secure-scan 1.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (569) hide show
  1. package/README.md +564 -0
  2. package/dist/ai/aiAnalyzer.d.ts +99 -0
  3. package/dist/ai/aiAnalyzer.d.ts.map +1 -0
  4. package/dist/ai/aiAnalyzer.js +669 -0
  5. package/dist/ai/aiAnalyzer.js.map +1 -0
  6. package/dist/ai/index.d.ts +5 -0
  7. package/dist/ai/index.d.ts.map +1 -0
  8. package/dist/ai/index.js +21 -0
  9. package/dist/ai/index.js.map +1 -0
  10. package/dist/analyzers/base/baseAnalyzer.d.ts +44 -0
  11. package/dist/analyzers/base/baseAnalyzer.d.ts.map +1 -0
  12. package/dist/analyzers/base/baseAnalyzer.js +53 -0
  13. package/dist/analyzers/base/baseAnalyzer.js.map +1 -0
  14. package/dist/analyzers/base/index.d.ts +5 -0
  15. package/dist/analyzers/base/index.d.ts.map +1 -0
  16. package/dist/analyzers/base/index.js +21 -0
  17. package/dist/analyzers/base/index.js.map +1 -0
  18. package/dist/analyzers/c-cpp/cppAnalyzer.d.ts +60 -0
  19. package/dist/analyzers/c-cpp/cppAnalyzer.d.ts.map +1 -0
  20. package/dist/analyzers/c-cpp/cppAnalyzer.js +218 -0
  21. package/dist/analyzers/c-cpp/cppAnalyzer.js.map +1 -0
  22. package/dist/analyzers/c-cpp/index.d.ts +5 -0
  23. package/dist/analyzers/c-cpp/index.d.ts.map +1 -0
  24. package/dist/analyzers/c-cpp/index.js +21 -0
  25. package/dist/analyzers/c-cpp/index.js.map +1 -0
  26. package/dist/analyzers/core/engine/index.d.ts +5 -0
  27. package/dist/analyzers/core/engine/index.d.ts.map +1 -0
  28. package/dist/analyzers/core/engine/index.js +21 -0
  29. package/dist/analyzers/core/engine/index.js.map +1 -0
  30. package/dist/analyzers/core/engine/ruleEngine.d.ts +46 -0
  31. package/dist/analyzers/core/engine/ruleEngine.d.ts.map +1 -0
  32. package/dist/analyzers/core/engine/ruleEngine.js +173 -0
  33. package/dist/analyzers/core/engine/ruleEngine.js.map +1 -0
  34. package/dist/analyzers/core/index.d.ts +8 -0
  35. package/dist/analyzers/core/index.d.ts.map +1 -0
  36. package/dist/analyzers/core/index.js +24 -0
  37. package/dist/analyzers/core/index.js.map +1 -0
  38. package/dist/analyzers/core/scanner/fileScanner.d.ts +31 -0
  39. package/dist/analyzers/core/scanner/fileScanner.d.ts.map +1 -0
  40. package/dist/analyzers/core/scanner/fileScanner.js +199 -0
  41. package/dist/analyzers/core/scanner/fileScanner.js.map +1 -0
  42. package/dist/analyzers/core/scanner/index.d.ts +5 -0
  43. package/dist/analyzers/core/scanner/index.d.ts.map +1 -0
  44. package/dist/analyzers/core/scanner/index.js +21 -0
  45. package/dist/analyzers/core/scanner/index.js.map +1 -0
  46. package/dist/analyzers/core/scoring/index.d.ts +5 -0
  47. package/dist/analyzers/core/scoring/index.d.ts.map +1 -0
  48. package/dist/analyzers/core/scoring/index.js +21 -0
  49. package/dist/analyzers/core/scoring/index.js.map +1 -0
  50. package/dist/analyzers/core/scoring/riskScoring.d.ts +49 -0
  51. package/dist/analyzers/core/scoring/riskScoring.d.ts.map +1 -0
  52. package/dist/analyzers/core/scoring/riskScoring.js +180 -0
  53. package/dist/analyzers/core/scoring/riskScoring.js.map +1 -0
  54. package/dist/analyzers/core/securityScanner.d.ts +47 -0
  55. package/dist/analyzers/core/securityScanner.d.ts.map +1 -0
  56. package/dist/analyzers/core/securityScanner.js +298 -0
  57. package/dist/analyzers/core/securityScanner.js.map +1 -0
  58. package/dist/analyzers/csharp/csharpAnalyzer.d.ts +64 -0
  59. package/dist/analyzers/csharp/csharpAnalyzer.d.ts.map +1 -0
  60. package/dist/analyzers/csharp/csharpAnalyzer.js +232 -0
  61. package/dist/analyzers/csharp/csharpAnalyzer.js.map +1 -0
  62. package/dist/analyzers/csharp/index.d.ts +5 -0
  63. package/dist/analyzers/csharp/index.d.ts.map +1 -0
  64. package/dist/analyzers/csharp/index.js +21 -0
  65. package/dist/analyzers/csharp/index.js.map +1 -0
  66. package/dist/analyzers/iac/iacAnalyzer.d.ts +36 -0
  67. package/dist/analyzers/iac/iacAnalyzer.d.ts.map +1 -0
  68. package/dist/analyzers/iac/iacAnalyzer.js +182 -0
  69. package/dist/analyzers/iac/iacAnalyzer.js.map +1 -0
  70. package/dist/analyzers/iac/index.d.ts +5 -0
  71. package/dist/analyzers/iac/index.d.ts.map +1 -0
  72. package/dist/analyzers/iac/index.js +21 -0
  73. package/dist/analyzers/iac/index.js.map +1 -0
  74. package/dist/analyzers/index.d.ts +30 -0
  75. package/dist/analyzers/index.d.ts.map +1 -0
  76. package/dist/analyzers/index.js +80 -0
  77. package/dist/analyzers/index.js.map +1 -0
  78. package/dist/analyzers/java/index.d.ts +5 -0
  79. package/dist/analyzers/java/index.d.ts.map +1 -0
  80. package/dist/analyzers/java/index.js +21 -0
  81. package/dist/analyzers/java/index.js.map +1 -0
  82. package/dist/analyzers/java/javaAnalyzer.d.ts +64 -0
  83. package/dist/analyzers/java/javaAnalyzer.d.ts.map +1 -0
  84. package/dist/analyzers/java/javaAnalyzer.js +224 -0
  85. package/dist/analyzers/java/javaAnalyzer.js.map +1 -0
  86. package/dist/analyzers/javascript/astUtils.d.ts +170 -0
  87. package/dist/analyzers/javascript/astUtils.d.ts.map +1 -0
  88. package/dist/analyzers/javascript/astUtils.js +700 -0
  89. package/dist/analyzers/javascript/astUtils.js.map +1 -0
  90. package/dist/analyzers/javascript/index.d.ts +18 -0
  91. package/dist/analyzers/javascript/index.d.ts.map +1 -0
  92. package/dist/analyzers/javascript/index.js +50 -0
  93. package/dist/analyzers/javascript/index.js.map +1 -0
  94. package/dist/analyzers/javascript/javascriptAnalyzer.d.ts +111 -0
  95. package/dist/analyzers/javascript/javascriptAnalyzer.d.ts.map +1 -0
  96. package/dist/analyzers/javascript/javascriptAnalyzer.js +860 -0
  97. package/dist/analyzers/javascript/javascriptAnalyzer.js.map +1 -0
  98. package/dist/analyzers/javascript/malwareDetector.d.ts +102 -0
  99. package/dist/analyzers/javascript/malwareDetector.d.ts.map +1 -0
  100. package/dist/analyzers/javascript/malwareDetector.js +616 -0
  101. package/dist/analyzers/javascript/malwareDetector.js.map +1 -0
  102. package/dist/analyzers/javascript/packageJsonAnalyzer.d.ts +87 -0
  103. package/dist/analyzers/javascript/packageJsonAnalyzer.d.ts.map +1 -0
  104. package/dist/analyzers/javascript/packageJsonAnalyzer.js +553 -0
  105. package/dist/analyzers/javascript/packageJsonAnalyzer.js.map +1 -0
  106. package/dist/analyzers/javascript/taintAnalyzer.d.ts +120 -0
  107. package/dist/analyzers/javascript/taintAnalyzer.d.ts.map +1 -0
  108. package/dist/analyzers/javascript/taintAnalyzer.js +526 -0
  109. package/dist/analyzers/javascript/taintAnalyzer.js.map +1 -0
  110. package/dist/analyzers/php/index.d.ts +5 -0
  111. package/dist/analyzers/php/index.d.ts.map +1 -0
  112. package/dist/analyzers/php/index.js +21 -0
  113. package/dist/analyzers/php/index.js.map +1 -0
  114. package/dist/analyzers/php/phpAnalyzer.d.ts +56 -0
  115. package/dist/analyzers/php/phpAnalyzer.d.ts.map +1 -0
  116. package/dist/analyzers/php/phpAnalyzer.js +202 -0
  117. package/dist/analyzers/php/phpAnalyzer.js.map +1 -0
  118. package/dist/analyzers/python/index.d.ts +5 -0
  119. package/dist/analyzers/python/index.d.ts.map +1 -0
  120. package/dist/analyzers/python/index.js +21 -0
  121. package/dist/analyzers/python/index.js.map +1 -0
  122. package/dist/analyzers/python/pythonAnalyzer.d.ts +64 -0
  123. package/dist/analyzers/python/pythonAnalyzer.d.ts.map +1 -0
  124. package/dist/analyzers/python/pythonAnalyzer.js +226 -0
  125. package/dist/analyzers/python/pythonAnalyzer.js.map +1 -0
  126. package/dist/cli/index.d.ts +7 -0
  127. package/dist/cli/index.d.ts.map +1 -0
  128. package/dist/cli/index.js +281 -0
  129. package/dist/cli/index.js.map +1 -0
  130. package/dist/core/engine/index.d.ts +5 -0
  131. package/dist/core/engine/index.d.ts.map +1 -0
  132. package/dist/core/engine/index.js +21 -0
  133. package/dist/core/engine/index.js.map +1 -0
  134. package/dist/core/engine/ruleEngine.d.ts +46 -0
  135. package/dist/core/engine/ruleEngine.d.ts.map +1 -0
  136. package/dist/core/engine/ruleEngine.js +173 -0
  137. package/dist/core/engine/ruleEngine.js.map +1 -0
  138. package/dist/core/index.d.ts +8 -0
  139. package/dist/core/index.d.ts.map +1 -0
