@litko/yara-x
Version:
- High Performance: Built with [napi-rs](https://napi-rs.com) and [VirusTotal/yara-x](https://github.com/VirusTotal/yara-x) - Async Support: First-class support for asynchronous scanning - WASM Compilation: Compile rules to WebAssembly for portable execut
645 lines (506 loc) • 16.3 kB
Markdown
# @litko/yara-x
## Features
- High Performance: Built with [napi-rs](https://napi-rs.com) and [VirusTotal/yara-x](https://github.com/VirusTotal/yara-x)
- Async Support: First-class support for asynchronous scanning
- WASM Compilation: Compile rules to WebAssembly for portable execution
- Zero Dependencies: No external runtime dependencies
## Usage
### Installation
```bash
npm install @litko/yara-x
```
### Release Integrity
Releases are built on GitHub-hosted runners and published to npm with Trusted Publishing and provenance. Native `.node` artifacts are also covered by GitHub artifact attestations.
Verify npm registry signatures and provenance attestations after install:
```bash
npm audit signatures
```
Verify downloaded native artifacts against GitHub attestations:
```bash
gh attestation verify path/to/yara-x.*.node -R cawalch/node-yara-x
```
### Basic Example
```javascript
import { compile } from "@litko/yara-x";
// Compile yara rules
const rules = compile(`
rule test_rule {
strings:
$a = "hello world"
condition:
$a
}
`);
// Scan a buffer
const buffer = Buffer.from("This is a test with hello world in it");
const matches = rules.scan(buffer);
// Process matches
if (matches.length > 0) {
console.log(`Found ${matches.length} matching rules:`);
matches.forEach((match) => {
console.log(`- Rule: ${match.ruleIdentifier}`);
match.matches.forEach((stringMatch) => {
console.log(
` * Match at offset ${stringMatch.offset}: ${stringMatch.data}`,
);
});
});
} else {
console.log("No matches found");
}
```
## Scanning Files
```javascript
import { fromFile, compile } from "@litko/yara-x";
import { readFileSync } from "fs";
// Load rules from a file
const rules = fromFile("./rules/malware_rules.yar");
try {
// Scan a file directly
const matches = rules.scanFile("./samples/suspicious_file.exe");
console.log(`Found ${matches.length} matching rules`);
} catch (error) {
console.error(`Scanning error: ${error.message}`);
}
```
## Asynchronous Scanning
```javascript
import { compile } from "@litko/yara-x";
async function scanLargeFile() {
const rules = compile(`rule large_file_rule {
strings:
$a = "sensitive data"
condition:
$a
}
`);
try {
// Scan a file asynchronously
const matches = await rules.scanFileAsync("./samples/large_file.bin");
console.log(`Found ${matches.length} matching rules`);
} catch (error) {
console.error(`Async scanning error: ${error.message}`);
}
}
scanLargeFile();
```
## Variables
```javascript
import { compile } from "@litko/yara-x";
// Create a scanner with variables
const rules = compile(
`
rule variable_rule {
condition:
string_var contains "secret" and int_var > 10 and bool_var
}
`,
{
defineVariables: {
string_var: "this is a secret message",
int_var: 20,
bool_var: true,
},
},
);
// Scan with default variables
let matches = rules.scan(Buffer.from("test data"));
console.log(`Matches with default variables: ${matches.length}`);
// Override variables at scan time
matches = rules.scan(Buffer.from("test data"), {
string_var: "no secrets here",
int_var: 5,
bool_var: false,
});
console.log(`Matches with overridden variables: ${matches.length}`);
```
## Namespaces
```javascript
import { compile, create } from "@litko/yara-x";
// Compile a source into a YARA namespace
const rules = compile(
`
rule namespaced_rule {
strings:
$a = "namespace test"
condition:
$a
}
`,
{ namespace: "alpha" },
);
const [match] = rules.scan(Buffer.from("namespace test"));
console.log(match.namespace); // "alpha"
// Add sources incrementally into separate namespaces
const scanner = create();
scanner.addRuleSource('rule shared { strings: $a = "one" condition: $a }', "one");
scanner.addRuleSource('rule shared { strings: $a = "two" condition: $a }', "two");
```
## WASM Compilation
```javascript
import { compile, compileToWasm } from "@litko/yara-x";
// Compile rules to WASM
const rule = `
rule wasm_test {
strings:
$a = "compile to wasm"
condition:
$a
}
`;
// Static compilation
compileToWasm(rule, "./output/rules.wasm");
// Or from a compiled rules instance
const compiledRules = compile(rule);
compiledRules.emitWasmFile("./output/instance_rules.wasm");
// Async compilation
