| "use strict"; |
| |
| |
| |
| |
| |
| |
| var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { |
| if (k2 === undefined) k2 = k; |
| var desc = Object.getOwnPropertyDescriptor(m, k); |
| if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) { |
| desc = { enumerable: true, get: function() { return m[k]; } }; |
| } |
| Object.defineProperty(o, k2, desc); |
| }) : (function(o, m, k, k2) { |
| if (k2 === undefined) k2 = k; |
| o[k2] = m[k]; |
| })); |
| var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { |
| Object.defineProperty(o, "default", { enumerable: true, value: v }); |
| }) : function(o, v) { |
| o["default"] = v; |
| }); |
| var __importStar = (this && this.__importStar) || (function () { |
| var ownKeys = function(o) { |
| ownKeys = Object.getOwnPropertyNames || function (o) { |
| var ar = []; |
| for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k; |
| return ar; |
| }; |
| return ownKeys(o); |
| }; |
| return function (mod) { |
| if (mod && mod.__esModule) return mod; |
| var result = {}; |
| if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]); |
| __setModuleDefault(result, mod); |
| return result; |
| }; |
| })(); |
| Object.defineProperty(exports, "__esModule", { value: true }); |
| exports.SECURITY_PATTERNS = void 0; |
| exports.scanFile = scanFile; |
| exports.scanFiles = scanFiles; |
| exports.getSeverityScore = getSeverityScore; |
| exports.sortBySeverity = sortBySeverity; |
| const fs = __importStar(require("fs")); |
| |
| |
| |
| exports.SECURITY_PATTERNS = [ |
| |
| { pattern: /password\s*=\s*['"][^'"]+['"]/gi, rule: 'no-hardcoded-password', severity: 'critical', message: 'Hardcoded password detected', suggestion: 'Use environment variables or secret management' }, |
| { pattern: /api[_-]?key\s*=\s*['"][^'"]+['"]/gi, rule: 'no-hardcoded-apikey', severity: 'critical', message: 'Hardcoded API key detected', suggestion: 'Use environment variables' }, |
| { pattern: /secret\s*=\s*['"][^'"]+['"]/gi, rule: 'no-hardcoded-secret', severity: 'critical', message: 'Hardcoded secret detected', suggestion: 'Use environment variables or secret management' }, |
| { pattern: /private[_-]?key\s*=\s*['"][^'"]+['"]/gi, rule: 'no-hardcoded-private-key', severity: 'critical', message: 'Hardcoded private key detected', suggestion: 'Use secure key management' }, |
| |
| { pattern: /eval\s*\(/g, rule: 'no-eval', severity: 'high', message: 'Avoid eval() - code injection risk', suggestion: 'Use safer alternatives like JSON.parse()' }, |
| { pattern: /exec\s*\(/g, rule: 'no-exec', severity: 'high', message: 'Avoid exec() - command injection risk', suggestion: 'Use execFile or spawn with args array' }, |
| { pattern: /Function\s*\(/g, rule: 'no-function-constructor', severity: 'high', message: 'Avoid Function constructor - code injection risk' }, |
| { pattern: /child_process.*exec\(/g, rule: 'no-shell-exec', severity: 'high', message: 'Shell execution detected', suggestion: 'Use execFile or spawn instead' }, |
| |
| { pattern: /SELECT\s+.*\s+FROM.*\+/gi, rule: 'sql-injection-risk', severity: 'high', message: 'Potential SQL injection - string concatenation in query', suggestion: 'Use parameterized queries' }, |
| { pattern: /`SELECT.*\$\{/gi, rule: 'sql-injection-template', severity: 'high', message: 'Template literal in SQL query', suggestion: 'Use parameterized queries' }, |
| |
| { pattern: /dangerouslySetInnerHTML/g, rule: 'xss-risk', severity: 'medium', message: 'XSS risk: dangerouslySetInnerHTML', suggestion: 'Sanitize content before rendering' }, |
| { pattern: /innerHTML\s*=/g, rule: 'no-inner-html', severity: 'medium', message: 'Avoid innerHTML - XSS risk', suggestion: 'Use textContent or sanitize content' }, |
| { pattern: /document\.write\s*\(/g, rule: 'no-document-write', severity: 'medium', message: 'Avoid document.write - XSS risk' }, |
| |
| { pattern: /\$\{.*\}/g, rule: 'template-injection', severity: 'low', message: 'Template literal detected - verify no injection' }, |
| { pattern: /new\s+RegExp\s*\([^)]*\+/g, rule: 'regex-injection', severity: 'medium', message: 'Dynamic RegExp - potential ReDoS risk', suggestion: 'Validate/sanitize regex input' }, |
| { pattern: /\.on\s*\(\s*['"]error['"]/g, rule: 'unhandled-error', severity: 'low', message: 'Error handler detected - verify proper error handling' }, |
| ]; |
| |
| |
| |
| function scanFile(filePath, content, patterns = exports.SECURITY_PATTERNS) { |
| const findings = []; |
| try { |
| const fileContent = content ?? (fs.existsSync(filePath) ? fs.readFileSync(filePath, 'utf-8') : ''); |
| if (!fileContent) |
| return findings; |
| for (const { pattern, rule, severity, message, suggestion } of patterns) { |
| const regex = new RegExp(pattern.source, pattern.flags); |
| let match; |
| while ((match = regex.exec(fileContent)) !== null) { |
| const lineNum = fileContent.slice(0, match.index).split('\n').length; |
| findings.push({ |
| file: filePath, |
| line: lineNum, |
| severity, |
| rule, |
| message, |
| match: match[0].slice(0, 50), |
| suggestion, |
| }); |
| } |
| } |
| } |
| catch { |
| |
| } |
| return findings; |
| } |
| |
| |
| |
| function scanFiles(files, patterns = exports.SECURITY_PATTERNS, maxFiles = 100) { |
| const findings = []; |
| for (const file of files.slice(0, maxFiles)) { |
| findings.push(...scanFile(file, undefined, patterns)); |
| } |
| return findings; |
| } |
| |
| |
| |
| function getSeverityScore(severity) { |
| switch (severity) { |
| case 'critical': return 4; |
| case 'high': return 3; |
| case 'medium': return 2; |
| case 'low': return 1; |
| default: return 0; |
| } |
| } |
| |
| |
| |
| function sortBySeverity(findings) { |
| return [...findings].sort((a, b) => getSeverityScore(b.severity) - getSeverityScore(a.severity)); |
| } |
| exports.default = { |
| SECURITY_PATTERNS: exports.SECURITY_PATTERNS, |
| scanFile, |
| scanFiles, |
| getSeverityScore, |
| sortBySeverity, |
| }; |
|
|