  140. package/dist/core/index.js +24 -0
  141. package/dist/core/index.js.map +1 -0
  142. package/dist/core/scanner/fileScanner.d.ts +31 -0
  143. package/dist/core/scanner/fileScanner.d.ts.map +1 -0
  144. package/dist/core/scanner/fileScanner.js +199 -0
  145. package/dist/core/scanner/fileScanner.js.map +1 -0
  146. package/dist/core/scanner/index.d.ts +5 -0
  147. package/dist/core/scanner/index.d.ts.map +1 -0
  148. package/dist/core/scanner/index.js +21 -0
  149. package/dist/core/scanner/index.js.map +1 -0
  150. package/dist/core/scoring/index.d.ts +5 -0
  151. package/dist/core/scoring/index.d.ts.map +1 -0
  152. package/dist/core/scoring/index.js +21 -0
  153. package/dist/core/scoring/index.js.map +1 -0
  154. package/dist/core/scoring/riskScoring.d.ts +49 -0
  155. package/dist/core/scoring/riskScoring.d.ts.map +1 -0
  156. package/dist/core/scoring/riskScoring.js +180 -0
  157. package/dist/core/scoring/riskScoring.js.map +1 -0
  158. package/dist/core/securityScanner.d.ts +47 -0
  159. package/dist/core/securityScanner.d.ts.map +1 -0
  160. package/dist/core/securityScanner.js +298 -0
  161. package/dist/core/securityScanner.js.map +1 -0
  162. package/dist/dependencies/aiDependencyAnalyzer.d.ts +96 -0
  163. package/dist/dependencies/aiDependencyAnalyzer.d.ts.map +1 -0
  164. package/dist/dependencies/aiDependencyAnalyzer.js +435 -0
  165. package/dist/dependencies/aiDependencyAnalyzer.js.map +1 -0
  166. package/dist/dependencies/database/cveDatabase.d.ts +32 -0
  167. package/dist/dependencies/database/cveDatabase.d.ts.map +1 -0
  168. package/dist/dependencies/database/cveDatabase.js +393 -0
  169. package/dist/dependencies/database/cveDatabase.js.map +1 -0
  170. package/dist/dependencies/database/index.d.ts +6 -0
  171. package/dist/dependencies/database/index.d.ts.map +1 -0
  172. package/dist/dependencies/database/index.js +22 -0
  173. package/dist/dependencies/database/index.js.map +1 -0
  174. package/dist/dependencies/database/maliciousPackages.d.ts +43 -0
  175. package/dist/dependencies/database/maliciousPackages.d.ts.map +1 -0
  176. package/dist/dependencies/database/maliciousPackages.js +279 -0
  177. package/dist/dependencies/database/maliciousPackages.js.map +1 -0
  178. package/dist/dependencies/dependencyAnalyzer.d.ts +74 -0
  179. package/dist/dependencies/dependencyAnalyzer.d.ts.map +1 -0
  180. package/dist/dependencies/dependencyAnalyzer.js +349 -0
  181. package/dist/dependencies/dependencyAnalyzer.js.map +1 -0
  182. package/dist/dependencies/detectors/index.d.ts +7 -0
  183. package/dist/dependencies/detectors/index.d.ts.map +1 -0
  184. package/dist/dependencies/detectors/index.js +28 -0
  185. package/dist/dependencies/detectors/index.js.map +1 -0
  186. package/dist/dependencies/detectors/securityStandards.d.ts +15 -0
  187. package/dist/dependencies/detectors/securityStandards.d.ts.map +1 -0
  188. package/dist/dependencies/detectors/securityStandards.js +178 -0
  189. package/dist/dependencies/detectors/securityStandards.js.map +1 -0
  190. package/dist/dependencies/detectors/vulnerabilityDetector.d.ts +53 -0
  191. package/dist/dependencies/detectors/vulnerabilityDetector.d.ts.map +1 -0
  192. package/dist/dependencies/detectors/vulnerabilityDetector.js +289 -0
  193. package/dist/dependencies/detectors/vulnerabilityDetector.js.map +1 -0
  194. package/dist/dependencies/index.d.ts +14 -0
  195. package/dist/dependencies/index.d.ts.map +1 -0
  196. package/dist/dependencies/index.js +43 -0
  197. package/dist/dependencies/index.js.map +1 -0
  198. package/dist/dependencies/installed/index.d.ts +8 -0
  199. package/dist/dependencies/installed/index.d.ts.map +1 -0
  200. package/dist/dependencies/installed/index.js +24 -0
  201. package/dist/dependencies/installed/index.js.map +1 -0
  202. package/dist/dependencies/installed/installedScanner.d.ts +91 -0
  203. package/dist/dependencies/installed/installedScanner.d.ts.map +1 -0
  204. package/dist/dependencies/installed/installedScanner.js +766 -0
  205. package/dist/dependencies/installed/installedScanner.js.map +1 -0
  206. package/dist/dependencies/installed/malwarePatterns.d.ts +32 -0
  207. package/dist/dependencies/installed/malwarePatterns.d.ts.map +1 -0
  208. package/dist/dependencies/installed/malwarePatterns.js +480 -0
  209. package/dist/dependencies/installed/malwarePatterns.js.map +1 -0
  210. package/dist/dependencies/installed/types.d.ts +274 -0
  211. package/dist/dependencies/installed/types.d.ts.map +1 -0
  212. package/dist/dependencies/installed/types.js +7 -0
  213. package/dist/dependencies/installed/types.js.map +1 -0
  214. package/dist/dependencies/parsers/base/baseParser.d.ts +44 -0
  215. package/dist/dependencies/parsers/base/baseParser.d.ts.map +1 -0
  216. package/dist/dependencies/parsers/base/baseParser.js +80 -0
  217. package/dist/dependencies/parsers/base/baseParser.js.map +1 -0
  218. package/dist/dependencies/parsers/base/index.d.ts +6 -0
  219. package/dist/dependencies/parsers/base/index.d.ts.map +1 -0
  220. package/dist/dependencies/parsers/base/index.js +27 -0
  221. package/dist/dependencies/parsers/base/index.js.map +1 -0
  222. package/dist/dependencies/parsers/cpp/cppParser.d.ts +36 -0
  223. package/dist/dependencies/parsers/cpp/cppParser.d.ts.map +1 -0
  224. package/dist/dependencies/parsers/cpp/cppParser.js +196 -0
  225. package/dist/dependencies/parsers/cpp/cppParser.js.map +1 -0
  226. package/dist/dependencies/parsers/cpp/index.d.ts +6 -0
  227. package/dist/dependencies/parsers/cpp/index.d.ts.map +1 -0
  228. package/dist/dependencies/parsers/cpp/index.js +27 -0
  229. package/dist/dependencies/parsers/cpp/index.js.map +1 -0
  230. package/dist/dependencies/parsers/csharp/csharpParser.d.ts +32 -0
  231. package/dist/dependencies/parsers/csharp/csharpParser.d.ts.map +1 -0
  232. package/dist/dependencies/parsers/csharp/csharpParser.js +125 -0
  233. package/dist/dependencies/parsers/csharp/csharpParser.js.map +1 -0
  234. package/dist/dependencies/parsers/csharp/index.d.ts +6 -0
  235. package/dist/dependencies/parsers/csharp/index.d.ts.map +1 -0
  236. package/dist/dependencies/parsers/csharp/index.js +27 -0
  237. package/dist/dependencies/parsers/csharp/index.js.map +1 -0
  238. package/dist/dependencies/parsers/index.d.ts +24 -0
  239. package/dist/dependencies/parsers/index.d.ts.map +1 -0
  240. package/dist/dependencies/parsers/index.js +69 -0
  241. package/dist/dependencies/parsers/index.js.map +1 -0
  242. package/dist/dependencies/parsers/java/index.d.ts +6 -0
  243. package/dist/dependencies/parsers/java/index.d.ts.map +1 -0
  244. package/dist/dependencies/parsers/java/index.js +27 -0
  245. package/dist/dependencies/parsers/java/index.js.map +1 -0
  246. package/dist/dependencies/parsers/java/javaParser.d.ts +32 -0
  247. package/dist/dependencies/parsers/java/javaParser.d.ts.map +1 -0
  248. package/dist/dependencies/parsers/java/javaParser.js +168 -0
  249. package/dist/dependencies/parsers/java/javaParser.js.map +1 -0
  250. package/dist/dependencies/parsers/javascript/index.d.ts +6 -0
  251. package/dist/dependencies/parsers/javascript/index.d.ts.map +1 -0
  252. package/dist/dependencies/parsers/javascript/index.js +27 -0
  253. package/dist/dependencies/parsers/javascript/index.js.map +1 -0
  254. package/dist/dependencies/parsers/javascript/javascriptParser.d.ts +55 -0
  255. package/dist/dependencies/parsers/javascript/javascriptParser.d.ts.map +1 -0
  256. package/dist/dependencies/parsers/javascript/javascriptParser.js +266 -0
  257. package/dist/dependencies/parsers/javascript/javascriptParser.js.map +1 -0
  258. package/dist/dependencies/parsers/php/index.d.ts +6 -0
  259. package/dist/dependencies/parsers/php/index.d.ts.map +1 -0
  260. package/dist/dependencies/parsers/php/index.js +27 -0
  261. package/dist/dependencies/parsers/php/index.js.map +1 -0
  262. package/dist/dependencies/parsers/php/phpParser.d.ts +35 -0
  263. package/dist/dependencies/parsers/php/phpParser.d.ts.map +1 -0
  264. package/dist/dependencies/parsers/php/phpParser.js +162 -0
