'high'
108
+ },
109
+ standards: {
110
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
111
+ cwe: [constants_1.CWE_REFERENCES.CWE_1321]
112
+ },
113
+ tags: ['prototype-pollution', 'javascript', 'injection'],
114
+ enabled: true
115
+ },
116
+ {
117
+ id: 'VUL-PROTO-002',
118
+ name: 'Prototype Pollution - JSON.parse with Reviver',
119
+ description: 'Detects potentially unsafe JSON parsing patterns.',
120
+ version: '1.0.0',
121
+ vulnerabilityType: types_1.VulnerabilityType.PROTOTYPE_POLLUTION,
122
+ category: types_1.VulnerabilityCategory.INJECTION,
123
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
124
+ severity: types_1.VulnerabilitySeverity.MEDIUM,
125
+ confidence: types_1.ConfidenceLevel.LOW,
126
+ baseScore: 50,
127
+ patterns: [
128
+ {
129
+ type: types_1.PatternType.REGEX,
130
+ patternId: 'proto-json-parse-body',
131
+ pattern: 'JSON\\.parse\\s*\\([^)]*(?:req\\.body|body|data)',
132
+ flags: 'gi',
133
+ weight: 0.70,
134
+ description: 'JSON.parse on user data'
135
+ }
136
+ ],
137
+ impact: {
138
+ confidentiality: 'low',
139
+ integrity: 'medium',
140
+ availability: 'low',
141
+ technicalImpact: 'Parsed JSON with __proto__ key can pollute prototypes.',
142
+ businessImpact: 'Application behavior modification.'
143
+ },
144
+ exploitability: {
145
+ attackVector: 'network',
146
+ attackComplexity: 'medium',
147
+ privilegesRequired: 'none',
148
+ userInteraction: 'none'
149
+ },
150
+ remediation: {
151
+ summary: 'Use JSON.parse with a reviver that filters dangerous keys.',
152
+ steps: [
153
+ 'Use reviver function to filter dangerous keys',
154
+ 'Validate parsed object structure',
155
+ 'Consider using schema validation libraries'
156
+ ],
157
+ secureCodeExample: `// Safe JSON parsing with reviver
158
+ function safeJsonParse(str) {
159
+ return JSON.parse(str, (key, value) => {
160
+ if (key === '__proto__' || key === 'constructor') {
161
+ return undefined;
162
+ }
163
+ return value;
164
+ });
165
+ }
166
+
167
+ // With schema validation (e.g., Zod)
168
+ import { z } from 'zod';
169
+ const UserSchema = z.object({
170
+ name: z.string(),
171
+ email: z.string().email()
172
+ });
173
+
174
+ const userData = UserSchema.parse(JSON.parse(req.body));`,
175
+ effort: 'low',
176
+ priority: 'medium'
177
+ },
178
+ standards: {
179
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
180
+ cwe: [constants_1.CWE_REFERENCES.CWE_1321]
181
+ },
182
+ tags: ['prototype-pollution', 'json', 'javascript'],
183
+ enabled: true
184
+ },
185
+ {
186
+ id: 'VUL-PROTO-003',
187
+ name: 'Prototype Pollution - Vulnerable Package Usage',
188
+ description: 'Detects usage of packages known to have prototype pollution vulnerabilities.',
189
+ version: '1.0.0',
190
+ vulnerabilityType: types_1.VulnerabilityType.PROTOTYPE_POLLUTION,
191
+ category: types_1.VulnerabilityCategory.KNOWN_VULNERABLE_COMPONENT,
192
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
193
+ severity: types_1.VulnerabilitySeverity.HIGH,
194
+ confidence: types_1.ConfidenceLevel.HIGH,
195
+ baseScore: 70,
196
+ patterns: [
197
+ {
198
+ type: types_1.PatternType.REGEX,
199
+ patternId: 'proto-vulnerable-qs',
200
+ pattern: 'require\\s*\\([\'"]qs[\'"]\\)',
201
+ flags: 'g',
202
+ weight: 0.70,
203
+ description: 'qs package (check version for CVE-2022-24999)'
204
+ },
205
+ {
206
+ type: types_1.PatternType.REGEX,
207
+ patternId: 'proto-vulnerable-flat',
208
+ pattern: 'require\\s*\\([\'"]flat[\'"]\\)',
209
+ flags: 'g',
210
+ weight: 0.80,
211
+ description: 'flat package (vulnerable < 5.0.1)'
212
+ },
213
+ {
214
+ type: types_1.PatternType.REGEX,
215
+ patternId: 'proto-vulnerable-merge',
216
+ pattern: 'require\\s*\\([\'"](?:deepmerge|deep-extend|merge-deep)[\'"]\\)',
217
+ flags: 'g',
218
+ weight: 0.75,
219
+ description: 'Deep merge packages (verify versions)'
220
+ }
221
+ ],
222
+ impact: {
223
+ confidentiality: 'medium',
224
+ integrity: 'high',
225
+ availability: 'medium',
226
+ technicalImpact: 'Known vulnerabilities in dependencies allow prototype pollution.',
227
+ businessImpact: 'Exploitation via known CVEs.'
