Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/kongbytes/joi-security
Detect security flaws in Joi validation schemas (XSS, SQL injection, ...) 🔥
https://github.com/kongbytes/joi-security
audits hapi joi js security sql-injection typescript validation web-security xss
Last synced: 14 days ago
JSON representation
Detect security flaws in Joi validation schemas (XSS, SQL injection, ...) 🔥
- Host: GitHub
- URL: https://github.com/kongbytes/joi-security
- Owner: kongbytes
- License: agpl-3.0
- Created: 2020-04-14T23:17:59.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2024-06-16T14:17:44.000Z (5 months ago)
- Last Synced: 2024-10-10T13:48:19.199Z (about 1 month ago)
- Topics: audits, hapi, joi, js, security, sql-injection, typescript, validation, web-security, xss
- Language: TypeScript
- Homepage:
- Size: 548 KB
- Stars: 44
- Watchers: 3
- Forks: 3
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Joi security 🔥
**This project provides a CLI for offensive and defensive security assesments on the Joi validator library. The goal is to ensure that a given Joi validation shema can resist against known security attacks such as SQL injections, path traversal and SSRF attempts.**
## Getting started
Install the latest *joi-security* CLI tool using NPM.
```bash
npm install -g joi-security
```Create a sample JavaScript file containing the Joi schema below and name it `schema.js`.
```js
// A sample Joi schema used for login validation
Joi.object().keys({
username: Joi.string().required(),
password: Joi.string().required()
});
```Scan the JS file using the `joi-security` scan command.
```bash
joi-security scan ./schema.js
```Do not include `require` or `return` statements in the provided JS file, an export named `Joi` will be provided. Keep the Joi schema to analyze as last statement in your file, as it will be otherwise ignored.
## Web attacks
The *joi-security* CLI includes by default a wide range of attacks that will be used to test your Joi schemas :
* XSS including Markdown bypass
* SQL injections
* NoSQL injections
* RCE (*Remote Code Execution*)
* LFI (*Local File Inclusion*)
* Overflow
* SSRF
* Suspicious IP addresses
* Homograph attacks on domains & emailsJoi security will also attempt to detect the input content based on key names and perform targeted attacks. For example, when matching with potential phone numbers the CLI will try to perform phone-related attacks against the Joi schema.
Credits to the awesome [PayloadAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings/) repository for the advanced attacks.
## Options & advanced usage
Changing the output format to HTML, defaults to `console` output.
```bash
joi-security scan ./schema.js --output=web
```Each attack may be linked to a set of tags that are displayed below below the payloads (`#xss,advanced`). Ignore a set of malicious payload tags with the `ignore` option, which may provide more accurate results.
```bash
joi-security scan ./schema.js --ignore=sql,markdown,overflow,aws
```## Contributing
Clone this project and make sure to have a complete Node installation (including NPM) on your workstation. Please note that this project has currently been tested with Node LTS 12.
```bash
# Go inside the Joi security project folder
cd joi-security# Install all project dependencies
npm install# Run a first development scan against a Joi schema
npm run dev scan ./sandbox/blogpost-schema.js
```## Copyright and license
"Joi security" is released under the GNU Affero General Public License. Feel free to suggest a feature, report a bug, or ask something: https://github.com/Saluki/joi-security/issues