npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

taro-plugin-vue-security

v1.1.0

Published

A Taro plugin that performs security scans on Taro projects during the build process with advanced semantic analysis and enterprise-grade reporting

Readme

Taro Plugin for Vue Security Scanning

A Taro plugin that performs security scans on Taro projects during the build process with advanced semantic analysis and enterprise-grade reporting.

🚀 Features

Core Security Features

  • Advanced Semantic Analysis: AST-based code analysis for enhanced accuracy

    • Reduces false positives through code context understanding
    • Supports JavaScript, TypeScript, JSX, and TSX syntax
    • Detects dangerous function calls with user input tracking
    • Identifies unsafe property access patterns
    • Provides confidence level assessment (High/Medium/Low)
    • Intelligent merging with regex-based detection
  • Taro-Specific Security Checks: Comprehensive security analysis for Taro features

    • Taro API Security: Checks for safe usage of Taro.request, Taro.uploadFile, etc.
    • Navigation Security: Validates Taro navigation API usage and parameter handling
    • Form Security: Inspects form handling and selector query usage
    • Config Security: Reviews Taro config files for security issues
  • Enhanced Dependency Security: Comprehensive dependency vulnerability scanning

    • Integrated npm audit for real-time vulnerability detection
    • Built-in vulnerability database for common packages
    • Outdated dependency detection
    • License compliance checking
    • Vulnerability caching for performance optimization
    • Support for transitive dependency analysis
  • Advanced Reporting: Enterprise-grade reporting capabilities

    • Trend analysis with historical data comparison
    • Compliance reports (OWASP, GDPR, HIPAA, PCI-DSS, SOX)
    • Vulnerability distribution analysis
    • CWE and OWASP Top 10 mapping
    • Fix complexity assessment
    • Priority-based recommendations
    • Interactive HTML reports with visual dashboards

Integration Features

  • Build Process Integration: Seamlessly integrates with Taro's build process

    • Runs security scans during development and production builds
    • Configurable scan timing (pre-build, post-build, or both)
    • Build failure options based on security issue severity
  • Developer Experience: Designed for a smooth developer workflow

    • Clear and concise security issue reports
    • Integration with Taro CLI output
    • Configurable reporting levels
    • Ignore patterns for false positives

📦 Installation

# Using npm
npm install --save-dev taro-plugin-vue-security

# Using yarn
yarn add --dev taro-plugin-vue-security

# Using pnpm
pnpm add --save-dev taro-plugin-vue-security

🔧 Configuration

Basic Configuration

Add the plugin to your config/index.js or config/dev.js file:

// config/index.js
const config = {
  // ... other Taro config
  plugins: [
    // ... other plugins
    'taro-plugin-vue-security'
  ]
};

module.exports = config;

Advanced Configuration

// config/index.js
const config = {
  // ... other Taro config
  plugins: [
    // ... other plugins
    ['taro-plugin-vue-security', {
      // Basic options
      enabled: true,
      failOnError: false, // Whether to fail the build on security issues
      reportLevel: 'warning', // 'error', 'warning', or 'info'
      outputFile: './security-report.json', // Optional output file for security report
      exclude: [], // Patterns to exclude from scanning
      
      // Advanced features
      enableSemanticAnalysis: true, // Enable AST-based semantic analysis
      enableDependencyScanning: true, // Enable dependency vulnerability scanning
      enableAdvancedReport: false, // Enable advanced reporting with trends and compliance
      reportHistoryPath: '.taro-security-reports', // Path for report history
      complianceStandards: ['OWASP', 'GDPR', 'HIPAA', 'PCI-DSS', 'SOX'], // Compliance standards to check
      
      // Taro-specific options
      enableTaroSpecificRules: true, // Enable Taro-specific security rules
      taroApiSecurity: true, // Enable Taro API security checks
      taroNavigationSecurity: true, // Enable Taro navigation security checks
      taroFormSecurity: true, // Enable Taro form security checks
      taroConfigSecurity: true // Enable Taro config security checks
    }]
  ]
};

module.exports = config;

