redos-detector
v6.0.2
Published
A CLI and library which tests helps score how vulnerable a regex pattern is to ReDoS attacks. Supported in the browser, Node and Deno.
Downloads
37,030
Readme
redos-detector
A CLI and library which tests helps score how vulnerable a regex pattern is to ReDoS attacks. Supported in the browser, Node and Deno.
Note you should make sure that the input string has a sensible length limit, as the amount of work needed to process the input may increase with the length of the string.
What does it do?
- It calculates all the different paths an input string could take through the provided pattern.
- Then for each candidate path found above, starting from just the first character, up to the complete path, it finds all the other paths that could also match a string that matches the candidate path.
- The score is the highest number found above. The higher the score, the more backtracks an engine will potentially need to take if the input string doesn't match the pattern.
- If the score is
1
this means no backtracks can occur and for every possible input string the pattern could only match one way. - If there are too many different paths it can be too expensive to calculate an accurate score, so it falls back incrementing every time a new path is found.
Note that this tool checks patterns that are expected to run using an engine that implements the ECMA-262 (JS) standard. If your pattern will be run in a different engine please be aware the result given here could be incorrect due to differences in engine behaviour.
Example
With ^(.|a)(.|b)$
there are 6 candidate paths:
.
a
..
.b
a.
ab
Path 1 and 2 will be put into a group because an input string of a
would match both. This would have a candidate score of 2.
Paths 3, 4, 5 and 6 will also be put into a group because an input string of ab
would match them all. Therefore this group would have a candidate score of 4.
Therefore the score that's reported would be 4.
Note in reality with the input ab!
it would backtrack 5 times (3 for ab
, and then 2 for a
), but the returned score is just the highest for a given prefix of the input string. This is because we don't know the maximum length the input string could be. E.g. with ^.a*.$
the total number of backtracks will be higher the more a
's there are.
Demo
https://redosdetector.com/ [Source]
Usage
This can be used via the CLI, or as a library. It's on npm.
There's also an ESLint plugin "eslint-plugin-redos-detector".
Result Structure
The following is the structure of the result you will get from both isSafe
, isSafePattern
and the CLI with the --json
flag.
Root
type Root = {
safe: boolean;
error: null | 'hitMaxScore' | 'hitMaxSteps' | 'timedOut';
trails: Trail[];
patternDowngraded: boolean;
pattern: string;
score:
| {
infinite: true;
}
| {
infinite: false;
value: number;
};
};
Trail
type Trail = {
trail: {
a: Side;
b: Side;
}[];
};
Side
type Side = {
backreferenceStack: {
index: number;
node: Node;
}[];
node: Node;
quantifierIterations: {
iteration: number;
node: Node;
}[];
};
Node
type Node = {
start: Location;
end: Location;
source: string;
};
Location
type Location = {
offset: number;
};
Options
The following options exist for both the library and CLI:
caseInsensitive
: Enable case insensitive mode. (Default:false
)unicode
: Enable unicode mode. (Default:false
)dotAll
: Enable dot-all mode, which allows.
to match new lines. (Default:false
)multiLine
: Enable multi-line mode, which changes^
and$
to match the start or end of any line within the string. (Default:false
)maxScore
: If the score goes above this number, the regex will be considered unsafe. (Default:200
)maxSteps
: The maximum number of steps to make. If this limit is hiterror
will behitMaxSteps
. You probably don't need to change this. (Default:20000
)timeout
: The maximum amount of time (ms) to spend processing. Once this time is passed the trails found so far will be returned, and theerror
will betimeout
. (Default:Infinity
)downgradePattern
: Automatically downgrade the pattern if it's not supported as is. If this happenspatternDowngraded
will betrue
andpattern
will contain the downgraded version. An exception may be thrown if the pattern needed to be downgraded and it wasn't. (Default:true
)
Note it's possible for there to be a infinite number of results, so you should probably make sure at least one of the maxSteps
and timeout
options is set to a finite number.
CLI
$ npx redos-detector check "<regex pattern>" (--caseInsensitive) (--unicode) (--dotAll) (--multiLine) (--maxScore <number>) (--maxSteps <number>) (--timeout <number>) (--alwaysIncludeTrails) (--disableDowngrade) (--resultsLimit <number>) (--json)
to run on the fly or
$ npm i -g redos-detector
to make the command available globally as redos-detector
.
By default this will output the result in a text format, and the exit status will be 0
if the pattern is safe, otherwise non-0
. You should not try and parse this text output as it may change between any version.
Only the first 15 results will be shown in the text output, but this can be changed with the --resultsLimit
option. This option is ignored with --json
.
The --json
option will result in JSON being outputted containing more information. The structure of this will follow semantic versioning. When this option is used the exit status will always be 0
(unless an exception occurred), so you should always check the safe
property to determine if the pattern is safe.
Library
$ npm install redos-detector
The following functions are provided:
isSafe(regexp: RegExp, options?: { maxScore?: number, maxSteps?: number, timeout?: number, downgradePattern?: boolean })
: This takes aRegExp
. Thei
andu
flags are supported.isSafePattern(pattern: string, options?: { maxScore?: number, maxSteps?: number, timeout?: number, downgradePattern?: boolean, caseInsensitive?: boolean, unicode?: boolean, dotAll?: boolean, multiLine?: boolean })
: This takes just the pattern as a string. E.g.a*
.downgradePattern(input: { pattern: string, unicode: boolean }
: This downgrades the provided pattern to one which is supported. You won't need to use this unless you set thedowngradePattern
option tofalse
.
Further Examples
Good
isSafe(/^([a-c]*)d([a-c]*)$/).safe === true;
because for any given input string this can only match in one way, or not match.
Bad
isSafe(/^([a-b]*)([a-c]*)$/).safe === false;
because the input a
could match in both places. The input ax
could result in both being tried.
The CLI would output the following for this:
Regex is not safe. There could be infinite backtracks.
The following trails show how the same input can be matched multiple ways.
2: `[a-b]` | 10: `[a-c]`
10: `[a-c]` | 10: `[a-c]`
=========================
2: `[a-b]` | 2: `[a-b]`
2: `[a-b]` | 10: `[a-c]`
10: `[a-c]` | 10: `[a-c]`
=========================
The first result means you could have a match where given the same input string, [a-c]
takes a character (at position 10), or [a-b]
takes a character (at position 2).
Note this could be made good again by making the first group atomic. Atomic groups are not supported directly right now, but can be inferred using a pattern like ^(?=([a-b]*))\1([a-c]*)$
(Demo).
isSafe(/^(a|a)+$/).safe === false;
is bad because in the group a
could match on both sides. The input aaaaaa!
could result in many combinations being tried.
Useful Resources
Here are some great resources, which I found super helpful when building this.
- https://www.regular-expressions.info/: Site containing everything you'd want to know about Regular Expressions.
- https://regexper.com/: Tool for visualising a regex pattern as a chart.
- https://regex101.com/: Tool for testing a pattern with syntax highlighting and useful information.
- https://github.com/jviereck/regjsparser: Parser used by this project.
- Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers: A paper which demonstrates how simple unbounded patterns can be expensive.