secure-scan 1.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (569) hide show
  1. package/README.md +564 -0
  2. package/dist/ai/aiAnalyzer.d.ts +99 -0
  3. package/dist/ai/aiAnalyzer.d.ts.map +1 -0
  4. package/dist/ai/aiAnalyzer.js +669 -0
  5. package/dist/ai/aiAnalyzer.js.map +1 -0
  6. package/dist/ai/index.d.ts +5 -0
  7. package/dist/ai/index.d.ts.map +1 -0
  8. package/dist/ai/index.js +21 -0
  9. package/dist/ai/index.js.map +1 -0
  10. package/dist/analyzers/base/baseAnalyzer.d.ts +44 -0
  11. package/dist/analyzers/base/baseAnalyzer.d.ts.map +1 -0
  12. package/dist/analyzers/base/baseAnalyzer.js +53 -0
  13. package/dist/analyzers/base/baseAnalyzer.js.map +1 -0
  14. package/dist/analyzers/base/index.d.ts +5 -0
  15. package/dist/analyzers/base/index.d.ts.map +1 -0
  16. package/dist/analyzers/base/index.js +21 -0
  17. package/dist/analyzers/base/index.js.map +1 -0
  18. package/dist/analyzers/c-cpp/cppAnalyzer.d.ts +60 -0
  19. package/dist/analyzers/c-cpp/cppAnalyzer.d.ts.map +1 -0
  20. package/dist/analyzers/c-cpp/cppAnalyzer.js +218 -0
  21. package/dist/analyzers/c-cpp/cppAnalyzer.js.map +1 -0
  22. package/dist/analyzers/c-cpp/index.d.ts +5 -0
  23. package/dist/analyzers/c-cpp/index.d.ts.map +1 -0
  24. package/dist/analyzers/c-cpp/index.js +21 -0
  25. package/dist/analyzers/c-cpp/index.js.map +1 -0
  26. package/dist/analyzers/core/engine/index.d.ts +5 -0
  27. package/dist/analyzers/core/engine/index.d.ts.map +1 -0
  28. package/dist/analyzers/core/engine/index.js +21 -0
  29. package/dist/analyzers/core/engine/index.js.map +1 -0
  30. package/dist/analyzers/core/engine/ruleEngine.d.ts +46 -0
  31. package/dist/analyzers/core/engine/ruleEngine.d.ts.map +1 -0
  32. package/dist/analyzers/core/engine/ruleEngine.js +173 -0
  33. package/dist/analyzers/core/engine/ruleEngine.js.map +1 -0
  34. package/dist/analyzers/core/index.d.ts +8 -0
  35. package/dist/analyzers/core/index.d.ts.map +1 -0
  36. package/dist/analyzers/core/index.js +24 -0
  37. package/dist/analyzers/core/index.js.map +1 -0
  38. package/dist/analyzers/core/scanner/fileScanner.d.ts +31 -0
  39. package/dist/analyzers/core/scanner/fileScanner.d.ts.map +1 -0
  40. package/dist/analyzers/core/scanner/fileScanner.js +199 -0
  41. package/dist/analyzers/core/scanner/fileScanner.js.map +1 -0
  42. package/dist/analyzers/core/scanner/index.d.ts +5 -0
  43. package/dist/analyzers/core/scanner/index.d.ts.map +1 -0
  44. package/dist/analyzers/core/scanner/index.js +21 -0
  45. package/dist/analyzers/core/scanner/index.js.map +1 -0
  46. package/dist/analyzers/core/scoring/index.d.ts +5 -0
  47. package/dist/analyzers/core/scoring/index.d.ts.map +1 -0
  48. package/dist/analyzers/core/scoring/index.js +21 -0
  49. package/dist/analyzers/core/scoring/index.js.map +1 -0
  50. package/dist/analyzers/core/scoring/riskScoring.d.ts +49 -0
  51. package/dist/analyzers/core/scoring/riskScoring.d.ts.map +1 -0
  52. package/dist/analyzers/core/scoring/riskScoring.js +180 -0
  53. package/dist/analyzers/core/scoring/riskScoring.js.map +1 -0
  54. package/dist/analyzers/core/securityScanner.d.ts +47 -0
  55. package/dist/analyzers/core/securityScanner.d.ts.map +1 -0
  56. package/dist/analyzers/core/securityScanner.js +298 -0
  57. package/dist/analyzers/core/securityScanner.js.map +1 -0
  58. package/dist/analyzers/csharp/csharpAnalyzer.d.ts +64 -0
  59. package/dist/analyzers/csharp/csharpAnalyzer.d.ts.map +1 -0
  60. package/dist/analyzers/csharp/csharpAnalyzer.js +232 -0
  61. package/dist/analyzers/csharp/csharpAnalyzer.js.map +1 -0
  62. package/dist/analyzers/csharp/index.d.ts +5 -0
  63. package/dist/analyzers/csharp/index.d.ts.map +1 -0
  64. package/dist/analyzers/csharp/index.js +21 -0
  65. package/dist/analyzers/csharp/index.js.map +1 -0
  66. package/dist/analyzers/iac/iacAnalyzer.d.ts +36 -0
  67. package/dist/analyzers/iac/iacAnalyzer.d.ts.map +1 -0
  68. package/dist/analyzers/iac/iacAnalyzer.js +182 -0
  69. package/dist/analyzers/iac/iacAnalyzer.js.map +1 -0
  70. package/dist/analyzers/iac/index.d.ts +5 -0
  71. package/dist/analyzers/iac/index.d.ts.map +1 -0
  72. package/dist/analyzers/iac/index.js +21 -0
  73. package/dist/analyzers/iac/index.js.map +1 -0
  74. package/dist/analyzers/index.d.ts +30 -0
  75. package/dist/analyzers/index.d.ts.map +1 -0
  76. package/dist/analyzers/index.js +80 -0
  77. package/dist/analyzers/index.js.map +1 -0
  78. package/dist/analyzers/java/index.d.ts +5 -0
  79. package/dist/analyzers/java/index.d.ts.map +1 -0
  80. package/dist/analyzers/java/index.js +21 -0
  81. package/dist/analyzers/java/index.js.map +1 -0
  82. package/dist/analyzers/java/javaAnalyzer.d.ts +64 -0
  83. package/dist/analyzers/java/javaAnalyzer.d.ts.map +1 -0
  84. package/dist/analyzers/java/javaAnalyzer.js +224 -0
  85. package/dist/analyzers/java/javaAnalyzer.js.map +1 -0
  86. package/dist/analyzers/javascript/astUtils.d.ts +170 -0
  87. package/dist/analyzers/javascript/astUtils.d.ts.map +1 -0
  88. package/dist/analyzers/javascript/astUtils.js +700 -0
  89. package/dist/analyzers/javascript/astUtils.js.map +1 -0
  90. package/dist/analyzers/javascript/index.d.ts +18 -0
  91. package/dist/analyzers/javascript/index.d.ts.map +1 -0
  92. package/dist/analyzers/javascript/index.js +50 -0
  93. package/dist/analyzers/javascript/index.js.map +1 -0
  94. package/dist/analyzers/javascript/javascriptAnalyzer.d.ts +111 -0
  95. package/dist/analyzers/javascript/javascriptAnalyzer.d.ts.map +1 -0
  96. package/dist/analyzers/javascript/javascriptAnalyzer.js +860 -0
  97. package/dist/analyzers/javascript/javascriptAnalyzer.js.map +1 -0
  98. package/dist/analyzers/javascript/malwareDetector.d.ts +102 -0
  99. package/dist/analyzers/javascript/malwareDetector.d.ts.map +1 -0
  100. package/dist/analyzers/javascript/malwareDetector.js +616 -0
  101. package/dist/analyzers/javascript/malwareDetector.js.map +1 -0
  102. package/dist/analyzers/javascript/packageJsonAnalyzer.d.ts +87 -0
  103. package/dist/analyzers/javascript/packageJsonAnalyzer.d.ts.map +1 -0
  104. package/dist/analyzers/javascript/packageJsonAnalyzer.js +553 -0
  105. package/dist/analyzers/javascript/packageJsonAnalyzer.js.map +1 -0
  106. package/dist/analyzers/javascript/taintAnalyzer.d.ts +120 -0
  107. package/dist/analyzers/javascript/taintAnalyzer.d.ts.map +1 -0
  108. package/dist/analyzers/javascript/taintAnalyzer.js +526 -0
  109. package/dist/analyzers/javascript/taintAnalyzer.js.map +1 -0
  110. package/dist/analyzers/php/index.d.ts +5 -0
  111. package/dist/analyzers/php/index.d.ts.map +1 -0
  112. package/dist/analyzers/php/index.js +21 -0
  113. package/dist/analyzers/php/index.js.map +1 -0
  114. package/dist/analyzers/php/phpAnalyzer.d.ts +56 -0
  115. package/dist/analyzers/php/phpAnalyzer.d.ts.map +1 -0
  116. package/dist/analyzers/php/phpAnalyzer.js +202 -0
  117. package/dist/analyzers/php/phpAnalyzer.js.map +1 -0
  118. package/dist/analyzers/python/index.d.ts +5 -0
  119. package/dist/analyzers/python/index.d.ts.map +1 -0
  120. package/dist/analyzers/python/index.js +21 -0
  121. package/dist/analyzers/python/index.js.map +1 -0
  122. package/dist/analyzers/python/pythonAnalyzer.d.ts +64 -0
  123. package/dist/analyzers/python/pythonAnalyzer.d.ts.map +1 -0
  124. package/dist/analyzers/python/pythonAnalyzer.js +226 -0
  125. package/dist/analyzers/python/pythonAnalyzer.js.map +1 -0
  126. package/dist/cli/index.d.ts +7 -0
  127. package/dist/cli/index.d.ts.map +1 -0
  128. package/dist/cli/index.js +281 -0
  129. package/dist/cli/index.js.map +1 -0
  130. package/dist/core/engine/index.d.ts +5 -0
  131. package/dist/core/engine/index.d.ts.map +1 -0
  132. package/dist/core/engine/index.js +21 -0
  133. package/dist/core/engine/index.js.map +1 -0
  134. package/dist/core/engine/ruleEngine.d.ts +46 -0
  135. package/dist/core/engine/ruleEngine.d.ts.map +1 -0
  136. package/dist/core/engine/ruleEngine.js +173 -0
  137. package/dist/core/engine/ruleEngine.js.map +1 -0
  138. package/dist/core/index.d.ts +8 -0
  139. package/dist/core/index.d.ts.map +1 -0
  140. package/dist/core/index.js +24 -0
  141. package/dist/core/index.js.map +1 -0
  142. package/dist/core/scanner/fileScanner.d.ts +31 -0
  143. package/dist/core/scanner/fileScanner.d.ts.map +1 -0
  144. package/dist/core/scanner/fileScanner.js +199 -0
  145. package/dist/core/scanner/fileScanner.js.map +1 -0
  146. package/dist/core/scanner/index.d.ts +5 -0
  147. package/dist/core/scanner/index.d.ts.map +1 -0
  148. package/dist/core/scanner/index.js +21 -0
  149. package/dist/core/scanner/index.js.map +1 -0
  150. package/dist/core/scoring/index.d.ts +5 -0
  151. package/dist/core/scoring/index.d.ts.map +1 -0
  152. package/dist/core/scoring/index.js +21 -0
  153. package/dist/core/scoring/index.js.map +1 -0
