@codeslick/security-knowledge
v1.0.0
Published
OWASP/CWE/CVSS mappings for comprehensive security vulnerability classification
Maintainers
Readme
@codeslick/security-knowledge
OWASP/CWE/CVSS mappings for comprehensive security vulnerability classification.
Features
- OWASP Top 10 2025: 95% coverage
- OWASP Top 10 2021: 100% coverage
- CWE Mappings: 85+ vulnerability types
- PCI-DSS Compliance: Payment Card Industry standards
- CVSS 3.1 Scoring: 0.0-10.0 severity scores
- Exploit Likelihood: High/Medium/Low classifications
- Security Impact: Data breach, RCE, XSS, DoS, etc.
Installation
npm install @codeslick/security-knowledgeUsage
import {
getComplianceMapping,
calculateSeverityScore,
getSeverityLabel,
getSeverityColor,
} from '@codeslick/security-knowledge';
// Get compliance mapping for a vulnerability
const mapping = getComplianceMapping('sql-injection');
console.log(mapping);
// {
// owasp: 'A03:2025 - Injection',
// cwe: 'CWE-89',
// pciDss: '6.5.1',
// references: [...]
// }
// Calculate severity score with context
const score = calculateSeverityScore('sql-injection', {
hasUserInput: true,
isPublicFacing: true,
containsSensitiveData: true
});
console.log(score);
// {
// severity: 'critical',
// cvssScore: 10.0,
// exploitLikelihood: 'high',
// impact: 'data-breach'
// }
// Get UI labels and colors
const label = getSeverityLabel('critical'); // 'CRITICAL'
const colors = getSeverityColor('critical');
// {
// bg: 'bg-red-100',
// text: 'text-red-900',
// border: 'border-red-500'
// }API
Compliance Mapping
getComplianceMapping(vulnerabilityType: string): ComplianceMappinggetOwaspCoverage(): Array<{ category: string; count: number }>
Severity Scoring
calculateSeverityScore(type: string, context?): SeverityScoregetSeverityLabel(severity: SecuritySeverity): stringgetSeverityColor(severity: SecuritySeverity): { bg, text, border }sortBySeverity(issues: Array<{severity, cvssScore?}>): Array<{...}>
Supported Vulnerabilities (85+)
Injection (OWASP A03:2025)
- SQL Injection, NoSQL Injection, Command Injection
- LDAP Injection, XPath Injection, Template Injection
- SSRF, XXE, XSS
Cryptographic Failures (OWASP A02:2025)
- Weak hashing (MD5, SHA1)
- Weak encryption (DES, ECB mode)
- Weak random number generation
- Hardcoded credentials
Authentication Failures (OWASP A07:2025)
- Plaintext password comparison
- Weak token generation
- Missing MFA, No rate limiting
- JWT vulnerabilities
Supply Chain (OWASP A03:2025)
- Dynamic imports without integrity
- Malicious packages
- Dependency confusion
- Package typosquatting
Exception Handling (OWASP A10:2025)
- Unhandled promise rejections
- Empty catch blocks
- Information exposure through errors
OWASP Coverage
import { getOwaspCoverage } from '@codeslick/security-knowledge';
const coverage = getOwaspCoverage();
// [
// { category: 'A01:2025 - Broken Access Control', count: 3 },
// { category: 'A02:2025 - Cryptographic Failures', count: 5 },
// { category: 'A03:2025 - Injection', count: 10 },
// ...
// ]License
MIT © Vitor Lourenco
