eslint-plugin-security-rules
v0.8.0
Published
ESLint security rules to help harden your project as early as possible.
Downloads
17,747
Readme
ESLint security rules to help harden your project as early as possible.
NB: This project was written as an artefact for a master's thesis at the IT University of Copenhagen and it should still be considered a work in progress.
Installation
- Requires Node.js
>=14 - Requires ESLint
>=8
yarn add --dev eslint-plugin-security-rulesUsage
To include the recommended eslint-plugin-security-rules to your ruleset add the following to your .eslintrc configuration:
{
"extends": [
"plugin:security-rules/recommended"
],
// Please include the environments that you use when using this plugin. Doing
// so will enhance the tracing algorithm greatly.
"env": {
"node": true,
"browser": true,
"es6": true
},
"overrides": [
{
"files": ["*.ts", "*.tsx"],
"extends": ["plugin:@typescript-eslint/recommended"],
// If you would like to improve the accuracy of the tracing algorithm
// when using typescript, then please include the "project" configuration
// for the @typescript-eslint/parser.
// See more at
// https://github.com/typescript-eslint/typescript-eslint/tree/main/packages/parser#parseroptionsproject
"parserOptions": {
"project": ["./tsconfig.json"]
}
},
]
}Rules
eslint-plugin-security-rules comes with several rulesets, scoped to the environment that they target, allowing you to only enable rules relevant to your project.
'plugin:security-rules/recommended': recommended security rules, including all available rules that you can drop in without any additional configuration.'plugin:security-rules/node': rules related to vulnerabilities occuring in code that is intended to be executed in a NodeJS environment.'plugin:security-rules/browser': rules related to vulnerabilities occuring in code that is intended to be executed in a browser.'plugin:security-rules/universal': rules related to vulnerabilities that may occur regardless of which environment the code is being run.'plugin:security-rules/package': rules related to ensure safe usage of dependencies by scanningpackage.json-files.'plugin:security-rules/react': security related rules targeting code using thereactpackage.'plugin:security-rules/pg': security related rules targeting code using thepg(postgres) package.'plugin:security-rules/mysql': security related rules targeting code using themysqlpackage.
Key:
- ✅ = recommended,
- 🔧 = fixable with suggestion,
- 💭 = enchaned with TypeScript type information,
- 🌩 = requires TypeScript type information
Browser
| Name | Description | ✅ | 🔧 | 💭 | 🌩 | |:--------|:------------|:--:|:--:|:--:|:----:| | security-rules/browser/no-xss | Detects DOM-based XSS vulnerabilities in browser sinks | ✅ | 🔧 | 💭 | |
Node
| Name | Description | ✅ | 🔧 | 💭 | 🌩 | |:--------|:------------|:--:|:--:|:--:|:----:| | security-rules/node/no-unsafe-path | Avoids usage of unsafe paths when interacting with the file-system using "fs" | ✅ | 🔧 | 💭 | | | security-rules/node/no-insecure-ciphers | Detects unsafe ciphers algorithms that should not be used | ✅ | 🔧 | 💭 | |
Universal
| Name | Description | ✅ | 🔧 | 💭 | 🌩 | |:--------|:------------|:--:|:--:|:--:|:----:| | security-rules/universal/no-hardcoded-credentials | Detects hardcoded secrets in a file | | | | | | security-rules/universal/no-vulnerable-dependencies | Determines if import statements exist in a vulnerable version | ✅ | | | |
Package.json
| Name | Description | ✅ | 🔧 | 💭 | 🌩 | |:--------|:------------|:--:|:--:|:--:|:----:| | security-rules/package/no-vulnerable-dependencies | Determines if any of the projects installed dependencies exist in a vulnerable version | ✅ | 🔧 | | |
Package specific rulesets
The following ruleset are related to specific popular packages, scanning for vulnerable usages in these.
React
| Name | Description | ✅ | 🔧 | 💭 | 🌩 | |:--------|:------------|:--:|:--:|:--:|:----:| | security-rules/react/no-xss | Detects DOM-based XSS vulnerabilities introduced in JSX | ✅ | 🔧 | 💭 | |
Postgres (pg)
| Name | Description | ✅ | 🔧 | 💭 | 🌩 | |:--------|:------------|:--:|:--:|:--:|:----:| | security-rules/pg/no-sql-injections | Detects queries vulnerable to SQL Injections | ✅ | 🔧 | 💭 | | | security-rules/pg/no-hardcoded-credentials | Detects hardcoded secrets in a file | ✅ | | 💭 | |
MySQL
| Name | Description | ✅ | 🔧 | 💭 | 🌩 | |:--------|:------------|:--:|:--:|:--:|:----:| | security-rules/mysql/no-sql-injections | Detects queries vulnerable to SQL Injections | ✅ | 🔧 | 💭 | | | security-rules/mysql/no-hardcoded-credentials | Detects hardcoded secrets in a file | ✅ | | 💭 | |
