npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

eslint-plugin-lambda-security

v1.1.1

Published

Security-focused ESLint plugin for AWS Lambda and Middy applications. Detects insecure API Gateway responses, missing security headers, CORS misconfigurations, input validation issues, and more.

Downloads

809

Readme

Description

This plugin secures your AWS Lambda functions by enforcing best practices related to IAM permissions, timeout configurations, and environment variable management. It proactively detects vulnerabilities such as over-permissive policies and insecure logging practices, helping you adhere to the Principle of Least Privilege. Implementing these checks ensures that your serverless architecture remains resilient and compliant with strict security standards.

Philosophy

Interlace fosters strength through integration. Instead of stacking isolated rules, we interlace security directly into your workflow to create a resilient fabric of code. We believe tools should guide rather than gatekeep, providing educational feedback that strengthens the developer with every interaction.

Getting Started

npm install eslint-plugin-lambda-security --save-dev

💡 What you get

  • Serverless-focused coverage: 5 rules targeting Lambda-specific vulnerabilities (credentials, CORS, secrets, logging).
  • LLM-optimized & MCP-ready: Structured 2-line messages with CWE + OWASP + CVSS + concrete fixes so humans and AI auto-fixers stay aligned.
  • Standards aligned: OWASP Serverless Top 10, CWE tagging, CVSS scoring in every finding for compliance mapping.
  • Tiered presets: recommended, strict for fast policy rollout.
  • Framework-aware: Detects Middy middleware, API Gateway response patterns, AWS SDK v3 clients.
  • Low false positive rate: Context-aware detection with production heuristics.

Every security rule produces a structured 2-line error message:

src/handlers/api.ts
  18:5   error  🔒 CWE-798 OWASP:SAS-2 CVSS:9.8 | Hardcoded AWS credentials detected | CRITICAL [SOC2,PCI-DSS]
                    Fix: Use credential provider chain or Lambda execution role | https://owasp.org/...

Each message includes:

  • 🔒 CWE reference - vulnerability classification
  • 📋 OWASP category - Serverless Top 10 mapping
  • 📊 CVSS score - severity rating (0.0-10.0)
  • 🏢 Compliance tags - affected frameworks (SOC2, PCI-DSS, HIPAA)
  • Fix instruction - exact code to write
  • 📚 Documentation link - learn more

⚙️ Configuration Presets

| Preset | Description | | :------------ | :--------------------------------------------------------------------- | | recommended | Balanced security for Lambda projects (critical as error, others warn) | | strict | Maximum security enforcement (all rules as errors) |

📚 Supported Libraries

| Library | npm | Downloads | Detection | | :----------------------- | :---------------------------------------------------------------------------------------------------------------------------------------- | :----------------------------------------------------------------------------------------------------------------------------------------------- | :--------------------- | | aws-lambda | npm | downloads | IAM, Logging, Timeouts | | @aws-sdk/client-lambda | npm | downloads | Credential Safety | | middy | npm | downloads | Middleware Security |


⚙️ Configuration Options

All rules accept these common options:

{
  rules: {
    'lambda-security/no-hardcoded-credentials-sdk': ['error', {
      allowInTests: true // Default: true - skip test files
    }],
    'lambda-security/no-secrets-in-env': ['error', {
      allowInTests: true,
      additionalPatterns: ['CUSTOM_SECRET_*'] // Additional patterns to detect
    }]
  }
}

🏢 Enterprise Integration Example

// eslint.config.js
import lambdaSecurity from 'eslint-plugin-lambda-security';

export default [
  // Baseline for all Lambda functions
  lambdaSecurity.configs.recommended,

  // Strict mode for payment/auth handlers
  {
    files: ['functions/payments/**', 'functions/auth/**'],
    ...lambdaSecurity.configs.strict,
  },
];

