UNPKG

nehonix-uri-processor

Version:

A powerful URI processor for encoding, decoding, and analyzing URI data securely.

58 lines 3.46 kB
/** * Enum defining various malicious pattern types */ export var MaliciousPatternType; (function (MaliciousPatternType) { MaliciousPatternType["SQL_INJECTION"] = "sql_injection"; MaliciousPatternType["XSS"] = "cross_site_scripting"; MaliciousPatternType["COMMAND_INJECTION"] = "command_injection"; MaliciousPatternType["PATH_TRAVERSAL"] = "path_traversal"; MaliciousPatternType["OPEN_REDIRECT"] = "open_redirect"; MaliciousPatternType["SSRF"] = "server_side_request_forgery"; MaliciousPatternType["CRLF_INJECTION"] = "crlf_injection"; MaliciousPatternType["ENCODED_PAYLOAD"] = "encoded_payload"; MaliciousPatternType["SERIALIZATION"] = "serialization_payload"; MaliciousPatternType["TEMPLATE_INJECTION"] = "template_injection"; MaliciousPatternType["SUSPICIOUS_PARAMETER"] = "suspicious_parameter"; MaliciousPatternType["DATA_URI"] = "data_uri"; MaliciousPatternType["SUSPICIOUS_IP"] = "suspicious_ip"; MaliciousPatternType["SUSPICIOUS_TLD"] = "suspicious_tld"; MaliciousPatternType["SUSPICIOUS_DOMAIN"] = "suspicious_domain"; MaliciousPatternType["PROTOCOL_CONFUSION"] = "protocol_confusion"; MaliciousPatternType["HOMOGRAPH_ATTACK"] = "homograph_attack"; MaliciousPatternType["MULTI_ENCODING"] = "multi_encoding"; MaliciousPatternType["UNICODE_EVASION"] = "unicode_evasion"; MaliciousPatternType["FRAGMENT_PAYLOAD"] = "fragment_payload"; MaliciousPatternType["HEADER_INJECTION"] = "header_injection"; MaliciousPatternType["NOSQL_INJECTION"] = "nosql_injection"; MaliciousPatternType["GRAPHQL_INJECTION"] = "graphql_injection"; MaliciousPatternType["DOM_BASED_ATTACK"] = "dom_based_attack"; MaliciousPatternType["FILE_INCLUSION"] = "file_inclusion"; MaliciousPatternType["RFI"] = "remote_file_inclusion"; MaliciousPatternType["PHISHING"] = "phishing"; // New pattern types MaliciousPatternType["PROTOTYPE_POLLUTION"] = "prototype_pollution"; MaliciousPatternType["JWT_MANIPULATION"] = "jwt_manipulation"; MaliciousPatternType["CSS_INJECTION"] = "css_injection"; MaliciousPatternType["HOST_HEADER_INJECTION"] = "host_header_injection"; MaliciousPatternType["DESERIALIZATION"] = "deserialization"; MaliciousPatternType["DOM_CLOBBERING"] = "dom_clobbering"; MaliciousPatternType["CLICKJACKING"] = "clickjacking"; MaliciousPatternType["CORS_MISCONFIGURATION"] = "cors_misconfiguration"; MaliciousPatternType["SUBDOMAIN_TAKEOVER"] = "subdomain_takeover"; MaliciousPatternType["HTTP_PARAMETER_POLLUTION"] = "http_parameter_pollution"; MaliciousPatternType["WEB_CACHE_POISONING"] = "web_cache_poisoning"; MaliciousPatternType["ANOMALY"] = "anomaly"; MaliciousPatternType["ZERO_DAY"] = "zero_day"; //v2.3.0 MaliciousPatternType["RANSOMWARE"] = "ransomware"; MaliciousPatternType["SUSPICIOUS_BEHAVIOR"] = "suspicious_behavior"; MaliciousPatternType["PARAMETER_TAMPERING"] = "parameter_tampering"; MaliciousPatternType["HIGH_ENTROPY"] = "high_entropy"; MaliciousPatternType["KNOWN_THREAT"] = "known_threat"; MaliciousPatternType["RCE"] = "rce"; MaliciousPatternType["ANOMALY_DETECTED"] = "anomaly_detected"; MaliciousPatternType["SUSPICIOUS_EXTENSION"] = "SUSPICIOUS_EXTENSION"; MaliciousPatternType["KNOWN_MALICIOUS_URL"] = "known_malicious_url"; })(MaliciousPatternType || (MaliciousPatternType = {})); //# sourceMappingURL=MaliciousPatterns.service.js.map