  154. package/dist/core/scoring/riskScoring.d.ts +49 -0
  155. package/dist/core/scoring/riskScoring.d.ts.map +1 -0
  156. package/dist/core/scoring/riskScoring.js +180 -0
  157. package/dist/core/scoring/riskScoring.js.map +1 -0
  158. package/dist/core/securityScanner.d.ts +47 -0
  159. package/dist/core/securityScanner.d.ts.map +1 -0
  160. package/dist/core/securityScanner.js +298 -0
  161. package/dist/core/securityScanner.js.map +1 -0
  162. package/dist/dependencies/aiDependencyAnalyzer.d.ts +96 -0
  163. package/dist/dependencies/aiDependencyAnalyzer.d.ts.map +1 -0
  164. package/dist/dependencies/aiDependencyAnalyzer.js +435 -0
  165. package/dist/dependencies/aiDependencyAnalyzer.js.map +1 -0
  166. package/dist/dependencies/database/cveDatabase.d.ts +32 -0
  167. package/dist/dependencies/database/cveDatabase.d.ts.map +1 -0
  168. package/dist/dependencies/database/cveDatabase.js +393 -0
  169. package/dist/dependencies/database/cveDatabase.js.map +1 -0
  170. package/dist/dependencies/database/index.d.ts +6 -0
  171. package/dist/dependencies/database/index.d.ts.map +1 -0
  172. package/dist/dependencies/database/index.js +22 -0
  173. package/dist/dependencies/database/index.js.map +1 -0
  174. package/dist/dependencies/database/maliciousPackages.d.ts +43 -0
  175. package/dist/dependencies/database/maliciousPackages.d.ts.map +1 -0
  176. package/dist/dependencies/database/maliciousPackages.js +279 -0
  177. package/dist/dependencies/database/maliciousPackages.js.map +1 -0
  178. package/dist/dependencies/dependencyAnalyzer.d.ts +74 -0
  179. package/dist/dependencies/dependencyAnalyzer.d.ts.map +1 -0
  180. package/dist/dependencies/dependencyAnalyzer.js +349 -0
  181. package/dist/dependencies/dependencyAnalyzer.js.map +1 -0
  182. package/dist/dependencies/detectors/index.d.ts +7 -0
  183. package/dist/dependencies/detectors/index.d.ts.map +1 -0
  184. package/dist/dependencies/detectors/index.js +28 -0
  185. package/dist/dependencies/detectors/index.js.map +1 -0
  186. package/dist/dependencies/detectors/securityStandards.d.ts +15 -0
  187. package/dist/dependencies/detectors/securityStandards.d.ts.map +1 -0
  188. package/dist/dependencies/detectors/securityStandards.js +178 -0
  189. package/dist/dependencies/detectors/securityStandards.js.map +1 -0
  190. package/dist/dependencies/detectors/vulnerabilityDetector.d.ts +53 -0
  191. package/dist/dependencies/detectors/vulnerabilityDetector.d.ts.map +1 -0
  192. package/dist/dependencies/detectors/vulnerabilityDetector.js +289 -0
  193. package/dist/dependencies/detectors/vulnerabilityDetector.js.map +1 -0
  194. package/dist/dependencies/index.d.ts +14 -0
  195. package/dist/dependencies/index.d.ts.map +1 -0
  196. package/dist/dependencies/index.js +43 -0
  197. package/dist/dependencies/index.js.map +1 -0
  198. package/dist/dependencies/installed/index.d.ts +8 -0
  199. package/dist/dependencies/installed/index.d.ts.map +1 -0
  200. package/dist/dependencies/installed/index.js +24 -0
  201. package/dist/dependencies/installed/index.js.map +1 -0
  202. package/dist/dependencies/installed/installedScanner.d.ts +91 -0
  203. package/dist/dependencies/installed/installedScanner.d.ts.map +1 -0
  204. package/dist/dependencies/installed/installedScanner.js +766 -0
  205. package/dist/dependencies/installed/installedScanner.js.map +1 -0
  206. package/dist/dependencies/installed/malwarePatterns.d.ts +32 -0
  207. package/dist/dependencies/installed/malwarePatterns.d.ts.map +1 -0
  208. package/dist/dependencies/installed/malwarePatterns.js +480 -0
  209. package/dist/dependencies/installed/malwarePatterns.js.map +1 -0
  210. package/dist/dependencies/installed/types.d.ts +274 -0
  211. package/dist/dependencies/installed/types.d.ts.map +1 -0
  212. package/dist/dependencies/installed/types.js +7 -0
  213. package/dist/dependencies/installed/types.js.map +1 -0
  214. package/dist/dependencies/parsers/base/baseParser.d.ts +44 -0
  215. package/dist/dependencies/parsers/base/baseParser.d.ts.map +1 -0
  216. package/dist/dependencies/parsers/base/baseParser.js +80 -0
  217. package/dist/dependencies/parsers/base/baseParser.js.map +1 -0
  218. package/dist/dependencies/parsers/base/index.d.ts +6 -0
  219. package/dist/dependencies/parsers/base/index.d.ts.map +1 -0
  220. package/dist/dependencies/parsers/base/index.js +27 -0
  221. package/dist/dependencies/parsers/base/index.js.map +1 -0
  222. package/dist/dependencies/parsers/cpp/cppParser.d.ts +36 -0
  223. package/dist/dependencies/parsers/cpp/cppParser.d.ts.map +1 -0
  224. package/dist/dependencies/parsers/cpp/cppParser.js +196 -0
  225. package/dist/dependencies/parsers/cpp/cppParser.js.map +1 -0
  226. package/dist/dependencies/parsers/cpp/index.d.ts +6 -0
  227. package/dist/dependencies/parsers/cpp/index.d.ts.map +1 -0
  228. package/dist/dependencies/parsers/cpp/index.js +27 -0
  229. package/dist/dependencies/parsers/cpp/index.js.map +1 -0
  230. package/dist/dependencies/parsers/csharp/csharpParser.d.ts +32 -0
  231. package/dist/dependencies/parsers/csharp/csharpParser.d.ts.map +1 -0
  232. package/dist/dependencies/parsers/csharp/csharpParser.js +125 -0
  233. package/dist/dependencies/parsers/csharp/csharpParser.js.map +1 -0
  234. package/dist/dependencies/parsers/csharp/index.d.ts +6 -0
  235. package/dist/dependencies/parsers/csharp/index.d.ts.map +1 -0
  236. package/dist/dependencies/parsers/csharp/index.js +27 -0
  237. package/dist/dependencies/parsers/csharp/index.js.map +1 -0
  238. package/dist/dependencies/parsers/index.d.ts +24 -0
  239. package/dist/dependencies/parsers/index.d.ts.map +1 -0
  240. package/dist/dependencies/parsers/index.js +69 -0
  241. package/dist/dependencies/parsers/index.js.map +1 -0
  242. package/dist/dependencies/parsers/java/index.d.ts +6 -0
  243. package/dist/dependencies/parsers/java/index.d.ts.map +1 -0
  244. package/dist/dependencies/parsers/java/index.js +27 -0
  245. package/dist/dependencies/parsers/java/index.js.map +1 -0
  246. package/dist/dependencies/parsers/java/javaParser.d.ts +32 -0
  247. package/dist/dependencies/parsers/java/javaParser.d.ts.map +1 -0
  248. package/dist/dependencies/parsers/java/javaParser.js +168 -0
  249. package/dist/dependencies/parsers/java/javaParser.js.map +1 -0
  250. package/dist/dependencies/parsers/javascript/index.d.ts +6 -0
  251. package/dist/dependencies/parsers/javascript/index.d.ts.map +1 -0
  252. package/dist/dependencies/parsers/javascript/index.js +27 -0
  253. package/dist/dependencies/parsers/javascript/index.js.map +1 -0
  254. package/dist/dependencies/parsers/javascript/javascriptParser.d.ts +55 -0
  255. package/dist/dependencies/parsers/javascript/javascriptParser.d.ts.map +1 -0
  256. package/dist/dependencies/parsers/javascript/javascriptParser.js +266 -0
  257. package/dist/dependencies/parsers/javascript/javascriptParser.js.map +1 -0
  258. package/dist/dependencies/parsers/php/index.d.ts +6 -0
  259. package/dist/dependencies/parsers/php/index.d.ts.map +1 -0
  260. package/dist/dependencies/parsers/php/index.js +27 -0
  261. package/dist/dependencies/parsers/php/index.js.map +1 -0
  262. package/dist/dependencies/parsers/php/phpParser.d.ts +35 -0
  263. package/dist/dependencies/parsers/php/phpParser.d.ts.map +1 -0
  264. package/dist/dependencies/parsers/php/phpParser.js +162 -0
  265. package/dist/dependencies/parsers/php/phpParser.js.map +1 -0
  266. package/dist/dependencies/parsers/python/index.d.ts +6 -0
  267. package/dist/dependencies/parsers/python/index.d.ts.map +1 -0
  268. package/dist/dependencies/parsers/python/index.js +27 -0
  269. package/dist/dependencies/parsers/python/index.js.map +1 -0
  270. package/dist/dependencies/parsers/python/pythonParser.d.ts +60 -0
  271. package/dist/dependencies/parsers/python/pythonParser.d.ts.map +1 -0
  272. package/dist/dependencies/parsers/python/pythonParser.js +336 -0
  273. package/dist/dependencies/parsers/python/pythonParser.js.map +1 -0
  274. package/dist/dependencies/types.d.ts +280 -0
  275. package/dist/dependencies/types.d.ts.map +1 -0
  276. package/dist/dependencies/types.js +59 -0
  277. package/dist/dependencies/types.js.map +1 -0
  278. package/dist/i18n/index.d.ts +2 -0
  279. package/dist/i18n/index.d.ts.map +1 -0
  280. package/dist/i18n/index.js +18 -0
  281. package/dist/i18n/index.js.map +1 -0
  282. package/dist/i18n/translations.d.ts +55 -0
  283. package/dist/i18n/translations.d.ts.map +1 -0
  284. package/dist/i18n/translations.js +119 -0
  285. package/dist/i18n/translations.js.map +1 -0
  286. package/dist/index.d.ts +14 -0
  287. package/dist/index.d.ts.map +1 -0
  288. package/dist/index.js +36 -0
  289. package/dist/index.js.map +1 -0
  290. package/dist/reports/dependencyReportGenerator.d.ts +20 -0