Rules

Legend

| Icon | Description | | :--: | :----------------------------------------------------------------- | | 💼 | Recommended: Included in the recommended preset. | | ⚠️ | Warns: Set towarn in recommended preset. | | 🔧 | Auto-fixable: Automatically fixable by the --fix CLI option. | | 💡 | Suggestions: Providing code suggestions in IDE. | | 🚫 | Deprecated: This rule is deprecated. |

| Rule | CWE | OWASP | CVSS | Description | 💼 | ⚠️ | 🔧 | 💡 | 🚫 | | :--------------------------------------------------------------------------------------------------------------------------- | :-----: | :----: | :--: | :------------------------------------------------------------------ | :-: | :-: | :-: | :-: | :-: | | no-hardcoded-credentials-sdk | CWE-798 | SAS-02 | 9.8 | no-hardcoded-credentials-sdk | 💼 | | | | | | no-permissive-cors-response | CWE-942 | SAS-04 | 9.1 | no-permissive-cors-response | 💼 | | 🔧 | | | | no-permissive-cors-middy | CWE-942 | SAS-04 | 9.1 | no-permissive-cors-middy | 💼 | | | | | | no-secrets-in-env | CWE-522 | SAS-03 | 9.8 | no-secrets-in-env | 💼 | | | | | | no-env-logging | CWE-532 | SAS-03 | 7.5 | no-env-logging | 💼 | ⚠️ | | | | | no-error-swallowing | CWE-391 | SAS-06 | 7.5 | no-error-swallowing | 💼 | ⚠️ | | | | | require-timeout-handling | CWE-703 | SAS-07 | 7.5 | require-timeout-handling | 💼 | ⚠️ | | | | | no-unbounded-batch-processing | CWE-400 | SAS-07 | 7.5 | no-unbounded-batch-processing | 💼 | ⚠️ | | | | | no-unvalidated-event-body | CWE-20 | SAS-01 | 7.5 | no-unvalidated-event-body | 💼 | ⚠️ | | | | | no-missing-authorization-check | CWE-862 | SAS-05 | 7.5 | no-missing-authorization-check | 💼 | ⚠️ | | | | | no-exposed-error-details | CWE-209 | SAS-09 | 7.5 | no-exposed-error-details | 💼 | ⚠️ | | | | | no-user-controlled-requests | CWE-918 | SAS-08 | 9.8 | no-user-controlled-requests | 💼 | | | | | | no-overly-permissive-iam-policy | CWE-732 | SAS-05 | 9.8 | no-overly-permissive-iam-policy | 💼 | | | | |


AI-Optimized Messages

This plugin is optimized for ESLint's Model Context Protocol (MCP), enabling AI assistants like Cursor, GitHub Copilot, and Claude to:

  • Understand the exact vulnerability type via CWE references
  • Apply the correct fix using structured guidance
  • Provide educational context to developers
src/handlers/api.ts
  18:5   error  🔒 CWE-798 OWASP:SAS-2 CVSS:9.8 | Hardcoded AWS credentials detected | CRITICAL [SOC2,PCI-DSS]
                    Fix: Use credential provider chain or Lambda execution role | https://owasp.org/...
// .cursor/mcp.json
{
  "mcpServers": {
    "eslint": {
      "command": "npx",
      "args": ["@eslint/mcp@latest"]
    }
  }
}

By providing this structured context (CWE, OWASP, Fix), we enable AI tools to reason about the security flaw rather than hallucinating. This allows Copilot/Cursor to suggest the exact correct fix immediately.


🔒 Privacy

This plugin runs 100% locally. No data ever leaves your machine.

🔗 Related ESLint Plugins

Part of the Interlace ESLint Ecosystem — AI-native security plugins with LLM-optimized error messages:

| Plugin | Downloads | Description | | :--------------------------------------------------------------------------------------------------- | :------------------------------------------------------------------------------------------------------------------------------------------------------------------: | :------------------------------------------ | | eslint-plugin-secure-coding | downloads | General security rules & OWASP guidelines. | | eslint-plugin-pg | downloads | PostgreSQL security & best practices. | | eslint-plugin-crypto | downloads | NodeJS Cryptography security rules. | | eslint-plugin-jwt | downloads | JWT security & best practices. | | eslint-plugin-browser-security | downloads | Browser-specific security & XSS prevention. | | eslint-plugin-vercel-ai-security | downloads | Vercel AI SDK security rules. | | eslint-plugin-express-security | downloads | Express.js security hardening rules. | | eslint-plugin-nestjs-security | downloads | NestJS security rules & patterns. | | eslint-plugin-import-next | downloads | Next-gen import sorting & architecture. |

📄 License

MIT © Ofri Peretz