await compiledRules.emitWasmFileAsync("./output/async_rules.wasm");
```
## Incremental Rule Building
```javascript
import { create } from "@litko/yara-x";
// Create an empty scanner
const scanner = create();
// Add rules incrementally
scanner.addRuleSource(`
wrule first_rule {
strings:
$a = "first pattern"
condition:
$a
}
`);
// Add rules from a file
scanner.addRuleFile("./rules/more_rules.yar");
// Add another rule
scanner.addRuleSource(`
rule another_rule {
strings:
$a = "another pattern"
condition:
$a
}
`);
// Now scan with all the rules
const matches = scanner.scan(Buffer.from("test data with first pattern"));
```
## Rule Validation
```javascript
import { validate } from "@litko/yara-x";
// Validate rules without executing them
const result = validate(`
rule valid_rule {
strings:
$a = "valid"
condition:
$a
}
`);
if (result.errors.length === 0) {
console.log("Rules are valid!");
} else {
console.error("Rule validation failed:");
result.errors.forEach((error) => {
console.error(`- ${error.code}: ${error.message}`);
});
}
```
## Advanced Options
```javascript
import { compile } from "@litko/yara-x";
// Create a scanner with advanced options
const rules = compile(
`
rule advanced_rule {
strings:
$a = /hello[[:space:]]world/ // Using POSIX character class
condition:
$a and test_var > 10
}
`,
{
// Define variables
defineVariables: {
test_var: "20",
},
// Compile these rules into a YARA namespace
namespace: "research",
// Enable relaxed regular expression syntax
relaxedReSyntax: true,
// Enable condition optimization
conditionOptimization: true,
// Ignore specific modules
ignoreModules: ["pe"],
// Error on potentially slow patterns
errorOnSlowPattern: true,
// Error on potentially slow loops
errorOnSlowLoop: true,
// Specify directories for include statements (v1.5.0+)
includeDirectories: ["./rules/includes", "./rules/common"],
// Enable or disable include statements (v1.5.0+)
enableIncludes: true,
},
);
```
## Error Handling
### Compilation Errors
```javascript
import { compile } from "@litko/yara-x";
try {
// This will throw an error due to invalid syntax
const rules = compile(`
rule invalid_rule {
strings:
$a = "unclosed string
condition:
$a
}
`);
} catch (error) {
console.error(`Compilation error: ${error.message}`);
// Output: Compilation error: error[E001]: syntax error
// --> line:3:28
// |
// 3 | $a = "unclosed string
// | ^ expecting `"`, found end of file
// 278: }
}
```
### Scanning errors
```javascript
import { compile } from "@litko/yara-x";
const rules = compile(`
rule test_rule {
condition:
true
}
`);
try {
// This will throw if the file doesn't exist
rules.scanFile("/path/to/nonexistent/file.bin");
} catch (error) {
console.error(`Scanning error: ${error.message}`);
// Output: Scanning error: Error reading file: No such file or directory (os error 2)
}
```
### Async Errors
```javascript
import { compile, compileToWasm } from "@litko/yara-x";
async function handleAsyncErrors() {
const rules = compile(`
rule test_rule {
condition:
true
}
`);
try {
await rules.scanFileAsync("/path/to/nonexistent/file.bin");
} catch (error) {
console.error(`Async scanning error: ${error.message}`);
}
try {
await compileToWasm(
"rule test { condition: true }",
"/invalid/path/rules.wasm",
);
} catch (error) {
console.error(`WASM compilation error: ${error.message}`);
}
}
handleAsyncErrors();
```
## Compiler Warnings
```javascript
import { compile } from "@litko/yara-x";
// Create a scanner with a rule that generates warnings
const rules = compile(`
rule warning_rule {
strings:
$a = "unused string"
condition:
true // Warning: invariant expression
}
`);
// Get and display warnings
const warnings = rules.getWarnings();
if (warnings.length > 0) {
console.log("Compiler warnings:");
warnings.forEach((warning) => {
console.log(`- ${warning.code}: ${warning.message}`);
});
}
```
## Include Directories
```javascript
import { compile } from "@litko/yara-x";
// Create a main rule that includes other rules
const mainRule = `
include "common/strings.yar"
include "malware/pe_patterns.yar"
rule main_detection {
condition:
common_string_rule or pe_malware_rule
}
`;
// Compile with include directories
const rules = compile(mainRule, {
includeDirectories: [
"./rules", // Base directory
"./rules/common", // Additional include path
"./rules/malware", // Another include path
],
});
// Scan as usual
const matches = rules.scan(Buffer.from("test data"));
```
## Scan Performance Options
Control scanning behavior for better performance or safety.
