sast-eslint-security
SAST Scan with ESLint Security (JavaScript/TypeScript)
You are a security engineer running static analysis on JavaScript/TypeScript code using ESLint with security-focused plugins.
When to use
Use this skill when asked to perform a SAST scan or security review on JavaScript or TypeScript code.
Prerequisites
- ESLint installed with security plugin:
npm install --save-dev eslint eslint-plugin-security # For TypeScript: also install @typescript-eslint/parser - Verify:
npx eslint --version
Instructions
- Identify the target — Determine the JS/TS file(s) or directory to scan.
- Run the scan:
npx eslint --plugin security --rule 'security/detect-unsafe-regex: error' \ --rule 'security/detect-non-literal-regexp: warn' \ --rule 'security/detect-eval-with-expression: error' \ --rule 'security/detect-no-csrf-before-method-override: error' \ --rule 'security/detect-possible-timing-attacks: warn' \ --rule 'security/detect-object-injection: warn' \ --format json --output-file eslint-security-results.json \ <target-path>- Alternatively, if the project has an
.eslintrcwith security plugin configured:npx eslint --format json --output-file eslint-security-results.json <target-path>
- Alternatively, if the project has an
- Parse the results — Read JSON output and present findings:
| # | Severity | Rule | File:Line | Finding | Remediation |
|---|----------|------|-----------|---------|-------------|
- Summarize — Provide total issues by severity, critical findings first, and specific fixes.
Key Security Rules
| Rule | Risk |
|---|---|
detect-eval-with-expression |
Remote code execution via eval() |
detect-non-literal-regexp |
ReDoS (Regular Expression DoS) |
detect-unsafe-regex |
ReDoS via exponential backtracking |
detect-no-csrf-before-method-override |
CSRF bypass |
detect-possible-timing-attacks |
Timing side-channel leaks |
detect-object-injection |
Prototype pollution / injection |
detect-child-process |
Command injection via child_process |
detect-non-literal-fs-filename |
Path traversal |
More from vchirrav/product-security-ai-skills
network-scan-nmap
Run Nmap for network discovery and security auditing. Performs port scanning, service detection, OS fingerprinting, and vulnerability script scanning.
35dast-nuclei
Run Nuclei template-based vulnerability scanner. Uses 8000+ community templates to detect CVEs, misconfigurations, exposures, and default credentials on web targets.
17malware-scan-yara
Run YARA rules for pattern-based malware identification. Scans files and directories against community and custom rule sets to detect malicious indicators.
14dast-zap
Run OWASP ZAP for Dynamic Application Security Testing. Performs baseline, full, or API scans against running web applications to find XSS, SQLi, CSRF, and other runtime vulnerabilities.
8api-security-spectral
Run Spectral to lint OpenAPI and AsyncAPI specs for security issues. Validates API design for authentication, authorization, rate limiting, and input validation patterns.
7secure-coding-audit
Audit code for security vulnerabilities using OWASP Secure Coding rules. Automatically detects the security domain (auth, API, Docker, K8s, CI/CD, etc.) and validates against the relevant checklist rules, citing specific Rule IDs.
7