  265. package/dist/dependencies/parsers/php/phpParser.js.map +1 -0
  266. package/dist/dependencies/parsers/python/index.d.ts +6 -0
  267. package/dist/dependencies/parsers/python/index.d.ts.map +1 -0
  268. package/dist/dependencies/parsers/python/index.js +27 -0
  269. package/dist/dependencies/parsers/python/index.js.map +1 -0
  270. package/dist/dependencies/parsers/python/pythonParser.d.ts +60 -0
  271. package/dist/dependencies/parsers/python/pythonParser.d.ts.map +1 -0
  272. package/dist/dependencies/parsers/python/pythonParser.js +336 -0
  273. package/dist/dependencies/parsers/python/pythonParser.js.map +1 -0
  274. package/dist/dependencies/types.d.ts +280 -0
  275. package/dist/dependencies/types.d.ts.map +1 -0
  276. package/dist/dependencies/types.js +59 -0
  277. package/dist/dependencies/types.js.map +1 -0
  278. package/dist/i18n/index.d.ts +2 -0
  279. package/dist/i18n/index.d.ts.map +1 -0
  280. package/dist/i18n/index.js +18 -0
  281. package/dist/i18n/index.js.map +1 -0
  282. package/dist/i18n/translations.d.ts +55 -0
  283. package/dist/i18n/translations.d.ts.map +1 -0
  284. package/dist/i18n/translations.js +119 -0
  285. package/dist/i18n/translations.js.map +1 -0
  286. package/dist/index.d.ts +14 -0
  287. package/dist/index.d.ts.map +1 -0
  288. package/dist/index.js +36 -0
  289. package/dist/index.js.map +1 -0
  290. package/dist/reports/dependencyReportGenerator.d.ts +20 -0
  291. package/dist/reports/dependencyReportGenerator.d.ts.map +1 -0
  292. package/dist/reports/dependencyReportGenerator.js +690 -0
  293. package/dist/reports/dependencyReportGenerator.js.map +1 -0
  294. package/dist/reports/htmlReportGenerator.d.ts +43 -0
  295. package/dist/reports/htmlReportGenerator.d.ts.map +1 -0
  296. package/dist/reports/htmlReportGenerator.js +793 -0
  297. package/dist/reports/htmlReportGenerator.js.map +1 -0
  298. package/dist/reports/index.d.ts +7 -0
  299. package/dist/reports/index.d.ts.map +1 -0
  300. package/dist/reports/index.js +23 -0
  301. package/dist/reports/index.js.map +1 -0
  302. package/dist/reports/installedDepsReportGenerator.d.ts +14 -0
  303. package/dist/reports/installedDepsReportGenerator.d.ts.map +1 -0
  304. package/dist/reports/installedDepsReportGenerator.js +872 -0
  305. package/dist/reports/installedDepsReportGenerator.js.map +1 -0
  306. package/dist/rules/index.d.ts +31 -0
  307. package/dist/rules/index.d.ts.map +1 -0
  308. package/dist/rules/index.js +95 -0
  309. package/dist/rules/index.js.map +1 -0
  310. package/dist/rules/malware/categories/backdoors.d.ts +12 -0
  311. package/dist/rules/malware/categories/backdoors.d.ts.map +1 -0
  312. package/dist/rules/malware/categories/backdoors.js +163 -0
  313. package/dist/rules/malware/categories/backdoors.js.map +1 -0
  314. package/dist/rules/malware/categories/cryptominers.d.ts +13 -0
  315. package/dist/rules/malware/categories/cryptominers.d.ts.map +1 -0
  316. package/dist/rules/malware/categories/cryptominers.js +415 -0
  317. package/dist/rules/malware/categories/cryptominers.js.map +1 -0
  318. package/dist/rules/malware/categories/exfiltration.d.ts +20 -0
  319. package/dist/rules/malware/categories/exfiltration.d.ts.map +1 -0
  320. package/dist/rules/malware/categories/exfiltration.js +658 -0
  321. package/dist/rules/malware/categories/exfiltration.js.map +1 -0
  322. package/dist/rules/malware/categories/keyloggers.d.ts +19 -0
  323. package/dist/rules/malware/categories/keyloggers.d.ts.map +1 -0
  324. package/dist/rules/malware/categories/keyloggers.js +763 -0
  325. package/dist/rules/malware/categories/keyloggers.js.map +1 -0
  326. package/dist/rules/malware/categories/loaders.d.ts +20 -0
  327. package/dist/rules/malware/categories/loaders.d.ts.map +1 -0
  328. package/dist/rules/malware/categories/loaders.js +702 -0
  329. package/dist/rules/malware/categories/loaders.js.map +1 -0
  330. package/dist/rules/malware/categories/network.d.ts +19 -0
  331. package/dist/rules/malware/categories/network.d.ts.map +1 -0
  332. package/dist/rules/malware/categories/network.js +622 -0
  333. package/dist/rules/malware/categories/network.js.map +1 -0
  334. package/dist/rules/malware/categories/obfuscation.d.ts +22 -0
  335. package/dist/rules/malware/categories/obfuscation.d.ts.map +1 -0
  336. package/dist/rules/malware/categories/obfuscation.js +766 -0
  337. package/dist/rules/malware/categories/obfuscation.js.map +1 -0
  338. package/dist/rules/malware/constants/index.d.ts +281 -0
  339. package/dist/rules/malware/constants/index.d.ts.map +1 -0
  340. package/dist/rules/malware/constants/index.js +327 -0
  341. package/dist/rules/malware/constants/index.js.map +1 -0
  342. package/dist/rules/malware/engine/index.d.ts +178 -0
  343. package/dist/rules/malware/engine/index.d.ts.map +1 -0
  344. package/dist/rules/malware/engine/index.js +552 -0
  345. package/dist/rules/malware/engine/index.js.map +1 -0
  346. package/dist/rules/malware/index.d.ts +205 -0
  347. package/dist/rules/malware/index.d.ts.map +1 -0
  348. package/dist/rules/malware/index.js +837 -0
  349. package/dist/rules/malware/index.js.map +1 -0
  350. package/dist/rules/malware/scoring/index.d.ts +84 -0
  351. package/dist/rules/malware/scoring/index.d.ts.map +1 -0
  352. package/dist/rules/malware/scoring/index.js +441 -0
  353. package/dist/rules/malware/scoring/index.js.map +1 -0
  354. package/dist/rules/malware/types/index.d.ts +616 -0
  355. package/dist/rules/malware/types/index.d.ts.map +1 -0
  356. package/dist/rules/malware/types/index.js +155 -0
  357. package/dist/rules/malware/types/index.js.map +1 -0
  358. package/dist/rules/malware/utils/index.d.ts +117 -0
  359. package/dist/rules/malware/utils/index.d.ts.map +1 -0
  360. package/dist/rules/malware/utils/index.js +514 -0
  361. package/dist/rules/malware/utils/index.js.map +1 -0
  362. package/dist/rules/standards.d.ts +26 -0
  363. package/dist/rules/standards.d.ts.map +1 -0
  364. package/dist/rules/standards.js +352 -0
  365. package/dist/rules/standards.js.map +1 -0
  366. package/dist/rules/vulnerabilities/constants/index.d.ts +835 -0
  367. package/dist/rules/vulnerabilities/constants/index.d.ts.map +1 -0
  368. package/dist/rules/vulnerabilities/constants/index.js +544 -0
  369. package/dist/rules/vulnerabilities/constants/index.js.map +1 -0
  370. package/dist/rules/vulnerabilities/engine/index.d.ts +145 -0
  371. package/dist/rules/vulnerabilities/engine/index.d.ts.map +1 -0
  372. package/dist/rules/vulnerabilities/engine/index.js +581 -0
  373. package/dist/rules/vulnerabilities/engine/index.js.map +1 -0
  374. package/dist/rules/vulnerabilities/index.d.ts +148 -0
  375. package/dist/rules/vulnerabilities/index.d.ts.map +1 -0
  376. package/dist/rules/vulnerabilities/index.js +252 -0
  377. package/dist/rules/vulnerabilities/index.js.map +1 -0
  378. package/dist/rules/vulnerabilities/rules/authentication.d.ts +8 -0
  379. package/dist/rules/vulnerabilities/rules/authentication.d.ts.map +1 -0
  380. package/dist/rules/vulnerabilities/rules/authentication.js +419 -0
  381. package/dist/rules/vulnerabilities/rules/authentication.js.map +1 -0
  382. package/dist/rules/vulnerabilities/rules/commandInjection.d.ts +8 -0
  383. package/dist/rules/vulnerabilities/rules/commandInjection.d.ts.map +1 -0
  384. package/dist/rules/vulnerabilities/rules/commandInjection.js +300 -0
  385. package/dist/rules/vulnerabilities/rules/commandInjection.js.map +1 -0
  386. package/dist/rules/vulnerabilities/rules/csrf.d.ts +8 -0
  387. package/dist/rules/vulnerabilities/rules/csrf.d.ts.map +1 -0
  388. package/dist/rules/vulnerabilities/rules/csrf.js +261 -0
  389. package/dist/rules/vulnerabilities/rules/csrf.js.map +1 -0
  390. package/dist/rules/vulnerabilities/rules/deserialization.d.ts +8 -0
  391. package/dist/rules/vulnerabilities/rules/deserialization.d.ts.map +1 -0
  392. package/dist/rules/vulnerabilities/rules/deserialization.js +336 -0
  393. package/dist/rules/vulnerabilities/rules/deserialization.js.map +1 -0
  394. package/dist/rules/vulnerabilities/rules/fileUpload.d.ts +8 -0
