Security News
Supply Chain Attack Detected in Solana's web3.js Library
A supply chain attack has been detected in versions 1.95.6 and 1.95.7 of the popular @solana/web3.js library.
perfect-express-sanitizer
Advanced tools
a complete package to control user input data to prevent Cross Site Scripting (XSS) ,Sql injection and no Sql injection attack
A complete package to control user input data to prevent Cross Site Scripting (XSS) ,Sql injection and no Sql injection attack.
it can control body, query and header of the requests and clear all dirty stuff that might effect on your application.
Install via NPM:
npm install perfect-express-sanitizer
This package is not limited to express and you can easily use it by calling method in every JS project.
const perfectExpressSanitizer = require("perfect-express-sanitizer");
const input = perfectExpressSanitizer.sanitize.prepareSanitize(
"<script>alert('test')</script> bob miler",
{ xss: true, noSql: true, sql: true, level: 5 });
console.log(input);
//------------ output ---------------
// " bob miler"
control input base on your requirements.
const sanitizer = require("perfect-express-sanitizer");
app.use(sanitizer.clean({
xss: true,
noSql: true,
sql: true
}));
use white list for some routes that you want to skip ignore
const whiteList = ['/users', '/users/list', '/users/search?age'];
app.use(sanitizer.clean({
xss: true,
noSql: true,
sql: true
}, whiteList));
by default, this package sanitize all inputs from body, query and header you can custom parts that you want to filter and sanitize user inputs.
for example you want to sanitize only body and query you can use below config.
app.use(sanitizer.clean({
xss: true,
noSql: true,
}, whiteList = [], only = ["body", "query"]));
setting level from 1 to 5 for sql or nosql sanitizer.
higher level contain lower level policies and check more keywords why define different level? sometimes you need to check only general keywords and all of your routes or some of them sending query or you don't need to set entire policies for them at this point you can set proper level for your application, higher level suggested.
const sanitizer = require("perfect-express-sanitizer");
app.use(sanitizer.clean({
xss: true,
noSql: true,
sql: true,
sqlLevel: 5,
noSqlLevel: 5
}));
you can add options to specify allowed keys to be skipped at sanitization
app.use(sanitizer.clean({
xss: true,
noSql: true,
sql: true,
sqlLevel: 5,
noSqlLevel: 5,
allowedKeys: ['name']
}));
you can add options to specify allowed tags to sanitize it and remove other tags
app.use(sanitizer.clean({
xss: true,
noSql: true,
sql: true,
sqlLevel: 5,
noSqlLevel: 5,
allowedKeys: ['h1']
}));
you can check user input that it has dangerous keywords or not! with below code.
const perfectExpressSanitizer = require("perfect-express-sanitizer");
//xss
const result = await perfectExpressSanitizer.detectXss('bob try to <"alert(1)');
console.log(result);
//------------ output ---------------
//true
//Sql Injection
const result = await perfectExpressSanitizer.detectSqlInjection(' bob try to create table', 5);
console.log(result);
//------------ output ---------------
//true
//NoSql Injection
const result = await perfectExpressSanitizer.detectNoSqlInjection('bob try to findOne', 5);
console.log(result);
//------------ output ---------------
//true
Pull requests are always welcome! Please base pull requests against the main branch and follow the contributing guide.
if your pull requests makes documentation changes, please update readme file.
This project is licensed under the terms of the MIT license
FAQs
a complete package to control user input data to prevent Cross Site Scripting (XSS) ,Sql injection and no Sql injection attack
We found that perfect-express-sanitizer demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
A supply chain attack has been detected in versions 1.95.6 and 1.95.7 of the popular @solana/web3.js library.
Research
Security News
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
Security News
Research
Socket researchers have discovered malicious npm packages targeting crypto developers, stealing credentials and wallet data using spyware delivered through typosquats of popular cryptographic libraries.