Skip to content

Latest commit

 

History

History
207 lines (161 loc) · 5.88 KB

README.md

File metadata and controls

207 lines (161 loc) · 5.88 KB

JavaScript Regex Security Scanner

A static analyzer to scan JavaScript and TypeScript code for problematic regular expressions.

Getting started

The scanner is available as a container image that you can run against any JavaScript or TypeScript project. For example, to scan the current directory:

docker run --rm -v $(pwd):/project docker.io/ericornelissen/js-re-scan:latest

NOTE: To use Podman instead of Docker you can replace docker by podman in any example command.

Ignore patterns

If necessary you can ignore certain files or directories using the option --ignore-pattern. For example, to ignore vendored code to focus on problems in your own project you can use:

docker run --rm -v $(pwd):/project docker.io/ericornelissen/js-re-scan:latest  \
  --ignore-pattern vendor/

Exit codes

The scanner has the following exit codes.

Exit code Meaning
0 No problems found
1 Files with problematic regular expressions found
2 Something went wrong while scanning

Features

  • Detect cases of exponential and polynomial backtracking.
  • Detect super-linear worst-case runtime caused by a regex being moved across the input string.
  • Ignore generated code based on standard file and folder patterns.
  • Ignore tests based on standard file and folder patterns.
  • Scan documentation.

Migrating to ESLint

If you have found this scanner helpful, consider using eslint-plugin-regexp instead. This ESLint plugin is what powers the scanner, and it may integrate better with your project's existing workflows.

Follow these steps to update your ESLint setup to cover what this scanner does:

  1. Install the plugin:

    npm install --save-dev eslint-plugin-regexp
  2. Update your ESLint configuration:

    • ESLint v9 with flat config:

      import regexp from "eslint-plugin-regexp";
      // ... other plugins you're already using
      
      export default [
        {
          files: ["**/*.{js,jsx,cjs,mjs,ts,cts,mts}"],
          plugins: {
            regexp,
          },
          rules: {
            "regexp/no-super-linear-backtracking": [
              "error",
              {
                "report": "certain"
              }
            ],
            "regexp/no-super-linear-move": [
              "error",
              {
                "ignorePartial": false,
                "ignoreSticky": false,
                "report": "certain"
              }
            ]
          }
        }
        // ... rest of your configuration
      ];
    • ESLint v8 and earlier or legacy config:

      # .eslintrc.yml or similar
      
      plugins:
        # ... other plugins you're already using
        - regexp
      
      rules:
        # ... other rules you already configured
        regexp/no-super-linear-backtracking:
          - error
          - report: certain
        regexp/no-super-linear-move:
          - error
          - ignorePartial: false
            ignoreSticky: false
            report: certain
      
      # ... rest of your configuration
      // .eslintrc.json, .eslintrc.js or similar
      
      {
        "plugins": [
          // ... other plugins you're already using
          "regexp"
        ],
        "rules": {
          // ... other rules you already configured
          "regexp/no-super-linear-backtracking": [
            "error",
            {
              "report": "certain"
            }
          ],
          "regexp/no-super-linear-move": [
            "error",
            {
              "ignorePartial": false,
              "ignoreSticky": false,
              "report": "certain"
            }
          ]
        }
        // ... rest of your configuration
      }

Build from source

If you want you can build the scanner from scratch. From the root of this project run something like:

docker build --file Containerfile .

Or use the convenience Make target:

make build ENGINE=docker

Philosophy

This scanner aims to provide developers with a tool to find vulnerable regular expression in their code. As such, the goal is to only report true positives. The result is that all findings are relevant, but a clean report does not mean your project has no vulnerable regular expressions.

This is contrast to tools like redos-detector, which will find vulnerable regular expressions this scanner won't, but also reports false positives. As it is difficult to determine if a particular report is a false positive, other tools are hard to use.

Behind the scenes

This scanner runs ESLint with the eslint-plugin-regexp plugin to find and report on regular expressions that violate rules with security implications.

TypeScript support is provided by @typescript-eslint/parser, MarkDown support is provided by @eslint/markdown.

License

This project is licensed under the Apache 2.0 license, see LICENSE for the full license text. The documentation text is licensed under CC BY-SA 4.0.


Please open an issue if you found a mistake or if you have a suggestion for how to improve the documentation.