Security News
Input Validation Vulnerabilities Dominate MITRE's 2024 CWE Top 25 List
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
treehugger.js
is a Javascript library for program processing. It
has generic means to represent and manipulate (analyze, transform)
abstract syntax trees (ASTs).
It consists of three parts:
lib/treehugger/tree.js
lib/treehugger/traverse.js
lib/treehugger/js/*.js
The project relies on require.js for library loading.
ast.js uses a few simple data structures to represent ASTs and a textual representation that makes it easy to debug and write these ASTs. The textual representation is best introduced by example.
Consider a simple expresion language with expression as follows:
2 + 3 * 1
A parser could turn this into the following AST:
Add
/ \
Num Mul
| / \
2 Num Num
| |
3 1
Which is expressed using treehugger.js's textual representation as follows:
Add(Num("2"), Mul(Num("3"), Num("1")))
Using the treehugger.js
API this AST can be contructed as follows:
var tree = require('treehugger/tree');
var node = tree.cons("Add", [tree.cons("Num", [tree.string("2")]),
tree.cons("Mul", [tree.cons("Num", [tree.string("3")]),
tree.cons("Num", [tree.string("1")])])]);
Or, more simply:
var node = tree.parse('Add(Num("2"), Mul(Num("3"), Num("1")))');
treehugger.js has three kinds of AST node types:
"2"
, "myVariable"
), usually representing identifiers or other
textual values.["a", "b", None()]
)None()
or Num("2")
), used to represent
language constructs in the language, such as operators, loop constructs, etc.Treehugger.js is based on the concept of generic traversals. A generic traversal traverses the tree in a particular order, for instance from top to bottom or from the bottom up. At every node the traversal comes accross you can apply one or transformations. Tranformations can either be AST patterns, transformation functions or a combination of both.
The treehugger/traverse.js
library adds a number of methods to AST nodes that make traversals simpler:
collectTopDown
(traverses the tree top to bottom until finding a match, collecting all matches and returning them as a list)traverseTopDown
(traverses the tree top to bottom until finding a match)A transformation can be either:
Each transform either matches or doesn't match. If a transformation function matches,
it returns a non-falsy value (usually a new AST node), if it doesn't, it returns false
.
A simple example:
var node = tree.parse('Add(Num("2"), Mul(Num("3"), Num("1")))');
node.collectTopDown("Num(_)").debug();
This will traverse the AST and look for nodes that match the Num(_) pattern,
where _
(a wildcard) can be anything. The collectTopDown
traversal traverses
the AST from top to bottom, and on the way collects all matches and returns them
as an ListNode
. The result of the collectTopDown
call in this case will be:
[Num("2"), Num("3"), Num("1")]
The .debug()
call prints the result to the Javascript console (console.log
).
So, what if we want to only return the numbers, not the Num(...)
constructors?
If we follow a textual pattern by a function, we can transform the result:
var node = tree.parse('Add(Num("2"), Mul(Num("3"), Num("1")))');
node.collectTopDown("Num(n)", function(b) { return b.n; }).debug();
Instead of using the placeholder _
, we now used n
. The function is passed a
bindings object whose n
property will contain the value of the placeholder.
So, the following will be printed to the Javascript console:
["2", "3", "1"]
If we want to match either Num
or Mul
nodes we can add a pattern for that
to the collectTopDown
call:
var node = tree.parse('Add(Num("2"), Mul(Num("3"), Num("1")))');
node.collectTopDown(
"Num(n)", function(b) {
return b.n;
},
"Mul(op1, op2)", function(b) {
return b.op1;
}
).debug();
This will print:
["2", Num("3")]
Why is that? The AST is traversed top to bottom by collectTopDown
. On its way, it will
try to match every node first against the Num(n)
pattern. If that succeeds,
the function after it in the argument list is executed, if the function returns
a value other than false
, the traversal stops at that branch and the result
is added to the result list. If the "Num(n)"
pattern did not match, it is
matched against "Mul(op1, op2)"
. Again, if this pattern matches, the function
is executed etc. etc. The collectTopDown
traversal will not traverse down to the
Num("3")
and Num("1")
nodes, because the traversal stopped when matching the
Mul(..., ...)
node -- if, instead the tranformation function would have returned
`false, the traversal would have proceeded down those nodes as well.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
You can see treehugger.js in action in this simple demo.
FAQs
treehugger is a Javascript library for program processing
The npm package treehugger receives a total of 1 weekly downloads. As such, treehugger popularity was classified as not popular.
We found that treehugger demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.
Research
Security News
A threat actor's playbook for exploiting the npm ecosystem was exposed on the dark web, detailing how to build a blockchain-powered botnet.