  395. package/dist/rules/vulnerabilities/rules/fileUpload.d.ts.map +1 -0
  396. package/dist/rules/vulnerabilities/rules/fileUpload.js +325 -0
  397. package/dist/rules/vulnerabilities/rules/fileUpload.js.map +1 -0
  398. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.d.ts +8 -0
  399. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.d.ts.map +1 -0
  400. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.js +446 -0
  401. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.js.map +1 -0
  402. package/dist/rules/vulnerabilities/rules/index.d.ts +17 -0
  403. package/dist/rules/vulnerabilities/rules/index.d.ts.map +1 -0
  404. package/dist/rules/vulnerabilities/rules/index.js +47 -0
  405. package/dist/rules/vulnerabilities/rules/index.js.map +1 -0
  406. package/dist/rules/vulnerabilities/rules/pathTraversal.d.ts +8 -0
  407. package/dist/rules/vulnerabilities/rules/pathTraversal.d.ts.map +1 -0
  408. package/dist/rules/vulnerabilities/rules/pathTraversal.js +351 -0
  409. package/dist/rules/vulnerabilities/rules/pathTraversal.js.map +1 -0
  410. package/dist/rules/vulnerabilities/rules/prototypePollution.d.ts +8 -0
  411. package/dist/rules/vulnerabilities/rules/prototypePollution.d.ts.map +1 -0
  412. package/dist/rules/vulnerabilities/rules/prototypePollution.js +272 -0
  413. package/dist/rules/vulnerabilities/rules/prototypePollution.js.map +1 -0
  414. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.d.ts +8 -0
  415. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.d.ts.map +1 -0
  416. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.js +438 -0
  417. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.js.map +1 -0
  418. package/dist/rules/vulnerabilities/rules/sqlInjection.d.ts +12 -0
  419. package/dist/rules/vulnerabilities/rules/sqlInjection.d.ts.map +1 -0
  420. package/dist/rules/vulnerabilities/rules/sqlInjection.js +636 -0
  421. package/dist/rules/vulnerabilities/rules/sqlInjection.js.map +1 -0
  422. package/dist/rules/vulnerabilities/rules/ssrf.d.ts +8 -0
  423. package/dist/rules/vulnerabilities/rules/ssrf.d.ts.map +1 -0
  424. package/dist/rules/vulnerabilities/rules/ssrf.js +401 -0
  425. package/dist/rules/vulnerabilities/rules/ssrf.js.map +1 -0
  426. package/dist/rules/vulnerabilities/rules/xss.d.ts +11 -0
  427. package/dist/rules/vulnerabilities/rules/xss.d.ts.map +1 -0
  428. package/dist/rules/vulnerabilities/rules/xss.js +724 -0
  429. package/dist/rules/vulnerabilities/rules/xss.js.map +1 -0
  430. package/dist/rules/vulnerabilities/scoring/index.d.ts +80 -0
  431. package/dist/rules/vulnerabilities/scoring/index.d.ts.map +1 -0
  432. package/dist/rules/vulnerabilities/scoring/index.js +414 -0
  433. package/dist/rules/vulnerabilities/scoring/index.js.map +1 -0
  434. package/dist/rules/vulnerabilities/types/index.d.ts +830 -0
  435. package/dist/rules/vulnerabilities/types/index.d.ts.map +1 -0
  436. package/dist/rules/vulnerabilities/types/index.js +164 -0
  437. package/dist/rules/vulnerabilities/types/index.js.map +1 -0
  438. package/dist/rules/vulnerabilities/utils/index.d.ts +206 -0
  439. package/dist/rules/vulnerabilities/utils/index.d.ts.map +1 -0
  440. package/dist/rules/vulnerabilities/utils/index.js +615 -0
  441. package/dist/rules/vulnerabilities/utils/index.js.map +1 -0
  442. package/dist/types/index.d.ts +359 -0
  443. package/dist/types/index.d.ts.map +1 -0
  444. package/dist/types/index.js +61 -0
  445. package/dist/types/index.js.map +1 -0
  446. package/dist/utils/index.d.ts +82 -0
  447. package/dist/utils/index.d.ts.map +1 -0
  448. package/dist/utils/index.js +326 -0
  449. package/dist/utils/index.js.map +1 -0
  450. package/dist/utils/logger.d.ts +40 -0
  451. package/dist/utils/logger.d.ts.map +1 -0
  452. package/dist/utils/logger.js +139 -0
  453. package/dist/utils/logger.js.map +1 -0
  454. package/docs/ARCHITECTURE.md +320 -0
  455. package/docs/V1.2.1-IA_Performances.md +116 -0
  456. package/docs/images/WIN_Defender.png +0 -0
  457. package/package.json +68 -0
  458. package/secure-scan.config.json +134 -0
  459. package/secure-scan.sln +29 -0
  460. package/src/ai/aiAnalyzer.ts +714 -0
  461. package/src/ai/index.ts +5 -0
  462. package/src/analyzers/base/baseAnalyzer.ts +66 -0
  463. package/src/analyzers/base/index.ts +5 -0
  464. package/src/analyzers/c-cpp/cppAnalyzer.ts +308 -0
  465. package/src/analyzers/c-cpp/index.ts +5 -0
  466. package/src/analyzers/core/engine/index.ts +5 -0
  467. package/src/analyzers/core/engine/ruleEngine.ts +221 -0
  468. package/src/analyzers/core/index.ts +8 -0
  469. package/src/analyzers/core/scanner/fileScanner.ts +204 -0
  470. package/src/analyzers/core/scanner/index.ts +5 -0
  471. package/src/analyzers/core/scoring/index.ts +5 -0
  472. package/src/analyzers/core/scoring/riskScoring.ts +198 -0
  473. package/src/analyzers/core/securityScanner.ts +321 -0
  474. package/src/analyzers/csharp/csharpAnalyzer.ts +328 -0
  475. package/src/analyzers/csharp/index.ts +5 -0
  476. package/src/analyzers/iac/iacAnalyzer.ts +318 -0
  477. package/src/analyzers/iac/index.ts +5 -0
  478. package/src/analyzers/index.ts +67 -0
  479. package/src/analyzers/java/index.ts +5 -0
  480. package/src/analyzers/java/javaAnalyzer.ts +320 -0
  481. package/src/analyzers/javascript/PROMPT_JS_ANALYZER.md +267 -0
  482. package/src/analyzers/javascript/astUtils.ts +789 -0
  483. package/src/analyzers/javascript/index.ts +50 -0
  484. package/src/analyzers/javascript/javascriptAnalyzer.ts +984 -0
  485. package/src/analyzers/javascript/malwareDetector.ts +697 -0
  486. package/src/analyzers/javascript/packageJsonAnalyzer.ts +626 -0
  487. package/src/analyzers/javascript/taintAnalyzer.ts +630 -0
  488. package/src/analyzers/php/index.ts +5 -0
  489. package/src/analyzers/php/phpAnalyzer.ts +280 -0
  490. package/src/analyzers/python/index.ts +5 -0
  491. package/src/analyzers/python/pythonAnalyzer.ts +319 -0
  492. package/src/cli/index.ts +276 -0
  493. package/src/dependencies/aiDependencyAnalyzer.ts +496 -0
  494. package/src/dependencies/database/cveDatabase.ts +426 -0
  495. package/src/dependencies/database/index.ts +6 -0
  496. package/src/dependencies/database/maliciousPackages.ts +286 -0
  497. package/src/dependencies/dependencyAnalyzer.ts +394 -0
  498. package/src/dependencies/detectors/index.ts +7 -0
  499. package/src/dependencies/detectors/securityStandards.ts +200 -0
  500. package/src/dependencies/detectors/vulnerabilityDetector.ts +343 -0
  501. package/src/dependencies/index.ts +27 -0
  502. package/src/dependencies/installed/index.ts +8 -0
  503. package/src/dependencies/installed/installedScanner.ts +821 -0
  504. package/src/dependencies/installed/malwarePatterns.ts +492 -0
  505. package/src/dependencies/installed/types.ts +287 -0
  506. package/src/dependencies/parsers/base/baseParser.ts +108 -0
  507. package/src/dependencies/parsers/base/index.ts +6 -0
  508. package/src/dependencies/parsers/cpp/cppParser.ts +245 -0
  509. package/src/dependencies/parsers/cpp/index.ts +6 -0
  510. package/src/dependencies/parsers/csharp/csharpParser.ts +151 -0
  511. package/src/dependencies/parsers/csharp/index.ts +6 -0
  512. package/src/dependencies/parsers/index.ts +56 -0
  513. package/src/dependencies/parsers/java/index.ts +6 -0
  514. package/src/dependencies/parsers/java/javaParser.ts +203 -0
  515. package/src/dependencies/parsers/javascript/index.ts +6 -0
  516. package/src/dependencies/parsers/javascript/javascriptParser.ts +362 -0
  517. package/src/dependencies/parsers/php/index.ts +6 -0
  518. package/src/dependencies/parsers/php/phpParser.ts +208 -0
  519. package/src/dependencies/parsers/python/index.ts +6 -0
  520. package/src/dependencies/parsers/python/pythonParser.ts +437 -0
  521. package/src/dependencies/types.ts +330 -0
  522. package/src/i18n/index.ts +1 -0
  523. package/src/i18n/translations.ts +194 -0
  524. package/src/index.ts +16 -0
  525. package/src/reports/dependencyReportGenerator.ts +717 -0
  526. package/src/reports/htmlReportGenerator.ts +781 -0
