skills/igbuend/grimbard/redos-anti-pattern

redos-anti-pattern

SKILL.md

ReDoS (Regular Expression Denial of Service) Anti-Pattern

Severity: High

Summary

Poorly written regex patterns take extremely long to evaluate malicious input, causing applications to hang and consume 100% CPU from a single request. Caused by catastrophic backtracking in patterns with nested quantifiers ((a+)+) or overlapping alternations.

The Anti-Pattern

The anti-pattern is regex with exponential-time complexity for input validation. Small input length increases cause exponential computation time growth.

BAD Code Example

// VULNERABLE: Nested quantifiers cause catastrophic backtracking.

// Validates string of 'a's followed by 'b'.
// `(a+)+` is the "evil" pattern creating catastrophic backtracking.
const VULNERABLE_REGEX = /^(a+)+b$/;

function validateString(input) {
    console.time('Regex Execution');
    const result = VULNERABLE_REGEX.test(input);
    console.timeEnd('Regex Execution');
    return result;
}

// Normal: validateString("aaab"); // -> true, < 1ms

// Attack: string that almost matches
const malicious_input = "aaaaaaaaaaaaaaaaaaaaaaaaaaaaab"; // 30 'a's + 'b'

// `(a+)+` matches 'a's in exponential ways.
// "aaa" → (a)(a)(a), (aa)(a), (a)(aa), (aaa)
// Engine tries all combinations.
// 30 'a's → over 1 billion backtracking steps, freezing process.
validateString(malicious_input); // Hangs for very long time.

GOOD Code Example

// SECURE: Linear-time regex or add controls.

// Option 1 (Best): Remove nested quantifier.
// Functionally identical, linear-time complexity.
const SAFE_REGEX = /^a+b$/;

function validateStringSafe(input) {
    console.time('Regex Execution');
    // Fails almost instantly for malicious input.
    const result = SAFE_REGEX.test(input);
    console.timeEnd('Regex Execution');
    return result;
}

// Option 2: Input length limit (defense-in-depth).
const MAX_LENGTH = 50;
function validateStringWithLimit(input) {
    if (input.length > MAX_LENGTH) {
        throw new Error("Input exceeds maximum length.");
    }
    // Prefer safe regex, but this provides fallback.
    return VULNERABLE_REGEX.test(input);
}

// Option 3: Use ReDoS-safe engine (Google RE2)
// Guarantees linear-time, avoids catastrophic backtracking.

Detection

  • Scan for "evil" regex patterns: The most common red flags are nested quantifiers. Look for patterns like:
    • (a+)+
    • (a*)*
    • (a|a)+
    • (a?)*
  • Look for alternations with overlapping patterns: (a|b)* is safe, but (a|ab)* is not, because ab can be matched in two different ways.
  • Use static analysis tools: There are many linters and security scanners that are specifically designed to detect vulnerable regular expressions in your code (e.g., safe-regex for Node.js).
  • Test with "almost matching" strings: To test a regex, create a long string that matches the repeating part of the pattern but fails at the very end. If the execution time increases dramatically with the length of the string, it is likely vulnerable.

Prevention

  • Avoid nested quantifiers: Most important rule. Rewrite (a+)+ as a+.
  • Avoid overlapping alternations: Use (a|b) not (a|ab) within repeated groups.
  • Limit input length: Validate input length before complex regex. Caps execution time (crude but effective defense).
  • Use timeouts: Regex match timeouts prevent indefinite freezing (doesn't fix underlying vulnerability).
  • Use ReDoS-safe engines: Google RE2 guarantees linear-time, immune to catastrophic backtracking.

Related Security Patterns & Anti-Patterns

References

Weekly Installs
3
GitHub Stars
4
First Seen
Feb 19, 2026
Installed on
openclaw3
claude-code3
replit3
codex3
kiro-cli3
kimi-cli3