infected header scanning enhanced

This commit is contained in:
laxmanhalaki 2026-02-26 18:43:21 +05:30
parent aa18e3c34d
commit 3c8fed7d2f
5 changed files with 28 additions and 15 deletions

View File

@ -1 +1 @@
import{a as s}from"./index-DzZrtI-x.js";import"./radix-vendor-CYvDqP9X.js";import"./charts-vendor-BVfwAPj-.js";import"./utils-vendor-BTBPSQfW.js";import"./ui-vendor-CX5oLBI_.js";import"./socket-vendor-TjCxX7sJ.js";import"./redux-vendor-tbZCm13o.js";import"./router-vendor-B_rK4TXr.js";async function m(n){return(await s.post(`/conclusions/${n}/generate`)).data.data}async function f(n,t){return(await s.post(`/conclusions/${n}/finalize`,{finalRemark:t})).data.data}async function d(n){var t;try{return(await s.get(`/conclusions/${n}`)).data.data}catch(o){if(((t=o.response)==null?void 0:t.status)===404)return null;throw o}}export{f as finalizeConclusion,m as generateConclusion,d as getConclusion};
import{a as s}from"./index-BCZm9H2Q.js";import"./radix-vendor-CYvDqP9X.js";import"./charts-vendor-BVfwAPj-.js";import"./utils-vendor-BTBPSQfW.js";import"./ui-vendor-CX5oLBI_.js";import"./socket-vendor-TjCxX7sJ.js";import"./redux-vendor-tbZCm13o.js";import"./router-vendor-B_rK4TXr.js";async function m(n){return(await s.post(`/conclusions/${n}/generate`)).data.data}async function f(n,t){return(await s.post(`/conclusions/${n}/finalize`,{finalRemark:t})).data.data}async function d(n){var t;try{return(await s.get(`/conclusions/${n}`)).data.data}catch(o){if(((t=o.response)==null?void 0:t.status)===404)return null;throw o}}export{f as finalizeConclusion,m as generateConclusion,d as getConclusion};

File diff suppressed because one or more lines are too long

View File

@ -13,7 +13,7 @@
<!-- Preload essential fonts and icons -->
<link rel="preconnect" href="https://fonts.googleapis.com">
<link rel="preconnect" href="https://fonts.gstatic.com" crossorigin>
<script type="module" crossorigin src="/assets/index-DzZrtI-x.js"></script>
<script type="module" crossorigin src="/assets/index-BCZm9H2Q.js"></script>
<link rel="modulepreload" crossorigin href="/assets/charts-vendor-BVfwAPj-.js">
<link rel="modulepreload" crossorigin href="/assets/radix-vendor-CYvDqP9X.js">
<link rel="modulepreload" crossorigin href="/assets/utils-vendor-BTBPSQfW.js">

View File

@ -152,7 +152,7 @@ export function scanContentForXSS(
patterns = [...UNIVERSAL_XSS_PATTERNS, ...SVG_XSS_PATTERNS];
break;
case 'PDF':
patterns = [...PDF_XSS_PATTERNS];
patterns = [...UNIVERSAL_XSS_PATTERNS, ...PDF_XSS_PATTERNS];
break;
case 'OFFICE':
patterns = [...OFFICE_XSS_PATTERNS];

View File

@ -96,10 +96,23 @@ const BLOCKED_PATTERNS: Array<{ pattern: RegExp; reason: string }> = [
pattern: /\.\w+\.(exe|bat|cmd|com|msi|scr|pif|vbs|vbe|js|jse|wsf|wsh|ps1|sh|bash)$/i,
reason: 'Suspicious double extension'
},
// XSS Patterns in filenames
// Dangerous characters associated with XSS and path manipulation
{
pattern: /<script|javascript:|onerror=|onload=|onclick=|alert\(|eval\(|document\./i,
reason: 'Potential XSS payload in filename'
pattern: /[<>]/,
reason: 'HTML tags or suspicious characters (<, >) not allowed in filenames'
},
// Comprehensive XSS Patterns in filenames
{
pattern: /<(script|img|svg|body|iframe|details|audio|video|embed|object|style|link|meta|html|form|input|button)/i,
reason: 'Potential XSS tag in filename'
},
{
pattern: /(javascript:|vbscript:|data:text\/html|expression\()|on(error|load|click|mouseover|focus|scroll|beforeunload|submit|change|keydown|keyup)=/i,
reason: 'Potential XSS payload or event handler in filename'
},
{
pattern: /(script|alert|eval|document\.|window\.|localStorage|sessionStorage|cookie|prompt|confirm)\(/i,
reason: 'Malicious JavaScript functions detected in filename'
},
];