  527. package/src/reports/index.ts +7 -0
  528. package/src/reports/installedDepsReportGenerator.ts +899 -0
  529. package/src/rules/index.ts +58 -0
  530. package/src/rules/malware/INFO.md +287 -0
  531. package/src/rules/malware/categories/backdoors.ts +174 -0
  532. package/src/rules/malware/categories/cryptominers.ts +434 -0
  533. package/src/rules/malware/categories/exfiltration.ts +677 -0
  534. package/src/rules/malware/categories/keyloggers.ts +780 -0
  535. package/src/rules/malware/categories/loaders.ts +721 -0
  536. package/src/rules/malware/categories/network.ts +639 -0
  537. package/src/rules/malware/categories/obfuscation.ts +788 -0
  538. package/src/rules/malware/constants/index.ts +358 -0
  539. package/src/rules/malware/engine/index.ts +758 -0
  540. package/src/rules/malware/index.ts +928 -0
  541. package/src/rules/malware/scoring/index.ts +549 -0
  542. package/src/rules/malware/types/index.ts +752 -0
  543. package/src/rules/malware/utils/index.ts +643 -0
  544. package/src/rules/standards.ts +372 -0
  545. package/src/rules/vulnerabilities/PROMPT_VULNERABILITIES.md +226 -0
  546. package/src/rules/vulnerabilities/constants/index.ts +625 -0
  547. package/src/rules/vulnerabilities/engine/index.ts +831 -0
  548. package/src/rules/vulnerabilities/index.ts +312 -0
  549. package/src/rules/vulnerabilities/rules/authentication.ts +426 -0
  550. package/src/rules/vulnerabilities/rules/commandInjection.ts +307 -0
  551. package/src/rules/vulnerabilities/rules/csrf.ts +268 -0
  552. package/src/rules/vulnerabilities/rules/deserialization.ts +343 -0
  553. package/src/rules/vulnerabilities/rules/fileUpload.ts +332 -0
  554. package/src/rules/vulnerabilities/rules/hardcodedSecrets.ts +453 -0
  555. package/src/rules/vulnerabilities/rules/index.ts +17 -0
  556. package/src/rules/vulnerabilities/rules/pathTraversal.ts +358 -0
  557. package/src/rules/vulnerabilities/rules/prototypePollution.ts +279 -0
  558. package/src/rules/vulnerabilities/rules/securityMisconfiguration.ts +445 -0
  559. package/src/rules/vulnerabilities/rules/sqlInjection.ts +669 -0
  560. package/src/rules/vulnerabilities/rules/ssrf.ts +408 -0
  561. package/src/rules/vulnerabilities/rules/xss.ts +753 -0
  562. package/src/rules/vulnerabilities/scoring/index.ts +543 -0
  563. package/src/rules/vulnerabilities/types/index.ts +1004 -0
  564. package/src/rules/vulnerabilities/utils/index.ts +709 -0
  565. package/src/types/index.ts +391 -0
  566. package/src/utils/index.ts +306 -0
  567. package/src/utils/logger.ts +150 -0
  568. package/test-installed-scanner.ts +136 -0
  569. package/tsconfig.json +30 -0
@@ -0,0 +1,636 @@
1
+ "use strict";
2
+ /**
3
+ * @fileoverview SQL Injection Detection Rules
4
+ * @module rules/vulnerabilities/rules/sqlInjection
5
+ *
6
+ * Comprehensive SQL injection detection for multiple languages and frameworks.
7
+ * Detects string concatenation in SQL queries, unsafe query building, and
8
+ * missing parameterized queries.
9
+ */
10
+ Object.defineProperty(exports, "__esModule", { value: true });
11
+ exports.sqlInjectionRules = void 0;
12
+ const types_1 = require("../types");
13
+ const constants_1 = require("../constants");
14
+ // ============================================================================
15
+ // TAINT DEFINITIONS FOR SQL INJECTION
16
+ // ============================================================================
17
+ const sqlInjectionSources = [
18
+ // JavaScript/Node.js
19
+ { id: 'js-req-body', name: 'req.body', pattern: /req\.body(?:\.\w+|\[\s*['"`]\w+['"`]\s*\])?/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], category: 'user_input' },
20
+ { id: 'js-req-query', name: 'req.query', pattern: /req\.query(?:\.\w+|\[\s*['"`]\w+['"`]\s*\])?/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], category: 'user_input' },
21
+ { id: 'js-req-params', name: 'req.params', pattern: /req\.params(?:\.\w+|\[\s*['"`]\w+['"`]\s*\])?/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], category: 'user_input' },
22
+ // Python/Flask/Django
23
+ { id: 'py-request-args', name: 'request.args', pattern: /request\.args\.get\s*\([^)]+\)/g, languages: [types_1.SupportedLanguage.PYTHON], category: 'user_input' },
24
+ { id: 'py-request-form', name: 'request.form', pattern: /request\.form\.get\s*\([^)]+\)/g, languages: [types_1.SupportedLanguage.PYTHON], category: 'user_input' },
25
+ { id: 'py-request-json', name: 'request.json', pattern: /request\.(?:json|get_json\(\))(?:\.\w+|\[\s*['"`]\w+['"`]\s*\])?/g, languages: [types_1.SupportedLanguage.PYTHON], category: 'user_input' },
26
+ // PHP
27
+ { id: 'php-get', name: '$_GET', pattern: /\$_GET\s*\[\s*['"`][^'"`]+['"`]\s*\]/g, languages: [types_1.SupportedLanguage.PHP], category: 'user_input' },
28
+ { id: 'php-post', name: '$_POST', pattern: /\$_POST\s*\[\s*['"`][^'"`]+['"`]\s*\]/g, languages: [types_1.SupportedLanguage.PHP], category: 'user_input' },
29
+ { id: 'php-request', name: '$_REQUEST', pattern: /\$_REQUEST\s*\[\s*['"`][^'"`]+['"`]\s*\]/g, languages: [types_1.SupportedLanguage.PHP], category: 'user_input' },
30
+ // Java
31
+ { id: 'java-param', name: 'getParameter', pattern: /(?:request\.)?getParameter\s*\([^)]+\)/g, languages: [types_1.SupportedLanguage.JAVA], category: 'user_input' },
32
+ { id: 'java-path-var', name: '@PathVariable', pattern: /@PathVariable(?:\s*\([^)]*\))?\s+\w+\s+\w+/g, languages: [types_1.SupportedLanguage.JAVA], category: 'user_input' },
33
+ // C#
34
+ { id: 'csharp-query', name: 'Request.QueryString', pattern: /Request\.QueryString\s*\[\s*['"`][^'"`]+['"`]\s*\]/g, languages: [types_1.SupportedLanguage.CSHARP], category: 'user_input' },
35
+ { id: 'csharp-form', name: 'Request.Form', pattern: /Request\.Form\s*\[\s*['"`][^'"`]+['"`]\s*\]/g, languages: [types_1.SupportedLanguage.CSHARP], category: 'user_input' }
36
+ ];
37
+ const sqlInjectionSinks = [
38
+ // JavaScript
39
+ { id: 'js-query', name: 'query()', pattern: /\.query\s*\(\s*['"`]|\.query\s*\(\s*\w+\s*\+/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], vulnerabilityType: types_1.VulnerabilityType.SQL_INJECTION },
40
+ { id: 'js-raw', name: 'raw()', pattern: /\.raw\s*\(\s*['"`]|\.raw\s*\(\s*\w+/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], vulnerabilityType: types_1.VulnerabilityType.SQL_INJECTION },
41
+ // Python
42
+ { id: 'py-execute', name: 'cursor.execute', pattern: /cursor\.execute\s*\(\s*(?:f['"`]|['"`].*%|['"`].*\.format)/g, languages: [types_1.SupportedLanguage.PYTHON], vulnerabilityType: types_1.VulnerabilityType.SQL_INJECTION },
43
+ { id: 'py-raw', name: 'raw()', pattern: /\.raw\s*\(\s*(?:f['"`]|['"`].*%)/g, languages: [types_1.SupportedLanguage.PYTHON], vulnerabilityType: types_1.VulnerabilityType.SQL_INJECTION },
44
+ // PHP
45
+ { id: 'php-query', name: 'mysql_query', pattern: /(?:mysql_query|mysqli_query|pg_query)\s*\(\s*(?:\$\w+\s*\.|\s*['"`].*\$)/g, languages: [types_1.SupportedLanguage.PHP], vulnerabilityType: types_1.VulnerabilityType.SQL_INJECTION },
46
+ { id: 'php-pdo-query', name: 'PDO::query', pattern: /->query\s*\(\s*(?:\$\w+\s*\.|\s*['"`].*\$)/g, languages: [types_1.SupportedLanguage.PHP], vulnerabilityType: types_1.VulnerabilityType.SQL_INJECTION },
47
+ // Java
48
+ { id: 'java-statement', name: 'Statement.execute', pattern: /(?:execute(?:Query|Update)?)\s*\(\s*(?:\w+\s*\+|['"`].*\+)/g, languages: [types_1.SupportedLanguage.JAVA], vulnerabilityType: types_1.VulnerabilityType.SQL_INJECTION },
49
+ { id: 'java-create-query', name: 'createQuery', pattern: /create(?:Native)?Query\s*\(\s*(?:\w+\s*\+|['"`].*\+)/g, languages: [types_1.SupportedLanguage.JAVA], vulnerabilityType: types_1.VulnerabilityType.SQL_INJECTION },
50
+ // C#
51
+ { id: 'csharp-command', name: 'SqlCommand', pattern: /new\s+SqlCommand\s*\(\s*(?:\w+\s*\+|['"`].*\+)/g, languages: [types_1.SupportedLanguage.CSHARP], vulnerabilityType: types_1.VulnerabilityType.SQL_INJECTION },
52
+ { id: 'csharp-execute', name: 'ExecuteReader', pattern: /Execute(?:Reader|NonQuery|Scalar)\s*\(/g, languages: [types_1.SupportedLanguage.CSHARP], vulnerabilityType: types_1.VulnerabilityType.SQL_INJECTION }
