use crate::ops::security_detection::detector_support::{attacks, DetectionError};
pub const SPEC_TOML: &str = r#"schema_version = 1
id = "security_detection.detect_xss"
archetype = "rule-bytes-to-bool"
display_name = "Detect XSS"
summary = "Returns true for script tags, JavaScript URLs, or executable event handlers."
category = "C"
[intrinsic]
wgsl = "security_detection_detect_xss"
[signature]
inputs = ["Bytes"]
output = "Bool"
laws = []
equivalence_classes = ["script_tag", "event_handler", "plain_html", "t47_cap"]
workgroup_size = [64, 1, 1]
tags = ["security-detection", "xss", "owasp", "t47"]
fixtures_dir = "fixtures/"
"#;
pub const REFERENCE_VECTORS_TOML: &str = r#"[[case]]
name = "positive_script"
input = "<script>alert(1)</script>"
expected = true
[[case]]
name = "negative_plain_html"
input = "<p>safe markup</p>"
expected = false
"#;
pub mod lowering {
#[must_use]
pub const fn source() -> &'static str {
r#"struct Params {
input_len: u32,
_pad0: u32,
_pad1: u32,
_pad2: u32,
}
@group(0) @binding(0) var<storage, read> input: array<u32>;
@group(0) @binding(1) var<storage, read_write> output: array<u32>;
@group(0) @binding(2) var<uniform> params: Params;
fn lower_ascii(byte: u32) -> u32 {
if (byte >= 65u && byte <= 90u) {
return byte + 32u;
}
return byte;
}
fn matches_at(index: u32, n0: u32, n1: u32, n2: u32, n3: u32, n4: u32, n5: u32, n6: u32, n7: u32, n8: u32, n9: u32, n10: u32, len: u32) -> bool {
if (index + len > params.input_len) {
return false;
}
let needle = array<u32, 11>(n0, n1, n2, n3, n4, n5, n6, n7, n8, n9, n10);
for (var offset = 0u; offset < len; offset = offset + 1u) {
if (lower_ascii(input[index + offset]) != needle[offset]) {
return false;
}
}
return true;
}
fn contains_pattern(lane: u32, n0: u32, n1: u32, n2: u32, n3: u32, n4: u32, n5: u32, n6: u32, n7: u32, n8: u32, n9: u32, n10: u32, len: u32) -> bool {
for (var index = lane; index < params.input_len; index = index + 64u) {
if (matches_at(index, n0, n1, n2, n3, n4, n5, n6, n7, n8, n9, n10, len)) {
return true;
}
}
return false;
}
var<workgroup> lane_matches: array<u32, 64>;
@compute @workgroup_size(64)
fn security_detection_detect_xss(@builtin(local_invocation_id) lid: vec3<u32>) {
let lane = lid.x;
lane_matches[lane] = select(0u, 1u,
contains_pattern(lane, 60u, 115u, 99u, 114u, 105u, 112u, 116u, 0u, 0u, 0u, 0u, 7u) ||
contains_pattern(lane, 106u, 97u, 118u, 97u, 115u, 99u, 114u, 105u, 112u, 116u, 58u, 11u) ||
contains_pattern(lane, 111u, 110u, 101u, 114u, 114u, 111u, 114u, 61u, 0u, 0u, 0u, 8u) ||
contains_pattern(lane, 111u, 110u, 108u, 111u, 97u, 100u, 61u, 0u, 0u, 0u, 0u, 7u));
workgroupBarrier();
if (lane == 0u) {
var found = 0u;
for (var i = 0u; i < 64u; i = i + 1u) {
found = found | lane_matches[i];
}
output[0] = found;
}
}
"#
}
}
pub fn detect_xss(input: &[u8]) -> Result<bool, DetectionError> {
attacks::detect_xss(input)
}
pub mod implementation {
pub use super::detect_xss;
pub mod kernel {
pub use super::super::detect_xss;
}
pub mod lowering {
pub mod wgsl {
pub use super::super::super::lowering::source;
}
}
}