  291. package/dist/reports/dependencyReportGenerator.d.ts.map +1 -0
  292. package/dist/reports/dependencyReportGenerator.js +690 -0
  293. package/dist/reports/dependencyReportGenerator.js.map +1 -0
  294. package/dist/reports/htmlReportGenerator.d.ts +43 -0
  295. package/dist/reports/htmlReportGenerator.d.ts.map +1 -0
  296. package/dist/reports/htmlReportGenerator.js +793 -0
  297. package/dist/reports/htmlReportGenerator.js.map +1 -0
  298. package/dist/reports/index.d.ts +7 -0
  299. package/dist/reports/index.d.ts.map +1 -0
  300. package/dist/reports/index.js +23 -0
  301. package/dist/reports/index.js.map +1 -0
  302. package/dist/reports/installedDepsReportGenerator.d.ts +14 -0
  303. package/dist/reports/installedDepsReportGenerator.d.ts.map +1 -0
  304. package/dist/reports/installedDepsReportGenerator.js +872 -0
  305. package/dist/reports/installedDepsReportGenerator.js.map +1 -0
  306. package/dist/rules/index.d.ts +31 -0
  307. package/dist/rules/index.d.ts.map +1 -0
  308. package/dist/rules/index.js +95 -0
  309. package/dist/rules/index.js.map +1 -0
  310. package/dist/rules/malware/categories/backdoors.d.ts +12 -0
  311. package/dist/rules/malware/categories/backdoors.d.ts.map +1 -0
  312. package/dist/rules/malware/categories/backdoors.js +163 -0
  313. package/dist/rules/malware/categories/backdoors.js.map +1 -0
  314. package/dist/rules/malware/categories/cryptominers.d.ts +13 -0
  315. package/dist/rules/malware/categories/cryptominers.d.ts.map +1 -0
  316. package/dist/rules/malware/categories/cryptominers.js +415 -0
  317. package/dist/rules/malware/categories/cryptominers.js.map +1 -0
  318. package/dist/rules/malware/categories/exfiltration.d.ts +20 -0
  319. package/dist/rules/malware/categories/exfiltration.d.ts.map +1 -0
  320. package/dist/rules/malware/categories/exfiltration.js +658 -0
  321. package/dist/rules/malware/categories/exfiltration.js.map +1 -0
  322. package/dist/rules/malware/categories/keyloggers.d.ts +19 -0
  323. package/dist/rules/malware/categories/keyloggers.d.ts.map +1 -0
  324. package/dist/rules/malware/categories/keyloggers.js +763 -0
  325. package/dist/rules/malware/categories/keyloggers.js.map +1 -0
  326. package/dist/rules/malware/categories/loaders.d.ts +20 -0
  327. package/dist/rules/malware/categories/loaders.d.ts.map +1 -0
  328. package/dist/rules/malware/categories/loaders.js +702 -0
  329. package/dist/rules/malware/categories/loaders.js.map +1 -0
  330. package/dist/rules/malware/categories/network.d.ts +19 -0
  331. package/dist/rules/malware/categories/network.d.ts.map +1 -0
  332. package/dist/rules/malware/categories/network.js +622 -0
  333. package/dist/rules/malware/categories/network.js.map +1 -0
  334. package/dist/rules/malware/categories/obfuscation.d.ts +22 -0
  335. package/dist/rules/malware/categories/obfuscation.d.ts.map +1 -0
  336. package/dist/rules/malware/categories/obfuscation.js +766 -0
  337. package/dist/rules/malware/categories/obfuscation.js.map +1 -0
  338. package/dist/rules/malware/constants/index.d.ts +281 -0
  339. package/dist/rules/malware/constants/index.d.ts.map +1 -0
  340. package/dist/rules/malware/constants/index.js +327 -0
  341. package/dist/rules/malware/constants/index.js.map +1 -0
  342. package/dist/rules/malware/engine/index.d.ts +178 -0
  343. package/dist/rules/malware/engine/index.d.ts.map +1 -0
  344. package/dist/rules/malware/engine/index.js +552 -0
  345. package/dist/rules/malware/engine/index.js.map +1 -0
  346. package/dist/rules/malware/index.d.ts +205 -0
  347. package/dist/rules/malware/index.d.ts.map +1 -0
  348. package/dist/rules/malware/index.js +837 -0
  349. package/dist/rules/malware/index.js.map +1 -0
  350. package/dist/rules/malware/scoring/index.d.ts +84 -0
  351. package/dist/rules/malware/scoring/index.d.ts.map +1 -0
  352. package/dist/rules/malware/scoring/index.js +441 -0
  353. package/dist/rules/malware/scoring/index.js.map +1 -0
  354. package/dist/rules/malware/types/index.d.ts +616 -0
  355. package/dist/rules/malware/types/index.d.ts.map +1 -0
  356. package/dist/rules/malware/types/index.js +155 -0
  357. package/dist/rules/malware/types/index.js.map +1 -0
  358. package/dist/rules/malware/utils/index.d.ts +117 -0
  359. package/dist/rules/malware/utils/index.d.ts.map +1 -0
  360. package/dist/rules/malware/utils/index.js +514 -0
  361. package/dist/rules/malware/utils/index.js.map +1 -0
  362. package/dist/rules/standards.d.ts +26 -0
  363. package/dist/rules/standards.d.ts.map +1 -0
  364. package/dist/rules/standards.js +352 -0
  365. package/dist/rules/standards.js.map +1 -0
  366. package/dist/rules/vulnerabilities/constants/index.d.ts +835 -0
  367. package/dist/rules/vulnerabilities/constants/index.d.ts.map +1 -0
  368. package/dist/rules/vulnerabilities/constants/index.js +544 -0
  369. package/dist/rules/vulnerabilities/constants/index.js.map +1 -0
  370. package/dist/rules/vulnerabilities/engine/index.d.ts +145 -0
  371. package/dist/rules/vulnerabilities/engine/index.d.ts.map +1 -0
  372. package/dist/rules/vulnerabilities/engine/index.js +581 -0
  373. package/dist/rules/vulnerabilities/engine/index.js.map +1 -0
  374. package/dist/rules/vulnerabilities/index.d.ts +148 -0
  375. package/dist/rules/vulnerabilities/index.d.ts.map +1 -0
  376. package/dist/rules/vulnerabilities/index.js +252 -0
  377. package/dist/rules/vulnerabilities/index.js.map +1 -0
  378. package/dist/rules/vulnerabilities/rules/authentication.d.ts +8 -0
  379. package/dist/rules/vulnerabilities/rules/authentication.d.ts.map +1 -0
  380. package/dist/rules/vulnerabilities/rules/authentication.js +419 -0
  381. package/dist/rules/vulnerabilities/rules/authentication.js.map +1 -0
  382. package/dist/rules/vulnerabilities/rules/commandInjection.d.ts +8 -0
  383. package/dist/rules/vulnerabilities/rules/commandInjection.d.ts.map +1 -0
  384. package/dist/rules/vulnerabilities/rules/commandInjection.js +300 -0
  385. package/dist/rules/vulnerabilities/rules/commandInjection.js.map +1 -0
  386. package/dist/rules/vulnerabilities/rules/csrf.d.ts +8 -0
  387. package/dist/rules/vulnerabilities/rules/csrf.d.ts.map +1 -0
  388. package/dist/rules/vulnerabilities/rules/csrf.js +261 -0
  389. package/dist/rules/vulnerabilities/rules/csrf.js.map +1 -0
  390. package/dist/rules/vulnerabilities/rules/deserialization.d.ts +8 -0
  391. package/dist/rules/vulnerabilities/rules/deserialization.d.ts.map +1 -0
  392. package/dist/rules/vulnerabilities/rules/deserialization.js +336 -0
  393. package/dist/rules/vulnerabilities/rules/deserialization.js.map +1 -0
  394. package/dist/rules/vulnerabilities/rules/fileUpload.d.ts +8 -0
  395. package/dist/rules/vulnerabilities/rules/fileUpload.d.ts.map +1 -0
  396. package/dist/rules/vulnerabilities/rules/fileUpload.js +325 -0
  397. package/dist/rules/vulnerabilities/rules/fileUpload.js.map +1 -0
  398. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.d.ts +8 -0
  399. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.d.ts.map +1 -0
  400. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.js +446 -0
  401. package/dist/rules/vulnerabilities/rules/hardcodedSecrets.js.map +1 -0
  402. package/dist/rules/vulnerabilities/rules/index.d.ts +17 -0
  403. package/dist/rules/vulnerabilities/rules/index.d.ts.map +1 -0
  404. package/dist/rules/vulnerabilities/rules/index.js +47 -0
  405. package/dist/rules/vulnerabilities/rules/index.js.map +1 -0
  406. package/dist/rules/vulnerabilities/rules/pathTraversal.d.ts +8 -0
  407. package/dist/rules/vulnerabilities/rules/pathTraversal.d.ts.map +1 -0
  408. package/dist/rules/vulnerabilities/rules/pathTraversal.js +351 -0
  409. package/dist/rules/vulnerabilities/rules/pathTraversal.js.map +1 -0
  410. package/dist/rules/vulnerabilities/rules/prototypePollution.d.ts +8 -0
  411. package/dist/rules/vulnerabilities/rules/prototypePollution.d.ts.map +1 -0
  412. package/dist/rules/vulnerabilities/rules/prototypePollution.js +272 -0
  413. package/dist/rules/vulnerabilities/rules/prototypePollution.js.map +1 -0
  414. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.d.ts +8 -0
  415. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.d.ts.map +1 -0
  416. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.js +438 -0
  417. package/dist/rules/vulnerabilities/rules/securityMisconfiguration.js.map +1 -0
  418. package/dist/rules/vulnerabilities/rules/sqlInjection.d.ts +12 -0
  419. package/dist/rules/vulnerabilities/rules/sqlInjection.d.ts.map +1 -0
  420. package/dist/rules/vulnerabilities/rules/sqlInjection.js +636 -0
  421. package/dist/rules/vulnerabilities/rules/sqlInjection.js.map +1 -0
  422. package/dist/rules/vulnerabilities/rules/ssrf.d.ts +8 -0
  423. package/dist/rules/vulnerabilities/rules/ssrf.d.ts.map +1 -0