53
+ ];
54
+ const sqlInjectionSanitizers = [
55
+ { id: 'parameterized', name: 'Parameterized Query', pattern: /\?\s*,|:\w+|@\w+|\$\d+/g, protectsAgainst: [types_1.VulnerabilityType.SQL_INJECTION], effectiveness: 100 },
56
+ { id: 'prepared', name: 'Prepared Statement', pattern: /prepare(?:d)?(?:Statement)?\s*\(/gi, protectsAgainst: [types_1.VulnerabilityType.SQL_INJECTION], effectiveness: 100 },
57
+ { id: 'escape', name: 'Escape Function', pattern: /escape(?:String|Id|Literal)?\s*\(/gi, protectsAgainst: [types_1.VulnerabilityType.SQL_INJECTION], effectiveness: 85 },
58
+ { id: 'quote', name: 'Quote Function', pattern: /->quote\s*\(/gi, protectsAgainst: [types_1.VulnerabilityType.SQL_INJECTION], effectiveness: 90 },
59
+ { id: 'bind', name: 'Bind Parameters', pattern: /bind(?:Param|Value)\s*\(/gi, protectsAgainst: [types_1.VulnerabilityType.SQL_INJECTION], effectiveness: 100 }
60
+ ];
61
+ // ============================================================================
62
+ // SQL INJECTION RULES
63
+ // ============================================================================
64
+ exports.sqlInjectionRules = [
65
+ // ==========================================================================
66
+ // JavaScript/TypeScript SQL Injection Rules
67
+ // ==========================================================================
68
+ {
69
+ id: 'VUL-SQLI-001',
70
+ name: 'SQL Injection - String Concatenation in Query',
71
+ description: 'Detects SQL queries built using string concatenation with user input, which can lead to SQL injection attacks.',
72
+ version: '1.0.0',
73
+ vulnerabilityType: types_1.VulnerabilityType.SQL_INJECTION,
74
+ category: types_1.VulnerabilityCategory.INJECTION,
75
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
76
+ severity: types_1.VulnerabilitySeverity.CRITICAL,
77
+ confidence: types_1.ConfidenceLevel.HIGH,
78
+ baseScore: 90,
79
+ patterns: [
80
+ {
81
+ type: types_1.PatternType.REGEX,
82
+ patternId: 'sqli-concat-query',
83
+ pattern: '\\.query\\s*\\(\\s*[\'"`](?:SELECT|INSERT|UPDATE|DELETE|DROP).*\\+',
84
+ flags: 'gi',
85
+ weight: 1.0,
86
+ description: 'SQL query with string concatenation'
87
+ },
88
+ {
89
+ type: types_1.PatternType.REGEX,
90
+ patternId: 'sqli-template-literal',
91
+ pattern: '\\.query\\s*\\(\\s*`[^`]*\\$\\{[^}]+\\}[^`]*`\\s*\\)',
92
+ flags: 'gi',
93
+ weight: 0.95,
94
+ description: 'SQL query with template literal interpolation'
95
+ },
96
+ {
97
+ type: types_1.PatternType.REGEX,
98
+ patternId: 'sqli-req-body-concat',
99
+ pattern: '(?:SELECT|INSERT|UPDATE|DELETE).*\\+\\s*req\\.(?:body|query|params)',
100
+ flags: 'gi',
101
+ weight: 1.0,
102
+ description: 'Direct concatenation of request data in SQL'
103
+ }
104
+ ],
105
+ taintSources: sqlInjectionSources.filter(s => s.languages?.includes(types_1.SupportedLanguage.JAVASCRIPT) ||
106
+ s.languages?.includes(types_1.SupportedLanguage.TYPESCRIPT)),
107
+ taintSinks: sqlInjectionSinks.filter(s => s.languages?.includes(types_1.SupportedLanguage.JAVASCRIPT) ||
108
+ s.languages?.includes(types_1.SupportedLanguage.TYPESCRIPT)),
109
+ taintSanitizers: sqlInjectionSanitizers,
110
+ impact: {
111
+ confidentiality: 'high',
112
+ integrity: 'high',
113
+ availability: 'high',
114
+ technicalImpact: 'Attackers can read, modify, or delete arbitrary data in the database. May lead to complete database compromise.',
115
+ businessImpact: 'Data breach, data loss, regulatory fines, reputation damage.',
116
+ affectedAssets: ['Database', 'User Data', 'Application Data'],
117
+ dataAtRisk: ['PII', 'Credentials', 'Financial Data']
118
+ },
119
+ exploitability: {
120
+ attackVector: 'network',
121
+ attackComplexity: 'low',
122
+ privilegesRequired: 'none',
123
+ userInteraction: 'none',
124
+ knownExploits: true
125
+ },
126
+ vulnerableExamples: [
127
+ {
128
+ code: `const userId = req.query.id;
129
+ const query = "SELECT * FROM users WHERE id = " + userId;
130
+ db.query(query);`,
131
+ language: types_1.SupportedLanguage.JAVASCRIPT,
132
+ isVulnerable: true,
133
+ description: 'User input directly concatenated in SQL query'
134
+ },
135
+ {
136
+ code: `const name = req.body.name;
137
+ db.query(\`SELECT * FROM products WHERE name = '\${name}'\`);`,
138
+ language: types_1.SupportedLanguage.JAVASCRIPT,
139
+ isVulnerable: true,
140
+ description: 'Template literal with unsanitized user input'
141
+ }
142
+ ],
143
+ secureExamples: [
144
+ {
145
+ code: `const userId = req.query.id;
146
+ db.query("SELECT * FROM users WHERE id = ?", [userId]);`,
147
+ language: types_1.SupportedLanguage.JAVASCRIPT,
148
+ isVulnerable: false,
149
+ description: 'Using parameterized query with placeholders',
150
+ safetyExplanation: 'Parameters are properly escaped by the database driver'
151
+ }
152
+ ],
153
+ remediation: {
154
+ summary: 'Use parameterized queries or prepared statements instead of string concatenation.',
155
+ steps: [
156
+ 'Replace string concatenation with parameterized queries',
157
+ 'Use ORM/query builders that automatically escape parameters',
158
+ 'Implement input validation as defense in depth',
159
+ 'Apply principle of least privilege to database accounts'
160
+ ],
161
+ secureCodeExample: `// Secure: Using parameterized query
162
+ db.query("SELECT * FROM users WHERE id = ?", [userId]);
163
+
164
+ // Secure: Using an ORM like Sequelize
165
+ const user = await User.findOne({ where: { id: userId } });`,
166
+ references: [
167
+ 'https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html',
168
+ 'https://owasp.org/www-community/attacks/SQL_Injection'
169
+ ],
170
+ effort: 'low',
171
+ priority: 'immediate'
172
+ },
173
+ standards: {
174
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
175
+ cwe: [constants_1.CWE_REFERENCES.CWE_89],
176
+ sans: [{ rank: 1, cweId: 'CWE-89', category: 'Injection' }]
177
+ },
178
+ tags: ['sql-injection', 'injection', 'database', 'critical', 'owasp-top-10'],
179
+ enabled: true
180
+ },
181
+ // ==========================================================================
182
+ // Python SQL Injection Rules
183
+ // ==========================================================================
184
+ {
185
+ id: 'VUL-SQLI-002',
186
+ name: 'SQL Injection - Python F-String in Query',
187
+ description: 'Detects SQL queries built using Python f-strings or format() with user input.',
188
+ version: '1.0.0',
189
+ vulnerabilityType: types_1.VulnerabilityType.SQL_INJECTION,
190
+ category: types_1.VulnerabilityCategory.INJECTION,
191
+ languages: [types_1.SupportedLanguage.PYTHON],
192
+ severity: types_1.VulnerabilitySeverity.CRITICAL,
193
+ confidence: types_1.ConfidenceLevel.HIGH,
194
+ baseScore: 90,
195
+ patterns: [
196
+ {
197
+ type: types_1.PatternType.REGEX,
198
+ patternId: 'sqli-python-fstring',
199
+ pattern: 'cursor\\.execute\\s*\\(\\s*f[\'"](?:SELECT|INSERT|UPDATE|DELETE).*\\{',
200
+ flags: 'gi',
201
+ weight: 1.0,
202
+ description: 'SQL query using f-string interpolation'
203
+ },
204
+ {
205
+ type: types_1.PatternType.REGEX,
206
+ patternId: 'sqli-python-format',
207
+ pattern: 'cursor\\.execute\\s*\\(\\s*[\'"](?:SELECT|INSERT|UPDATE|DELETE).*%s.*\\.format\\s*\\(',
208
+ flags: 'gi',
209
+ weight: 0.95,
210
+ description: 'SQL query using .format()'
211
+ },
212
+ {
213
+ type: types_1.PatternType.REGEX,
214
+ patternId: 'sqli-python-percent',
215
+ pattern: 'cursor\\.execute\\s*\\(\\s*[\'"](?:SELECT|INSERT|UPDATE|DELETE).*%s.*%\\s*\\(',
216
+ flags: 'gi',
217
+ weight: 0.95,
218
+ description: 'SQL query using % formatting'
219
+ }
220
+ ],
221
+ taintSources: sqlInjectionSources.filter(s => s.languages?.includes(types_1.SupportedLanguage.PYTHON)),
222
+ taintSinks: sqlInjectionSinks.filter(s => s.languages?.includes(types_1.SupportedLanguage.PYTHON)),
223
+ taintSanitizers: sqlInjectionSanitizers,
224
+ impact: {
225
+ confidentiality: 'high',
226
+ integrity: 'high',
227
+ availability: 'high',
228
+ technicalImpact: 'Full database access and potential server compromise.',
229
+ businessImpact: 'Data breach and regulatory violations.'