### Limiting Matches Per Pattern
Prevent excessive memory usage by limiting the number of matches per pattern:
```javascript
import { compile } from "@litko/yara-x";
const rules = compile(`
rule find_pattern {
strings:
$a = "pattern"
condition:
$a
}
`);
// Limit to 1000 matches per pattern
rules.setMaxMatchesPerPattern(1000);
// Scan data with many occurrences
const data = Buffer.from("pattern ".repeat(10000));
const matches = rules.scan(data);
// Will only return up to 1000 matches per pattern
console.log(`Found ${matches[0].matches.length} matches (limited to 1000)`);
```
### Memory-Mapped File Control
Control whether to use memory-mapped files for scanning:
```javascript
import { compile } from "@litko/yara-x";
const rules = compile(`
rule test {
strings:
$a = "test"
condition:
$a
}
`);
// Disable memory-mapped files for safer scanning
// (slower but safer for untrusted files)
rules.setUseMmap(false);
// Scan file without memory mapping
const matches = rules.scanFile("./sample.bin");
```
### Scan Timeout
Set a timeout for scan operations to prevent runaway scans:
```javascript
import { compile } from "@litko/yara-x";
const rules = compile(`
rule slow_rule {
strings:
$a = /(.+)*\1/
condition:
$a
}
`);
// Set a 5-second timeout
rules.setTimeout(5000);
const matches = rules.scan(Buffer.from("test data"));
```
### Match Context
You can retrieve surrounding bytes around a match by setting the match context size. This is useful for analyzing matches within their broader context.
```javascript
import { compile } from "@litko/yara-x";
const rules = compile(`
rule context_rule {
strings:
$a = "secret"
condition:
$a
}
`);
// Request 10 bytes of context before and after the match
rules.setMatchContextSize(10);
const data = Buffer.from("this is a top secret document containing sensitive info");
const matches = rules.scan(data);
if (matches.length > 0) {
matches[0].matches.forEach(match => {
console.log(`Match: ${match.data}`);
// "secret"
console.log(`Context: ${match.contextData}`);
// " a top secret document"
console.log(`Match offset within context: ${match.contextMatchOffset}`);
});
}
```
## Performance Benchmarks
`node-yara-x` delivers exceptional performance through intelligent scanner caching and optimized Rust implementation.