  424. package/dist/rules/vulnerabilities/rules/ssrf.js +401 -0
  425. package/dist/rules/vulnerabilities/rules/ssrf.js.map +1 -0
  426. package/dist/rules/vulnerabilities/rules/xss.d.ts +11 -0
  427. package/dist/rules/vulnerabilities/rules/xss.d.ts.map +1 -0
  428. package/dist/rules/vulnerabilities/rules/xss.js +724 -0
  429. package/dist/rules/vulnerabilities/rules/xss.js.map +1 -0
  430. package/dist/rules/vulnerabilities/scoring/index.d.ts +80 -0
  431. package/dist/rules/vulnerabilities/scoring/index.d.ts.map +1 -0
  432. package/dist/rules/vulnerabilities/scoring/index.js +414 -0
  433. package/dist/rules/vulnerabilities/scoring/index.js.map +1 -0
  434. package/dist/rules/vulnerabilities/types/index.d.ts +830 -0
  435. package/dist/rules/vulnerabilities/types/index.d.ts.map +1 -0
  436. package/dist/rules/vulnerabilities/types/index.js +164 -0
  437. package/dist/rules/vulnerabilities/types/index.js.map +1 -0
  438. package/dist/rules/vulnerabilities/utils/index.d.ts +206 -0
  439. package/dist/rules/vulnerabilities/utils/index.d.ts.map +1 -0
  440. package/dist/rules/vulnerabilities/utils/index.js +615 -0
  441. package/dist/rules/vulnerabilities/utils/index.js.map +1 -0
  442. package/dist/types/index.d.ts +359 -0
  443. package/dist/types/index.d.ts.map +1 -0
  444. package/dist/types/index.js +61 -0
  445. package/dist/types/index.js.map +1 -0
  446. package/dist/utils/index.d.ts +82 -0
  447. package/dist/utils/index.d.ts.map +1 -0
  448. package/dist/utils/index.js +326 -0
  449. package/dist/utils/index.js.map +1 -0
  450. package/dist/utils/logger.d.ts +40 -0
  451. package/dist/utils/logger.d.ts.map +1 -0
  452. package/dist/utils/logger.js +139 -0
  453. package/dist/utils/logger.js.map +1 -0
  454. package/docs/ARCHITECTURE.md +320 -0
  455. package/docs/V1.2.1-IA_Performances.md +116 -0
  456. package/docs/images/WIN_Defender.png +0 -0
  457. package/package.json +68 -0
  458. package/secure-scan.config.json +134 -0
  459. package/secure-scan.sln +29 -0
  460. package/src/ai/aiAnalyzer.ts +714 -0
  461. package/src/ai/index.ts +5 -0
  462. package/src/analyzers/base/baseAnalyzer.ts +66 -0
  463. package/src/analyzers/base/index.ts +5 -0
  464. package/src/analyzers/c-cpp/cppAnalyzer.ts +308 -0
  465. package/src/analyzers/c-cpp/index.ts +5 -0
  466. package/src/analyzers/core/engine/index.ts +5 -0
  467. package/src/analyzers/core/engine/ruleEngine.ts +221 -0
  468. package/src/analyzers/core/index.ts +8 -0
  469. package/src/analyzers/core/scanner/fileScanner.ts +204 -0
  470. package/src/analyzers/core/scanner/index.ts +5 -0
  471. package/src/analyzers/core/scoring/index.ts +5 -0
  472. package/src/analyzers/core/scoring/riskScoring.ts +198 -0
  473. package/src/analyzers/core/securityScanner.ts +321 -0
  474. package/src/analyzers/csharp/csharpAnalyzer.ts +328 -0
  475. package/src/analyzers/csharp/index.ts +5 -0
  476. package/src/analyzers/iac/iacAnalyzer.ts +318 -0
  477. package/src/analyzers/iac/index.ts +5 -0
  478. package/src/analyzers/index.ts +67 -0
  479. package/src/analyzers/java/index.ts +5 -0
  480. package/src/analyzers/java/javaAnalyzer.ts +320 -0
  481. package/src/analyzers/javascript/PROMPT_JS_ANALYZER.md +267 -0
  482. package/src/analyzers/javascript/astUtils.ts +789 -0
  483. package/src/analyzers/javascript/index.ts +50 -0
  484. package/src/analyzers/javascript/javascriptAnalyzer.ts +984 -0
  485. package/src/analyzers/javascript/malwareDetector.ts +697 -0
  486. package/src/analyzers/javascript/packageJsonAnalyzer.ts +626 -0
  487. package/src/analyzers/javascript/taintAnalyzer.ts +630 -0
  488. package/src/analyzers/php/index.ts +5 -0
  489. package/src/analyzers/php/phpAnalyzer.ts +280 -0
  490. package/src/analyzers/python/index.ts +5 -0
  491. package/src/analyzers/python/pythonAnalyzer.ts +319 -0
  492. package/src/cli/index.ts +276 -0
  493. package/src/dependencies/aiDependencyAnalyzer.ts +496 -0
  494. package/src/dependencies/database/cveDatabase.ts +426 -0
  495. package/src/dependencies/database/index.ts +6 -0
  496. package/src/dependencies/database/maliciousPackages.ts +286 -0
  497. package/src/dependencies/dependencyAnalyzer.ts +394 -0
  498. package/src/dependencies/detectors/index.ts +7 -0
  499. package/src/dependencies/detectors/securityStandards.ts +200 -0
  500. package/src/dependencies/detectors/vulnerabilityDetector.ts +343 -0
  501. package/src/dependencies/index.ts +27 -0
  502. package/src/dependencies/installed/index.ts +8 -0
  503. package/src/dependencies/installed/installedScanner.ts +821 -0
  504. package/src/dependencies/installed/malwarePatterns.ts +492 -0
  505. package/src/dependencies/installed/types.ts +287 -0
  506. package/src/dependencies/parsers/base/baseParser.ts +108 -0
  507. package/src/dependencies/parsers/base/index.ts +6 -0
  508. package/src/dependencies/parsers/cpp/cppParser.ts +245 -0
  509. package/src/dependencies/parsers/cpp/index.ts +6 -0
  510. package/src/dependencies/parsers/csharp/csharpParser.ts +151 -0
  511. package/src/dependencies/parsers/csharp/index.ts +6 -0
  512. package/src/dependencies/parsers/index.ts +56 -0
  513. package/src/dependencies/parsers/java/index.ts +6 -0
  514. package/src/dependencies/parsers/java/javaParser.ts +203 -0
  515. package/src/dependencies/parsers/javascript/index.ts +6 -0
  516. package/src/dependencies/parsers/javascript/javascriptParser.ts +362 -0
  517. package/src/dependencies/parsers/php/index.ts +6 -0
  518. package/src/dependencies/parsers/php/phpParser.ts +208 -0
  519. package/src/dependencies/parsers/python/index.ts +6 -0
  520. package/src/dependencies/parsers/python/pythonParser.ts +437 -0
  521. package/src/dependencies/types.ts +330 -0
  522. package/src/i18n/index.ts +1 -0
  523. package/src/i18n/translations.ts +194 -0
  524. package/src/index.ts +16 -0
  525. package/src/reports/dependencyReportGenerator.ts +717 -0
  526. package/src/reports/htmlReportGenerator.ts +781 -0
  527. package/src/reports/index.ts +7 -0
  528. package/src/reports/installedDepsReportGenerator.ts +899 -0
  529. package/src/rules/index.ts +58 -0
  530. package/src/rules/malware/INFO.md +287 -0
  531. package/src/rules/malware/categories/backdoors.ts +174 -0
  532. package/src/rules/malware/categories/cryptominers.ts +434 -0
  533. package/src/rules/malware/categories/exfiltration.ts +677 -0
  534. package/src/rules/malware/categories/keyloggers.ts +780 -0
  535. package/src/rules/malware/categories/loaders.ts +721 -0
  536. package/src/rules/malware/categories/network.ts +639 -0
  537. package/src/rules/malware/categories/obfuscation.ts +788 -0
  538. package/src/rules/malware/constants/index.ts +358 -0
  539. package/src/rules/malware/engine/index.ts +758 -0
  540. package/src/rules/malware/index.ts +928 -0
  541. package/src/rules/malware/scoring/index.ts +549 -0
  542. package/src/rules/malware/types/index.ts +752 -0
  543. package/src/rules/malware/utils/index.ts +643 -0
  544. package/src/rules/standards.ts +372 -0
  545. package/src/rules/vulnerabilities/PROMPT_VULNERABILITIES.md +226 -0
  546. package/src/rules/vulnerabilities/constants/index.ts +625 -0
  547. package/src/rules/vulnerabilities/engine/index.ts +831 -0
  548. package/src/rules/vulnerabilities/index.ts +312 -0
  549. package/src/rules/vulnerabilities/rules/authentication.ts +426 -0
  550. package/src/rules/vulnerabilities/rules/commandInjection.ts +307 -0
  551. package/src/rules/vulnerabilities/rules/csrf.ts +268 -0
  552. package/src/rules/vulnerabilities/rules/deserialization.ts +343 -0
  553. package/src/rules/vulnerabilities/rules/fileUpload.ts +332 -0
  554. package/src/rules/vulnerabilities/rules/hardcodedSecrets.ts +453 -0
  555. package/src/rules/vulnerabilities/rules/index.ts +17 -0
  556. package/src/rules/vulnerabilities/rules/pathTraversal.ts +358 -0
  557. package/src/rules/vulnerabilities/rules/prototypePollution.ts +279 -0
  558. package/src/rules/vulnerabilities/rules/securityMisconfiguration.ts +445 -0
  559. package/src/rules/vulnerabilities/rules/sqlInjection.ts +669 -0
  560. package/src/rules/vulnerabilities/rules/ssrf.ts +408 -0
  561. package/src/rules/vulnerabilities/rules/xss.ts +753 -0
  562. package/src/rules/vulnerabilities/scoring/index.ts +543 -0
  563. package/src/rules/vulnerabilities/types/index.ts +1004 -0
  564. package/src/rules/vulnerabilities/utils/index.ts +709 -0
  565. package/src/types/index.ts +391 -0
  566. package/src/utils/index.ts +306 -0
  567. package/src/utils/logger.ts +150 -0
  568. package/test-installed-scanner.ts +136 -0
  569. package/tsconfig.json +30 -0
@@ -0,0 +1,724 @@
1
+ "use strict";
2
+ /**
3
+ * @fileoverview Cross-Site Scripting (XSS) Detection Rules
4
+ * @module rules/vulnerabilities/rules/xss
5
+ *
6
+ * Comprehensive XSS detection for DOM-based, Reflected, and Stored XSS.
