Overview
Node.js security rules for fs, child_process, vm, and crypto modules
Live from GitHub
This content is fetched directly from README.md on GitHub and cached for 1 hour.
AI-Optimized Security
Every rule includes CWE, OWASP, and CVSS metadata for AI assistants to provide precise, context-aware fixes.
Rules (31)
Browse all Node.js security rules with CWE/OWASP mapping
Changelog
View version history and updates
Security-focused ESLint plugin for Node.js built-in modules (fs, child_process, vm, crypto, Buffer).
Description
This plugin provides Security rules for Node.js core modules (fs, child_process, crypto, etc). By using this plugin, you can proactively identify and mitigate security risks across your entire codebase.
Philosophy
Interlace fosters strength through integration. Instead of stacking isolated rules, we interlace security directly into your workflow to create a resilient fabric of code. We believe tools should guide rather than gatekeep, providing educational feedback that strengthens the developer with every interaction.
Getting Started
- To check out the guide, visit eslint.interlace.tools. ๐
- ่ฆๆฅ็ไธญๆ ๆๅ, ่ฏท่ฎฟ้ฎ eslint.interlace.tools. ๐
- ๊ฐ์ด๋ ๋ฌธ์๋ eslint.interlace.tools์์ ํ์ธํ์ค ์ ์์ต๋๋ค. ๐
- ใฌใคใใฏ eslint.interlace.toolsใงใ็ขบ่ชใใ ใใใ ๐
- Para ver la guรญa, visita eslint.interlace.tools. ๐
- ููุงุทูุงุน ุนูู ุงูุฏูููุ ูู ุจุฒูุงุฑุฉ eslint.interlace.tools. ๐
npm install eslint-plugin-node-security --save-dev๐ก What You Get
- 31 security rules covering Node.js core module vulnerabilities
- Command Injection Detection for
child_process.exec,spawn, andexecFile - Path Traversal Prevention for
fsmodule operations - TOCTOU Race Condition Detection for file system operations
- Cryptographic Security for weak algorithms and key management
- LLM-optimized messages with CWE references and fix guidance
โ๏ธ Configuration Presets
| Preset | Description |
|---|---|
recommended | Balanced security for most Node.js projects |
strict | Maximum security enforcement (all rules as errors) |
fs-security | Focus on file system vulnerabilities (CWE-22, CWE-73) |
crypto | Cryptographic security rules only |
Rules
Legend
| Icon | Description |
|---|---|
| ๐ผ | Recommended: Included in the recommended preset. |
| โ ๏ธ | Warns: Set towarn in recommended preset. |
| ๐ง | Auto-fixable: Automatically fixable by the --fix CLI option. |
| ๐ก | Suggestions: Providing code suggestions in IDE. |
| ๐ซ | Deprecated: This rule is deprecated. |
| Rule | CWE | OWASP | CVSS | Description | ๐ผ | โ ๏ธ | ๐ง | ๐ก | ๐ซ |
|---|---|---|---|---|---|---|---|---|---|
| detect-child-process | CWE-78 | 9.8 | ESLint rule documentation for detect-child-process | ๐ผ | ๐ก | ||||
| detect-eval-with-expression | CWE-95 | 9.8 | ESLint rule documentation for detect-eval-with-expression | ๐ผ | |||||
| detect-non-literal-fs-filename | CWE-22 | 7.5 | ESLint rule documentation for detect-non-literal-fs-filename | ๐ผ | ๐ก | ||||
| detect-suspicious-dependencies | CWE-829 | 8.2 | ESLint rule documentation for detect-suspicious-dependencies | ๐ผ | |||||
| lock-file | CWE-829 | 7.5 | ESLint rule documentation for lock-file | ๐ผ | |||||
| no-arbitrary-file-access | CWE-22 | 7.5 | ESLint rule documentation for no-arbitrary-file-access | ๐ผ | |||||
| no-buffer-overread | CWE-126 | 7.5 | ESLint rule documentation for no-buffer-overread | ๐ผ | |||||
| no-cryptojs | CWE-327 | 5.0 | ESLint rule documentation for no-cryptojs | ๐ผ | โ ๏ธ | ๐ก | |||