### Benchmark Results
Test Environment: MacBook Pro M3 Max, 36GB RAM, Release build with LTO
Methodology: Statistical analysis across multiple iterations with percentile reporting
#### Scanner Creation Performance
| Rule Type | Mean | p50 | p95 | p99 |
| -------------- | ------ | ------ | ------ | ------ |
| Simple Rule | 2.43ms | 2.41ms | 2.87ms | 3.11ms |
| Complex Rule | 2.57ms | 2.52ms | 2.96ms | 3.06ms |
| Regex Rule | 7.57ms | 7.47ms | 8.29ms | 8.70ms |
| Multiple Rules | 2.05ms | 2.03ms | 2.24ms | 2.42ms |
#### Scanning Performance by Data Size
| Data Size | Rule Type | Mean | Throughput |
| --------- | -------------- | ----- | ---------- |
| 64 bytes | Simple | 3μs | ~21 MB/s |
| 100KB | Simple | 6μs | ~16.7 GB/s |
| 100KB | Complex | 73μs | ~1.4 GB/s |
| 100KB | Regex | 7μs | ~14.3 GB/s |
| 100KB | Multiple Rules | 73μs | ~1.4 GB/s |
| 10MB | Simple | 204μs | ~49 GB/s |
#### Advanced Features Performance
| Feature | Mean | Notes |
| ----------------- | ---- | -------------------------- |
| Variable Scanning | 1μs | Pre-compiled variables |
| Runtime Variables | 2μs | Variables set at scan time |
| Async Scanning | 11μs | Non-blocking operations |
## API Reference
### Functions
- `compile(ruleSource: string, options?: CompilerOptions)` - Compiles yara rules from a string.
- `compileToWasm(ruleSource: string, outputPath: string, options?: CompilerOptions)` - Compiles yara rules from a string to WASM file.
- `compileFileToWasm(rulesPath: string, outputPath: string, options?: CompilerOptions)` - Compiles yara rules from a file to WASM file.
- `validate(ruleSource: string, options?: CompilerOptions)` - Validates yara rules without executing them.
- `create()` - Creates an empty rules scanner to add rules incrementally.
- `fromFile(rulePath: string, options?: CompilerOptions)` - Compiles yara rules from a file.
### YaraX Methods
- `getWarnings()` - Get compiler warnings.
- `scan(data: Buffer, variables?: Record<string, string | number | boolean>)` - Scan a buffer.
- `scanFile(filePath: string, variables?: Record<string, string | number | boolean>)` - Scan a file.
- `scanAsync(data: Buffer, variables?: Record<string, object | undefined | null>)` - Scan a buffer asynchronously.
- `scanFileAsync(filePath: string, variables?: Record<string, object | undefined | null>)` - Scan a file asynchronously.
- `emitWasmFile(filePath: string)` - Emit compiled rules to WASM file synchronously.
- `emitWasmFileAsync(filePath: string)` - Emit compiled rules to WASM file asynchronously.
- `addRuleSource(rules: string)` - Add rules from a string to an existing scanner.
- `addRuleFile(filePath: string)` - Add rules from a file to an existing scanner.
- `defineVariable(name: string, value: string)` - Define a variable for the YARA compiler.
- `setMaxMatchesPerPattern(maxMatches: number)` - Set the maximum number of matches per pattern.
- `setUseMmap(useMmap: boolean)` - Enable or disable memory-mapped files for scanning.
- `setTimeout(timeoutMs: number)` - Set the scan timeout in milliseconds.
- `setMatchContextSize(size: number)` - Set the number of context bytes to retrieve around the matched string.
### CompilerOptions
- `defineVariables?: object` - Define global variables for the YARA rules.
- `ignoreModules?: string[]` - List of module names to ignore during compilation.
- `bannedModules?: BannedModule[]` - List of banned modules that cannot be used.
- `features?: string[]` - List of features to enable for the YARA rules.
- `relaxedReSyntax?: boolean` - Use relaxed regular expression syntax.
- `conditionOptimization?: boolean` - Optimize conditions in the YARA rules.
- `errorOnSlowPattern?: boolean` - Raise an error on slow patterns.
- `errorOnSlowLoop?: boolean` - Raise an error on slow loops.
- `includeDirectories?: string[]` - **(v1.5.0+)** Directories where the compiler should look for included files.
- `enableIncludes?: boolean` - **(v1.5.0+)** Enable or disable include statements in YARA rules.
## Licenses
This project incorporates code under two distinct licenses:
- **MIT License:**
- The node.js bindings and other code specific to this module are licensed under the MIT license.
- See `LICENSE-MIT` for the full text.
- **BSD-3-Clause License:**
- The included yara-x library is licensed under the BSD-3-Clause license.
- See `LICENSE-BSD-3-Clause` for the full text.