7
+ * Covers multiple languages and frameworks.
8
+ */
9
+ Object.defineProperty(exports, "__esModule", { value: true });
10
+ exports.xssRules = void 0;
11
+ const types_1 = require("../types");
12
+ const constants_1 = require("../constants");
13
+ // ============================================================================
14
+ // TAINT DEFINITIONS FOR XSS
15
+ // ============================================================================
16
+ const xssSources = [
17
+ // DOM Sources
18
+ { id: 'dom-location', name: 'location', pattern: /(?:window\.)?location\.(?:search|hash|href|pathname)/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], category: 'user_input' },
19
+ { id: 'dom-referrer', name: 'document.referrer', pattern: /document\.referrer/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], category: 'user_input' },
20
+ { id: 'dom-url', name: 'document.URL', pattern: /document\.(?:URL|documentURI)/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], category: 'user_input' },
21
+ { id: 'dom-cookie', name: 'document.cookie', pattern: /document\.cookie/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], category: 'user_input' },
22
+ { id: 'dom-storage', name: 'localStorage/sessionStorage', pattern: /(?:local|session)Storage\.getItem\s*\(/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], category: 'user_input' },
23
+ // Server Sources
24
+ { id: 'js-req', name: 'req.body/query/params', pattern: /req\.(?:body|query|params)(?:\.\w+|\[\s*['"`]\w+['"`]\s*\])?/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], category: 'user_input' },
25
+ { id: 'php-superglobals', name: '$_GET/$_POST', pattern: /\$_(?:GET|POST|REQUEST)\s*\[\s*['"`][^'"`]+['"`]\s*\]/g, languages: [types_1.SupportedLanguage.PHP], category: 'user_input' },
26
+ { id: 'py-request', name: 'request.args/form', pattern: /request\.(?:args|form)\.get\s*\([^)]+\)/g, languages: [types_1.SupportedLanguage.PYTHON], category: 'user_input' },
27
+ { id: 'java-param', name: 'getParameter', pattern: /(?:request\.)?getParameter\s*\([^)]+\)/g, languages: [types_1.SupportedLanguage.JAVA], category: 'user_input' }
28
+ ];
29
+ const xssSinks = [
30
+ // DOM Sinks
31
+ { id: 'dom-innerhtml', name: 'innerHTML', pattern: /\.innerHTML\s*=(?!=)/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], vulnerabilityType: types_1.VulnerabilityType.XSS_DOM, dangerousArgs: [0] },
32
+ { id: 'dom-outerhtml', name: 'outerHTML', pattern: /\.outerHTML\s*=(?!=)/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], vulnerabilityType: types_1.VulnerabilityType.XSS_DOM },
33
+ { id: 'dom-write', name: 'document.write', pattern: /document\s*\.\s*write(?:ln)?\s*\(/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], vulnerabilityType: types_1.VulnerabilityType.XSS_DOM },
34
+ { id: 'dom-inserthtml', name: 'insertAdjacentHTML', pattern: /\.insertAdjacentHTML\s*\(/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], vulnerabilityType: types_1.VulnerabilityType.XSS_DOM },
35
+ // jQuery Sinks
36
+ { id: 'jquery-html', name: '$.html()', pattern: /\$\([^)]*\)\s*\.\s*html\s*\([^)]+\)/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], vulnerabilityType: types_1.VulnerabilityType.XSS_DOM },
37
+ { id: 'jquery-append', name: '$.append()', pattern: /\$\([^)]*\)\s*\.\s*(?:append|prepend|after|before)\s*\([^)]+\)/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], vulnerabilityType: types_1.VulnerabilityType.XSS_DOM },
38
+ // React Sinks
39
+ { id: 'react-dangerous', name: 'dangerouslySetInnerHTML', pattern: /dangerouslySetInnerHTML\s*=\s*\{/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], vulnerabilityType: types_1.VulnerabilityType.XSS_DOM },
40
+ // Angular Sinks
41
+ { id: 'angular-bypass', name: 'bypassSecurityTrust', pattern: /bypassSecurityTrust(?:Html|Script|Url|ResourceUrl|Style)\s*\(/g, languages: [types_1.SupportedLanguage.TYPESCRIPT], vulnerabilityType: types_1.VulnerabilityType.XSS_DOM },
42
+ // Vue Sinks
43
+ { id: 'vue-vhtml', name: 'v-html', pattern: /v-html\s*=\s*['"`]/g, languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT], vulnerabilityType: types_1.VulnerabilityType.XSS_DOM },
44
+ // Server-side template sinks
45
+ { id: 'php-echo', name: 'echo $_', pattern: /echo\s+\$_(?:GET|POST|REQUEST)/g, languages: [types_1.SupportedLanguage.PHP], vulnerabilityType: types_1.VulnerabilityType.XSS_REFLECTED },
46
+ { id: 'php-print', name: 'print $_', pattern: /print\s+\$_(?:GET|POST|REQUEST)/g, languages: [types_1.SupportedLanguage.PHP], vulnerabilityType: types_1.VulnerabilityType.XSS_REFLECTED }
47
+ ];
48
+ const xssSanitizers = [
49
+ { id: 'dompurify', name: 'DOMPurify', pattern: /DOMPurify\s*\.\s*sanitize\s*\(/g, protectsAgainst: [types_1.VulnerabilityType.XSS_DOM, types_1.VulnerabilityType.XSS_REFLECTED, types_1.VulnerabilityType.XSS_STORED], effectiveness: 98 },
50
+ { id: 'textcontent', name: 'textContent', pattern: /\.textContent\s*=/g, protectsAgainst: [types_1.VulnerabilityType.XSS_DOM], effectiveness: 100 },
51
+ { id: 'createtextnode', name: 'createTextNode', pattern: /createTextNode\s*\(/g, protectsAgainst: [types_1.VulnerabilityType.XSS_DOM], effectiveness: 100 },
52
+ { id: 'encodeuri', name: 'encodeURIComponent', pattern: /encodeURIComponent\s*\(/g, protectsAgainst: [types_1.VulnerabilityType.XSS_DOM, types_1.VulnerabilityType.XSS_REFLECTED], effectiveness: 90 },
53
+ { id: 'htmlspecialchars', name: 'htmlspecialchars', pattern: /htmlspecialchars\s*\(/g, languages: [types_1.SupportedLanguage.PHP], protectsAgainst: [types_1.VulnerabilityType.XSS_REFLECTED, types_1.VulnerabilityType.XSS_STORED], effectiveness: 95 },
54
+ { id: 'htmlentities', name: 'htmlentities', pattern: /htmlentities\s*\(/g, languages: [types_1.SupportedLanguage.PHP], protectsAgainst: [types_1.VulnerabilityType.XSS_REFLECTED, types_1.VulnerabilityType.XSS_STORED], effectiveness: 95 },
55
+ { id: 'strip-tags', name: 'strip_tags', pattern: /strip_tags\s*\(/g, languages: [types_1.SupportedLanguage.PHP], protectsAgainst: [types_1.VulnerabilityType.XSS_REFLECTED], effectiveness: 70 },
56
+ { id: 'bleach', name: 'bleach.clean', pattern: /bleach\s*\.\s*clean\s*\(/g, languages: [types_1.SupportedLanguage.PYTHON], protectsAgainst: [types_1.VulnerabilityType.XSS_REFLECTED, types_1.VulnerabilityType.XSS_STORED], effectiveness: 95 },
57
+ { id: 'escape', name: 'escape()', pattern: /\bescape\s*\(|markupsafe\.escape/g, protectsAgainst: [types_1.VulnerabilityType.XSS_REFLECTED, types_1.VulnerabilityType.XSS_STORED], effectiveness: 90 }
58
+ ];
59
+ // ============================================================================
60
+ // XSS RULES
61
+ // ============================================================================
62
+ exports.xssRules = [
63
+ // ==========================================================================
64
+ // DOM-based XSS Rules
65
+ // ==========================================================================
66
+ {
67
+ id: 'VUL-XSS-001',
68
+ name: 'DOM XSS - innerHTML with User Input',
69
+ description: 'Detects assignment of user-controlled data to innerHTML, which can execute arbitrary JavaScript.',
70
+ version: '1.0.0',
71
+ vulnerabilityType: types_1.VulnerabilityType.XSS_DOM,
72
+ category: types_1.VulnerabilityCategory.XSS,
73
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
74
+ severity: types_1.VulnerabilitySeverity.HIGH,
75
+ confidence: types_1.ConfidenceLevel.HIGH,
76
+ baseScore: 80,
77
+ patterns: [
78