228
+ },
229
+ exploitability: {
230
+ attackVector: 'network',
231
+ attackComplexity: 'low',
232
+ privilegesRequired: 'none',
233
+ userInteraction: 'none',
234
+ knownExploits: true
235
+ },
236
+ remediation: {
237
+ summary: 'Update vulnerable packages to patched versions.',
238
+ steps: [
239
+ 'Run npm audit or yarn audit',
240
+ 'Update lodash to >= 4.17.21',
241
+ 'Update qs to >= 6.10.3',
242
+ 'Update flat to >= 5.0.1',
243
+ 'Consider alternative packages without vulnerabilities'
244
+ ],
245
+ secureCodeExample: `// Update packages in package.json
246
+ {
247
+ "dependencies": {
248
+ "lodash": "^4.17.21",
249
+ "qs": "^6.11.0",
250
+ "flat": "^5.0.2"
251
+ }
252
+ }
253
+
254
+ // Or use native alternatives
255
+ // Instead of lodash.merge:
256
+ const merged = { ...defaults, ...userOptions };
257
+
258
+ // Instead of qs:
259
+ const params = new URLSearchParams(queryString);`,
260
+ effort: 'low',
261
+ priority: 'high'
262
+ },
263
+ standards: {
264
+ owasp: [constants_1.OWASP_TOP_10_2021.A06],
265
+ cwe: [constants_1.CWE_REFERENCES.CWE_1321]
266
+ },
267
+ tags: ['prototype-pollution', 'dependencies', 'npm'],
268
+ enabled: true
269
+ }
270
+ ];
271
+ exports.default = exports.prototypePollutionRules;
272
+ //# sourceMappingURL=prototypePollution.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"prototypePollution.js","sourceRoot":"","sources":["../../../../src/rules/vulnerabilities/rules/prototypePollution.ts"],"names":[],"mappings":";AAAA;;;GAGG;;;AAEH,oCAQkB;AAClB,4CAAiE;AAEpD,QAAA,uBAAuB,GAAwB;IAC1D;QACE,EAAE,EAAE,eAAe;QACnB,IAAI,EAAE,2CAA2C;QACjD,WAAW,EAAE,qEAAqE;QAClF,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,mBAAmB;QACxD,QAAQ,EAAE,6BAAqB,CAAC,SAAS;QACzC,SAAS,EAAE,CAAC,yBAAiB,CAAC,UAAU,EAAE,yBAAiB,CAAC,UAAU,CAAC;QACvE,QAAQ,EAAE,6BAAqB,CAAC,IAAI;QACpC,UAAU,EAAE,uBAAe,CAAC,MAAM;QAClC,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,yBAAyB;gBACpC,OAAO,EAAE,8DAA8D;gBACvE,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,+BAA+B;aAC7C;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,kBAAkB;gBAC7B,OAAO,EAAE,wCAAwC;gBACjD,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,iCAAiC;aAC/C;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,oBAAoB;gBAC/B,OAAO,EAAE,sEAAsE;gBAC/E,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,kCAAkC;aAChD;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,qBAAqB;gBAChC,OAAO,EAAE,oFAAoF;gBAC7F,KAAK,EAAE,GAAG;gBACV,MAAM,EAAE,GAAG;gBACX,WAAW,EAAE,kDAAkD;aAChE;SACF;QACD,aAAa,EAAE;YACb,OAAO,EAAE,CAAC,UAAU,EAAE,WAAW,EAAE,YAAY,EAAE,YAAY,CAAC;YAC9D,KAAK,EAAE,CAAC,eAAe,EAAE,uBAAuB,EAAE,SAAS,EAAE,OAAO,EAAE,gBAAgB,CAAC;YACvF,UAAU,EAAE,CAAC,qBAAqB,EAAE,eAAe,EAAE,gBAAgB,CAAC;SACvE;QACD,MAAM,EAAE;YACN,eAAe,EAAE,QAAQ;YACzB,SAAS,EAAE,MAAM;YACjB,YAAY,EAAE,QAAQ;YACtB,eAAe,EAAE,4EAA4E;YAC7F,cAAc,EAAE,8DAA8D;SAC/E;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,QAAQ;YAC1B,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,MAAM;YACvB,aAAa,EAAE,IAAI;SACpB;QACD,WAAW,EAAE;YACX,OAAO,EAAE,uFAAuF;YAChG,KAAK,EAAE;gBACL,0DAA0D;gBAC1D,qDAAqD;gBACrD,+BAA+B;gBAC/B,gDAAgD;gBAChD,mDAAmD;aACpD;YACD,iBAAiB,EAAE;;;;;;;;;;;;;;;;;;;;;2BAqBE;YACrB,MAAM,EAAE,QAAQ;YAChB,QAAQ,EAAE,MAAM;SACjB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,CAAC;YAC9B,GAAG,EAAE,CAAC,0BAAc,CAAC,QAAQ,CAAC;SAC/B;QACD,IAAI,EAAE,CAAC,qBAAqB,EAAE,YAAY,EAAE,WAAW,CAAC;QACxD,OAAO,EAAE,IAAI;KACd;IACD;QACE,EAAE,EAAE,eAAe;QACnB,IAAI,EAAE,+CAA+C;QACrD,WAAW,EAAE,mDAAmD;QAChE,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,mBAAmB;QACxD,QAAQ,EAAE,6BAAqB,CAAC,SAAS;QACzC,SAAS,EAAE,CAAC,yBAAiB,CAAC,UAAU,EAAE,yBAAiB,CAAC,UAAU,CAAC;QACvE,QAAQ,EAAE,6BAAqB,CAAC,MAAM;QACtC,UAAU,EAAE,uBAAe,CAAC,GAAG;QAC/B,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,uBAAuB;gBAClC,OAAO,EAAE,kDAAkD;gBAC3D,KAAK,EAAE,IAAI;gBACX,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,yBAAyB;aACvC;SACF;QACD,MAAM,EAAE;YACN,eAAe,EAAE,KAAK;YACtB,SAAS,EAAE,QAAQ;YACnB,YAAY,EAAE,KAAK;YACnB,eAAe,EAAE,wDAAwD;YACzE,cAAc,EAAE,oCAAoC;SACrD;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,QAAQ;YAC1B,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,MAAM;SACxB;QACD,WAAW,EAAE;YACX,OAAO,EAAE,4DAA4D;YACrE,KAAK,EAAE;gBACL,+CAA+C;gBAC/C,kCAAkC;gBAClC,4CAA4C;aAC7C;YACD,iBAAiB,EAAE;;;;;;;;;;;;;;;;;yDAiBgC;YACnD,MAAM,EAAE,KAAK;YACb,QAAQ,EAAE,QAAQ;SACnB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,CAAC;YAC9B,GAAG,EAAE,CAAC,0BAAc,CAAC,QAAQ,CAAC;SAC/B;QACD,IAAI,EAAE,CAAC,qBAAqB,EAAE,MAAM,EAAE,YAAY,CAAC;QACnD,OAAO,EAAE,IAAI;KACd;IACD;QACE,EAAE,EAAE,eAAe;QACnB,IAAI,EAAE,gDAAgD;QACtD,WAAW,EAAE,8EAA8E;QAC3F,OAAO,EAAE,OAAO;QAChB,iBAAiB,EAAE,yBAAiB,CAAC,mBAAmB;QACxD,QAAQ,EAAE,6BAAqB,CAAC,0BAA0B;QAC1D,SAAS,EAAE,CAAC,yBAAiB,CAAC,UAAU,EAAE,yBAAiB,CAAC,UAAU,CAAC;QACvE,QAAQ,EAAE,6BAAqB,CAAC,IAAI;QACpC,UAAU,EAAE,uBAAe,CAAC,IAAI;QAChC,SAAS,EAAE,EAAE;QACb,QAAQ,EAAE;YACR;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,qBAAqB;gBAChC,OAAO,EAAE,+BAA+B;gBACxC,KAAK,EAAE,GAAG;gBACV,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,+CAA+C;aAC7D;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,uBAAuB;gBAClC,OAAO,EAAE,iCAAiC;gBAC1C,KAAK,EAAE,GAAG;gBACV,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,mCAAmC;aACjD;YACD;gBACE,IAAI,EAAE,mBAAW,CAAC,KAAK;gBACvB,SAAS,EAAE,wBAAwB;gBACnC,OAAO,EAAE,iEAAiE;gBAC1E,KAAK,EAAE,GAAG;gBACV,MAAM,EAAE,IAAI;gBACZ,WAAW,EAAE,uCAAuC;aACrD;SACF;QACD,MAAM,EAAE;YACN,eAAe,EAAE,QAAQ;YACzB,SAAS,EAAE,MAAM;YACjB,YAAY,EAAE,QAAQ;YACtB,eAAe,EAAE,kEAAkE;YACnF,cAAc,EAAE,8BAA8B;SAC/C;QACD,cAAc,EAAE;YACd,YAAY,EAAE,SAAS;YACvB,gBAAgB,EAAE,KAAK;YACvB,kBAAkB,EAAE,MAAM;YAC1B,eAAe,EAAE,MAAM;YACvB,aAAa,EAAE,IAAI;SACpB;QACD,WAAW,EAAE;YACX,OAAO,EAAE,iDAAiD;YAC1D,KAAK,EAAE;gBACL,6BAA6B;gBAC7B,6BAA6B;gBAC7B,wBAAwB;gBACxB,yBAAyB;gBACzB,uDAAuD;aACxD;YACD,iBAAiB,EAAE;;;;;;;;;;;;;;iDAcwB;YAC3C,MAAM,EAAE,KAAK;YACb,QAAQ,EAAE,MAAM;SACjB;QACD,SAAS,EAAE;YACT,KAAK,EAAE,CAAC,6BAAiB,CAAC,GAAG,CAAC;YAC9B,GAAG,EAAE,CAAC,0BAAc,CAAC,QAAQ,CAAC;SAC/B;QACD,IAAI,EAAE,CAAC,qBAAqB,EAAE,cAAc,EAAE,KAAK,CAAC;QACpD,OAAO,EAAE,IAAI;KACd;CACF,CAAC;AAEF,kBAAe,+BAAuB,CAAC"}
@@ -0,0 +1,8 @@
1
+ /**
2
+ * @fileoverview Security Misconfiguration Detection Rules
3
+ * @module rules/vulnerabilities/rules/securityMisconfiguration
4
+ */
5
+ import { VulnerabilityRule } from '../types';
6
+ export declare const securityMisconfigurationRules: VulnerabilityRule[];
7
+ export default securityMisconfigurationRules;
8
+ //# sourceMappingURL=securityMisconfiguration.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"securityMisconfiguration.d.ts","sourceRoot":"","sources":["../../../../src/rules/vulnerabilities/rules/securityMisconfiguration.ts"],"names":[],"mappings":"AAAA;;;GAGG;AAEH,OAAO,EACL,iBAAiB,EAOlB,MAAM,UAAU,CAAC;AAGlB,eAAO,MAAM,6BAA6B,EAAE,iBAAiB,EA0a5D,CAAC;AAEF,eAAe,6BAA6B,CAAC"}