230
+ },
231
+ exploitability: {
232
+ attackVector: 'network',
233
+ attackComplexity: 'low',
234
+ privilegesRequired: 'none',
235
+ userInteraction: 'none'
236
+ },
237
+ vulnerableExamples: [
238
+ {
239
+ code: `user_id = request.args.get('id')
240
+ cursor.execute(f"SELECT * FROM users WHERE id = {user_id}")`,
241
+ language: types_1.SupportedLanguage.PYTHON,
242
+ isVulnerable: true,
243
+ description: 'F-string used in SQL query'
244
+ }
245
+ ],
246
+ remediation: {
247
+ summary: 'Use parameterized queries with tuple or dict parameters.',
248
+ steps: [
249
+ 'Replace f-strings with parameterized queries',
250
+ 'Use SQLAlchemy ORM for database operations',
251
+ 'Never use string formatting for SQL queries'
252
+ ],
253
+ secureCodeExample: `# Secure: Using parameterized query
254
+ cursor.execute("SELECT * FROM users WHERE id = %s", (user_id,))
255
+
256
+ # Secure: Using SQLAlchemy ORM
257
+ user = session.query(User).filter(User.id == user_id).first()`,
258
+ references: [
259
+ 'https://www.psycopg.org/docs/usage.html#passing-parameters-to-sql-queries'
260
+ ],
261
+ effort: 'low',
262
+ priority: 'immediate'
263
+ },
264
+ standards: {
265
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
266
+ cwe: [constants_1.CWE_REFERENCES.CWE_89]
267
+ },
268
+ tags: ['sql-injection', 'python', 'flask', 'django', 'critical'],
269
+ enabled: true
270
+ },
271
+ // ==========================================================================
272
+ // PHP SQL Injection Rules
273
+ // ==========================================================================
274
+ {
275
+ id: 'VUL-SQLI-003',
276
+ name: 'SQL Injection - PHP Variable in Query',
277
+ description: 'Detects SQL queries with PHP variables directly embedded, indicating potential SQL injection.',
278
+ version: '1.0.0',
279
+ vulnerabilityType: types_1.VulnerabilityType.SQL_INJECTION,
280
+ category: types_1.VulnerabilityCategory.INJECTION,
281
+ languages: [types_1.SupportedLanguage.PHP],
282
+ severity: types_1.VulnerabilitySeverity.CRITICAL,
283
+ confidence: types_1.ConfidenceLevel.HIGH,
284
+ baseScore: 92,
285
+ patterns: [
286
+ {
287
+ type: types_1.PatternType.REGEX,
288
+ patternId: 'sqli-php-mysql-query',
289
+ pattern: '(?:mysql_query|mysqli_query)\\s*\\(\\s*[\'"](?:SELECT|INSERT|UPDATE|DELETE).*\\$_(?:GET|POST|REQUEST)',
290
+ flags: 'gi',
291
+ weight: 1.0,
292
+ description: 'Direct use of superglobal in mysql_query'
293
+ },
294
+ {
295
+ type: types_1.PatternType.REGEX,
296
+ patternId: 'sqli-php-pdo-exec',
297
+ pattern: '->(?:query|exec)\\s*\\(\\s*[\'"](?:SELECT|INSERT|UPDATE|DELETE).*\\$',
298
+ flags: 'gi',
299
+ weight: 0.95,
300
+ description: 'Variable interpolation in PDO query'
301
+ },
302
+ {
303
+ type: types_1.PatternType.REGEX,
304
+ patternId: 'sqli-php-concat',
305
+ pattern: '(?:mysql_query|mysqli_query|->query)\\s*\\([^)]*\\.\\s*\\$_(?:GET|POST|REQUEST)',
306
+ flags: 'gi',
307
+ weight: 1.0,
308
+ description: 'Concatenation of superglobal in SQL'
309
+ }
310
+ ],
311
+ taintSources: sqlInjectionSources.filter(s => s.languages?.includes(types_1.SupportedLanguage.PHP)),
312
+ taintSinks: sqlInjectionSinks.filter(s => s.languages?.includes(types_1.SupportedLanguage.PHP)),
313
+ taintSanitizers: sqlInjectionSanitizers,
314
+ impact: {
315
+ confidentiality: 'high',
316
+ integrity: 'high',
317
+ availability: 'high',
318
+ technicalImpact: 'Database compromise, potential code execution via SQL features.',
319
+ businessImpact: 'Massive data breach potential.'
320
+ },
321
+ exploitability: {
322
+ attackVector: 'network',
323
+ attackComplexity: 'low',
324
+ privilegesRequired: 'none',
325
+ userInteraction: 'none',
326
+ knownExploits: true
327
+ },
328
+ vulnerableExamples: [
329
+ {
330
+ code: `$id = $_GET['id'];
331
+ $result = mysql_query("SELECT * FROM users WHERE id = '$id'");`,
332
+ language: types_1.SupportedLanguage.PHP,
333
+ isVulnerable: true,
334
+ description: 'Direct use of $_GET in SQL query'
335
+ }
336
+ ],
337
+ remediation: {
338
+ summary: 'Use PDO with prepared statements or mysqli with parameterized queries.',
339
+ steps: [
340
+ 'Migrate from mysql_* to PDO or mysqli',
341
+ 'Use prepared statements with bound parameters',
342
+ 'Implement input validation and type casting'
343
+ ],
344
+ secureCodeExample: `// Secure: Using PDO prepared statement
345
+ $stmt = $pdo->prepare("SELECT * FROM users WHERE id = :id");
346
+ $stmt->execute(['id' => $_GET['id']]);
347
+
348
+ // Secure: Using mysqli prepared statement
349
+ $stmt = $mysqli->prepare("SELECT * FROM users WHERE id = ?");
350
+ $stmt->bind_param("i", $_GET['id']);
351
+ $stmt->execute();`,
352
+ effort: 'medium',
353
+ priority: 'immediate'
354
+ },
355
+ standards: {
356
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
357
+ cwe: [constants_1.CWE_REFERENCES.CWE_89]
358
+ },
359
+ tags: ['sql-injection', 'php', 'critical', 'legacy'],
360
+ enabled: true
361
+ },
362
+ // ==========================================================================
363
+ // Java SQL Injection Rules
364
+ // ==========================================================================
365
+ {
366
+ id: 'VUL-SQLI-004',
367
+ name: 'SQL Injection - Java Statement with Concatenation',
368
+ description: 'Detects Java Statement objects with string concatenation instead of PreparedStatement.',
369
+ version: '1.0.0',
370
+ vulnerabilityType: types_1.VulnerabilityType.SQL_INJECTION,
371
+ category: types_1.VulnerabilityCategory.INJECTION,
372
+ languages: [types_1.SupportedLanguage.JAVA],
373
+ severity: types_1.VulnerabilitySeverity.CRITICAL,
374
+ confidence: types_1.ConfidenceLevel.HIGH,
375
+ baseScore: 90,
376
+ patterns: [
377
+ {
378
+ type: types_1.PatternType.REGEX,
379
+ patternId: 'sqli-java-statement',
380
+ pattern: 'executeQuery\\s*\\(\\s*[\'"](?:SELECT|INSERT|UPDATE|DELETE).*\\+',
381
+ flags: 'gi',
382
+ weight: 1.0,
383
+ description: 'Statement.executeQuery with concatenation'
384
+ },
385
+ {
386
+ type: types_1.PatternType.REGEX,
387
+ patternId: 'sqli-java-create-statement',
388
+ pattern: 'createStatement\\s*\\(\\s*\\).*execute(?:Query|Update)?\\s*\\([^)]*\\+',
389
+ flags: 'gis',
390
+ weight: 0.95,
391
+ description: 'createStatement followed by concatenated query'
392
+ },
393
+ {
394
+ type: types_1.PatternType.REGEX,
395
+ patternId: 'sqli-java-native-query',
396
+ pattern: 'createNativeQuery\\s*\\(\\s*[\'"].*\\+',
397
+ flags: 'gi',
398
+ weight: 0.90,
399
+ description: 'JPA native query with concatenation'
400
+ }
401
+ ],
402
+ taintSources: sqlInjectionSources.filter(s => s.languages?.includes(types_1.SupportedLanguage.JAVA)),
403
+ taintSinks: sqlInjectionSinks.filter(s => s.languages?.includes(types_1.SupportedLanguage.JAVA)),
404
+ taintSanitizers: sqlInjectionSanitizers,
405
+ impact: {
406
+ confidentiality: 'high',
407
+ integrity: 'high',
408
+ availability: 'high',
409
+ technicalImpact: 'Full database compromise possible.',
410
+ businessImpact: 'Data theft and manipulation.'