+ {
79
+ type: types_1.PatternType.REGEX,
80
+ patternId: 'xss-innerhtml-location',
81
+ pattern: '\\.innerHTML\\s*=\\s*(?:.*location\\.|.*document\\.(?:URL|referrer|cookie))',
82
+ flags: 'gi',
83
+ weight: 1.0,
84
+ description: 'innerHTML with DOM-based source'
85
+ },
86
+ {
87
+ type: types_1.PatternType.REGEX,
88
+ patternId: 'xss-innerhtml-var',
89
+ pattern: '\\.innerHTML\\s*=\\s*[^;]*(?:\\+|`\\$\\{)',
90
+ flags: 'gi',
91
+ weight: 0.85,
92
+ description: 'innerHTML with variable concatenation'
93
+ },
94
+ {
95
+ type: types_1.PatternType.REGEX,
96
+ patternId: 'xss-outerhtml',
97
+ pattern: '\\.outerHTML\\s*=\\s*[^;]*(?:\\+|`\\$\\{)',
98
+ flags: 'gi',
99
+ weight: 0.85,
100
+ description: 'outerHTML with variable'
101
+ }
102
+ ],
103
+ taintSources: xssSources.filter(s => s.languages?.includes(types_1.SupportedLanguage.JAVASCRIPT)),
104
+ taintSinks: xssSinks.filter(s => s.id.startsWith('dom-')),
105
+ taintSanitizers: xssSanitizers,
106
+ impact: {
107
+ confidentiality: 'high',
108
+ integrity: 'high',
109
+ availability: 'low',
110
+ technicalImpact: 'Arbitrary JavaScript execution in user browser. Session hijacking, credential theft, keylogging.',
111
+ businessImpact: 'Account takeover, defacement, malware distribution.',
112
+ affectedAssets: ['User Browser', 'User Session', 'User Credentials'],
113
+ dataAtRisk: ['Session Tokens', 'Cookies', 'User Input']
114
+ },
115
+ exploitability: {
116
+ attackVector: 'network',
117
+ attackComplexity: 'low',
118
+ privilegesRequired: 'none',
119
+ userInteraction: 'required',
120
+ knownExploits: true
121
+ },
122
+ vulnerableExamples: [
123
+ {
124
+ code: `const name = new URLSearchParams(location.search).get('name');
125
+ document.getElementById('greeting').innerHTML = 'Hello, ' + name;`,
126
+ language: types_1.SupportedLanguage.JAVASCRIPT,
127
+ isVulnerable: true,
128
+ description: 'User input from URL directly assigned to innerHTML'
129
+ }
130
+ ],
131
+ secureExamples: [
132
+ {
133
+ code: `const name = new URLSearchParams(location.search).get('name');
134
+ document.getElementById('greeting').textContent = 'Hello, ' + name;`,
135
+ language: types_1.SupportedLanguage.JAVASCRIPT,
136
+ isVulnerable: false,
137
+ description: 'Using textContent instead of innerHTML',
138
+ safetyExplanation: 'textContent does not parse HTML, treating input as plain text'
139
+ }
140
+ ],
141
+ remediation: {
142
+ summary: 'Use textContent, DOMPurify, or framework-safe methods instead of innerHTML.',
143
+ steps: [
144
+ 'Replace innerHTML with textContent for plain text',
145
+ 'Use DOMPurify.sanitize() when HTML is required',
146
+ 'Use framework methods like React JSX or Angular templates',
147
+ 'Implement Content Security Policy (CSP)'
148
+ ],
149
+ secureCodeExample: `// Secure: Using textContent
150
+ element.textContent = userInput;
151
+
152
+ // Secure: Using DOMPurify when HTML needed
153
+ element.innerHTML = DOMPurify.sanitize(userInput);
154
+
155
+ // Secure: Using DOM APIs
156
+ const text = document.createTextNode(userInput);
157
+ element.appendChild(text);`,
158
+ references: [
159
+ 'https://cheatsheetseries.owasp.org/cheatsheets/DOM_based_XSS_Prevention_Cheat_Sheet.html',
160
+ 'https://github.com/cure53/DOMPurify'
161
+ ],
162
+ effort: 'low',
163
+ priority: 'high'
164
+ },
165
+ standards: {
166
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
167
+ cwe: [constants_1.CWE_REFERENCES.CWE_79],
168
+ sans: [{ rank: 2, cweId: 'CWE-79', category: 'XSS' }]
169
+ },
170
+ tags: ['xss', 'dom-xss', 'javascript', 'client-side', 'high'],
171
+ enabled: true
172
+ },
173
+ {
174
+ id: 'VUL-XSS-002',
175
+ name: 'DOM XSS - document.write with User Input',
176
+ description: 'Detects document.write() with user-controlled data, which can inject malicious scripts.',
177
+ version: '1.0.0',
178
+ vulnerabilityType: types_1.VulnerabilityType.XSS_DOM,
179
+ category: types_1.VulnerabilityCategory.XSS,
180
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
181
+ severity: types_1.VulnerabilitySeverity.HIGH,
182
+ confidence: types_1.ConfidenceLevel.HIGH,
183
+ baseScore: 82,
184
+ patterns: [
185
+ {
186
+ type: types_1.PatternType.REGEX,
187
+ patternId: 'xss-docwrite-location',
188
+ pattern: 'document\\.write(?:ln)?\\s*\\([^)]*(?:location|document\\.(?:URL|referrer))',
189
+ flags: 'gi',
190
+ weight: 1.0,
191
+ description: 'document.write with DOM source'
192
+ },
193
+ {
194
+ type: types_1.PatternType.REGEX,
195
+ patternId: 'xss-docwrite-concat',
196
+ pattern: 'document\\.write(?:ln)?\\s*\\([^)]*\\+',
197
+ flags: 'gi',
198
+ weight: 0.80,
199
+ description: 'document.write with concatenation'
200
+ }
201
+ ],
202
+ taintSources: xssSources,
203
+ taintSinks: [{ id: 'dom-write', name: 'document.write', pattern: /document\.write/g, vulnerabilityType: types_1.VulnerabilityType.XSS_DOM }],
204
+ taintSanitizers: xssSanitizers,
205
+ impact: {
206
+ confidentiality: 'high',
207
+ integrity: 'high',
208
+ availability: 'low',
209
+ technicalImpact: 'Full page content manipulation, script injection.',
210
+ businessImpact: 'Complete page takeover possible.'
211
+ },
212
+ exploitability: {
213
+ attackVector: 'network',
214
+ attackComplexity: 'low',
215
+ privilegesRequired: 'none',
216
+ userInteraction: 'required'
217
+ },
218
+ remediation: {
219
+ summary: 'Avoid document.write entirely. Use DOM manipulation methods instead.',
220
+ steps: [
221
+ 'Replace document.write with DOM APIs',
222
+ 'Use createElement and appendChild',
223
+ 'Implement CSP to block inline scripts'
224
+ ],
225
+ secureCodeExample: `// Instead of document.write, use:
226
+ const element = document.createElement('div');
227
+ element.textContent = sanitizedContent;
228
+ document.body.appendChild(element);`,
229
+ effort: 'medium',
230
+ priority: 'high'
231
+ },
232
+ standards: {
233
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
234
+ cwe: [constants_1.CWE_REFERENCES.CWE_79]
235
+ },
236
+ tags: ['xss', 'dom-xss', 'document-write', 'deprecated'],
237
+ enabled: true
238
+ },
239
+ {
240
+ id: 'VUL-XSS-003',
241
+ name: 'DOM XSS - jQuery html() with User Input',
242
+ description: 'Detects jQuery .html() method with user-controlled data.',
243
+ version: '1.0.0',
244
+ vulnerabilityType: types_1.VulnerabilityType.XSS_DOM,
245
+ category: types_1.VulnerabilityCategory.XSS,
246
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
247
+ severity: types_1.VulnerabilitySeverity.HIGH,
248
+ confidence: types_1.ConfidenceLevel.MEDIUM,
249
+ baseScore: 75,
250
+ patterns: [
251
+ {
252
+ type: types_1.PatternType.REGEX,
253
+ patternId: 'xss-jquery-html',
254
+ pattern: '\\$\\([^)]+\\)\\.html\\s*\\([^)]*(?:location|document\\.|\\+|`\\$\\{)',
255
+ flags: 'gi',
256
+ weight: 0.90,
257
+ description: 'jQuery .html() with dynamic content'
258
+ },
259
+ {
260
+ type: types_1.PatternType.REGEX,
261
+ patternId: 'xss-jquery-append',
262
+ pattern: '\\$\\([^)]+\\)\\.(?:append|prepend|after|before)\\s*\\([^)]*(?:<|\\+.*<)',
263
+ flags: 'gi',
264
+ weight: 0.85,
265
+ description: 'jQuery DOM insertion with HTML'
266
+ }
267
+ ],
268
+ taintSources: xssSources,
269
+ taintSinks: xssSinks.filter(s => s.id.startsWith('jquery-')),
270
+ taintSanitizers: xssSanitizers,
271
+ impact: {
272
+ confidentiality: 'high',
273
+ integrity: 'high',
274
+ availability: 'low',
275
+ technicalImpact: 'Script execution in user context.',
276
+ businessImpact: 'Session theft, phishing attacks.'
