Security-focused ESLint plugin with 24 AI-parseable rules for cryptographic best practices. Detects weak algorithms, insecure key handling, CVE-specific vulnerabilities, and deprecated crypto patterns.
npm install eslint-plugin-crypto
Cryptographic security rules enforcing best practices and modern standards (Node.js crypto).
This plugin provides Cryptographic security rules enforcing best practices and modern standards (Node.js crypto).
By using this plugin, you can proactively identify and mitigate security risks across your entire codebase.
Interlace fosters strength through integration. Instead of stacking isolated rules, we interlace security directly into your workflow to create a resilient fabric of code. We believe tools should guide rather than gatekeep, providing educational feedback that strengthens the developer with every interaction.
- To check out the guide, visit eslint.interlace.tools. ๐
- ่ฆๆฅ็ไธญๆ ๆๅ, ่ฏท่ฎฟ้ฎ eslint.interlace.tools. ๐
- ๊ฐ์ด๋ ๋ฌธ์๋ eslint.interlace.tools์์ ํ์ธํ์ค ์ ์์ต๋๋ค. ๐
- ใฌใคใใฏ eslint.interlace.toolsใงใ็ขบ่ชใใ ใใใ ๐
- Para ver la guรญa, visita eslint.interlace.tools. ๐
- ููุงุทูุงุน ุนูู ุงูุฏูููุ ูู
ุจุฒูุงุฑุฉ eslint.interlace.tools. ๐
``bash`
npm install eslint-plugin-crypto --save-dev
| Balanced security defaults for most projects |
| strict | Strict preset - all rules as errors |
| cryptojs-migration | For teams migrating from crypto-js |
| nodejs-only | Only Node.js crypto rules |
| cve-focused | Rules targeting specific CVEs |๐ Supported Libraries
| Library | npm | Downloads | Detection |
| ------------------ | ------------------------------------------------------------------------------------------------------------------ | ---------------------------------------------------------------------------------------------------------------------- | --------------------------------- |
| crypto (Node.js) |  | - | Weak Algo, Key Length, Randomness |
| crypto-js |  |  | Legacy patterns, Weak PRNG |Examples
$3
`javascript
// CVE-2023-46809: Marvin Attack
crypto.privateDecrypt({ key, padding: crypto.constants.RSA_PKCS1_PADDING }, buffer);// CWE-338: Weak random
const token = Math.random().toString(36);
// CWE-327: ECB mode leaks patterns
crypto.createCipheriv('aes-256-ecb', key, iv);
// CWE-208: Timing attack
if (userToken === storedToken) { ... }
`$3
`javascript
// Use OAEP padding
crypto.privateDecrypt({ key, padding: crypto.constants.RSA_PKCS1_OAEP_PADDING }, buffer);// Secure random
const token = crypto.randomBytes(32).toString('hex');
// GCM provides authentication
crypto.createCipheriv('aes-256-gcm', key, iv);
// Constant-time comparison
if (crypto.timingSafeEqual(Buffer.from(userToken), Buffer.from(storedToken))) { ... }
`Peer Dependencies (Optional)
`json
{
"crypto-hash": ">=3.0.0",
"crypto-random-string": ">=4.0.0",
"crypto-js": ">=4.0.0"
}
`Rules
Legend
| Icon | Description |
| :---: | :--- |
| ๐ผ | Recommended: Included in the recommended preset. |
| โ ๏ธ | Warns: Set towarn in recommended preset. |
| ๐ง | Auto-fixable: Automatically fixable by the
--fix CLI option. |
| ๐ก | Suggestions: Providing code suggestions in IDE. |
| ๐ซ | Deprecated: This rule is deprecated. || Rule | CWE | OWASP | CVSS | Description | ๐ผ | โ ๏ธ | ๐ง | ๐ก | ๐ซ |
| :--- | :---: | :---: | :---: | :--- | :---: | :---: | :---: | :---: | :---: |
| no-hardcoded-crypto-key | CWE-321 | A02:2025 | 9.8 | Enforce no hardcoded crypto key | ๐ผ | | | ๐ก | |
| no-key-reuse | CWE-323 | A02:2025 | 7.5 | Enforce no key reuse | ๐ผ | โ ๏ธ | | ๐ก | |
| no-math-random-crypto | CWE-338 | A07:2025 | 5.3 | Enforce no math random crypto | ๐ผ | | | ๐ก | |
| no-numeric-only-tokens | CWE-330 | A07:2025 | 5.3 | Enforce no numeric only tokens | ๐ผ | โ ๏ธ | | ๐ก | |
| no-predictable-salt | CWE-331 | A07:2025 | 7.5 | Enforce no predictable salt | ๐ผ | | | ๐ก | |
| no-web-crypto-export | CWE-321 | A02:2025 | 5.0 | Enforce no web crypto export | ๐ผ | โ ๏ธ | | ๐ก | |
| require-authenticated-encryption | CWE-327 | A04:2025 | 6.5 | Enforce require authenticated encryption | ๐ผ | โ ๏ธ | | ๐ก | |
| require-key-length | CWE-326 | A02:2025 | 7.5 | Enforce require key length | ๐ผ | โ ๏ธ | | ๐ก | |
| require-random-iv | CWE-329 | A02:2025 | 7.5 | Enforce require random iv | ๐ผ | โ ๏ธ | | ๐ก | |
| require-secure-pbkdf2-digest | CWE-916 | A02:2025 | 9.1 | Enforce require secure pbkdf2 digest | ๐ผ | | | ๐ก | |
| require-sufficient-length | CWE-326 | A02:2025 | 7.5 | Enforce require sufficient length | ๐ผ | โ ๏ธ | | ๐ก | |
๐ Related ESLint Plugins
Part of the Interlace ESLint Ecosystem โ AI-native security plugins with LLM-optimized error messages:
| Plugin | Downloads | Description |
| :--- | :---: | :--- |
|
eslint-plugin-secure-coding |  | General security rules & OWASP guidelines. |
| eslint-plugin-pg |  | PostgreSQL security & best practices. |
| eslint-plugin-crypto |  | NodeJS Cryptography security rules. |
| eslint-plugin-jwt |  | JWT security & best practices. |
| eslint-plugin-browser-security |  | Browser-specific security & XSS prevention. |
| eslint-plugin-express-security |  | Express.js security hardening rules. |
| eslint-plugin-lambda-security |  | AWS Lambda security best practices. |
| eslint-plugin-nestjs-security |  | NestJS security rules & patterns. |
| eslint-plugin-mongodb-security |  | MongoDB security best practices. |
| eslint-plugin-vercel-ai-security |  | Vercel AI SDK security hardening. |
| eslint-plugin-import-next` |  | Next-gen import sorting & architecture. |MIT ยฉ Ofri Peretz