🎯 Usage

During Development

When running taro dev, the plugin will automatically scan your codebase and report any security issues:

taro dev

During Build

When running taro build, the plugin will scan your codebase before the build process:

taro build --type weapp

Security Report

The plugin generates a security report that includes:

  • Summary of scanned files and found vulnerabilities
  • Detailed list of security issues with severity levels
  • Code snippets showing the vulnerable code
  • Recommendations for fixing each issue
  • Dependency vulnerability information (if enabled)
  • Compliance status (if advanced reporting is enabled)

🛡️ Security Rules

The plugin includes the following security rules specifically for Taro:

Taro API Security

  • Detects insecure usage of Taro.request
  • Checks for unsafe Taro.uploadFile usage
  • Identifies insecure Taro.downloadFile usage
  • Verifies safe usage of Taro storage APIs

Navigation Security

  • Detects unsafe Taro.navigateTo usage
  • Checks for insecure Taro.redirectTo usage
  • Identifies unsafe Taro.switchTab usage
  • Verifies safe parameter passing in navigation

Form Security

  • Detects insecure Taro.createSelectorQuery usage
  • Checks for unsafe form submission handling
  • Identifies potential DOM manipulation vulnerabilities

Config Security

  • Detects hardcoded secrets in Taro config files
  • Checks for insecure configuration settings
  • Identifies potential security misconfigurations

📋 Configuration Options

| Option | Type | Default | Description | |--------|------|---------|-------------| | enabled | boolean | true | Whether to enable the plugin | | failOnError | boolean | false | Whether to fail the build on security issues | | reportLevel | string | 'warning' | Minimum severity level to report ('error', 'warning', or 'info') | | outputFile | string | null | Optional output file for security report | | exclude | array | [] | Patterns to exclude from scanning | | enableSemanticAnalysis | boolean | true | Enable AST-based semantic analysis | | enableDependencyScanning | boolean | true | Enable dependency vulnerability scanning | | enableAdvancedReport | boolean | false | Enable advanced reporting with trends and compliance | | reportHistoryPath | string | '.taro-security-reports' | Path for report history | | complianceStandards | array | ['OWASP', 'GDPR', 'HIPAA', 'PCI-DSS', 'SOX'] | Compliance standards to check | | enableTaroSpecificRules | boolean | true | Enable Taro-specific security rules | | taroApiSecurity | boolean | true | Enable Taro API security checks | | taroNavigationSecurity | boolean | true | Enable Taro navigation security checks | | taroFormSecurity | boolean | true | Enable Taro form security checks | | taroConfigSecurity | boolean | true | Enable Taro config security checks |

🔄 Integration with Other Tools

CI/CD Integration

The plugin can be integrated with CI/CD pipelines to automatically scan for security issues during builds:

# GitHub Actions example
jobs:
  security-scan:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v3
      - name: Set up Node.js
        uses: actions/setup-node@v3
        with:
          node-version: '18'
      - name: Install dependencies
        run: npm ci
      - name: Run security scan
        run: taro build --type weapp

IDE Integration

For better developer experience, consider using the Vue Security Scanner VS Code extension alongside this plugin.

📁 Project Structure

taro-project/
├── config/
│   ├── index.js          # Taro config with plugin setup
│   └── dev.js            # Development config
├── src/
│   ├── pages/
│   │   └── index/
│   │       ├── index.tsx # Page component
│   │       └── index.config.ts # Page config
│   └── app.tsx           # App entry
├── package.json
└── .taro-security-reports/ # Generated security reports

🚀 Getting Started

  1. Install the plugin:

    npm install --save-dev taro-plugin-vue-security
  2. Configure the plugin in your Taro config:

    // config/index.js
    const config = {
      plugins: [
        'taro-plugin-vue-security'
      ]
    };
  3. Run your Taro project:

    taro dev
  4. Check the security report in your console output or specified output file.

📝 Changelog

v1.0.0

  • Initial release
  • Added Taro API security checks
  • Added navigation security checks
  • Added form security checks
  • Added config security checks
  • Added dependency scanning
  • Added advanced reporting

🤝 Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

📄 License

MIT

🔗 Related Links