277
+ },
278
+ exploitability: {
279
+ attackVector: 'network',
280
+ attackComplexity: 'low',
281
+ privilegesRequired: 'none',
282
+ userInteraction: 'required'
283
+ },
284
+ remediation: {
285
+ summary: 'Use .text() instead of .html(), or sanitize with DOMPurify.',
286
+ steps: [
287
+ 'Replace .html() with .text() for plain text',
288
+ 'Sanitize HTML with DOMPurify before using .html()',
289
+ 'Use .attr() carefully for attributes'
290
+ ],
291
+ secureCodeExample: `// Secure: Use .text() for plain text
292
+ $('#element').text(userInput);
293
+
294
+ // Secure: Sanitize if HTML is needed
295
+ $('#element').html(DOMPurify.sanitize(userInput));`,
296
+ effort: 'low',
297
+ priority: 'high'
298
+ },
299
+ standards: {
300
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
301
+ cwe: [constants_1.CWE_REFERENCES.CWE_79]
302
+ },
303
+ tags: ['xss', 'dom-xss', 'jquery', 'high'],
304
+ enabled: true
305
+ },
306
+ // ==========================================================================
307
+ // React/Angular/Vue XSS Rules
308
+ // ==========================================================================
309
+ {
310
+ id: 'VUL-XSS-004',
311
+ name: 'React XSS - dangerouslySetInnerHTML',
312
+ description: 'Detects use of dangerouslySetInnerHTML with potentially unsafe content.',
313
+ version: '1.0.0',
314
+ vulnerabilityType: types_1.VulnerabilityType.XSS_DOM,
315
+ category: types_1.VulnerabilityCategory.XSS,
316
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT],
317
+ severity: types_1.VulnerabilitySeverity.HIGH,
318
+ confidence: types_1.ConfidenceLevel.MEDIUM,
319
+ baseScore: 70,
320
+ patterns: [
321
+ {
322
+ type: types_1.PatternType.REGEX,
323
+ patternId: 'xss-react-dangerous',
324
+ pattern: 'dangerouslySetInnerHTML\\s*=\\s*\\{\\s*\\{\\s*__html\\s*:',
325
+ flags: 'gi',
326
+ weight: 0.85,
327
+ description: 'dangerouslySetInnerHTML usage'
328
+ },
329
+ {
330
+ type: types_1.PatternType.REGEX,
331
+ patternId: 'xss-react-dangerous-prop',
332
+ pattern: 'dangerouslySetInnerHTML\\s*=\\s*\\{[^}]*props\\.',
333
+ flags: 'gi',
334
+ weight: 0.95,
335
+ description: 'dangerouslySetInnerHTML with props'
336
+ }
337
+ ],
338
+ falsePositivePatterns: [
339
+ {
340
+ type: types_1.PatternType.REGEX,
341
+ patternId: 'xss-react-sanitized',
342
+ pattern: 'dangerouslySetInnerHTML.*DOMPurify\\.sanitize',
343
+ flags: 'gis',
344
+ description: 'Content is sanitized with DOMPurify'
345
+ }
346
+ ],
347
+ impact: {
348
+ confidentiality: 'high',
349
+ integrity: 'high',
350
+ availability: 'low',
351
+ technicalImpact: 'XSS in React application context.',
352
+ businessImpact: 'Component-level attack surface.'
353
+ },
354
+ exploitability: {
355
+ attackVector: 'network',
356
+ attackComplexity: 'low',
357
+ privilegesRequired: 'none',
358
+ userInteraction: 'required'
359
+ },
360
+ remediation: {
361
+ summary: 'Avoid dangerouslySetInnerHTML. If required, always sanitize with DOMPurify.',
362
+ steps: [
363
+ 'Use JSX for dynamic content instead',
364
+ 'If HTML is required, sanitize with DOMPurify',
365
+ 'Review all uses of dangerouslySetInnerHTML'
366
+ ],
367
+ secureCodeExample: `// Avoid: dangerouslySetInnerHTML
368
+ // <div dangerouslySetInnerHTML={{__html: userContent}} />
369
+
370
+ // Secure: Use JSX
371
+ <div>{userContent}</div>
372
+
373
+ // Secure: Sanitize if HTML needed
374
+ import DOMPurify from 'dompurify';
375
+ <div dangerouslySetInnerHTML={{__html: DOMPurify.sanitize(userContent)}} />`,
376
+ effort: 'low',
377
+ priority: 'high'
378
+ },
379
+ standards: {
380
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
381
+ cwe: [constants_1.CWE_REFERENCES.CWE_79]
382
+ },
383
+ tags: ['xss', 'react', 'dangerously-set-inner-html', 'high'],
384
+ enabled: true
385
+ },
386
+ {
387
+ id: 'VUL-XSS-005',
388
+ name: 'Angular XSS - bypassSecurityTrust',
389
+ description: 'Detects use of Angular DomSanitizer bypass methods without proper validation.',
390
+ version: '1.0.0',
391
+ vulnerabilityType: types_1.VulnerabilityType.XSS_DOM,
392
+ category: types_1.VulnerabilityCategory.XSS,
393
+ languages: [types_1.SupportedLanguage.TYPESCRIPT],
394
+ severity: types_1.VulnerabilitySeverity.HIGH,
395
+ confidence: types_1.ConfidenceLevel.HIGH,
396
+ baseScore: 78,
397
+ patterns: [
398
+ {
399
+ type: types_1.PatternType.REGEX,
400
+ patternId: 'xss-angular-bypass-html',
401
+ pattern: 'bypassSecurityTrustHtml\\s*\\(',
402
+ flags: 'gi',
403
+ weight: 0.95,
404
+ description: 'bypassSecurityTrustHtml usage'
405
+ },
406
+ {
407
+ type: types_1.PatternType.REGEX,
408
+ patternId: 'xss-angular-bypass-script',
409
+ pattern: 'bypassSecurityTrustScript\\s*\\(',
410
+ flags: 'gi',
411
+ weight: 1.0,
412
+ description: 'bypassSecurityTrustScript usage'
413
+ },
414
+ {
415
+ type: types_1.PatternType.REGEX,
416
+ patternId: 'xss-angular-bypass-url',
417
+ pattern: 'bypassSecurityTrust(?:Url|ResourceUrl)\\s*\\(',
418
+ flags: 'gi',
419
+ weight: 0.85,
420
+ description: 'bypassSecurityTrustUrl usage'
421
+ }
422
+ ],
423
+ impact: {
424
+ confidentiality: 'high',
425
+ integrity: 'high',
426
+ availability: 'low',
427
+ technicalImpact: 'Bypasses Angular built-in XSS protection.',
428
+ businessImpact: 'Security control bypass.'
429
+ },
430
+ exploitability: {
431
+ attackVector: 'network',
432
+ attackComplexity: 'low',
433
+ privilegesRequired: 'none',
434
+ userInteraction: 'required'
435
+ },
436
+ remediation: {
437
+ summary: 'Avoid bypass methods. If needed, validate and sanitize content first.',
438
+ steps: [
439
+ 'Review necessity of bypassing sanitization',
440
+ 'Use DOMPurify before bypassing',
441
+ 'Implement strict input validation'
442
+ ],
443
+ secureCodeExample: `// Validate before bypassing
444
+ import DOMPurify from 'dompurify';
445
+
446
+ sanitizeAndTrust(html: string): SafeHtml {
447
+ const clean = DOMPurify.sanitize(html);
448
+ return this.sanitizer.bypassSecurityTrustHtml(clean);
449
+ }`,
450
+ effort: 'medium',
451
+ priority: 'high'
452
+ },
453
+ standards: {
454
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
455
+ cwe: [constants_1.CWE_REFERENCES.CWE_79]
456
+ },
457
+ tags: ['xss', 'angular', 'security-bypass', 'high'],
458
+ enabled: true
459
+ },
460
+ // ==========================================================================
461
+ // Reflected XSS Rules
462
+ // ==========================================================================
463
+ {
464
+ id: 'VUL-XSS-006',
465
+ name: 'Reflected XSS - PHP Echo User Input',
466
+ description: 'Detects PHP code that echoes user input without proper escaping.',
467
+ version: '1.0.0',
468
+ vulnerabilityType: types_1.VulnerabilityType.XSS_REFLECTED,
469
+ category: types_1.VulnerabilityCategory.XSS,
470
+ languages: [types_1.SupportedLanguage.PHP],
471
+ severity: types_1.VulnerabilitySeverity.HIGH,
472
+ confidence: types_1.ConfidenceLevel.HIGH,
473
+ baseScore: 80,
474
+ patterns: [
475
+ {
476
+ type: types_1.PatternType.REGEX,
477
+ patternId: 'xss-php-echo-get',
478
+ pattern: 'echo\\s+\\$_GET\\s*\\[',
479
+ flags: 'gi',
480
+ weight: 1.0,
481
+ description: 'Direct echo of $_GET'
482
+ },
483
+ {
484
+ type: types_1.PatternType.REGEX,
485
+ patternId: 'xss-php-echo-post',
486
+ pattern: 'echo\\s+\\$_POST\\s*\\[',
487
+ flags: 'gi',
488
+ weight: 1.0,
489
+ description: 'Direct echo of $_POST'
490
+ },
491
+ {
492
+ type: types_1.PatternType.REGEX,
493
+ patternId: 'xss-php-echo-request',
494
+ pattern: 'echo\\s+\\$_REQUEST\\s*\\[',
495
+ flags: 'gi',
496
+ weight: 1.0,
497
+ description: 'Direct echo of $_REQUEST'
498
+ },
499
+ {
500
+ type: types_1.PatternType.REGEX,
501
+ patternId: 'xss-php-print',
502
+ pattern: 'print\\s+\\$_(?:GET|POST|REQUEST)\\s*\\[',
503
+ flags: 'gi',
504
+ weight: 1.0,
505
+ description: 'Direct print of superglobal'
506
+ },
507
+ {
508
+ type: types_1.PatternType.REGEX,
509
+ patternId: 'xss-php-shortecho',
510
+ pattern: '\\<\\?=\\s*\\$_(?:GET|POST|REQUEST)\\s*\\[',
511
+ flags: 'gi',
512
+ weight: 1.0,
513
+ description: 'Short echo tag with superglobal'
514
+ }
515
+ ],
516
+ taintSources: xssSources.filter(s => s.languages?.includes(types_1.SupportedLanguage.PHP)),
517
+ taintSinks: xssSinks.filter(s => s.languages?.includes(types_1.SupportedLanguage.PHP)),
518
+ taintSanitizers: xssSanitizers.filter(s => !s.languages || s.languages.includes(types_1.SupportedLanguage.PHP)),
519
+ impact: {
520
+ confidentiality: 'high',
521
+ integrity: 'high',
522
+ availability: 'low',
523
+ technicalImpact: 'Script injection in response, session hijacking.',
524
+ businessImpact: 'Account compromise, phishing.'