| no-cryptojs-weak-random | CWE-338 | 5.3 | ESLint rule documentation for no-cryptojs-weak-random | ๐ผ | ๐ก | ||||
| no-data-in-temp-storage | CWE-312 | 7.5 | ESLint rule documentation for no-data-in-temp-storage | โ ๏ธ | |||||
| no-deprecated-cipher-method | CWE-327 | 5.0 | ESLint rule documentation for no-deprecated-cipher-method | ๐ผ | ๐ก | ||||
| no-dynamic-dependency-loading | CWE-829 | 7.5 | ESLint rule documentation for no-dynamic-dependency-loading | โ ๏ธ | |||||
| no-dynamic-require | CWE-706 | 7.5 | ESLint rule documentation for no-dynamic-require | โ ๏ธ | |||||
| no-ecb-mode | CWE-327 | 7.5 | ESLint rule documentation for no-ecb-mode | ๐ผ | ๐ก | ||||
| no-insecure-key-derivation | CWE-916 | 7.5 | ESLint rule documentation for no-insecure-key-derivation | ๐ผ | ๐ก | ||||
| no-insecure-rsa-padding | CWE-327 | 7.4 | ESLint rule documentation for no-insecure-rsa-padding | ๐ผ | ๐ก | ||||
| no-pii-in-logs | CWE-532 | 7.5 | ESLint rule documentation for no-pii-in-logs | โ ๏ธ | |||||
| no-self-signed-certs | CWE-295 | 7.5 | ESLint rule documentation for no-self-signed-certs | ๐ผ | ๐ก | ||||
| no-sha1-hash | CWE-327 | 7.5 | ESLint rule documentation for no-sha1-hash | ๐ผ | ๐ก | ||||
| no-static-iv | CWE-329 | 7.5 | ESLint rule documentation for no-static-iv | ๐ผ | ๐ก | ||||
| no-timing-unsafe-compare | CWE-208 | 5.9 | ESLint rule documentation for no-timing-unsafe-compare | ๐ผ | โ ๏ธ | ๐ก | |||
| no-toctou-vulnerability | CWE-367 | 7.0 | ESLint rule documentation for no-toctou-vulnerability | ๐ผ | ๐ก | ||||
| no-unsafe-dynamic-require | CWE-706 | 7.5 | ESLint rule documentation for no-unsafe-dynamic-require | ๐ผ | ๐ก | ||||
| no-weak-cipher-algorithm | CWE-327 | 7.5 | ESLint rule documentation for no-weak-cipher-algorithm | ๐ผ | ๐ก | ||||
| no-weak-hash-algorithm | CWE-327 | 7.5 | ESLint rule documentation for no-weak-hash-algorithm | ๐ผ | ๐ก | ||||
| no-zip-slip | CWE-22 | 8.1 | ESLint rule documentation for no-zip-slip | ๐ผ | |||||
| prefer-native-crypto | CWE-327 | 5.0 | ESLint rule documentation for prefer-native-crypto | ๐ผ | โ ๏ธ | ๐ก | |||
| require-dependency-integrity | CWE-494 | 7.5 | ESLint rule documentation for require-dependency-integrity | ||||||
| require-secure-credential-storage | CWE-522 | 7.5 | ESLint rule documentation for require-secure-credential-storage | ||||||
| require-secure-deletion | CWE-459 | 7.5 | ESLint rule documentation for require-secure-deletion | ||||||
| require-storage-encryption | CWE-311 | 7.5 | ESLint rule documentation for require-storage-encryption |
๐ Related ESLint Plugins
Part of the Interlace ESLint Ecosystem โ AI-native security plugins with LLM-optimized error messages:
| Plugin | Downloads | Description |
|---|---|---|
eslint-plugin-secure-coding | General security rules & OWASP guidelines. | |
eslint-plugin-pg | PostgreSQL security & best practices. | |
eslint-plugin-crypto | NodeJS Cryptography security rules. | |
eslint-plugin-jwt | JWT security & best practices. | |
eslint-plugin-browser-security | Browser-specific security & XSS prevention. | |
eslint-plugin-express-security | Express.js security hardening rules. | |
eslint-plugin-lambda-security | AWS Lambda security best practices. | |
eslint-plugin-nestjs-security | NestJS security rules & patterns. | |
eslint-plugin-mongodb-security | MongoDB security best practices. | |
eslint-plugin-vercel-ai-security | Vercel AI SDK security hardening. | |
eslint-plugin-import-next | Next-gen import sorting & architecture. |
๐ License
MIT ยฉ Ofri Peretz
View README.md on GitHub โ
