nehonix-uri-processor
Version:
A powerful URI processor for encoding, decoding, and analyzing URI data securely.
58 lines • 3.46 kB
JavaScript
/**
* Enum defining various malicious pattern types
*/
export var MaliciousPatternType;
(function (MaliciousPatternType) {
MaliciousPatternType["SQL_INJECTION"] = "sql_injection";
MaliciousPatternType["XSS"] = "cross_site_scripting";
MaliciousPatternType["COMMAND_INJECTION"] = "command_injection";
MaliciousPatternType["PATH_TRAVERSAL"] = "path_traversal";
MaliciousPatternType["OPEN_REDIRECT"] = "open_redirect";
MaliciousPatternType["SSRF"] = "server_side_request_forgery";
MaliciousPatternType["CRLF_INJECTION"] = "crlf_injection";
MaliciousPatternType["ENCODED_PAYLOAD"] = "encoded_payload";
MaliciousPatternType["SERIALIZATION"] = "serialization_payload";
MaliciousPatternType["TEMPLATE_INJECTION"] = "template_injection";
MaliciousPatternType["SUSPICIOUS_PARAMETER"] = "suspicious_parameter";
MaliciousPatternType["DATA_URI"] = "data_uri";
MaliciousPatternType["SUSPICIOUS_IP"] = "suspicious_ip";
MaliciousPatternType["SUSPICIOUS_TLD"] = "suspicious_tld";
MaliciousPatternType["SUSPICIOUS_DOMAIN"] = "suspicious_domain";
MaliciousPatternType["PROTOCOL_CONFUSION"] = "protocol_confusion";
MaliciousPatternType["HOMOGRAPH_ATTACK"] = "homograph_attack";
MaliciousPatternType["MULTI_ENCODING"] = "multi_encoding";
MaliciousPatternType["UNICODE_EVASION"] = "unicode_evasion";
MaliciousPatternType["FRAGMENT_PAYLOAD"] = "fragment_payload";
MaliciousPatternType["HEADER_INJECTION"] = "header_injection";
MaliciousPatternType["NOSQL_INJECTION"] = "nosql_injection";
MaliciousPatternType["GRAPHQL_INJECTION"] = "graphql_injection";
MaliciousPatternType["DOM_BASED_ATTACK"] = "dom_based_attack";
MaliciousPatternType["FILE_INCLUSION"] = "file_inclusion";
MaliciousPatternType["RFI"] = "remote_file_inclusion";
MaliciousPatternType["PHISHING"] = "phishing";
// New pattern types
MaliciousPatternType["PROTOTYPE_POLLUTION"] = "prototype_pollution";
MaliciousPatternType["JWT_MANIPULATION"] = "jwt_manipulation";
MaliciousPatternType["CSS_INJECTION"] = "css_injection";
MaliciousPatternType["HOST_HEADER_INJECTION"] = "host_header_injection";
MaliciousPatternType["DESERIALIZATION"] = "deserialization";
MaliciousPatternType["DOM_CLOBBERING"] = "dom_clobbering";
MaliciousPatternType["CLICKJACKING"] = "clickjacking";
MaliciousPatternType["CORS_MISCONFIGURATION"] = "cors_misconfiguration";
MaliciousPatternType["SUBDOMAIN_TAKEOVER"] = "subdomain_takeover";
MaliciousPatternType["HTTP_PARAMETER_POLLUTION"] = "http_parameter_pollution";
MaliciousPatternType["WEB_CACHE_POISONING"] = "web_cache_poisoning";
MaliciousPatternType["ANOMALY"] = "anomaly";
MaliciousPatternType["ZERO_DAY"] = "zero_day";
//v2.3.0
MaliciousPatternType["RANSOMWARE"] = "ransomware";
MaliciousPatternType["SUSPICIOUS_BEHAVIOR"] = "suspicious_behavior";
MaliciousPatternType["PARAMETER_TAMPERING"] = "parameter_tampering";
MaliciousPatternType["HIGH_ENTROPY"] = "high_entropy";
MaliciousPatternType["KNOWN_THREAT"] = "known_threat";
MaliciousPatternType["RCE"] = "rce";
MaliciousPatternType["ANOMALY_DETECTED"] = "anomaly_detected";
MaliciousPatternType["SUSPICIOUS_EXTENSION"] = "SUSPICIOUS_EXTENSION";
MaliciousPatternType["KNOWN_MALICIOUS_URL"] = "known_malicious_url";
})(MaliciousPatternType || (MaliciousPatternType = {}));
//# sourceMappingURL=MaliciousPatterns.service.js.map