525
+ },
526
+ exploitability: {
527
+ attackVector: 'network',
528
+ attackComplexity: 'low',
529
+ privilegesRequired: 'none',
530
+ userInteraction: 'required',
531
+ knownExploits: true
532
+ },
533
+ vulnerableExamples: [
534
+ {
535
+ code: `<?php
536
+ echo "Hello, " . $_GET['name'];
537
+ ?>`,
538
+ language: types_1.SupportedLanguage.PHP,
539
+ isVulnerable: true,
540
+ description: 'Direct output of user input'
541
+ }
542
+ ],
543
+ remediation: {
544
+ summary: 'Always use htmlspecialchars() or htmlentities() when outputting user data.',
545
+ steps: [
546
+ 'Wrap all user output with htmlspecialchars()',
547
+ 'Use ENT_QUOTES flag for attribute contexts',
548
+ 'Consider using template engines with auto-escaping'
549
+ ],
550
+ secureCodeExample: `<?php
551
+ // Secure: Using htmlspecialchars
552
+ echo "Hello, " . htmlspecialchars($_GET['name'], ENT_QUOTES, 'UTF-8');
553
+
554
+ // Secure: Using htmlentities
555
+ echo "Hello, " . htmlentities($_GET['name'], ENT_QUOTES, 'UTF-8');
556
+ ?>`,
557
+ effort: 'low',
558
+ priority: 'high'
559
+ },
560
+ standards: {
561
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
562
+ cwe: [constants_1.CWE_REFERENCES.CWE_79]
563
+ },
564
+ tags: ['xss', 'reflected-xss', 'php', 'high'],
565
+ enabled: true
566
+ },
567
+ // ==========================================================================
568
+ // Stored XSS Detection
569
+ // ==========================================================================
570
+ {
571
+ id: 'VUL-XSS-007',
572
+ name: 'Potential Stored XSS - Database to HTML',
573
+ description: 'Detects patterns where database content is rendered to HTML without escaping.',
574
+ version: '1.0.0',
575
+ vulnerabilityType: types_1.VulnerabilityType.XSS_STORED,
576
+ category: types_1.VulnerabilityCategory.XSS,
577
+ languages: [types_1.SupportedLanguage.JAVASCRIPT, types_1.SupportedLanguage.TYPESCRIPT, types_1.SupportedLanguage.PHP, types_1.SupportedLanguage.PYTHON],
578
+ severity: types_1.VulnerabilitySeverity.CRITICAL,
579
+ confidence: types_1.ConfidenceLevel.MEDIUM,
580
+ baseScore: 85,
581
+ patterns: [
582
+ {
583
+ type: types_1.PatternType.REGEX,
584
+ patternId: 'xss-stored-db-html-js',
585
+ pattern: '\\.innerHTML\\s*=\\s*(?:data|result|row|record|item)(?:\\.|\\[)',
586
+ flags: 'gi',
587
+ weight: 0.80,
588
+ description: 'Database result to innerHTML'
589
+ },
590
+ {
591
+ type: types_1.PatternType.REGEX,
592
+ patternId: 'xss-stored-render-body',
593
+ pattern: '\\.(?:render|send)\\s*\\([^)]*\\{[^}]*(?:content|body|message|text)\\s*:',
594
+ flags: 'gi',
595
+ weight: 0.70,
596
+ description: 'Rendering database content'
597
+ }
598
+ ],
599
+ impact: {
600
+ confidentiality: 'high',
601
+ integrity: 'high',
602
+ availability: 'low',
603
+ scope: 'changed',
604
+ technicalImpact: 'Persistent XSS affecting all users viewing the content.',
605
+ businessImpact: 'Mass user compromise, worm propagation.',
606
+ affectedAssets: ['All Users', 'Database Content'],
607
+ dataAtRisk: ['All User Sessions', 'Stored Data']
608
+ },
609
+ exploitability: {
610
+ attackVector: 'network',
611
+ attackComplexity: 'low',
612
+ privilegesRequired: 'low',
613
+ userInteraction: 'required',
614
+ knownExploits: true
615
+ },
616
+ remediation: {
617
+ summary: 'Always sanitize content before storing and escape when rendering.',
618
+ steps: [
619
+ 'Sanitize user input before storing in database',
620
+ 'Escape content when rendering to HTML',
621
+ 'Use Content Security Policy (CSP)',
622
+ 'Implement defense in depth with both input and output controls'
623
+ ],
624
+ secureCodeExample: `// Secure: Sanitize on input
625
+ const sanitized = DOMPurify.sanitize(userContent);
626
+ await db.save({ content: sanitized });
627
+
628
+ // Secure: Escape on output
629
+ element.textContent = dbContent;`,
630
+ effort: 'medium',
631
+ priority: 'immediate'
632
+ },
633
+ standards: {
634
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
635
+ cwe: [constants_1.CWE_REFERENCES.CWE_79]
636
+ },
637
+ tags: ['xss', 'stored-xss', 'persistent', 'critical'],
638
+ enabled: true
639
+ },
640
+ // ==========================================================================
641
+ // Template Injection XSS
642
+ // ==========================================================================
643
+ {
644
+ id: 'VUL-XSS-008',
645
+ name: 'Server-Side Template Injection Leading to XSS',
646
+ description: 'Detects server-side template rendering with user input that may cause XSS.',
647
+ version: '1.0.0',
648
+ vulnerabilityType: types_1.VulnerabilityType.TEMPLATE_INJECTION,
649
+ category: types_1.VulnerabilityCategory.XSS,
650
+ languages: [types_1.SupportedLanguage.PYTHON, types_1.SupportedLanguage.JAVASCRIPT],
651
+ severity: types_1.VulnerabilitySeverity.CRITICAL,
652
+ confidence: types_1.ConfidenceLevel.HIGH,
653
+ baseScore: 88,
654
+ patterns: [
655
+ {
656
+ type: types_1.PatternType.REGEX,
657
+ patternId: 'xss-ssti-python',
658
+ pattern: 'render_template_string\\s*\\([^)]*request\\.',
659
+ flags: 'gi',
660
+ weight: 1.0,
661
+ description: 'Flask render_template_string with request data'
662
+ },
663
+ {
664
+ type: types_1.PatternType.REGEX,
665
+ patternId: 'xss-ssti-jinja',
666
+ pattern: 'Template\\s*\\([^)]*\\)\\.render\\s*\\(',
667
+ flags: 'gi',
668
+ weight: 0.90,
669
+ description: 'Jinja2 Template render'
670
+ },
671
+ {
672
+ type: types_1.PatternType.REGEX,
673
+ patternId: 'xss-ssti-ejs',
674
+ pattern: 'ejs\\.render\\s*\\([^,]+,\\s*\\{[^}]*req\\.',
675
+ flags: 'gi',
676
+ weight: 0.85,
677
+ description: 'EJS render with request data'
678
+ }
679
+ ],
680
+ impact: {
681
+ confidentiality: 'high',
682
+ integrity: 'high',
683
+ availability: 'high',
684
+ scope: 'changed',
685
+ technicalImpact: 'Server-side code execution, not just XSS.',
686
+ businessImpact: 'Complete server compromise.'
687
+ },
688
+ exploitability: {
689
+ attackVector: 'network',
690
+ attackComplexity: 'low',
691
+ privilegesRequired: 'none',
692
+ userInteraction: 'none',
693
+ knownExploits: true
694
+ },
695
+ remediation: {
696
+ summary: 'Never pass user input directly to template rendering. Use predefined templates.',
697
+ steps: [
698
+ 'Use render_template with separate template files',
699
+ 'Pass user input as template variables, not template content',
700
+ 'Enable template auto-escaping'
701
+ ],
702
+ secureCodeExample: `# Secure: Use template files, not string rendering
703
+ from flask import render_template
704
+
705
+ @app.route('/hello')
706
+ def hello():
707
+ name = request.args.get('name', '')
708
+ return render_template('hello.html', name=name)`,
709
+ effort: 'medium',
710
+ priority: 'immediate'
711
+ },
712
+ standards: {
713
+ owasp: [constants_1.OWASP_TOP_10_2021.A03],
714
+ cwe: [constants_1.CWE_REFERENCES.CWE_79, constants_1.CWE_REFERENCES.CWE_94]
715
+ },
716
+ tags: ['xss', 'ssti', 'template-injection', 'rce', 'critical'],
717
+ enabled: true
718
+ }
719
+ ];
720
+ // ============================================================================
721
+ // EXPORTS
722
+ // ============================================================================
723
+ exports.default = exports.xssRules;
724
+ //# sourceMappingURL=xss.js.map