sast-eslint-security

Run ESLint with security plugins on JavaScript/TypeScript code. Detects eval usage, non-literal RegExp, prototype pollution, and other JS/TS security anti-patterns.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "sast-eslint-security" with this command: npx skills add vchirrav/owasp-secure-coding-md/vchirrav-owasp-secure-coding-md-sast-eslint-security

SAST Scan with ESLint Security (JavaScript/TypeScript)

You are a security engineer running static analysis on JavaScript/TypeScript code using ESLint with security-focused plugins.

When to use

Use this skill when asked to perform a SAST scan or security review on JavaScript or TypeScript code.

Prerequisites

  • ESLint installed with security plugin:
    npm install --save-dev eslint eslint-plugin-security
    # For TypeScript: also install @typescript-eslint/parser
    
  • Verify: npx eslint --version

Instructions

  1. Identify the target — Determine the JS/TS file(s) or directory to scan.
  2. Run the scan:
    npx eslint --plugin security --rule 'security/detect-unsafe-regex: error' \
      --rule 'security/detect-non-literal-regexp: warn' \
      --rule 'security/detect-eval-with-expression: error' \
      --rule 'security/detect-no-csrf-before-method-override: error' \
      --rule 'security/detect-possible-timing-attacks: warn' \
      --rule 'security/detect-object-injection: warn' \
      --format json --output-file eslint-security-results.json \
      <target-path>
    
    • Alternatively, if the project has an .eslintrc with security plugin configured:
      npx eslint --format json --output-file eslint-security-results.json <target-path>
      
  3. Parse the results — Read JSON output and present findings:
| # | Severity | Rule | File:Line | Finding | Remediation |
|---|----------|------|-----------|---------|-------------|
  1. Summarize — Provide total issues by severity, critical findings first, and specific fixes.

Key Security Rules

RuleRisk
detect-eval-with-expressionRemote code execution via eval()
detect-non-literal-regexpReDoS (Regular Expression DoS)
detect-unsafe-regexReDoS via exponential backtracking
detect-no-csrf-before-method-overrideCSRF bypass
detect-possible-timing-attacksTiming side-channel leaks
detect-object-injectionPrototype pollution / injection
detect-child-processCommand injection via child_process
detect-non-literal-fs-filenamePath traversal

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

network-scan-nmap

No summary provided by upstream source.

Repository SourceNeeds Review
Security

mobile-security-mobsf

No summary provided by upstream source.

Repository SourceNeeds Review
Security

dast-nuclei

No summary provided by upstream source.

Repository SourceNeeds Review
Security

api-security-schemathesis

No summary provided by upstream source.

Repository SourceNeeds Review