
Security News
Critical Security Vulnerability in React Server Components
React disclosed a CVSS 10.0 RCE in React Server Components and is advising users to upgrade affected packages and frameworks to patched versions now.
redos-detector
Advanced tools
A CLI and library which tests helps score how vulnerable a regex pattern is to ReDoS attacks. Supported in the browser, Node and Deno.
A CLI and library which tests helps score how vulnerable a regex pattern is to ReDoS attacks. Supported in the browser, Node and Deno.
Note you should make sure that the input string has a sensible length limit, as the amount of work needed to process the input may increase with the length of the string.
1 this means no backtracks can occur and for every possible input string the pattern could only match one way.Note that this tool checks patterns that are expected to run using an engine that implements the ECMA-262 (JS) standard. If your pattern will be run in a different engine please be aware the result given here could be incorrect due to differences in engine behaviour.
With ^(.|a)(.|b)$ there are 6 candidate paths:
.a...ba.abPath 1 and 2 will be put into a group because an input string of a would match both. This would have a candidate score of 2.
Paths 3, 4, 5 and 6 will also be put into a group because an input string of ab would match them all. Therefore this group would have a candidate score of 4.
Therefore the score that's reported would be 4.
Note in reality with the input ab! it would backtrack 5 times (3 for ab, and then 2 for a), but the returned score is just the highest for a given prefix of the input string. This is because we don't know the maximum length the input string could be. E.g. with ^.a*.$ the total number of backtracks will be higher the more a's there are.
https://redosdetector.com/ [Source]
This can be used via the CLI, or as a library. It's on npm.
There's also an ESLint plugin "eslint-plugin-redos-detector".
The following is the structure of the result you will get from both isSafe, isSafePattern and the CLI with the --json flag.
type Root = {
safe: boolean;
error: null | 'hitMaxScore' | 'hitMaxSteps' | 'timedOut';
trails: Trail[];
patternDowngraded: boolean;
pattern: string;
score:
| {
infinite: true;
}
| {
infinite: false;
value: number;
};
};
type Trail = {
trail: {
a: Side;
b: Side;
}[];
};
type Side = {
backreferenceStack: {
index: number;
node: Node;
}[];
node: Node;
quantifierIterations: {
iteration: number;
node: Node;
}[];
};
type Node = {
start: Location;
end: Location;
source: string;
};
type Location = {
offset: number;
};
The following options exist for both the library and CLI:
caseInsensitive: Enable case insensitive mode. (Default: false)unicode: Enable unicode mode. (Default: false)dotAll: Enable dot-all mode, which allows . to match new lines. (Default: false)multiLine: Enable multi-line mode, which changes ^ and $ to match the start or end of any line within the string. (Default: false)maxScore: If the score goes above this number, the regex will be considered unsafe. (Default: 200)maxSteps: The maximum number of steps to make. If this limit is hit error will be hitMaxSteps. You probably don't need to change this. (Default: 20000)timeout: The maximum amount of time (ms) to spend processing. Once this time is passed the trails found so far will be returned, and the error will be timeout. (Default: Infinity)downgradePattern: Automatically downgrade the pattern if it's not supported as is. If this happens patternDowngraded will be true and pattern will contain the downgraded version. An exception may be thrown if the pattern needed to be downgraded and it wasn't. (Default: true)Note it's possible for there to be a infinite number of results, so you should probably make sure at least one of the maxSteps and timeout options is set to a finite number.
$ npx redos-detector check "<regex pattern>" (--caseInsensitive) (--unicode) (--dotAll) (--multiLine) (--maxScore <number>) (--maxSteps <number>) (--timeout <number>) (--alwaysIncludeTrails) (--disableDowngrade) (--resultsLimit <number>) (--json)
to run on the fly or
$ npm i -g redos-detector
to make the command available globally as redos-detector.
By default this will output the result in a text format, and the exit status will be 0 if the pattern is safe, otherwise non-0. You should not try and parse this text output as it may change between any version.
Only the first 15 results will be shown in the text output, but this can be changed with the --resultsLimit option. This option is ignored with --json.
The --json option will result in JSON being outputted containing more information. The structure of this will follow semantic versioning. When this option is used the exit status will always be 0 (unless an exception occurred), so you should always check the safe property to determine if the pattern is safe.
$ npm install redos-detector
The following functions are provided:
isSafe(regexp: RegExp, options?: { maxScore?: number, maxSteps?: number, timeout?: number, downgradePattern?: boolean }): This takes a RegExp. The i and u flags are supported.isSafePattern(pattern: string, options?: { maxScore?: number, maxSteps?: number, timeout?: number, downgradePattern?: boolean, caseInsensitive?: boolean, unicode?: boolean, dotAll?: boolean, multiLine?: boolean }): This takes just the pattern as a string. E.g. a*.downgradePattern(input: { pattern: string, unicode: boolean }: This downgrades the provided pattern to one which is supported. You won't need to use this unless you set the downgradePattern option to false.isSafe(/^([a-c]*)d([a-c]*)$/).safe === true;
because for any given input string this can only match in one way, or not match.
isSafe(/^([a-b]*)([a-c]*)$/).safe === false;
because the input a could match in both places. The input ax could result in both being tried.
The CLI would output the following for this:
Regex is not safe. There could be infinite backtracks.
The following trails show how the same input can be matched multiple ways.
2: `[a-b]` | 10: `[a-c]`
10: `[a-c]` | 10: `[a-c]`
=========================
2: `[a-b]` | 2: `[a-b]`
2: `[a-b]` | 10: `[a-c]`
10: `[a-c]` | 10: `[a-c]`
=========================
The first result means you could have a match where given the same input string, [a-c] takes a character (at position 10), or [a-b] takes a character (at position 2).
Note this could be made good again by making the first group atomic. Atomic groups are not supported directly right now, but can be inferred using a pattern like ^(?=([a-b]*))\1([a-c]*)$ (Demo).
isSafe(/^(a|a)+$/).safe === false;
is bad because in the group a could match on both sides. The input aaaaaa! could result in many combinations being tried.
Here are some great resources, which I found super helpful when building this.
FAQs
A CLI and library which tests helps score how vulnerable a regex pattern is to ReDoS attacks. Supported in the browser, Node and Deno.
The npm package redos-detector receives a total of 21,733 weekly downloads. As such, redos-detector popularity was classified as popular.
We found that redos-detector demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
React disclosed a CVSS 10.0 RCE in React Server Components and is advising users to upgrade affected packages and frameworks to patched versions now.

Research
/Security News
We spotted a wave of auto-generated “elf-*” npm packages published every two minutes from new accounts, with simple malware variants and early takedowns underway.

Security News
TypeScript 6.0 will be the last JavaScript-based major release, as the project shifts to the TypeScript 7 native toolchain with major build speedups.