411
+ },
412
+ exploitability: {
413
+ attackVector: 'network',
414
+ attackComplexity: 'low',
415
+ privilegesRequired: 'none',
416
+ userInteraction: 'none'
417
+ },
418
+ vulnerableExamples: [
419
+ {
420
+ code: `String userId = request.getParameter("id");
421
+ Statement stmt = conn.createStatement();
422
+ ResultSet rs = stmt.executeQuery("SELECT * FROM users WHERE id = " + userId);`,
423
+ language: types_1.SupportedLanguage.JAVA,
424
+ isVulnerable: true,
425
+ description: 'Statement with concatenated user input'
426
+ }
427
+ ],
428
+ remediation: {
429
+ summary: 'Use PreparedStatement with parameter binding.',
430
+ steps: [
431
+ 'Replace Statement with PreparedStatement',
432
+ 'Use ? placeholders and setXxx() methods',
433
+ 'Consider using JPA Criteria API or named parameters'
434
+ ],
435
+ secureCodeExample: `// Secure: Using PreparedStatement
436
+ String userId = request.getParameter("id");
437
+ PreparedStatement pstmt = conn.prepareStatement("SELECT * FROM users WHERE id = ?");
438
+ pstmt.setString(1, userId);
439
+ ResultSet rs = pstmt.executeQuery();
440
+
441
+ // Secure: Using JPA with parameters
442
+ Query query = em.createQuery("SELECT u FROM User u WHERE u.id = :id");
443
+ query.setParameter("id", userId);`,
444
+ effort: 'low',
445
+ priority: 'immediate'
446
+ },
447
+ standards: {
448
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
449
+ cwe: [constants_1.CWE_REFERENCES.CWE_89]
450
+ },
451
+ tags: ['sql-injection', 'java', 'jdbc', 'critical'],
452
+ enabled: true
453
+ },
454
+ // ==========================================================================
455
+ // C# SQL Injection Rules
456
+ // ==========================================================================
457
+ {
458
+ id: 'VUL-SQLI-005',
459
+ name: 'SQL Injection - C# SqlCommand with Concatenation',
460
+ description: 'Detects SqlCommand with string concatenation instead of parameterized queries.',
461
+ version: '1.0.0',
462
+ vulnerabilityType: types_1.VulnerabilityType.SQL_INJECTION,
463
+ category: types_1.VulnerabilityCategory.INJECTION,
464
+ languages: [types_1.SupportedLanguage.CSHARP],
465
+ severity: types_1.VulnerabilitySeverity.CRITICAL,
466
+ confidence: types_1.ConfidenceLevel.HIGH,
467
+ baseScore: 90,
468
+ patterns: [
469
+ {
470
+ type: types_1.PatternType.REGEX,
471
+ patternId: 'sqli-csharp-sqlcommand',
472
+ pattern: 'new\\s+SqlCommand\\s*\\(\\s*[\'"](?:SELECT|INSERT|UPDATE|DELETE).*\\+',
473
+ flags: 'gi',
474
+ weight: 1.0,
475
+ description: 'SqlCommand constructor with concatenation'
476
+ },
477
+ {
478
+ type: types_1.PatternType.REGEX,
479
+ patternId: 'sqli-csharp-commandtext',
480
+ pattern: '\\.CommandText\\s*=\\s*[\'"](?:SELECT|INSERT|UPDATE|DELETE).*\\+',
481
+ flags: 'gi',
482
+ weight: 0.95,
483
+ description: 'CommandText property with concatenation'
484
+ },
485
+ {
486
+ type: types_1.PatternType.REGEX,
487
+ patternId: 'sqli-csharp-interpolation',
488
+ pattern: 'new\\s+SqlCommand\\s*\\(\\s*\\$[\'"](?:SELECT|INSERT|UPDATE|DELETE).*\\{',
489
+ flags: 'gi',
490
+ weight: 1.0,
491
+ description: 'SqlCommand with string interpolation'
492
+ }
493
+ ],
494
+ taintSources: sqlInjectionSources.filter(s => s.languages?.includes(types_1.SupportedLanguage.CSHARP)),
495
+ taintSinks: sqlInjectionSinks.filter(s => s.languages?.includes(types_1.SupportedLanguage.CSHARP)),
496
+ taintSanitizers: sqlInjectionSanitizers,
497
+ impact: {
498
+ confidentiality: 'high',
499
+ integrity: 'high',
500
+ availability: 'high',
501
+ technicalImpact: 'Database server compromise possible.',
502
+ businessImpact: 'Data breach and service disruption.'
503
+ },
504
+ exploitability: {
505
+ attackVector: 'network',
506
+ attackComplexity: 'low',
507
+ privilegesRequired: 'none',
508
+ userInteraction: 'none'
509
+ },
510
+ vulnerableExamples: [
511
+ {
512
+ code: `string userId = Request.QueryString["id"];
513
+ SqlCommand cmd = new SqlCommand("SELECT * FROM Users WHERE Id = " + userId, conn);
514
+ SqlDataReader reader = cmd.ExecuteReader();`,
515
+ language: types_1.SupportedLanguage.CSHARP,
516
+ isVulnerable: true,
517
+ description: 'SqlCommand with concatenated user input'
518
+ }
519
+ ],
520
+ remediation: {
521
+ summary: 'Use SqlCommand with SqlParameter or Entity Framework.',
522
+ steps: [
523
+ 'Add parameters using SqlCommand.Parameters',
524
+ 'Use Entity Framework or Dapper with parameterized queries',
525
+ 'Implement input validation as additional defense'
526
+ ],
527
+ secureCodeExample: `// Secure: Using SqlParameters
528
+ string userId = Request.QueryString["id"];
529
+ SqlCommand cmd = new SqlCommand("SELECT * FROM Users WHERE Id = @id", conn);
530
+ cmd.Parameters.AddWithValue("@id", userId);
531
+ SqlDataReader reader = cmd.ExecuteReader();
532
+
533
+ // Secure: Using Entity Framework
534
+ var user = context.Users.FirstOrDefault(u => u.Id == userId);`,
535
+ effort: 'low',
536
+ priority: 'immediate'
537
+ },
538
+ standards: {
539
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
540
+ cwe: [constants_1.CWE_REFERENCES.CWE_89]
541
+ },
542
+ tags: ['sql-injection', 'csharp', 'dotnet', 'ado-net', 'critical'],
543
+ enabled: true
544
+ },
545
+ // ==========================================================================
546
+ // NoSQL Injection Rule
547
+ // ==========================================================================
548
+ {
549
+ id: 'VUL-SQLI-006',
550
+ name: 'NoSQL Injection - MongoDB Query',
551
+ description: 'Detects potential NoSQL injection in MongoDB queries built with user input.',
552
+ version: '1.0.0',
553
+ vulnerabilityType: types_1.VulnerabilityType.NOSQL_INJECTION,
554
+ category: types_1.VulnerabilityCategory.INJECTION,
555
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT, types_1.SupportedLanguage.PYTHON],
556
+ severity: types_1.VulnerabilitySeverity.HIGH,
557
+ confidence: types_1.ConfidenceLevel.MEDIUM,
558
+ baseScore: 75,
559
+ patterns: [
560
+ {
561
+ type: types_1.PatternType.REGEX,
562
+ patternId: 'nosqli-find-body',
563
+ pattern: '\\.find(?:One)?\\s*\\(\\s*(?:req\\.(?:body|query)|\\{[^}]*req\\.)',
564
+ flags: 'gi',
565
+ weight: 0.90,
566
+ description: 'MongoDB find with request data'
567
+ },
568
+ {
569
+ type: types_1.PatternType.REGEX,
570
+ patternId: 'nosqli-where',
571
+ pattern: '\\$where\\s*:\\s*[\'"`].*\\+',
572
+ flags: 'gi',
573
+ weight: 1.0,
574
+ description: '$where operator with concatenation'
575
+ },
576
+ {
577
+ type: types_1.PatternType.REGEX,
578
+ patternId: 'nosqli-json-parse',
579
+ pattern: 'JSON\\.parse\\s*\\(\\s*req\\.',
580
+ flags: 'gi',
581
+ weight: 0.85,
582
+ description: 'Parsing user input as query object'
583
+ }
584
+ ],
585
+ impact: {
586
+ confidentiality: 'high',
587
+ integrity: 'high',
588
+ availability: 'low',
589
+ technicalImpact: 'Database query manipulation, data extraction.',
590
+ businessImpact: 'Unauthorized data access.'
591
+ },
592
+ exploitability: {
593
+ attackVector: 'network',
594
+ attackComplexity: 'low',
595
+ privilegesRequired: 'none',
596
+ userInteraction: 'none'
597
+ },
598
+ vulnerableExamples: [
599
+ {
600
+ code: `const user = await User.findOne({
601
+ username: req.body.username,
602
+ password: req.body.password
603
+ });`,
604
+ language: types_1.SupportedLanguage.JAVASCRIPT,
605
+ isVulnerable: true,
606
+ description: 'Direct use of request body in MongoDB query - allows {$gt: ""} injection'
607
+ }
608
+ ],
609
+ remediation: {
610
+ summary: 'Validate and sanitize input, use explicit field selection.',
611
+ steps: [
612
+ 'Validate input types before using in queries',
613
+ 'Use mongo-sanitize or similar library',
614
+ 'Avoid $where operator with user input',
615
+ 'Use explicit type casting for query parameters'
616
+ ],
617
+ secureCodeExample: `// Secure: Type validation
618
+ const username = String(req.body.username);
619
+ const password = String(req.body.password);
620
+ const user = await User.findOne({ username, password });`,
621
+ effort: 'low',
622
+ priority: 'high'
623
+ },
624
+ standards: {
625
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
626
+ cwe: [constants_1.CWE_REFERENCES.CWE_89]
627
+ },
628
+ tags: ['nosql-injection', 'mongodb', 'javascript', 'high'],
629
+ enabled: true
630
+ }
631
+ ];
632
+ // ============================================================================
633
+ // EXPORTS
634
+ // ============================================================================
635
+ exports.default = exports.sqlInjectionRules;
636
+ //# sourceMappingURL=sqlInjection.js.map