Package Exports
- eslint-plugin-lambda-security
- eslint-plugin-lambda-security/types
Readme
Security best practices for AWS Lambda functions (IAM, timeouts, environment).
Description
This plugin secures your AWS Lambda functions by enforcing best practices related to IAM permissions, timeout configurations, and environment variable management. It proactively detects vulnerabilities such as over-permissive policies and insecure logging practices, helping you adhere to the Principle of Least Privilege. Implementing these checks ensures that your serverless architecture remains resilient and compliant with strict security standards.
Philosophy
Interlace fosters strength through integration. Instead of stacking isolated rules, we interlace security directly into your workflow to create a resilient fabric of code. We believe tools should guide rather than gatekeep, providing educational feedback that strengthens the developer with every interaction.
Getting Started
- To check out the guide, visit eslint.interlace.tools. ๐
- ่ฆๆฅ็ไธญๆ ๆๅ, ่ฏท่ฎฟ้ฎ eslint.interlace.tools. ๐
- ๊ฐ์ด๋ ๋ฌธ์๋ eslint.interlace.tools์์ ํ์ธํ์ค ์ ์์ต๋๋ค. ๐
- ใฌใคใใฏ eslint.interlace.toolsใงใ็ขบ่ชใใ ใใใ ๐
- Para ver la guรญa, visita eslint.interlace.tools. ๐
- ููุงุทูุงุน ุนูู ุงูุฏูููุ ูู ุจุฒูุงุฑุฉ eslint.interlace.tools. ๐
npm install eslint-plugin-lambda-security --save-dev๐ก What you get
- Serverless-focused coverage: 5 rules targeting Lambda-specific vulnerabilities (credentials, CORS, secrets, logging).
- LLM-optimized & MCP-ready: Structured 2-line messages with CWE + OWASP + CVSS + concrete fixes so humans and AI auto-fixers stay aligned.
- Standards aligned: OWASP Serverless Top 10, CWE tagging, CVSS scoring in every finding for compliance mapping.
- Tiered presets:
recommended,strictfor fast policy rollout. - Framework-aware: Detects Middy middleware, API Gateway response patterns, AWS SDK v3 clients.
- Low false positive rate: Context-aware detection with production heuristics.
Every security rule produces a structured 2-line error message:
src/handlers/api.ts
18:5 error ๐ CWE-798 OWASP:SAS-2 CVSS:9.8 | Hardcoded AWS credentials detected | CRITICAL [SOC2,PCI-DSS]
Fix: Use credential provider chain or Lambda execution role | https://owasp.org/...Each message includes:
- ๐ CWE reference - vulnerability classification
- ๐ OWASP category - Serverless Top 10 mapping
- ๐ CVSS score - severity rating (0.0-10.0)
- ๐ข Compliance tags - affected frameworks (SOC2, PCI-DSS, HIPAA)
- โ Fix instruction - exact code to write
- ๐ Documentation link - learn more
โ๏ธ Configuration Presets
| Preset | Description |
|---|---|
recommended |
Balanced security for Lambda projects (critical as error, others warn) |
strict |
Maximum security enforcement (all rules as errors) |
๐ Supported Libraries
| Library | npm | Downloads | Detection |
|---|---|---|---|
aws-lambda |
IAM, Logging, Timeouts | ||
@aws-sdk/client-lambda |
Credential Safety | ||
middy |
Middleware Security |
โ๏ธ Configuration Options
All rules accept these common options:
{
rules: {
'lambda-security/no-hardcoded-credentials-sdk': ['error', {
allowInTests: true // Default: true - skip test files
}],
'lambda-security/no-secrets-in-env': ['error', {
allowInTests: true,
additionalPatterns: ['CUSTOM_SECRET_*'] // Additional patterns to detect
}]
}
}๐ข Enterprise Integration Example
// eslint.config.js
import lambdaSecurity from 'eslint-plugin-lambda-security';
export default [
// Baseline for all Lambda functions
lambdaSecurity.configs.recommended,
// Strict mode for payment/auth handlers
{
files: ['functions/payments/**', 'functions/auth/**'],
...lambdaSecurity.configs.strict,
},
];Rules
Legend
| Icon | Description |
|---|---|
| ๐ผ | Recommended: Included in the recommended preset. |
| โ ๏ธ | Warns: Set towarn in recommended preset. |
| ๐ง | Auto-fixable: Automatically fixable by the --fix CLI option. |
| ๐ก | Suggestions: Providing code suggestions in IDE. |
| ๐ซ | Deprecated: This rule is deprecated. |
AI-Optimized Messages
This plugin is optimized for ESLint's Model Context Protocol (MCP), enabling AI assistants like Cursor, GitHub Copilot, and Claude to:
- Understand the exact vulnerability type via CWE references
- Apply the correct fix using structured guidance
- Provide educational context to developers
src/handlers/api.ts
18:5 error ๐ CWE-798 OWASP:SAS-2 CVSS:9.8 | Hardcoded AWS credentials detected | CRITICAL [SOC2,PCI-DSS]
Fix: Use credential provider chain or Lambda execution role | https://owasp.org/...// .cursor/mcp.json
{
"mcpServers": {
"eslint": {
"command": "npx",
"args": ["@eslint/mcp@latest"]
}
}
}By providing this structured context (CWE, OWASP, Fix), we enable AI tools to reason about the security flaw rather than hallucinating. This allows Copilot/Cursor to suggest the exact correct fix immediately.
๐ Privacy
This plugin runs 100% locally. No data ever leaves your machine.
๐ Related ESLint Plugins
Part of the Interlace ESLint Ecosystem โ AI-native security plugins with LLM-optimized error messages:
| Plugin | Downloads | Description |
|---|---|---|
eslint-plugin-secure-coding |
General security rules & OWASP guidelines. | |
eslint-plugin-pg |
PostgreSQL security & best practices. | |
eslint-plugin-crypto |
NodeJS Cryptography security rules. | |
eslint-plugin-jwt |
JWT security & best practices. | |
eslint-plugin-browser-security |
Browser-specific security & XSS prevention. | |
eslint-plugin-express-security |
Express.js security hardening rules. | |
eslint-plugin-lambda-security |
AWS Lambda security best practices. | |
eslint-plugin-nestjs-security |
NestJS security rules & patterns. | |
eslint-plugin-mongodb-security |
MongoDB security best practices. | |
eslint-plugin-vercel-ai-security |
Vercel AI SDK security hardening. | |
eslint-plugin-import-next |
Next-gen import sorting & architecture. |
๐ License
MIT ยฉ Ofri Peretz
